-
4
-
-
34249871944
-
A qualitative study of users' view on information security
-
Jun. 2007
-
Albrechtsen, E. 2007. A qualitative study of users' view on information security. Computers & Security. 26, 4 (Jun. 2007), 276-289.
-
(2007)
Computers & Security
, vol.26
, Issue.4
, pp. 276-289
-
-
Albrechtsen, E.1
-
5
-
-
0017472917
-
Self-efficacy: Toward a unifying theory of behavioral change
-
1977
-
Bandura, A. 1977. Self-efficacy: toward a unifying theory of behavioral change. Psychological review. (1977).
-
(1977)
Psychological Review
-
-
Bandura, A.1
-
6
-
-
85011237933
-
I wanna tell you a story”: Exploring the application of vignettes in qualitative research with children and young people
-
2000
-
Barter, C. and Renold, E. 2000. “I wanna tell you a story”: exploring the application of vignettes in qualitative research with children and young people. International Journal of Social Research Methodology. 3, 4 (2000), 307-323.
-
(2000)
International Journal of Social Research Methodology
, vol.3
, Issue.4
, pp. 307-323
-
-
Barter, C.1
Renold, E.2
-
7
-
-
0038491740
-
The use of vignettes in qualitative research
-
1999
-
Barter, C. and Renold, E. 1999. The use of vignettes in qualitative research. Social research update. 25, 9 (1999), 1-6.
-
(1999)
Social Research Update
, vol.25
, Issue.9
, pp. 1-6
-
-
Barter, C.1
Renold, E.2
-
9
-
-
84924405869
-
Cyber security in the workplace: Understanding and promoting behaviour change
-
2013
-
Blythe, J.M. 2013. Cyber security in the workplace: Understanding and promoting behaviour change. Proceedings of CHItaly 2013 Doctoral Consortium (2013), 92-101.
-
(2013)
Proceedings of CHItaly 2013 Doctoral Consortium
, pp. 92-101
-
-
Blythe, J.M.1
-
12
-
-
77957061746
-
Information security policy compliance: An empirical study of rationality-based beliefs and information security awareness
-
2010
-
Bulgurcu, B., Cavusoglu, H. and Benbasat, I. 2010. Information security policy compliance: an empirical study of rationality-based beliefs and information security awareness. MIS Quarterly. 34, 3 (2010), 523-548.
-
(2010)
MIS Quarterly
, vol.34
, Issue.3
, pp. 523-548
-
-
Bulgurcu, B.1
Cavusoglu, H.2
Benbasat, I.3
-
13
-
-
84873421010
-
Applying the Theory of planned behaviour to predicting online safety behaviour
-
Feb. 2013
-
Burns, S. and Roberts, L. 2013. Applying the Theory of Planned Behaviour to predicting online safety behaviour. Crime Prevention and Community Safety. 15, 1 (Feb. 2013), 48-64.
-
(2013)
Crime Prevention and Community Safety
, vol.15
, Issue.1
, pp. 48-64
-
-
Burns, S.1
Roberts, L.2
-
15
-
-
84887485725
-
Using the health belief model to explore users' perceptions of “being safe and secure” in the world of technology mediated financial transactions
-
Feb. 2014
-
Davinson, N. and Sillence, E. 2014. Using the health belief model to explore users' perceptions of “being safe and secure” in the world of technology mediated financial transactions. International Journal of Human-Computer Studies. 72, 2 (Feb. 2014), 154-168.
-
(2014)
International Journal of Human-Computer Studies
, vol.72
, Issue.2
, pp. 154-168
-
-
Davinson, N.1
Sillence, E.2
-
16
-
-
49049114397
-
The centrality of awareness in the formation of user behavioral intention toward protective information technologies
-
2007
-
Dinev, T. and Hu, Q. 2007. The Centrality of Awareness in the Formation of User Behavioral Intention toward Protective Information Technologies. Journal of the Association for Information System. 8, 7 (2007), 386-408.
-
(2007)
Journal of the Association for Information System
, vol.8
, Issue.7
, pp. 386-408
-
-
Dinev, T.1
Hu, Q.2
-
17
-
-
84900482702
-
Security in the wild: User strategies for managing security as an everyday, practical problem
-
2004
-
Dourish, P., Grinter, R.E., De La Flor, J.D. and Joseph, M. 2004. Security in the wild: User strategies for managing security as an everyday, practical problem. Personal and Ubiquitous Computing. 8, 6 (2004), 391-401.
-
(2004)
Personal and Ubiquitous Computing
, vol.8
, Issue.6
, pp. 391-401
-
-
Dourish, P.1
Grinter, R.E.2
De La Flor, J.D.3
Joseph, M.4
-
18
-
-
8144226845
-
Elicitation studies and the theory of planned behavior: A systematic review of exercise beliefs
-
Jan. 2005
-
Downs, D.S. and Hausenblas, H.A. 2005. Elicitation studies and the theory of planned behavior: a systematic review of exercise beliefs. Psychology of Sport and Exercise. 6, 1 (Jan. 2005), 1-31.
-
(2005)
Psychology of Sport and Exercise
, vol.6
, Issue.1
, pp. 1-31
-
-
Downs, D.S.1
Hausenblas, H.A.2
-
19
-
-
84970405810
-
The vignette technique in survey research
-
1987
-
Finch, J. 1987. The vignette technique in survey research. Sociology. 21, 1 (1987), 105-114.
-
(1987)
Sociology
, vol.21
, Issue.1
, pp. 105-114
-
-
Finch, J.1
-
20
-
-
33746766203
-
The role of theory in developing effective health communications
-
2006
-
Fishbein, M. and Cappella, J. 2006. The role of theory in developing effective health communications. Journal of Communication. 56, (2006), 1-17.
-
(2006)
Journal of Communication
, vol.56
, pp. 1-17
-
-
Fishbein, M.1
Cappella, J.2
-
21
-
-
84965799654
-
Impression management in organizations
-
1988
-
Gardner, W. and Martinko, M. 1988. Impression management in organizations. Journal of management. 14, 2 (1988), 321-338.
-
(1988)
Journal of Management
, vol.14
, Issue.2
, pp. 321-338
-
-
Gardner, W.1
Martinko, M.2
-
22
-
-
70349151365
-
Consumer motivations in taking action against spyware: An empirical investigation
-
2009
-
Gurung, A., Luo, X. and Liao, Q. 2009. Consumer motivations in taking action against spyware: an empirical investigation. Information Management & Computer Security. 17, 3 (2009), 276-289.
-
(2009)
Information Management & Computer Security
, vol.17
, Issue.3
, pp. 276-289
-
-
Gurung, A.1
Luo, X.2
Liao, Q.3
-
23
-
-
0038925782
-
Motivation through the design of work: Test of a theory
-
1976
-
Hackman, J. and Oldham, G. 1976. Motivation through the design of work: Test of a theory. Organizational Behavior and Human Performance. 16, 2 (1976), 250-279.
-
(1976)
Organizational Behavior and Human Performance
, vol.16
, Issue.2
, pp. 250-279
-
-
Hackman, J.1
Oldham, G.2
-
24
-
-
67349144062
-
Encouraging information security behaviors in organizations: Role of penalties, pressures and perceived effectiveness
-
May 2009
-
Herath, T. and Rao, H.R. 2009. Encouraging information security behaviors in organizations: Role of penalties, pressures and perceived effectiveness. Decision Support Systems. 47, 2 (May 2009), 154-165.
-
(2009)
Decision Support Systems
, vol.47
, Issue.2
, pp. 154-165
-
-
Herath, T.1
Rao, H.R.2
-
25
-
-
67650152666
-
Protection motivation and deterrence: A framework for security policy compliance in organisations
-
Apr. 2009
-
Herath, T. and Rao, H.R. 2009. Protection motivation and deterrence: a framework for security policy compliance in organisations. European Journal of Information Systems. 18, 2 (Apr. 2009), 106-125.
-
(2009)
European Journal of Information Systems
, vol.18
, Issue.2
, pp. 106-125
-
-
Herath, T.1
Rao, H.R.2
-
26
-
-
0032393265
-
Considering the vignette technique and its application to a study of drug injecting and HIV risk and safer behaviour
-
1998
-
Hughes, R. 1998. Considering the vignette technique and its application to a study of drug injecting and HIV risk and safer behaviour. Sociology of Health and Illness. 20, (1998), 381-400.
-
(1998)
Sociology of Health and Illness
, vol.20
, pp. 381-400
-
-
Hughes, R.1
-
27
-
-
0026830136
-
Validity threats in scheduled semistructured research interviews
-
1992
-
Hutchinson, S. and Wilson, H.S. 1992. Validity threats in scheduled semistructured research interviews. Nursing Research. 41, 2 (1992), 117-119.
-
(1992)
Nursing Research
, vol.41
, Issue.2
, pp. 117-119
-
-
Hutchinson, S.1
Wilson, H.S.2
-
29
-
-
84887852395
-
Information systems security policy compliance: An empirical study of the effects of socialisation, influence, and cognition
-
2014
-
Ifinedo, P. 2014. Information systems security policy compliance: An empirical study of the effects of socialisation, influence, and cognition. Information and Management. 51, 1 (2014), 69-79.
-
(2014)
Information and Management
, vol.51
, Issue.1
, pp. 69-79
-
-
Ifinedo, P.1
-
30
-
-
84856018908
-
Understanding information systems security policy compliance: An integration of the theory of planned behavior and the protection motivation theory
-
Nov. 2011
-
Ifinedo, P. 2011. Understanding information systems security policy compliance: An integration of the theory of planned behavior and the protection motivation theory. Computers & Security. 31, 1 (Nov. 2011), 83-95.
-
(2011)
Computers & Security
, vol.31
, Issue.1
, pp. 83-95
-
-
Ifinedo, P.1
-
33
-
-
77957057727
-
Fear appeals and information security behavior: An empircal study
-
2010
-
Johnston, A.C. and Warkentin, M. 2010. Fear appeals and information security behavior: An empircal study. MIS Quarterly. 34, 3 (2010), 549-566.
-
(2010)
MIS Quarterly
, vol.34
, Issue.3
, pp. 549-566
-
-
Johnston, A.C.1
Warkentin, M.2
-
34
-
-
1242263532
-
Why there aren't more information security research studies
-
May 2004
-
Kotulic, A.G. and Clark, J.G. 2004. Why there aren't more information security research studies. Information & Management. 41, 5 (May 2004), 597-607.
-
(2004)
Information & Management
, vol.41
, Issue.5
, pp. 597-607
-
-
Kotulic, A.G.1
Clark, J.G.2
-
35
-
-
56049103535
-
Locking the door but leaving the computer vulnerable: Factors inhibiting home users' adoption of software firewalls
-
Dec. 2008
-
Kumar, N., Mohan, K. and Holowczak, R. 2008. Locking the door but leaving the computer vulnerable: Factors inhibiting home users' adoption of software firewalls. Decision Support Systems. 46, 1 (Dec. 2008), 254-264.
-
(2008)
Decision Support Systems
, vol.46
, Issue.1
, pp. 254-264
-
-
Kumar, N.1
Mohan, K.2
Holowczak, R.3
-
36
-
-
51749090174
-
Keeping our network safe: A model of online protection behaviour
-
Sep. 2008
-
Lee, D., Larose, R. and Rifon, N. 2008. Keeping our network safe: a model of online protection behaviour. Behaviour & Information Technology. 27, 5 (Sep. 2008), 445-454.
-
(2008)
Behaviour & Information Technology
, vol.27
, Issue.5
, pp. 445-454
-
-
Lee, D.1
Larose, R.2
Rifon, N.3
-
37
-
-
40049109336
-
An empirical investigation of anti-spyware software adoption: A multitheoretical perspective
-
2008
-
Lee, Y. and Kozar, K. 2008. An empirical investigation of anti-spyware software adoption: A multitheoretical perspective. Information & Management. 45, 2 (2008), 109-119.
-
(2008)
Information & Management
, vol.45
, Issue.2
, pp. 109-119
-
-
Lee, Y.1
Kozar, K.2
-
38
-
-
67650141420
-
Theory of reasoned action, theory of planned behavior, and the integrated behavioral model
-
K. Glanz, B. Rimer, and K. Viswanath, eds. Jossey Bass
-
Montaño, D.E. and Kasprzyk, D. 2008. Theory of reasoned action, theory of planned behavior, and the integrated behavioral model. Health behavior and health education: theory, research, and practice. K. Glanz, B. Rimer, and K. Viswanath, eds. Jossey Bass. 67-96.
-
(2008)
Health Behavior and Health Education: Theory, Research, and Practice
, pp. 67-96
-
-
Montaño, D.E.1
Kasprzyk, D.2
-
39
-
-
80053545071
-
A socio-behavioral study of home computer users' intention to practice security
-
2005
-
Ng, B. and Rahim, M. 2005. A socio-behavioral study of home computer users' intention to practice security. PACIS 2005 Proceedings (2005), 234-247.
-
(2005)
PACIS 2005 Proceedings
, pp. 234-247
-
-
Ng, B.1
Rahim, M.2
-
40
-
-
61349092288
-
Studying users' computer security behavior: A health belief perspective
-
Mar. 2009
-
Ng, B.-Y., Kankanhalli, A. and Xu, Y. 2009. Studying users' computer security behavior: A health belief perspective. Decision Support Systems. 46, 4 (Mar. 2009), 815-825.
-
(2009)
Decision Support Systems
, vol.46
, Issue.4
, pp. 815-825
-
-
Ng, B.-Y.1
Kankanhalli, A.2
Xu, Y.3
-
42
-
-
17044369631
-
Balancing work and home: How job and home demands are related to burnout
-
2005
-
Peeters, M., Montgomery, A., Bakker, A. and Schaufeli, W. 2005. Balancing Work and Home: How Job and Home Demands Are Related to Burnout. International Journal of Stress Management. 12, 1 (2005), 43-61.
-
(2005)
International Journal of Stress Management
, vol.12
, Issue.1
, pp. 43-61
-
-
Peeters, M.1
Montgomery, A.2
Bakker, A.3
Schaufeli, W.4
-
44
-
-
0001457476
-
-
London: Routledge. 1994
-
Ritchie, J., Spencer, L., Bryman, A. and Burgess, R. 1994. Analysing qualitative data. London: Routledge. (1994).
-
(1994)
Analysing Qualitative Data
-
-
Ritchie, J.1
Spencer, L.2
Bryman, A.3
Burgess, R.4
-
45
-
-
0001840352
-
A protection motivation theory of fear appeals and attitude change
-
Rogers, R.W. 1975. A protection motivation theory of fear appeals and attitude change. Journal of Psychology. 91, (1975), 93-114.
-
(1975)
Journal of Psychology
, vol.91
, Issue.1975
, pp. 93-114
-
-
Rogers, R.W.1
-
46
-
-
0034068688
-
Compliance with eye patching in children and its psychosocial effects: A qualitative application of protection motivation theory
-
2000
-
Searle, A., Vedhara, K., Norman, P., Frost, A. and Harrad, R. 2000. Compliance with eye patching in children and its psychosocial effects: a qualitative application of protection motivation theory. Psychology, Health & Medicine. 5, 1 (2000), 43-54.
-
(2000)
Psychology, Health & Medicine
, vol.5
, Issue.1
, pp. 43-54
-
-
Searle, A.1
Vedhara, K.2
Norman, P.3
Frost, A.4
Harrad, R.5
-
47
-
-
77954785765
-
Multicultural vignettes for teacher preparation
-
2002
-
Seguin, C.A. and Ambrosio, A. 2002. Multicultural vignettes for teacher preparation. Multicultural Perspectives. 4, 4 (2002), 10-16.
-
(2002)
Multicultural Perspectives
, vol.4
, Issue.4
, pp. 10-16
-
-
Seguin, C.A.1
Ambrosio, A.2
-
48
-
-
85006082697
-
Intention - Behavior relations: A conceptual and empirical review
-
2002
-
Sheeran, P. 2002. Intention - Behavior Relations: A Conceptual and Empirical Review. European Review of Social Psychology. 12, 1 (2002), 1-36.
-
(2002)
European Review of Social Psychology
, vol.12
, Issue.1
, pp. 1-36
-
-
Sheeran, P.1
-
49
-
-
84891789669
-
Employees' adherence to information security policies: An exploratory field study
-
Dec. 2014
-
Siponen, M., Mahmood, M.A. and Pahnila, S. 2014. Employees' adherence to information security policies: An exploratory field study. Information & Management. 51, 2 (Dec. 2014), 217-224.
-
(2014)
Information & Management
, vol.51
, Issue.2
, pp. 217-224
-
-
Siponen, M.1
Mahmood, M.A.2
Pahnila, S.3
-
51
-
-
79952911896
-
Spyware and adware: How do internet users defend themselves?
-
2009
-
Sriramachandramurthy, R., Balasubramanian, S.K. and Hodis, M.A. 2009. Spyware and adware: how do internet users defend themselves? American Journal of Business. 24, 2 (2009), 41-52.
-
(2009)
American Journal of Business
, vol.24
, Issue.2
, pp. 41-52
-
-
Sriramachandramurthy, R.1
Balasubramanian, S.K.2
Hodis, M.A.3
-
52
-
-
79960049010
-
Framework analysis: A qualitative methodology for applied policy research
-
2009
-
Srivastava, A. and Thomson, S. 2009. Framework analysis: a qualitative methodology for applied policy research. Joaag. (2009).
-
(2009)
Joaag
-
-
Srivastava, A.1
Thomson, S.2
-
53
-
-
17844366573
-
Analysis of end user security behaviors
-
Mar. 2005
-
Stanton, J., Stam, K., Mastrangelo, P. and Jolton, J. 2005. Analysis of end user security behaviors. Computers & Security. 24, 2 (Mar. 2005), 124-133.
-
(2005)
Computers & Security
, vol.24
, Issue.2
, pp. 124-133
-
-
Stanton, J.1
Stam, K.2
Mastrangelo, P.3
Jolton, J.4
-
54
-
-
33750923703
-
Cultivating an organizational information security culture
-
von and 2006
-
Thomson, K., Solms, R. von and Louw, L. 2006. Cultivating an organizational information security culture. Computer Fraud & Security. (2006).
-
(2006)
Computer Fraud & Security
-
-
Thomson, K.1
Solms, R.2
Louw, L.3
-
55
-
-
84861093724
-
Motivating IS security compliance: Insights from habit and protection motivation theory
-
May 2012
-
Vance, A., Siponen, M. and Pahnila, S. 2012. Motivating IS security compliance: Insights from Habit and Protection Motivation Theory. Information & Management. 49, 3-4 (May 2012), 190-198.
-
(2012)
Information & Management
, vol.49
, Issue.3-4
, pp. 190-198
-
-
Vance, A.1
Siponen, M.2
Pahnila, S.3
-
56
-
-
0023717136
-
Self-efficacy: The third factor besides attitude and subjective norm as a predictor of behavioural intentions
-
de, 1988
-
Vries, H. de, Dijkstra, M. and Kuhlman, P. 1988. Self-efficacy: the third factor besides attitude and subjective norm as a predictor of behavioural intentions. Health education research. (1988).
-
(1988)
Health Education Research
-
-
Vries, H.1
Dijkstra, M.2
Kuhlman, P.3
-
57
-
-
32044435280
-
Designing vignette studies in marketing
-
2002
-
Wason, K., Polonsky, M. and Hyman, M. 2002. Designing vignette studies in marketing. Australasian Marketing Journal (AMJ). 10, 3 (2002), 41-58.
-
(2002)
Australasian Marketing Journal (AMJ)
, vol.10
, Issue.3
, pp. 41-58
-
-
Wason, K.1
Polonsky, M.2
Hyman, M.3
-
58
-
-
51349158689
-
Security lapses and the omission of information security measures: A threat control model and empirical test
-
Sep. 2008
-
Workman, M., Bommer, W. and Straub, D. 2008. Security lapses and the omission of information security measures: A threat control model and empirical test. Computers in Human Behavior. 24, 6 (Sep. 2008), 2799-2816.
-
(2008)
Computers in Human Behavior
, vol.24
, Issue.6
, pp. 2799-2816
-
-
Workman, M.1
Bommer, W.2
Straub, D.3
-
59
-
-
52749096686
-
Predicting self-protections of online privacy
-
Oct. 2008
-
Yao, M.Z. and Linz, D.G. 2008. Predicting self-protections of online privacy. Cyberpsychology & behavior: the impact of the Internet, multimedia and virtual reality on behavior and society. 11, 5 (Oct. 2008), 615-7.
-
(2008)
Cyberpsychology & Behavior: The Impact of the Internet, Multimedia and Virtual Reality on Behavior and Society
, vol.11
, Issue.5
, pp. 615-617
-
-
Yao, M.Z.1
Linz, D.G.2
|