Personality Traits and Cognitive Determinants – An Empirical Investigation of the Use of Smartphone Security Measures
暂无分享,去创建一个
[1] Yufei Yuan,et al. Understanding User's Behaviors in Coping with Security Threat of Mobile Devices Loss and Theft , 2012, 2012 45th Hawaii International Conference on System Sciences.
[2] Oded Nov,et al. Personality and Technology Acceptance: Personal Innovativeness in IT, Openness and Resistance to Change , 2008, Proceedings of the 41st Annual Hawaii International Conference on System Sciences (HICSS 2008).
[3] Younghwa Lee,et al. The Technology Acceptance Model: Past, Present, and Future , 2003, Commun. Assoc. Inf. Syst..
[4] Detmar W. Straub,et al. Specifying Formative Constructs in Information Systems Research , 2007, MIS Q..
[5] Wynne W. Chin. Issues and Opinion on Structural Equation Modeling by , 2009 .
[6] Sebastian Möller,et al. On the need for different security methods on mobile phones , 2011, Mobile HCI.
[7] Steven Furnell,et al. From desktop to mobile: Examining the security experience , 2009, Comput. Secur..
[8] Jan Guynes Clark,et al. Why there aren't more information security research studies , 2004, Inf. Manag..
[9] Gaurav Bansal. Security Concerns in the Nomological Network of Trust and Big 5: First Order Vs. Second Order , 2011, ICIS.
[10] P. Costa,et al. Facet Scales for Agreeableness and Conscientiousness: A Revision of the NEO Personality Inventory☆ , 1991 .
[11] Robert F. Easley,et al. Research Note - How Does Personality Matter? Relating the Five-Factor Model to Technology Acceptance and Use , 2008, Inf. Syst. Res..
[12] Dennis F. Galletta,et al. User Awareness of Security Countermeasures and Its Impact on Information Systems Misuse: A Deterrence Approach , 2009, Inf. Syst. Res..
[13] Detmar W. Straub,et al. Structural Equation Modeling and Regression: Guidelines for Research Practice , 2000, Commun. Assoc. Inf. Syst..
[14] Jan Marco Leimeister,et al. Consumerization - IT Innovations from the Consumer Market as a Challenge for Corporate IT , 2012, Bus. Inf. Syst. Eng..
[15] Wei Wang. How Personality Affects Continuance Intention: An Empirical Investigation of Instant Messaging , 2010, PACIS.
[16] Michael H. Breitner,et al. Employees' Information Security Awareness and Behavior: A Literature Review , 2013, 2013 46th Hawaii International Conference on System Sciences.
[17] Ruth C. King,et al. Service Convenience and Relational Exchange in Electronic Mediated Environment: An Empirical Investigation , 2008, ICIS.
[18] Rajeev Sharma,et al. The Contingent Effects of Management Support and Task Interdependence on Successful Information Systems Implementation , 2003, MIS Q..
[19] Appa Rao Korukonda,et al. Differences that do matter: A dialectic analysis of individual characteristics and personality dimensions contributing to computer anxiety , 2007, Comput. Hum. Behav..
[20] Murray R. Barrick,et al. Personality and Performance at the Beginning of the New Millennium: What Do We Know and Where Do We Go Next? , 2001 .
[21] Norman A. Johnson,et al. Personality traits and concern for privacy: an empirical study in the context of location-based services , 2008, Eur. J. Inf. Syst..
[22] A. Adam. Whatever happened to information systems ethics? Caught between the devil and the deep blue sea , 2004 .
[23] James C. McElroy,et al. Dispositional Factors in Internet Use: Personality Versus Cognitive Style , 2007, MIS Q..
[24] I. Ajzen. The theory of planned behavior , 1991 .
[25] Steven Furnell,et al. Authentication of users on mobile telephones - A survey of attitudes and practices , 2005, Comput. Secur..
[26] Hock-Hai Teo,et al. Decision-Maker Mindfulness in IT Adoption: The Role of Informed Culture and Individual Personality , 2009, ICIS.
[27] Izak Benbasat,et al. Predicting Intention to Adopt Interorganizational Linkages: An Institutional Perspective , 2003, MIS Q..
[28] T. Judge,et al. Personality and leadership: a qualitative and quantitative review. , 2002, The Journal of applied psychology.
[29] Qing Hu,et al. Top Management Championship and Individual Behaviour Towards Information Security: An Integrative Model , 2008, ECIS.
[30] Detmar W. Straub,et al. Validation Guidelines for IS Positivist Research , 2004, Commun. Assoc. Inf. Syst..
[31] Deborah Compeau,et al. Computer Self-Efficacy: Development of a Measure and Initial Test , 1995, MIS Q..
[32] Gordon B. Davis,et al. User Acceptance of Information Technology: Toward a Unified View , 2003, MIS Q..
[33] Izak Benbasat,et al. Information Security Policy Compliance: An Empirical Study of Rationality-Based Beliefs and Information Security Awareness , 2010, MIS Q..
[34] Merrill Warkentin,et al. Fear Appeals and Information Security Behaviors: An Empirical Study , 2010, MIS Q..
[35] Cheryl Burke Jarvis,et al. A Critical Review of Construct Indicators and Measurement Model Misspecification in Marketing and Consumer Research , 2003 .
[36] Viswanath Venkatesh,et al. Technology Acceptance Model 3 and a Research Agenda on Interventions , 2008, Decis. Sci..
[37] Jordan Shropshire,et al. Personality and IT security: An application of the five-factor model , 2006, AMCIS.
[38] Fred D. Davis. Perceived Usefulness, Perceived Ease of Use, and User Acceptance of Information Technology , 1989, MIS Q..
[39] Gordon W. Allport,et al. Pattern and growth in personality , 1961 .
[40] Shintaro Okazaki,et al. What do we know about mobile Internet adopters? A cluster analysis , 2006, Inf. Manag..
[41] Adam Pridgen,et al. STAAF: Scaling Android Application Analysis with a Modular Framework , 2012, 2012 45th Hawaii International Conference on System Sciences.