Preventive Adoption of Information Security Behaviors

[1]  Tom L. Roberts,et al.  Insiders' Protection of Organizational Information Assets: Development of a Systematics-Based Taxonomy and Theory of Diversity for Protection-Motivated Behaviors , 2013, MIS Q..

[2]  Qing Hu,et al.  Future directions for behavioral information security research , 2013, Comput. Secur..

[3]  Ayako Komatsu,et al.  Human aspects of information security: An empirical study of intentional versus actual behavior , 2013, Inf. Manag. Comput. Secur..

[4]  Princely Ifinedo,et al.  Understanding information systems security policy compliance: An integration of the theory of planned behavior and the protection motivation theory , 2012, Comput. Secur..

[5]  Detmar W. Straub,et al.  An Update and Extension to SEM Guidelines for Admnistrative and Social Science Research , 2011 .

[6]  Elizabeth Sillence,et al.  It won't happen to me: Promoting secure behaviour among internet users , 2010, Comput. Hum. Behav..

[7]  Mikko T. Siponen,et al.  Neutralization: New Insights into the Problem of Employee Systems Security Policy Violations , 2010, MIS Q..

[8]  Merrill Warkentin,et al.  Fear Appeals and Information Security Behaviors: An Empirical Study , 2010, MIS Q..

[9]  Ritu Agarwal,et al.  Practicing Safe Computing: A Multimedia Empirical Examination of Home Computer User Security Behavioral Intentions , 2010, MIS Q..

[10]  Yajiong Xue,et al.  Understanding Security Behaviors in Personal Computer Usage: A Threat Avoidance Perspective , 2010, J. Assoc. Inf. Syst..

[11]  Mo Adam Mahmood,et al.  Compliance with Information Security Policies: An Empirical Investigation , 2010, Computer.

[12]  Wynne W. Chin How to Write Up and Report PLS Analyses , 2010 .

[13]  Ronald T. Cenfetelli,et al.  Interpretation of Formative Measurement in Information Systems Research , 2009, MIS Q..

[14]  Jason Bennett Thatcher,et al.  Conceptualizing and testing formative constructs: tutorial and annotated example , 2009, DATB.

[15]  H. Raghav Rao,et al.  Protection motivation and deterrence: a framework for security policy compliance in organisations , 2009, Eur. J. Inf. Syst..

[16]  Yajiong Xue,et al.  Avoidance of Information Technology Threats: A Theoretical Perspective , 2009, MIS Q..

[17]  Gaby Odekerken-Schröder,et al.  Using PLS path modeling for assessing hierarchial construct models: guidelines and impirical illustration , 2009 .

[18]  Dennis F. Galletta,et al.  User Awareness of Security Countermeasures and Its Impact on Information Systems Misuse: A Deterrence Approach , 2009, Inf. Syst. Res..

[19]  Detmar W. Straub,et al.  Security lapses and the omission of information security measures: A threat control model and empirical test , 2008, Comput. Hum. Behav..

[20]  Detmar W. Straub,et al.  Specifying Formative Constructs in Information Systems Research , 2007, MIS Q..

[21]  Edgar Erdfelder,et al.  G*Power 3: A flexible statistical power analysis program for the social, behavioral, and biomedical sciences , 2007, Behavior research methods.

[22]  Jörg Henseler,et al.  Testing Moderating Effects in PLS Path Models. An Illustration of Available Procedures , 2005 .

[23]  Detmar W. Straub,et al.  Validation Guidelines for IS Positivist Research , 2004, Commun. Assoc. Inf. Syst..

[24]  Scott B. MacKenzie,et al.  Common method biases in behavioral research: a critical review of the literature and recommended remedies. , 2003, The Journal of applied psychology.

[25]  Cheryl Burke Jarvis,et al.  A Critical Review of Construct Indicators and Measurement Model Misspecification in Marketing and Consumer Research , 2003 .

[26]  Wynne W. Chin,et al.  A Partial Least Squares Latent Variable Modeling Approach for Measuring Interaction Effects: Results from a Monte Carlo Simulation Study and an Electronic - Mail Emotion/Adoption Study , 2003, Inf. Syst. Res..

[27]  P. Sheeran,et al.  Prediction and Intervention in Health-Related Behavior: A Meta-Analytic Review of Protection Motivation Theory , 2000 .

[28]  M. Fishbein,et al.  Factors influencing behavior and behavior change. , 2000 .

[29]  Detmar W. Straub,et al.  Coping With Systems Risk: Security Planning Models for Management Decision Making , 1998, MIS Q..

[30]  J. E. Maddux,et al.  Behavioral intentions in theories of health behavior. , 1997 .

[31]  Richard Baskerville,et al.  The Second-Order Security Dilemma , 1996 .

[32]  I. Rosenstock,et al.  The Health Belief Model and HIV Risk Behavior Change , 1994 .

[33]  K. Glanz,et al.  Health behavior and health education : theory, research, and practice , 1991 .

[34]  I. Ajzen The theory of planned behavior , 1991 .

[35]  S. West,et al.  Multiple Regression: Testing and Interpreting Interactions , 1991 .

[36]  Detmar W. Straub,et al.  Effective IS Security: An Empirical Study , 1990, Inf. Syst. Res..

[37]  A. Rao,et al.  The Effect of Price, Brand Name, and Store Name on Buyers’ Perceptions of Product Quality: An Integrative Review , 1989 .

[38]  Fred D. Davis,et al.  User Acceptance of Computer Technology: A Comparison of Two Theoretical Models , 1989 .

[39]  V. Champion,et al.  Instrument development for health belief model constructs , 1984, ANS. Advances in nursing science.

[40]  M. Becker,et al.  The Health Belief Model: A Decade Later , 1984, Health education quarterly.

[41]  N D Weinstein,et al.  Why it won't happen to me: perceptions of risk factors and susceptibility. , 1984, Health psychology : official journal of the Division of Health Psychology, American Psychological Association.

[42]  R. Rogers Cognitive and physiological processes in fear appeals and attitude change: a revised theory of prote , 1983 .

[43]  H C Triandis,et al.  Values, attitudes, and interpersonal behavior. , 1980, Nebraska Symposium on Motivation. Nebraska Symposium on Motivation.

[44]  A. Bandura Social learning theory , 1977 .

[45]  R. W. Rogers,et al.  A Protection Motivation Theory of Fear Appeals and Attitude Change1. , 1975, The Journal of psychology.

[46]  I. Rosenstock The Health Belief Model and Preventive Health Behavior , 1974 .

[47]  A. Tversky,et al.  Judgment under Uncertainty: Heuristics and Biases , 1974, Science.

[48]  J. Hair Multivariate data analysis , 1972 .

[49]  I. Rosenstock Why people use health services. , 1966, The Milbank Memorial Fund quarterly.

[50]  E. Rogers,et al.  Diffusion of Innovations , 1964 .