Preventive Adoption of Information Security Behaviors
暂无分享,去创建一个
Elena Karahanna | Donald E. Wynn | Clay K. Williams | Ramana Madupalli | Elena Karahanna | Ramana Madupalli | D. Wynn
[1] Tom L. Roberts,et al. Insiders' Protection of Organizational Information Assets: Development of a Systematics-Based Taxonomy and Theory of Diversity for Protection-Motivated Behaviors , 2013, MIS Q..
[2] Qing Hu,et al. Future directions for behavioral information security research , 2013, Comput. Secur..
[3] Ayako Komatsu,et al. Human aspects of information security: An empirical study of intentional versus actual behavior , 2013, Inf. Manag. Comput. Secur..
[4] Princely Ifinedo,et al. Understanding information systems security policy compliance: An integration of the theory of planned behavior and the protection motivation theory , 2012, Comput. Secur..
[5] Detmar W. Straub,et al. An Update and Extension to SEM Guidelines for Admnistrative and Social Science Research , 2011 .
[6] Elizabeth Sillence,et al. It won't happen to me: Promoting secure behaviour among internet users , 2010, Comput. Hum. Behav..
[7] Mikko T. Siponen,et al. Neutralization: New Insights into the Problem of Employee Systems Security Policy Violations , 2010, MIS Q..
[8] Merrill Warkentin,et al. Fear Appeals and Information Security Behaviors: An Empirical Study , 2010, MIS Q..
[9] Ritu Agarwal,et al. Practicing Safe Computing: A Multimedia Empirical Examination of Home Computer User Security Behavioral Intentions , 2010, MIS Q..
[10] Yajiong Xue,et al. Understanding Security Behaviors in Personal Computer Usage: A Threat Avoidance Perspective , 2010, J. Assoc. Inf. Syst..
[11] Mo Adam Mahmood,et al. Compliance with Information Security Policies: An Empirical Investigation , 2010, Computer.
[12] Wynne W. Chin. How to Write Up and Report PLS Analyses , 2010 .
[13] Ronald T. Cenfetelli,et al. Interpretation of Formative Measurement in Information Systems Research , 2009, MIS Q..
[14] Jason Bennett Thatcher,et al. Conceptualizing and testing formative constructs: tutorial and annotated example , 2009, DATB.
[15] H. Raghav Rao,et al. Protection motivation and deterrence: a framework for security policy compliance in organisations , 2009, Eur. J. Inf. Syst..
[16] Yajiong Xue,et al. Avoidance of Information Technology Threats: A Theoretical Perspective , 2009, MIS Q..
[17] Gaby Odekerken-Schröder,et al. Using PLS path modeling for assessing hierarchial construct models: guidelines and impirical illustration , 2009 .
[18] Dennis F. Galletta,et al. User Awareness of Security Countermeasures and Its Impact on Information Systems Misuse: A Deterrence Approach , 2009, Inf. Syst. Res..
[19] Detmar W. Straub,et al. Security lapses and the omission of information security measures: A threat control model and empirical test , 2008, Comput. Hum. Behav..
[20] Detmar W. Straub,et al. Specifying Formative Constructs in Information Systems Research , 2007, MIS Q..
[21] Edgar Erdfelder,et al. G*Power 3: A flexible statistical power analysis program for the social, behavioral, and biomedical sciences , 2007, Behavior research methods.
[22] Jörg Henseler,et al. Testing Moderating Effects in PLS Path Models. An Illustration of Available Procedures , 2005 .
[23] Detmar W. Straub,et al. Validation Guidelines for IS Positivist Research , 2004, Commun. Assoc. Inf. Syst..
[24] Scott B. MacKenzie,et al. Common method biases in behavioral research: a critical review of the literature and recommended remedies. , 2003, The Journal of applied psychology.
[25] Cheryl Burke Jarvis,et al. A Critical Review of Construct Indicators and Measurement Model Misspecification in Marketing and Consumer Research , 2003 .
[26] Wynne W. Chin,et al. A Partial Least Squares Latent Variable Modeling Approach for Measuring Interaction Effects: Results from a Monte Carlo Simulation Study and an Electronic - Mail Emotion/Adoption Study , 2003, Inf. Syst. Res..
[27] P. Sheeran,et al. Prediction and Intervention in Health-Related Behavior: A Meta-Analytic Review of Protection Motivation Theory , 2000 .
[28] M. Fishbein,et al. Factors influencing behavior and behavior change. , 2000 .
[29] Detmar W. Straub,et al. Coping With Systems Risk: Security Planning Models for Management Decision Making , 1998, MIS Q..
[30] J. E. Maddux,et al. Behavioral intentions in theories of health behavior. , 1997 .
[31] Richard Baskerville,et al. The Second-Order Security Dilemma , 1996 .
[32] I. Rosenstock,et al. The Health Belief Model and HIV Risk Behavior Change , 1994 .
[33] K. Glanz,et al. Health behavior and health education : theory, research, and practice , 1991 .
[34] I. Ajzen. The theory of planned behavior , 1991 .
[35] S. West,et al. Multiple Regression: Testing and Interpreting Interactions , 1991 .
[36] Detmar W. Straub,et al. Effective IS Security: An Empirical Study , 1990, Inf. Syst. Res..
[37] A. Rao,et al. The Effect of Price, Brand Name, and Store Name on Buyers’ Perceptions of Product Quality: An Integrative Review , 1989 .
[38] Fred D. Davis,et al. User Acceptance of Computer Technology: A Comparison of Two Theoretical Models , 1989 .
[39] V. Champion,et al. Instrument development for health belief model constructs , 1984, ANS. Advances in nursing science.
[40] M. Becker,et al. The Health Belief Model: A Decade Later , 1984, Health education quarterly.
[41] N D Weinstein,et al. Why it won't happen to me: perceptions of risk factors and susceptibility. , 1984, Health psychology : official journal of the Division of Health Psychology, American Psychological Association.
[42] R. Rogers. Cognitive and physiological processes in fear appeals and attitude change: a revised theory of prote , 1983 .
[43] H C Triandis,et al. Values, attitudes, and interpersonal behavior. , 1980, Nebraska Symposium on Motivation. Nebraska Symposium on Motivation.
[44] A. Bandura. Social learning theory , 1977 .
[45] R. W. Rogers,et al. A Protection Motivation Theory of Fear Appeals and Attitude Change1. , 1975, The Journal of psychology.
[46] I. Rosenstock. The Health Belief Model and Preventive Health Behavior , 1974 .
[47] A. Tversky,et al. Judgment under Uncertainty: Heuristics and Biases , 1974, Science.
[48] J. Hair. Multivariate data analysis , 1972 .
[49] I. Rosenstock. Why people use health services. , 1966, The Milbank Memorial Fund quarterly.
[50] E. Rogers,et al. Diffusion of Innovations , 1964 .