Can Secure Behaviors Be Contagious? A Two-Stage Investigation of the Influence of Herd Behavior on Security Decisions
暂无分享,去创建一个
[1] Jacob Cohen. Statistical Power Analysis for the Behavioral Sciences , 1969, The SAGE Encyclopedia of Research Design.
[2] Merrill Warkentin,et al. Experience Matters: The Role of Vicarious Experience in Secure Actions , 2020, J. Database Manag..
[3] Dustin Ormond,et al. Don't Even Think About It! The Effects of Antineutralization, Informational, and Normative Communication on Information Security Compliance , 2018, J. Assoc. Inf. Syst..
[4] Chong Wang,et al. Socially Nudged: A Quasi-Experimental Study of Friends' Social Influence in Online Product Ratings , 2018, Inf. Syst. Res..
[5] Merrill Warkentin,et al. Secure Behavior over Time: Perspectives from the Theory of Process Memory , 2018, DATB.
[6] Yang Liu,et al. When Online Reviews Meet Sales Volume Information: Is More or Accurate Information Always Better? , 2017, Inf. Syst. Res..
[7] Jingguo Wang,et al. Coping Responses in Phishing Detection: An Investigation of Antecedents and Consequences , 2017, Inf. Syst. Res..
[8] Yi-Jen Ho,et al. Popularity or Proximity: Characterizing the Nature of Social Influence in an Online Music Community , 2017, Inf. Syst. Res..
[9] Jan Marco Leimeister,et al. Not just an ego-trip: Exploring backers' motivation for funding in incentive-based crowdfunding , 2017, J. Strateg. Inf. Syst..
[10] Andrew Schwarz,et al. Examining the Impact and Detection of the "Urban Legend" of Common Method Bias , 2017, DATB.
[11] Jordan Shropshire,et al. Continuance of protective security behavior: A longitudinal study , 2016, Decis. Support Syst..
[12] Paul Benjamin Lowry,et al. Limited Information and Quick Decisions: Consumer Privacy Calculus for Mobile Applications , 2016, AIS Trans. Hum. Comput. Interact..
[13] Alexander Benlian,et al. Effects of Social Interaction Dynamics on Platforms , 2016, J. Manag. Inf. Syst..
[14] Byungjoon Yoo,et al. An analysis of popularity information effects: Field experiments in an online marketplace , 2016, Electron. Commer. Res. Appl..
[15] Yili Hong,et al. Culture, Conformity, and Emotional Suppression in Online Reviews , 2016, J. Assoc. Inf. Syst..
[16] Detmar W. Straub,et al. Neural Correlates of Protection Motivation for Secure IT Behaviors: An fMRI Examination , 2016, J. Assoc. Inf. Syst..
[17] Dennis F. Galletta,et al. What Do Systems Users Have to Fear? Using Fear Appeals to Engender Threats and Fear that Motivate Protective Security Behaviors , 2015, MIS Q..
[18] Chih-Hsiang Chang,et al. The effects of national culture and behavioral pitfalls on investors' decision-making: Herding behavior in international stock markets ☆ , 2015 .
[19] Merrill Warkentin,et al. An Enhanced Fear Appeal Rhetorical Framework: Leveraging Threats to the Human Asset Through Sanctioning Rhetoric , 2015, MIS Q..
[20] Kent Marett,et al. Checking the manipulation checks in information security research , 2015, Inf. Comput. Secur..
[21] Joseph S. Valacich,et al. The Behavioral Roots of Information Systems Security: Exploring Key Factors Related to Unethical IT Use , 2015, J. Manag. Inf. Syst..
[22] B. A. Conway,et al. The effects of laforin, malin, Stbd1, and Ptg deficiencies on heart glycogen levels in Pompe disease mouse models , 2015 .
[23] Gregory Kadlec,et al. Institutional Investors and Stock Return Anomalies , 2014 .
[24] Robert E. Crossler,et al. Understanding Compliance with Bring Your Own Device Policies Utilizing Protection Motivation Theory: Bridging the Intention-Behavior Gap , 2014, J. Inf. Syst..
[25] Heshan Sun,et al. A Longitudinal Study of Herd Behavior in the Adoption and Continued Use of Technology , 2013, MIS Q..
[26] Sean J. Taylor,et al. Social Influence Bias: A Randomized Experiment , 2013, Science.
[27] Qing Hu,et al. Future directions for behavioral information security research , 2013, Comput. Secur..
[28] Scott B. MacKenzie,et al. Construct Measurement and Validation Procedures in MIS and Behavioral Research: Integrating New and Existing Techniques , 2011, MIS Q..
[29] Juanjuan Zhang,et al. How Does Popularity Information Affect Choices? A Field Experiment , 2009 .
[30] M Baddeley,et al. Information Security: Lessons from Behavioural Economics , 2011 .
[31] Merrill Warkentin,et al. Fear Appeals and Information Security Behaviors: An Empirical Study , 2010, MIS Q..
[32] Yajiong Xue,et al. Understanding Security Behaviors in Personal Computer Usage: A Threat Avoidance Perspective , 2010, J. Assoc. Inf. Syst..
[33] Sung S. Kim. The integrative framework of technology use: an extension and test , 2009 .
[34] Glenn J. Browne,et al. Sequential Adoption Theory: A Theory for Understanding Herding Behavior in Early Adoption of Novel Technologies , 2009, J. Assoc. Inf. Syst..
[35] Sung S. Kim,et al. Out of Dedication or Constraint? A Dual Model of Post-Adoption Phenomena and its Empirical Test in the Context of Online Services , 2009, MIS Q..
[36] Bin Gu,et al. Informational Cascades and Software Adoption on the Internet: An Empirical Investigation , 2008, MIS Q..
[37] Ping Wang,et al. Popular Concepts beyond Organizations : Exploring New Dimensions of Information Technology Innovations , 2009 .
[38] Lorin M. Hitt,et al. Self Selection and Information Role of Online Product Reviews , 2007, Inf. Syst. Res..
[39] William Lewis,et al. Research Note - Statistical Power in Analyzing Interaction Effects: Questioning the Advantage of PLS with Product Indicators , 2007, Inf. Syst. Res..
[40] Mark Srite,et al. The Role of Espoused National Cultural Values in Technology Acceptance , 2006, MIS Q..
[41] M. Lieberman,et al. Why Do Firms Imitate Each Other , 2006 .
[42] Naresh K. Malhotra,et al. A Longitudinal Model of Continued IS Use: An Integrative View of Four Mechanisms Underlying Postadoption Phenomena , 2005, Manag. Sci..
[43] John D. Hey,et al. Do Markets Drive Out Lemmings - or Vice Versa? , 2004 .
[44] Rossouw von Solms,et al. The 10 deadly sins of information security management , 2004, Comput. Secur..
[45] Anol Bhattacherjee,et al. Understanding Changes in Belief and Attitude Toward Information Technology Usage: A Theoretical Model and Longitudinal Test , 2004, MIS Q..
[46] Detmar W. Straub,et al. Validation Guidelines for IS Positivist Research , 2004, Commun. Assoc. Inf. Syst..
[47] Robert J. Kauffman,et al. What Do You Know? Rational Expectations in Information Technology Adoption and Investment , 2003, J. Manag. Inf. Syst..
[48] Scott B. MacKenzie,et al. Common method biases in behavioral research: a critical review of the literature and recommended remedies. , 2003, The Journal of applied psychology.
[49] Charles J. Kacmar,et al. Developing and Validating Trust Measures for e-Commerce: An Integrative Typology , 2002, Inf. Syst. Res..
[50] H. Rao,et al. Fool's Gold: Social Proof in the Initiation and Abandonment of Coverage by Wall Street Analysts , 2001 .
[51] Anol Bhattacherjee,et al. Understanding Information Systems Continuance: An Expectation-Confirmation Model , 2001, MIS Q..
[52] M. Allen,et al. A Meta-Analysis of Fear Appeals: Implications for Effective Public Health Campaigns , 2000, Health education & behavior : the official publication of the Society for Public Health Education.
[53] R. W. Rogers,et al. A meta-analysis of research on protection motivation theory. , 2000 .
[54] J. Steenkamp,et al. Assessing Measurement Invariance in Cross-National Consumer Research , 1998 .
[55] C. Avery,et al. Multidimensional Uncertainty and Herd Behavior in Financial Markets , 1998 .
[56] J. Graham. Herding Among Investment Newsletters: Theory and Evidence , 1998 .
[57] Wynne W. Chin,et al. On the use, usefulness, and ease of use of structural equation modeling in MIS research: a note of caution , 1995 .
[58] Lori Rosenkopf,et al. INSTITUTIONAL AND COMPETITIVE BANDWAGONS: USING MATHEMATICAL MODELING AS A TOOL TO EXPLORE INNOVATION DIFFUSION , 1993 .
[59] D. Acemoglu. Learning about Others' Actions and the Investment Accelerator , 1993 .
[60] A. Banerjee,et al. A Simple Model of Herd Behavior , 1992 .
[61] Izak Benbasat,et al. Development of an Instrument to Measure the Perceptions of Adopting an Information Technology Innovation , 1991, Inf. Syst. Res..
[62] Jane M. Howell,et al. Personal Computing: Toward a Conceptual Model of Utilization , 1991, MIS Q..
[63] H C Triandis,et al. Values, attitudes, and interpersonal behavior. , 1980, Nebraska Symposium on Motivation. Nebraska Symposium on Motivation.
[64] H. Simon,et al. From substantive to procedural rationality , 1976 .
[65] J. Keynes. The General Theory of Employment , 1937 .