Are we ready for cyberterrorist attacks? - Examining the role of individual resilience
暂无分享,去创建一个
[1] F. Norris,et al. Community Resilience as a Metaphor, Theory, Set of Capacities, and Strategy for Disaster Readiness , 2008, American journal of community psychology.
[2] Dennis F. Galletta,et al. What Do Systems Users Have to Fear? Using Fear Appeals to Engender Threats and Fear that Motivate Protective Security Behaviors , 2015, MIS Q..
[3] M. Workman,et al. Punishment and ethics deterrents: A study of insider security contravention , 2007 .
[4] Detmar W. Straub,et al. An Update and Extension to SEM Guidelines for Admnistrative and Social Science Research , 2011 .
[5] Stephen Maren,et al. Pavlovian fear conditioning as a behavioral assay for hippocampus and amygdala function: cautions and caveats , 2008, The European journal of neuroscience.
[6] G. Bonanno,et al. What predicts psychological resilience after disaster? The role of demographics, resources, and life stress. , 2007, Journal of consulting and clinical psychology.
[7] R. W. Rogers,et al. A Protection Motivation Theory of Fear Appeals and Attitude Change1. , 1975, The Journal of psychology.
[8] Sonya L. Britt,et al. Money Beliefs and Financial Behaviors: Development of the Klontz Money Script Inventory , 2011 .
[9] Alain Bensoussan,et al. When Hackers Talk: Managing Information Security Under Variable Attack Rates and Knowledge Dissemination , 2011, Inf. Syst. Res..
[10] Orna Braun-Lewensohn,et al. Personal and communal resilience in communities exposed to missile attacks: Does intensity of exposure matter? , 2014 .
[11] Gilbert A. Churchill. A Paradigm for Developing Better Measures of Marketing Constructs , 1979 .
[12] Jian Hua,et al. The economic impact of cyber terrorism , 2013, Journal of strategic information systems.
[13] J. Trachtman,et al. Global Cyberterrorism, Jurisdiction, and International Organization , 2004 .
[14] Leiser Silva,et al. Catch me if you can: Online protests on sites powered by user-generated content , 2017, Inf. Manag..
[15] Kim Wilkins. Writing Resilience in the Digital Age , 2014 .
[16] Christopher Lyon,et al. Toward a Social Theory of Resilience: Social Systems, Cultural Systems, and Collective Action in Transitioning Forest‐Based Communities , 2013 .
[17] Merrill Warkentin,et al. Fear Appeals and Information Security Behaviors: An Empirical Study , 2010, MIS Q..
[18] Elisabeth Krausmann,et al. An economic framework for the development of a resilience index for business recovery , 2013 .
[19] Merrill Warkentin,et al. Beyond Deterrence: An Expanded View of Employee Computer Abuse , 2013, MIS Q..
[20] John Pinkerton,et al. Family support, social capital, resilience and adolescent coping , 2007 .
[21] Mir M. Ali,et al. Adolescent Propensity to Engage in Health Risky Behaviors: The Role of Individual Resilience , 2010, International journal of environmental research and public health.
[22] S. Gaines,et al. Terror threat perception and its consequences in contemporary Britain. , 2005, British journal of psychology.
[23] G. Bonanno. Loss, trauma, and human resilience: have we underestimated the human capacity to thrive after extremely aversive events? , 2008, The American psychologist.
[24] Maria Kjaerland,et al. A classification of computer security incidents based on reported attack data , 2005 .
[25] Detmar W. Straub,et al. Coping With Systems Risk: Security Planning Models for Management Decision Making , 1998, MIS Q..
[26] J. Davidson,et al. Development of a new resilience scale: The Connor‐Davidson Resilience Scale (CD‐RISC) , 2003, Depression and anxiety.
[27] A. Masten,et al. Research, part of a Special Feature on Managing Surprises in Complex Systems Disaster Preparation and Recovery: Lessons from Research on Resilience in Human Development , 2008 .
[28] Tom L. Roberts,et al. The Impact of Organizational Commitment on Insiders’ Motivation to Protect Organizational Information Assets , 2015, J. Manag. Inf. Syst..
[29] Marcus K. Rogers,et al. A social learning theory and moral disengagement analysis of criminal computer behavior: an exploratory study , 2001 .
[30] L. Whitbeck,et al. Family, Community, and School Influences on Resilience among American Indian Adolescents in the Upper Midwest. , 2006 .
[31] E. Werner. Resilience in Development , 1995 .
[32] A. Masten. Ordinary magic. Resilience processes in development. , 2001, The American psychologist.
[33] B P Allen. Frightening information and extraneous arousal: changing cognitions and behavior regarding nuclear war. , 1993, The Journal of social psychology.
[34] Jeffrey P. Dew,et al. The Financial Management Behavior Scale: Development and Validation , 2011 .
[35] Paul Benjamin Lowry,et al. Partial Least Squares (PLS) Structural Equation Modeling (SEM) for Building and Testing Behavioral Causal Theory: When to Choose It and How to Use It , 2014, IEEE Transactions on Professional Communication.
[36] Murray B Stein,et al. Psychometric analysis and refinement of the Connor-davidson Resilience Scale (CD-RISC): Validation of a 10-item measure of resilience. , 2007, Journal of traumatic stress.
[37] Sandor Vegh,et al. Hacktivists or Cyberterrorists? The Changing Media Discourse on Hacking , 2002, First Monday.
[38] Isabelle Fagnot,et al. Behavioral Information Security , 2007 .
[39] K. Gable. Cyber-Apocalypse Now: Securing the Internet Against Cyberterrorism and Using Universal Jurisdiction as a Deterrent , 2009 .
[40] R D Conger,et al. Couple resilience to economic pressure. , 1999, Journal of personality and social psychology.
[41] Bin Zhang,et al. Examining Hacker Participation Length in Cybercriminal Internet-Relay-Chat Communities , 2016, J. Manag. Inf. Syst..
[42] Christian E. Waugh,et al. What good are positive emotions in crises? A prospective study of resilience and emotions following the terrorist attacks on the United States on September 11th, 2001. , 2003, Journal of personality and social psychology.
[43] M-P Dumont,et al. Resilience in Adolescents: Protective Role of Social Support, Coping Strategies, Self-Esteem, and Social Activities on Experience of Stress and Depression , 1999 .
[44] S. Wadsworth,et al. Family Risk and Resilience in the Context of War and Terrorism , 2010 .
[45] Fatemeh Zahedi,et al. Individuals' Internet Security Perceptions and Behaviors: Polycontextual Contrasts Between the United States and China , 2016, MIS Q..
[46] Albert H. Segars,et al. Assessing the unidimensionality of measurement : a paradigm and illustration within the context of information systems research , 1997 .
[47] S. Prince-Embury,et al. Risk Behavior and Personal Resiliency in Adolescents , 2015 .
[48] James V. Hansen,et al. Genetic programming for prevention of cyberterrorism through dynamic and evolving intrusion detection , 2007, Decis. Support Syst..
[49] Jian Hua,et al. How Can We Deter Cyber Terrorism? , 2012, Inf. Secur. J. A Glob. Perspect..
[50] Detmar W. Straub,et al. Structural Equation Modeling and Regression: Guidelines for Research Practice , 2000, Commun. Assoc. Inf. Syst..
[51] Merrill Warkentin,et al. An Enhanced Fear Appeal Rhetorical Framework: Leveraging Threats to the Human Asset Through Sanctioning Rhetoric , 2015, MIS Q..
[52] Wynne W. Chin. How to Write Up and Report PLS Analyses , 2010 .
[53] Froma Walsh,et al. Strengthening family resilience , 1998 .