Understanding User's Behaviors in Coping with Security Threat of Mobile Devices Loss and Theft
暂无分享,去创建一个
[1] Younghwa Lee,et al. Threat or coping appraisal: determinants of SMB executives’ decision to adopt anti-malware software , 2009, Eur. J. Inf. Syst..
[2] Anne Beaudry,et al. Understanding User Responses to Information Technology: A Coping Model of User Adaption , 2005, MIS Q..
[3] Jizhou Sun,et al. A new design of wearable token system for mobile device security , 2008, IEEE Transactions on Consumer Electronics.
[4] Alan Goode,et al. Managing mobile security: How are we doing? , 2010, Netw. Secur..
[5] Detmar W. Straub,et al. The amplification effects of procedural justice on a threat control model of information systems security behaviours , 2009, Behav. Inf. Technol..
[6] Yajiong Xue,et al. Avoidance of Information Technology Threats: A Theoretical Perspective , 2009, MIS Q..
[7] D. Cicchetti. Emotion and Adaptation , 1993 .
[8] W. Bearden,et al. Consumer Self‐Confidence: Refinements in Conceptualization and Measurement , 2001 .
[9] A. Bandura. Self-efficacy mechanism in human agency. , 1982 .
[10] Detmar W. Straub,et al. Security lapses and the omission of information security measures: A threat control model and empirical test , 2008, Comput. Hum. Behav..
[11] Alfred Loo,et al. Technical opinionSecurity threats of smart phones and Bluetooth , 2009, CACM.
[12] Wynne W. Chin. The partial least squares approach for structural equation modeling. , 1998 .
[13] A. Bandura. Self-efficacy: toward a unifying theory of behavioral change. , 1977, Psychology Review.
[14] Jon Friedman,et al. Protecting data on mobile devices: A taxonomy of security threats to mobile computing and review of applicable defenses , 2008, Inf. Knowl. Syst. Manag..
[15] Ritu Agarwal,et al. Practicing Safe Computing: A Multimedia Empirical Examination of Home Computer User Security Behavioral Intentions , 2010, MIS Q..
[16] Yajiong Xue,et al. Understanding Security Behaviors in Personal Computer Usage: A Threat Avoidance Perspective , 2010, J. Assoc. Inf. Syst..
[17] J. Rotter. Generalized expectancies for internal versus external control of reinforcement. , 1966, Psychological monographs.
[18] R. Rogers. Cognitive and physiological processes in fear appeals and attitude change: a revised theory of prote , 1983 .
[19] H. Raghav Rao,et al. Protection motivation and deterrence: a framework for security policy compliance in organisations , 2009, Eur. J. Inf. Syst..
[20] Murray R. Barrick,et al. Team Structure and Performance: Assessing the Mediating Role of Intrateam Process and the Moderating Role of Task Type , 2000 .
[21] R. W. Rogers,et al. A Protection Motivation Theory of Fear Appeals and Attitude Change1. , 1975, The Journal of psychology.
[22] Merrill Warkentin,et al. Fear Appeals and Information Security Behaviors: An Empirical Study , 2010, MIS Q..