How smaller businesses struggle with security advice
暂无分享,去创建一个
[1] Karen Renaud,et al. Smartphone Owners Need Security Advice. How Can We Ensure They Get it? , 2016, CONF-IRM.
[2] Heinz Landau. Book Review “Drive – The Surprising Truth About What Motivates Us”, by Daniel H. Pink , 2015 .
[3] Thorsten Kurpjuhn. The SME security challenge , 2015 .
[4] N. Amrin. The Impact of Cyber Security on SMEs , 2014 .
[5] G. Kok,et al. Sixty years of fear appeal research: current state of the evidence. , 2014, International journal of psychology : Journal international de psychologie.
[6] R. Ruiter,et al. Neuroscientific evidence for defensive avoidance of fear appeals , 2014, International journal of psychology : Journal international de psychologie.
[7] Mark L. Berenson,et al. Business Statistics , 2009, International Encyclopedia of Statistical Science.
[8] Stephen Pritchard. Insight: Navigating the black hole of small business security , 2010 .
[9] B. Scheibehenne,et al. Less may be more when choosing is difficult: choice complexity and too much choice. , 2010, Acta psychologica.
[10] Steven Furnell,et al. Recognising and addressing ‘security fatigue’ , 2009 .
[11] Nathalie Dens,et al. Fear, threat and efficacy in threat appeals: message involvement as a key mediator to message acceptance. , 2009, Accident; analysis and prevention.
[12] Ryan West,et al. The psychology of security , 2008, CACM.
[13] Ioni M. Lewis,et al. The role of fear appeals in improving driver safety: A review of the effectiveness of fear-arousing (threat) appeals in road safety advertising. , 2007 .
[14] Michael J. Palenchar,et al. Strategic risk communication: Adding value to society , 2007 .
[15] Mikko T. Siponen,et al. Which Factors Explain Employees' Adherence to Information Security Policies? An Empirical Study , 2007, PACIS.
[16] T. Grothmann,et al. People at Risk of Flooding: Why Some Residents Take Precautionary Action While Others Do Not , 2006 .
[17] Jana Fromm. Risk denial and neglect : studies in risk perception , 2005 .
[18] Andrew Stewart,et al. On risk: perception and direction , 2004, Comput. Secur..
[19] David A. Banks,et al. Organisational Information Security: A Viable System Perspective , 2004, AISM.
[20] Joachim Scholderer,et al. Communicating about the Risks and Benefits of Genetically Modified Foods: The Mediating Role of Trust , 2003, Risk analysis : an official publication of the Society for Risk Analysis.
[21] W. Lemmens. Martha C. Nussbaum: Upheavals of thought: the intelligence of emotions , 2003 .
[22] Kennon M. Sheldon,et al. Daily Well-Being: The Role of Autonomy, Competence, and Relatedness , 2000 .
[23] Jonathan A. Smith,et al. Doing Interpretative Phenomenological Analysis , 1999 .
[24] M. Kreuter,et al. Risk Perception, Beliefs About Prevention, and Preventive Behaviors of Farmers , 1998 .
[25] Kim Witte,et al. Fear as motivator, fear as inhibitor: Using the extended parallel process model to explain fear appeal successes and failures. , 1996 .
[26] K. Witte. Putting the fear back into fear appeals: The extended parallel process model , 1992 .
[27] William H. Desvousges,et al. Risk Perception, Learning, and Individual Behavior , 1988 .
[28] George Kingsley Zipf,et al. Human behavior and the principle of least effort , 1949 .