How smaller businesses struggle with security advice

[1]  Karen Renaud,et al.  Smartphone Owners Need Security Advice. How Can We Ensure They Get it? , 2016, CONF-IRM.

[2]  Heinz Landau Book Review “Drive – The Surprising Truth About What Motivates Us”, by Daniel H. Pink , 2015 .

[3]  Thorsten Kurpjuhn The SME security challenge , 2015 .

[4]  N. Amrin The Impact of Cyber Security on SMEs , 2014 .

[5]  G. Kok,et al.  Sixty years of fear appeal research: current state of the evidence. , 2014, International journal of psychology : Journal international de psychologie.

[6]  R. Ruiter,et al.  Neuroscientific evidence for defensive avoidance of fear appeals , 2014, International journal of psychology : Journal international de psychologie.

[7]  Mark L. Berenson,et al.  Business Statistics , 2009, International Encyclopedia of Statistical Science.

[8]  Stephen Pritchard Insight: Navigating the black hole of small business security , 2010 .

[9]  B. Scheibehenne,et al.  Less may be more when choosing is difficult: choice complexity and too much choice. , 2010, Acta psychologica.

[10]  Steven Furnell,et al.  Recognising and addressing ‘security fatigue’ , 2009 .

[11]  Nathalie Dens,et al.  Fear, threat and efficacy in threat appeals: message involvement as a key mediator to message acceptance. , 2009, Accident; analysis and prevention.

[12]  Ryan West,et al.  The psychology of security , 2008, CACM.

[13]  Ioni M. Lewis,et al.  The role of fear appeals in improving driver safety: A review of the effectiveness of fear-arousing (threat) appeals in road safety advertising. , 2007 .

[14]  Michael J. Palenchar,et al.  Strategic risk communication: Adding value to society , 2007 .

[15]  Mikko T. Siponen,et al.  Which Factors Explain Employees' Adherence to Information Security Policies? An Empirical Study , 2007, PACIS.

[16]  T. Grothmann,et al.  People at Risk of Flooding: Why Some Residents Take Precautionary Action While Others Do Not , 2006 .

[17]  Jana Fromm Risk denial and neglect : studies in risk perception , 2005 .

[18]  Andrew Stewart,et al.  On risk: perception and direction , 2004, Comput. Secur..

[19]  David A. Banks,et al.  Organisational Information Security: A Viable System Perspective , 2004, AISM.

[20]  Joachim Scholderer,et al.  Communicating about the Risks and Benefits of Genetically Modified Foods: The Mediating Role of Trust , 2003, Risk analysis : an official publication of the Society for Risk Analysis.

[21]  W. Lemmens Martha C. Nussbaum: Upheavals of thought: the intelligence of emotions , 2003 .

[22]  Kennon M. Sheldon,et al.  Daily Well-Being: The Role of Autonomy, Competence, and Relatedness , 2000 .

[23]  Jonathan A. Smith,et al.  Doing Interpretative Phenomenological Analysis , 1999 .

[24]  M. Kreuter,et al.  Risk Perception, Beliefs About Prevention, and Preventive Behaviors of Farmers , 1998 .

[25]  Kim Witte,et al.  Fear as motivator, fear as inhibitor: Using the extended parallel process model to explain fear appeal successes and failures. , 1996 .

[26]  K. Witte Putting the fear back into fear appeals: The extended parallel process model , 1992 .

[27]  William H. Desvousges,et al.  Risk Perception, Learning, and Individual Behavior , 1988 .

[28]  George Kingsley Zipf,et al.  Human behavior and the principle of least effort , 1949 .