Research on the influence of fear appeals on APP users' privacy protection behavior
暂无分享,去创建一个
[1] Merrill Warkentin,et al. Fear Appeals and Information Security Behaviors: An Empirical Study , 2010, MIS Q..
[2] Torleif Halkjelsvik,et al. Fear appeals in advanced tobacco control environments: the impact of a national mass media campaign in Norway. , 2013, Health education research.
[3] A. Bandura. The Explanatory and Predictive Scope of Self-Efficacy Theory , 1986 .
[4] Patrick D. McDaniel,et al. On lightweight mobile phone application certification , 2009, CCS.
[5] K. Witte. Fear control and danger control: A test of the extended parallel process model (EPPM) , 1994 .
[6] L. Miller,et al. Probiotics reduce symptoms of antibiotic use in a hospital setting: a randomized dose response study. , 2014, Vaccine.
[7] D. Shuman,et al. The Language of Miranda Warnings in American Jurisdictions: A Replication and Vocabulary Analysis , 2008, Law and human behavior.
[8] Li Xiang. An Android User Privacy Protection System , 2012 .
[9] Swarat Chaudhuri,et al. A Study of Android Application Security , 2011, USENIX Security Symposium.
[10] David A. Wagner,et al. Analyzing inter-application communication in Android , 2011, MobiSys '11.
[11] Peter R Harris,et al. Does heightening risk appraisals change people's intentions and behavior? A meta-analysis of experimental studies. , 2014, Psychological bulletin.
[12] Lizhuo Wang,et al. Analysis of alternatives for insulinizing patients to achieve glycemic control and avoid accompanying risks of hypoglycemia. , 2015, Biomedical reports.
[13] Fatemeh Zahedi,et al. Individuals' Internet Security Perceptions and Behaviors: Polycontextual Contrasts Between the United States and China , 2016, MIS Q..
[14] Robert LaRose,et al. Online safety begins with you and me: Convincing Internet users to protect themselves , 2015, Comput. Hum. Behav..
[15] W. Gan,et al. Opposite effects of fear conditioning and extinction on dendritic spine remodelling , 2012, Nature.
[16] Izak Benbasat,et al. Information Security Policy Compliance: An Empirical Study of Rationality-Based Beliefs and Information Security Awareness , 2010, MIS Q..
[17] F. Gresham,et al. Self-Efficacy Differences Among Mildly Handicapped, Gifted, and Nonhandicapped Students , 1988 .
[18] Se-Hoon Jeong. Visual Metaphor in Advertising: Is the Persuasive Effect Attributable to Visual Argumentation or Metaphorical Rhetoric? , 2008 .
[19] H. Raghav Rao,et al. Protection motivation and deterrence: a framework for security policy compliance in organisations , 2009, Eur. J. Inf. Syst..