Influence of Social Context and Affect on Individuals' Implementation of Information Security Safeguards
暂无分享,去创建一个
[1] Larry E. Toothaker,et al. Multiple Regression: Testing and Interpreting Interactions , 1991 .
[2] Wynne W. Chin,et al. A Partial Least Squares Latent Variable Modeling Approach for Measuring Interaction Effects: Results from a Monte Carlo Simulation Study and an Electronic - Mail Emotion/Adoption Study , 2003, Inf. Syst. Res..
[3] Samer Faraj,et al. Why Should I Share? Examining Social Capital and Knowledge Contribution in Electronic Networks of Practice , 2005, MIS Q..
[4] Sung S. Kim,et al. Internet Users' Information Privacy-Protective Responses: A Taxonomy and a Nomological Model , 2008, MIS Q..
[5] Cliff Lampe,et al. The Benefits of Facebook "Friends: " Social Capital and College Students' Use of Online Social Network Sites , 2007, J. Comput. Mediat. Commun..
[6] A. Isen,et al. The effect of positive feelings on risk taking: When the chips are down. , 1983 .
[7] Jane M. Howell,et al. Personal Computing: Toward a Conceptual Model of Utilization , 1991, MIS Q..
[8] Tamara Dinev,et al. An Extended Privacy Calculus Model for E-Commerce Transactions , 2006, Inf. Syst. Res..
[9] S. Ghoshal,et al. Social Capital and Value Creation: The Role of Intrafirm Networks , 1998 .
[10] Detmar W. Straub,et al. Structural Equation Modeling and Regression: Guidelines for Research Practice , 2000, Commun. Assoc. Inf. Syst..
[11] B. Fischhoff,et al. Cost benefit analysis and the art of motorcycle maintenance , 1977 .
[12] Jacob Cohen. Statistical Power Analysis for the Behavioral Sciences , 1969, The SAGE Encyclopedia of Research Design.
[13] Ana M. Martínez-Alemán,et al. Online Social Networking on Campus: Understanding What Matters in Student Culture , 2008 .
[14] Deborah Compeau,et al. Social Cognitive Theory and Individual Reactions to Computing Technology: A Longitudinal Study , 1999, MIS Q..
[15] John Hulland,et al. Use of partial least squares (PLS) in strategic management research: a review of four recent studies , 1999 .
[16] Jinsook Cho,et al. Likelihood to abort an online transaction: influences from cognitive evaluations, attitudes, and behavioral variables , 2004, Inf. Manag..
[17] J. Helliwell,et al. The social context of well-being. , 2004, Philosophical transactions of the Royal Society of London. Series B, Biological sciences.
[18] C. Fornell,et al. Evaluating structural equation models with unobservable variables and measurement error. , 1981 .
[19] S. Ghoshal,et al. Social Capital, Intellectual Capital, and the Organizational Advantage , 1998 .
[20] Jacob Cohen,et al. Applied multiple regression/correlation analysis for the behavioral sciences , 1979 .
[21] T. Keith. Multiple Regression and Beyond , 2005, Principles & Methods of Statistical Analysis.
[22] Deborah Compeau,et al. Computer Self-Efficacy: Development of a Measure and Initial Test , 1995, MIS Q..
[23] P. Slovic. Trust, Emotion, Sex, Politics, and Science: Surveying the Risk‐Assessment Battlefield , 1999, Risk analysis : an official publication of the Society for Risk Analysis.
[24] Harbir Singh,et al. Learning and protection of proprietary assets in strategic alliances: building relational capital , 2000 .
[25] R. Bies,et al. Consumer Privacy: Balancing Economic and Justice Considerations , 2003 .
[26] Adam Shostack,et al. The New School of Information Security , 2008 .
[27] Hsi‐Peng Lu,et al. An empirical study of the effect of perceived risk upon intention to use online applications , 2005, Inf. Manag. Comput. Security.
[28] J. Hair. Multivariate data analysis , 1972 .
[29] Subhash Sharma,et al. Identification and Analysis of Moderator Variables , 1981 .
[30] Daniel R. Krause,et al. The relationships between supplier development, commitment, social capital accumulation and performance improvement , 2007 .
[31] Steve Mansfield-Devine,et al. Social Networking: Anti-social networking: exploiting the trusting environment of Web 2.0 , 2008 .
[32] P. Adler,et al. Social Capital: Prospects for a New Concept , 2002 .
[33] B. Fischhoff,et al. Behavioral Decision Theory , 1977 .
[34] Yajiong Xue,et al. Avoidance of Information Technology Threats: A Theoretical Perspective , 2009, MIS Q..
[35] Beverly B. Tyler,et al. Antecedents and consequences of social capital on buyer performance improvement , 2008 .
[36] C. Coulton,et al. Interaction Effects in Multiple Regression , 1993 .
[37] Edgar Erdfelder,et al. G*Power 3: A flexible statistical power analysis program for the social, behavioral, and biomedical sciences , 2007, Behavior research methods.
[38] W. Edwards. Behavioral decision theory. , 1961, Annual review of psychology.
[39] Alan R. Dennis,et al. Social Capital and Knowledge Integration in Digitally Enabled Teams , 2008, Inf. Syst. Res..
[40] P. Deldin,et al. The effect of mood induction in a risky decision-making task , 1986 .
[41] Thomas E. Nygren,et al. Influence of positive affect on the subjective utility of gains and losses: it is just not worth the risk. , 1988, Journal of personality and social psychology.
[42] M. Culnan,et al. Information Privacy Concerns, Procedural Fairness, and Impersonal Trust: An Empirical Investigation , 1999 .
[43] Sherah Kurnia,et al. Social Capital in Information and Communications Technology Research: Past, Present, and Future , 2009, Commun. Assoc. Inf. Syst..
[44] Stephen M. Johnson,et al. The affect heuristic in judgments of risks and benefits , 2000 .
[45] Vincenzo Russo,et al. Privacy calculus model in e-commerce – a study of Italy and the United States , 2006, Eur. J. Inf. Syst..
[46] ScienceDirect. Organizational behavior and human performance , 1984 .
[47] Detmar W. Straub,et al. A Practical Guide To Factorial Validity Using PLS-Graph: Tutorial And Annotated Example , 2005, Commun. Assoc. Inf. Syst..
[48] Matthew Pearson,et al. Online social networking on campus: understanding what matters in student culture , 2010 .
[49] P. Slovic,et al. A psychological study of the inverse relationship between perceived risk and perceived benefit. , 1994, Risk analysis : an official publication of the Society for Risk Analysis.
[50] Ramnath K. Chellappa,et al. Personalization versus Privacy: An Empirical Examination of the Online Consumer’s Dilemma , 2005, Inf. Technol. Manag..
[51] Andrew Whitaker,et al. Chained Exploits: Advanced Hacking Attacks from Start to Finish , 2009 .
[52] Wynne W. Chin,et al. Extending the technology acceptance model: the influence of perceived user resources , 2001, DATB.