Evaluating the effectiveness of learner controlled information security training

[1]  Bong-Goon Seo,et al.  The effect of message framing on security behavior in online services: Focusing on the shift of time orientation via psychological ownership , 2019, Comput. Hum. Behav..

[2]  Research Methods for Cyber Security , 2018, Network Security.

[3]  Michael E. Wasserman,et al.  The Psychology of Learner Control in Training: A Multilevel, Interactionist Framework , 2017 .

[4]  Michael E. Wasserman,et al.  How Do Learners Interact with E-learning? Examining Patterns of Learner Control Behaviors , 2017, AIS Trans. Hum. Comput. Interact..

[5]  Wu He,et al.  Gender difference and employees' cybersecurity behaviors , 2017, Comput. Hum. Behav..

[6]  Tom L. Roberts,et al.  Examining the Relationship of Organizational Insiders' Psychological Capital with Information Security Threat and Coping Appraisals , 2017, Comput. Hum. Behav..

[7]  Craig M. Reddock,et al.  A Meta-Analytic Investigation of Objective Learner Control in Web-based Instruction , 2016, Journal of Business and Psychology.

[8]  Robert LaRose,et al.  Understanding online safety behaviors: A protection motivation theory perspective , 2016, Comput. Secur..

[9]  N. Kock Non-Normality Propagation among Latent Variables and Indicators in PLS-SEM Simulations , 2016 .

[10]  Stefan Smolnik,et al.  The Effectiveness of E-Learning Systems: A Review of the Empirical Literature on Learner Control , 2016 .

[11]  Sandra L. Fisher,et al.  Learner Control and e-Learning: Taking Stock and Moving Forward , 2016 .

[12]  Detmar W. Straub,et al.  Neural Correlates of Protection Motivation for Secure IT Behaviors: An fMRI Examination , 2016, J. Assoc. Inf. Syst..

[13]  Karin A. Orvis,et al.  Re-examination of Motivation in Learning Contexts: Meta-analytically Investigating the Role Type of Motivation Plays in the Prediction of Key Training Outcomes , 2016 .

[14]  Yu Andy Wu,et al.  Impact of Users’ Security Awareness on Desktop Security Behavior: A Protection Motivation Theory Perspective , 2016, Inf. Syst. Manag..

[15]  Christopher B. Mayhorn,et al.  One Phish, Two Phish, How to Avoid the Internet Phish , 2014 .

[16]  Emerson R. Murphy-Hill,et al.  Social influences on secure development tool adoption: why security tools spread , 2014, CSCW.

[17]  Thomas Clarke,et al.  The advance of the MOOCs (massive open online courses) : The impending globalisation of business education? , 2013 .

[18]  Paul Hong,et al.  Using social media applications for educational outcomes in college teaching: A structural equation analysis , 2013, Br. J. Educ. Technol..

[19]  Steve Mansfield-Devine,et al.  Interview: Joe Ferrara – fighting phishing , 2013 .

[20]  Robert P. Bostrom,et al.  An Investigation of the Appropriation of Technology-Mediated Training Methods Incorporating Enactive and Collaborative Learning , 2013, Inf. Syst. Res..

[21]  Tara S. Behrend,et al.  Reexamining the Nature of Learner Control: Dimensionality and Effects on Learning and Training Reactions , 2013, Journal of Business and Psychology.

[22]  Shuting Xu,et al.  Applying Protection Motivation Theory to Information Security Training for College Students , 2013 .

[23]  Tara S. Behrend,et al.  Using Animated Agents in Learner‐Controlled Training: The Effects of Design Control , 2012 .

[24]  Marko Sarstedt,et al.  The Use of Partial Least Squares Structural Equation Modeling in Strategic Management Research: A Review of Past Practices and Recommendations for Future Applications , 2012 .

[25]  Ned Kock,et al.  Lateral Collinearity and Misleading Results in Variance-Based SEM: An Illustration and Recommendations , 2012, J. Assoc. Inf. Syst..

[26]  James Cox,et al.  Information systems user security: A structured model of the knowing-doing gap , 2012, Comput. Hum. Behav..

[27]  Fujun Lai,et al.  Using Partial Least Squares in Operations Management Research: A Practical Guideline and Summary of Past Research , 2012 .

[28]  Salem Shiryan,et al.  Employee Training Effectiveness in Saudi Arabian SME Performance , 2012 .

[29]  Angela Paradise,et al.  (In)Visible Threats? The Third-Person Effect in Perceptions of the Influence of Facebook , 2012, Cyberpsychology Behav. Soc. Netw..

[30]  Ranida B. Harris,et al.  Social Networking Websites and Posting Personal Information: An Evaluation of Protection Motivation Theory , 2011 .

[31]  David S. Ackerman,et al.  Effect of Type of Curriculum on Educational Outcomes and Motivation Among Marketing Students With Different Learning Styles , 2011 .

[32]  Mikko T. Siponen,et al.  Toward a New Meta-Theory for Designing Information Systems (IS) Security Training Approaches , 2011, J. Assoc. Inf. Syst..

[33]  Hyojin Kim Pharmaceutical Companies as a Source of Health Information: A Pilot Study of the Effects of Source, Web Site Interactivity, and Involvement , 2011, Health marketing quarterly.

[34]  Michael E. Wasserman,et al.  E-nabled for E-Learning? The Moderating Role of Personality in Determining the Optimal Degree of Learner Control in an E-Learning Environment , 2010 .

[35]  Mikko T. Siponen,et al.  Improving Employees' Compliance Through Information Systems Security Training: An Action Research Study , 2010, MIS Q..

[36]  Jonathan Evans Intuition and Reasoning: A Dual-Process Perspective , 2010 .

[37]  Merrill Warkentin,et al.  Fear Appeals and Information Security Behaviors: An Empirical Study , 2010, MIS Q..

[38]  Edward L. Levine,et al.  The Perplexing Role of Learner Control in E-Learning: Will Learning and Transfer Benefit or Suffer? , 2010 .

[39]  InduShobha N. Chengalur-Smith,et al.  An overview of social engineering malware: Trends, tactics, and implications , 2010 .

[40]  Tzyh-Lih Hsia,et al.  A study of student satisfaction in a blended e-learning system environment , 2010, Comput. Educ..

[41]  Yajiong Xue,et al.  Understanding Security Behaviors in Personal Computer Usage: A Threat Avoidance Perspective , 2010, J. Assoc. Inf. Syst..

[42]  Hyojin Kim,et al.  The Effects of Interactivity on Information Processing and Attitude Change: Implications for Mental Health Stigma , 2010, Health communication.

[43]  Mo Adam Mahmood,et al.  Compliance with Information Security Policies: An Empirical Investigation , 2010, Computer.

[44]  Young U. Ryu,et al.  Self-efficacy in information security: Its influence on end users' information security practice behavior , 2009, Comput. Secur..

[45]  Connie V. Chan,et al.  Interactive Graphics for Expressing Health Risks: Development and Qualitative Evaluation , 2009, Journal of health communication.

[46]  Lorrie Faith Cranor,et al.  School of phish: a real-world evaluation of anti-phishing training , 2009, SOUPS.

[47]  Paul Benjamin Lowry,et al.  The CMC Interactivity Model: How Interactivity Enhances Communication Quality and Process Satisfaction in Lean-Media Groups , 2009, J. Manag. Inf. Syst..

[48]  Michael E. Wasserman,et al.  Power to the people: using learner control to improve trainee reactions and learning in web-based instructional environments. , 2009, The Journal of applied psychology.

[49]  Donald L. Kirkpatrick,et al.  Evaluating Training Programs : The Four Levels , 2009 .

[50]  H. Raghav Rao,et al.  Protection motivation and deterrence: a framework for security policy compliance in organisations , 2009, Eur. J. Inf. Syst..

[51]  Shu-Ling Wang,et al.  The role of feedback and self-efficacy on web-based learning: The social cognitive perspective , 2008, Comput. Educ..

[52]  Detmar W. Straub,et al.  Security lapses and the omission of information security measures: A threat control model and empirical test , 2008, Comput. Hum. Behav..

[53]  Deborah Compeau,et al.  Self-regulated learning strategies and software training , 2008, Inf. Manag..

[54]  Steven Hornik,et al.  An empirical examination of factors contributing to the creation of successful e-learning environments , 2008, Int. J. Hum. Comput. Stud..

[55]  Dowming Yeh,et al.  What drives a successful e-Learning? An empirical investigation of the critical factors influencing learner satisfaction , 2008, Comput. Educ..

[56]  Radhika Santhanam,et al.  Using Self-Regulatory Learning to Enhance E-Learning-Based Information Technology Training , 2008, Inf. Syst. Res..

[57]  Katherine Ely,et al.  A review and meta-analysis of the nomological network of trainee reactions. , 2008, The Journal of applied psychology.

[58]  Steven W. Schmidt The relationship between satisfaction with workplace training and overall job satisfaction , 2007 .

[59]  Béatrice S. Hasler,et al.  Learner Control, Cognitive Load and Instructional Animation , 2007 .

[60]  Joseph E. Beck,et al.  Does Learner Control Affect Learning? , 2007, AIED.

[61]  Hwiman Chung,et al.  Effects of Perceived Interactivity on Web Site Preference and Memory: Role of Personal Motivation , 2006, J. Comput. Mediat. Commun..

[62]  Janine L. Spears The effects of user participation in identifying information security risk in business processes , 2006, SIGMIS CPR '06.

[63]  María Sicilia,et al.  EFFECTS OF INTERACTIVITY IN A WEB SITE: The Moderating Effect of Need for Cognition , 2005 .

[64]  K. Brown An examination of the structure and nomological network of trainee reactions: a closer look at "smile sheets". , 2005, The Journal of applied psychology.

[65]  Richard D. Johnson,et al.  An empirical investigation of sources of application-specific computer-self-efficacy and mediators of the efficacy - performance relationship , 2005, Int. J. Hum. Comput. Stud..

[66]  BENGT JOHANSSON,et al.  The Third-Person Effect , 2005 .

[67]  Barbara H Wixom,et al.  A Theoretical Integration of User Satisfaction and Technology Acceptance , 2005, Inf. Syst. Res..

[68]  Chien-Hung Liu,et al.  Learning effectiveness in a Web-based virtual learning environment: a learner control perspective , 2005, J. Comput. Assist. Learn..

[69]  Eduardo Salas,et al.  Optimizing e‐learning: Research‐based guidelines for learner‐controlled training , 2004 .

[70]  Robert Fletcher,et al.  Tailored Computer-Based Cancer Risk Communication: Correcting Colorectal Cancer Risk Perception , 2004, Journal of health communication.

[71]  SHYAM SUNDAR,et al.  Explicating Web Site Interactivity , 2003, Commun. Res..

[72]  Yuping Liu,et al.  What is Interactivity and is it Always Such a Good Thing? Implications of Definition, Person, and Situation for the Influence of Interactivity on Advertising Effectiveness , 2002 .

[73]  S. Cassidy,et al.  Developing the Computer User Self-Efficacy (Cuse) Scale: Investigating the Relationship between Computer Self-Efficacy, Gender and Experience with Computers , 2002 .

[74]  Richard K. Staley,et al.  From Example Study to Problem Solving: Smooth Transitions Help Learning , 2002 .

[75]  J. L. Pierce,et al.  Toward a Theory of Psychological Ownership in Organizations , 2001 .

[76]  Gregory Schraw,et al.  Teacher beliefs about instructional choice : A phenomenological study , 2000 .

[77]  Kim Witte,et al.  A Meta-Analysis of Fear Appeals: Implications for Effective Public Health Campaigns , 2000, Health education & behavior : the official publication of the Society for Public Health Education.

[78]  Heidi L. Schnackenberg,et al.  Learner control over full and lean computer-based instruction under differing ability levels , 2000 .

[79]  David H. Jonassen,et al.  Instructional design models for well-structured and III-structured problem-solving learning outcomes , 1997 .

[80]  Katherine A. Karl,et al.  The impact of feedback and self-efficacy on performance in training. , 1993 .

[81]  K. Witte Putting the fear back into fear appeals: The extended parallel process model , 1992 .

[82]  Houston H. Carr,et al.  Threats to Information Systems: Today's Reality, Yesterday's Understanding , 1992, MIS Q..

[83]  I. Ajzen The theory of planned behavior , 1991 .

[84]  E. R. Steinberg Cognition and learner control: a literature review, 1977–1988 , 1989 .

[85]  G. Alliger,et al.  KIRKPATRICK'S LEVELS OF TRAINING CRITERIA: THIRTY YEARS LATER , 1989 .

[86]  Patrick J. Schloss,et al.  The Differential Effect of Learner Control and Feedback in College Students' Performance on CAI Modules , 1988 .

[87]  A. Bandura Social Foundations of Thought and Action: A Social Cognitive Theory , 1985 .

[88]  Raymond W. Kulhavy,et al.  Feedback and content review in programmed instruction , 1979 .

[89]  Daniel Bar-Tal,et al.  Attributional Analysis of Achievement-related Behavior , 1978 .

[90]  R. W. Rogers,et al.  A Protection Motivation Theory of Fear Appeals and Attitude Change1. , 1975, The Journal of psychology.

[91]  J. Gower,et al.  Multivariate data analysis , 1972 .

[92]  Richard C. Anderson,et al.  Conditions under which feedback facilitates learning from programmed lessons. , 1972 .

[93]  Victor R. Prybutok,et al.  Neuroscience Foundations for Human Decision Making in Information Security: A General Framework and Experiment Design , 2017 .

[94]  Joseph V. Homan,et al.  HOW LONG DO EMPLOYEES REMEMBER INFORMATION SECURITY TRAINING PROGRAMS? A STUDY OF KNOWLEDGE ACQUISITION AND RETENTION , 2016 .

[95]  Princely Ifinedo,et al.  Information systems security policy compliance: An empirical study of the effects of socialisation, influence, and cognition , 2014, Inf. Manag..

[96]  Suprateek Sarker,et al.  One Size Does Not Fit All: Different Cultures Require Different Information Systems Security Interventions , 2013, PACIS.

[97]  Katelyn J. Cavanaugh Individual Differences and Usage of Learner Control , 2013 .

[98]  Ahmed I. Albarrak,et al.  Evaluation of Users Information Security Practices at King Saud University Hospitals , 2011 .

[99]  Sherly Abraham,et al.  Information Security Behavior: Factors and Research Directions , 2011, AMCIS.

[100]  D. Randy Garrison,et al.  The first decade of the community of inquiry framework: A retrospective , 2010, Internet High. Educ..

[101]  Mark D. Threeton THE RELATIONSHIP BETWEEN PERSONALITY TYPE AND LEARNING STYLE: A STUDY OF AUTOMOTIVE TECHNOLOGY STUDENTS , 2009 .

[102]  Albert L. Harris,et al.  The impact of information richness on information security awareness training effectiveness , 2009, Comput. Educ..

[103]  Douglas R. Vogel,et al.  Student E-Learning Intrinsic Motivation: A Qualitative Analysis , 2007, Commun. Assoc. Inf. Syst..

[104]  Kregg Aytes,et al.  Computer Security and Risky Computing Practices: A Rational Choice Perspective , 2004, J. Organ. End User Comput..

[105]  Blaine A. Price,et al.  Distance education via the Internet: the student experience , 2000, Br. J. Educ. Technol..

[106]  Sean Hammond,et al.  Research Methods in Psychology , 1994 .

[107]  Sue R. Faerman,et al.  Trainee Satisfaction and Training Impact: Issues in Training Evaluation , 1993 .

[108]  J. Keller Motivational Design of Instruction , 1983 .

[109]  D. Kirkpatrick Techniques for evaluating training programs , 1979 .

[110]  Leventhal,et al.  [Advances in Experimental Social Psychology] Advances in Experimental Social Psychology Volume 5 Volume 5 || Findings and Theory in the Study of Fear Communications , 1970 .

[111]  Blake Ives,et al.  Web-based Virtual Learning Environments: a Research Framework and a Preliminary Assessment of Effectiveness in Basic It Skills Training Author(s): Piccoli Et Al./web-based Virtual Learning Environments Web-based Virtual Learning Environments: a Research Framework and a Preliminary Assessment of Effe , 2022 .