Evaluating the effectiveness of learner controlled information security training
暂无分享,去创建一个
[1] Bong-Goon Seo,et al. The effect of message framing on security behavior in online services: Focusing on the shift of time orientation via psychological ownership , 2019, Comput. Hum. Behav..
[2] Research Methods for Cyber Security , 2018, Network Security.
[3] Michael E. Wasserman,et al. The Psychology of Learner Control in Training: A Multilevel, Interactionist Framework , 2017 .
[4] Michael E. Wasserman,et al. How Do Learners Interact with E-learning? Examining Patterns of Learner Control Behaviors , 2017, AIS Trans. Hum. Comput. Interact..
[5] Wu He,et al. Gender difference and employees' cybersecurity behaviors , 2017, Comput. Hum. Behav..
[6] Tom L. Roberts,et al. Examining the Relationship of Organizational Insiders' Psychological Capital with Information Security Threat and Coping Appraisals , 2017, Comput. Hum. Behav..
[7] Craig M. Reddock,et al. A Meta-Analytic Investigation of Objective Learner Control in Web-based Instruction , 2016, Journal of Business and Psychology.
[8] Robert LaRose,et al. Understanding online safety behaviors: A protection motivation theory perspective , 2016, Comput. Secur..
[9] N. Kock. Non-Normality Propagation among Latent Variables and Indicators in PLS-SEM Simulations , 2016 .
[10] Stefan Smolnik,et al. The Effectiveness of E-Learning Systems: A Review of the Empirical Literature on Learner Control , 2016 .
[11] Sandra L. Fisher,et al. Learner Control and e-Learning: Taking Stock and Moving Forward , 2016 .
[12] Detmar W. Straub,et al. Neural Correlates of Protection Motivation for Secure IT Behaviors: An fMRI Examination , 2016, J. Assoc. Inf. Syst..
[13] Karin A. Orvis,et al. Re-examination of Motivation in Learning Contexts: Meta-analytically Investigating the Role Type of Motivation Plays in the Prediction of Key Training Outcomes , 2016 .
[14] Yu Andy Wu,et al. Impact of Users’ Security Awareness on Desktop Security Behavior: A Protection Motivation Theory Perspective , 2016, Inf. Syst. Manag..
[15] Christopher B. Mayhorn,et al. One Phish, Two Phish, How to Avoid the Internet Phish , 2014 .
[16] Emerson R. Murphy-Hill,et al. Social influences on secure development tool adoption: why security tools spread , 2014, CSCW.
[17] Thomas Clarke,et al. The advance of the MOOCs (massive open online courses) : The impending globalisation of business education? , 2013 .
[18] Paul Hong,et al. Using social media applications for educational outcomes in college teaching: A structural equation analysis , 2013, Br. J. Educ. Technol..
[19] Steve Mansfield-Devine,et al. Interview: Joe Ferrara – fighting phishing , 2013 .
[20] Robert P. Bostrom,et al. An Investigation of the Appropriation of Technology-Mediated Training Methods Incorporating Enactive and Collaborative Learning , 2013, Inf. Syst. Res..
[21] Tara S. Behrend,et al. Reexamining the Nature of Learner Control: Dimensionality and Effects on Learning and Training Reactions , 2013, Journal of Business and Psychology.
[22] Shuting Xu,et al. Applying Protection Motivation Theory to Information Security Training for College Students , 2013 .
[23] Tara S. Behrend,et al. Using Animated Agents in Learner‐Controlled Training: The Effects of Design Control , 2012 .
[24] Marko Sarstedt,et al. The Use of Partial Least Squares Structural Equation Modeling in Strategic Management Research: A Review of Past Practices and Recommendations for Future Applications , 2012 .
[25] Ned Kock,et al. Lateral Collinearity and Misleading Results in Variance-Based SEM: An Illustration and Recommendations , 2012, J. Assoc. Inf. Syst..
[26] James Cox,et al. Information systems user security: A structured model of the knowing-doing gap , 2012, Comput. Hum. Behav..
[27] Fujun Lai,et al. Using Partial Least Squares in Operations Management Research: A Practical Guideline and Summary of Past Research , 2012 .
[28] Salem Shiryan,et al. Employee Training Effectiveness in Saudi Arabian SME Performance , 2012 .
[29] Angela Paradise,et al. (In)Visible Threats? The Third-Person Effect in Perceptions of the Influence of Facebook , 2012, Cyberpsychology Behav. Soc. Netw..
[30] Ranida B. Harris,et al. Social Networking Websites and Posting Personal Information: An Evaluation of Protection Motivation Theory , 2011 .
[31] David S. Ackerman,et al. Effect of Type of Curriculum on Educational Outcomes and Motivation Among Marketing Students With Different Learning Styles , 2011 .
[32] Mikko T. Siponen,et al. Toward a New Meta-Theory for Designing Information Systems (IS) Security Training Approaches , 2011, J. Assoc. Inf. Syst..
[33] Hyojin Kim. Pharmaceutical Companies as a Source of Health Information: A Pilot Study of the Effects of Source, Web Site Interactivity, and Involvement , 2011, Health marketing quarterly.
[34] Michael E. Wasserman,et al. E-nabled for E-Learning? The Moderating Role of Personality in Determining the Optimal Degree of Learner Control in an E-Learning Environment , 2010 .
[35] Mikko T. Siponen,et al. Improving Employees' Compliance Through Information Systems Security Training: An Action Research Study , 2010, MIS Q..
[36] Jonathan Evans. Intuition and Reasoning: A Dual-Process Perspective , 2010 .
[37] Merrill Warkentin,et al. Fear Appeals and Information Security Behaviors: An Empirical Study , 2010, MIS Q..
[38] Edward L. Levine,et al. The Perplexing Role of Learner Control in E-Learning: Will Learning and Transfer Benefit or Suffer? , 2010 .
[39] InduShobha N. Chengalur-Smith,et al. An overview of social engineering malware: Trends, tactics, and implications , 2010 .
[40] Tzyh-Lih Hsia,et al. A study of student satisfaction in a blended e-learning system environment , 2010, Comput. Educ..
[41] Yajiong Xue,et al. Understanding Security Behaviors in Personal Computer Usage: A Threat Avoidance Perspective , 2010, J. Assoc. Inf. Syst..
[42] Hyojin Kim,et al. The Effects of Interactivity on Information Processing and Attitude Change: Implications for Mental Health Stigma , 2010, Health communication.
[43] Mo Adam Mahmood,et al. Compliance with Information Security Policies: An Empirical Investigation , 2010, Computer.
[44] Young U. Ryu,et al. Self-efficacy in information security: Its influence on end users' information security practice behavior , 2009, Comput. Secur..
[45] Connie V. Chan,et al. Interactive Graphics for Expressing Health Risks: Development and Qualitative Evaluation , 2009, Journal of health communication.
[46] Lorrie Faith Cranor,et al. School of phish: a real-world evaluation of anti-phishing training , 2009, SOUPS.
[47] Paul Benjamin Lowry,et al. The CMC Interactivity Model: How Interactivity Enhances Communication Quality and Process Satisfaction in Lean-Media Groups , 2009, J. Manag. Inf. Syst..
[48] Michael E. Wasserman,et al. Power to the people: using learner control to improve trainee reactions and learning in web-based instructional environments. , 2009, The Journal of applied psychology.
[49] Donald L. Kirkpatrick,et al. Evaluating Training Programs : The Four Levels , 2009 .
[50] H. Raghav Rao,et al. Protection motivation and deterrence: a framework for security policy compliance in organisations , 2009, Eur. J. Inf. Syst..
[51] Shu-Ling Wang,et al. The role of feedback and self-efficacy on web-based learning: The social cognitive perspective , 2008, Comput. Educ..
[52] Detmar W. Straub,et al. Security lapses and the omission of information security measures: A threat control model and empirical test , 2008, Comput. Hum. Behav..
[53] Deborah Compeau,et al. Self-regulated learning strategies and software training , 2008, Inf. Manag..
[54] Steven Hornik,et al. An empirical examination of factors contributing to the creation of successful e-learning environments , 2008, Int. J. Hum. Comput. Stud..
[55] Dowming Yeh,et al. What drives a successful e-Learning? An empirical investigation of the critical factors influencing learner satisfaction , 2008, Comput. Educ..
[56] Radhika Santhanam,et al. Using Self-Regulatory Learning to Enhance E-Learning-Based Information Technology Training , 2008, Inf. Syst. Res..
[57] Katherine Ely,et al. A review and meta-analysis of the nomological network of trainee reactions. , 2008, The Journal of applied psychology.
[58] Steven W. Schmidt. The relationship between satisfaction with workplace training and overall job satisfaction , 2007 .
[59] Béatrice S. Hasler,et al. Learner Control, Cognitive Load and Instructional Animation , 2007 .
[60] Joseph E. Beck,et al. Does Learner Control Affect Learning? , 2007, AIED.
[61] Hwiman Chung,et al. Effects of Perceived Interactivity on Web Site Preference and Memory: Role of Personal Motivation , 2006, J. Comput. Mediat. Commun..
[62] Janine L. Spears. The effects of user participation in identifying information security risk in business processes , 2006, SIGMIS CPR '06.
[63] María Sicilia,et al. EFFECTS OF INTERACTIVITY IN A WEB SITE: The Moderating Effect of Need for Cognition , 2005 .
[64] K. Brown. An examination of the structure and nomological network of trainee reactions: a closer look at "smile sheets". , 2005, The Journal of applied psychology.
[65] Richard D. Johnson,et al. An empirical investigation of sources of application-specific computer-self-efficacy and mediators of the efficacy - performance relationship , 2005, Int. J. Hum. Comput. Stud..
[66] BENGT JOHANSSON,et al. The Third-Person Effect , 2005 .
[67] Barbara H Wixom,et al. A Theoretical Integration of User Satisfaction and Technology Acceptance , 2005, Inf. Syst. Res..
[68] Chien-Hung Liu,et al. Learning effectiveness in a Web-based virtual learning environment: a learner control perspective , 2005, J. Comput. Assist. Learn..
[69] Eduardo Salas,et al. Optimizing e‐learning: Research‐based guidelines for learner‐controlled training , 2004 .
[70] Robert Fletcher,et al. Tailored Computer-Based Cancer Risk Communication: Correcting Colorectal Cancer Risk Perception , 2004, Journal of health communication.
[71] SHYAM SUNDAR,et al. Explicating Web Site Interactivity , 2003, Commun. Res..
[72] Yuping Liu,et al. What is Interactivity and is it Always Such a Good Thing? Implications of Definition, Person, and Situation for the Influence of Interactivity on Advertising Effectiveness , 2002 .
[73] S. Cassidy,et al. Developing the Computer User Self-Efficacy (Cuse) Scale: Investigating the Relationship between Computer Self-Efficacy, Gender and Experience with Computers , 2002 .
[74] Richard K. Staley,et al. From Example Study to Problem Solving: Smooth Transitions Help Learning , 2002 .
[75] J. L. Pierce,et al. Toward a Theory of Psychological Ownership in Organizations , 2001 .
[76] Gregory Schraw,et al. Teacher beliefs about instructional choice : A phenomenological study , 2000 .
[77] Kim Witte,et al. A Meta-Analysis of Fear Appeals: Implications for Effective Public Health Campaigns , 2000, Health education & behavior : the official publication of the Society for Public Health Education.
[78] Heidi L. Schnackenberg,et al. Learner control over full and lean computer-based instruction under differing ability levels , 2000 .
[79] David H. Jonassen,et al. Instructional design models for well-structured and III-structured problem-solving learning outcomes , 1997 .
[80] Katherine A. Karl,et al. The impact of feedback and self-efficacy on performance in training. , 1993 .
[81] K. Witte. Putting the fear back into fear appeals: The extended parallel process model , 1992 .
[82] Houston H. Carr,et al. Threats to Information Systems: Today's Reality, Yesterday's Understanding , 1992, MIS Q..
[83] I. Ajzen. The theory of planned behavior , 1991 .
[84] E. R. Steinberg. Cognition and learner control: a literature review, 1977–1988 , 1989 .
[85] G. Alliger,et al. KIRKPATRICK'S LEVELS OF TRAINING CRITERIA: THIRTY YEARS LATER , 1989 .
[86] Patrick J. Schloss,et al. The Differential Effect of Learner Control and Feedback in College Students' Performance on CAI Modules , 1988 .
[87] A. Bandura. Social Foundations of Thought and Action: A Social Cognitive Theory , 1985 .
[88] Raymond W. Kulhavy,et al. Feedback and content review in programmed instruction , 1979 .
[89] Daniel Bar-Tal,et al. Attributional Analysis of Achievement-related Behavior , 1978 .
[90] R. W. Rogers,et al. A Protection Motivation Theory of Fear Appeals and Attitude Change1. , 1975, The Journal of psychology.
[91] J. Gower,et al. Multivariate data analysis , 1972 .
[92] Richard C. Anderson,et al. Conditions under which feedback facilitates learning from programmed lessons. , 1972 .
[93] Victor R. Prybutok,et al. Neuroscience Foundations for Human Decision Making in Information Security: A General Framework and Experiment Design , 2017 .
[94] Joseph V. Homan,et al. HOW LONG DO EMPLOYEES REMEMBER INFORMATION SECURITY TRAINING PROGRAMS? A STUDY OF KNOWLEDGE ACQUISITION AND RETENTION , 2016 .
[95] Princely Ifinedo,et al. Information systems security policy compliance: An empirical study of the effects of socialisation, influence, and cognition , 2014, Inf. Manag..
[96] Suprateek Sarker,et al. One Size Does Not Fit All: Different Cultures Require Different Information Systems Security Interventions , 2013, PACIS.
[97] Katelyn J. Cavanaugh. Individual Differences and Usage of Learner Control , 2013 .
[98] Ahmed I. Albarrak,et al. Evaluation of Users Information Security Practices at King Saud University Hospitals , 2011 .
[99] Sherly Abraham,et al. Information Security Behavior: Factors and Research Directions , 2011, AMCIS.
[100] D. Randy Garrison,et al. The first decade of the community of inquiry framework: A retrospective , 2010, Internet High. Educ..
[101] Mark D. Threeton. THE RELATIONSHIP BETWEEN PERSONALITY TYPE AND LEARNING STYLE: A STUDY OF AUTOMOTIVE TECHNOLOGY STUDENTS , 2009 .
[102] Albert L. Harris,et al. The impact of information richness on information security awareness training effectiveness , 2009, Comput. Educ..
[103] Douglas R. Vogel,et al. Student E-Learning Intrinsic Motivation: A Qualitative Analysis , 2007, Commun. Assoc. Inf. Syst..
[104] Kregg Aytes,et al. Computer Security and Risky Computing Practices: A Rational Choice Perspective , 2004, J. Organ. End User Comput..
[105] Blaine A. Price,et al. Distance education via the Internet: the student experience , 2000, Br. J. Educ. Technol..
[106] Sean Hammond,et al. Research Methods in Psychology , 1994 .
[107] Sue R. Faerman,et al. Trainee Satisfaction and Training Impact: Issues in Training Evaluation , 1993 .
[108] J. Keller. Motivational Design of Instruction , 1983 .
[109] D. Kirkpatrick. Techniques for evaluating training programs , 1979 .
[110] Leventhal,et al. [Advances in Experimental Social Psychology] Advances in Experimental Social Psychology Volume 5 Volume 5 || Findings and Theory in the Study of Fear Communications , 1970 .
[111] Blake Ives,et al. Web-based Virtual Learning Environments: a Research Framework and a Preliminary Assessment of Effectiveness in Basic It Skills Training Author(s): Piccoli Et Al./web-based Virtual Learning Environments Web-based Virtual Learning Environments: a Research Framework and a Preliminary Assessment of Effe , 2022 .