An empirical study of a behavioral decision model with moderated effects for long-range security initiatives

[1]  Clifton L. Smith,et al.  Security education in Singapore: A study of knowledge structures in electronic security technology , 2011 .

[2]  P. Fussey An economy of choice? Terrorist decision-making and criminological rational choice theories reconsidered , 2011 .

[3]  S. Costanza,et al.  Policing terror threats and false positives: Employing a signal detection model to examine changes in national and local policing strategy between 2001 and 2007 , 2011 .

[4]  Norbert Schwarz,et al.  Washing Away Postdecisional Dissonance , 2010, Science.

[5]  Barbara M. Byrne,et al.  Structural equation modeling with AMOS , 2010 .

[6]  Duane T. Wegener,et al.  Elaboration and consequences of anchored estimates: An attitudinal perspective on numerical anchoring , 2008 .

[7]  Todd J. Thorsteinson,et al.  Anchoring effects on performance judgments , 2008 .

[8]  P. Jarzabkowski Shaping Strategy as a Structuration Process , 2008 .

[9]  V. Goel,et al.  Smarter Than We Think , 2008, Psychological science.

[10]  Chi-Hyon Lee,et al.  Within-Industry Diversification and Firm Performance in the Presence of Network Externalities: Evidence From the Software Industry , 2008 .

[11]  Daniel M. Oppenheimer,et al.  Anchors aweigh: A demonstration of cross-modality anchoring and magnitude priming , 2008, Cognition.

[12]  J. Tyler Incorporating storytelling into practice: How HRD practitioners foster strategic storytelling , 2007 .

[13]  I. Levin,et al.  Common and distinct factors in decision making under ambiguity and risk: A psychometric study of individual differences , 2007 .

[14]  Michael Workman,et al.  Advancements in technologies: new opportunities to investigate factors contributing to differential technology and information use , 2007 .

[15]  T. Grothmann,et al.  People at Risk of Flooding: Why Some Residents Take Precautionary Action While Others Do Not , 2006 .

[16]  Evangelos A. Kiountouzis,et al.  Information Management & Computer Security Formulating information systems risk management strategies through cultural theory , 2016 .

[17]  Nancy L. Leech,et al.  IBM SPSS for Intermediate Statistics: Use and Interpretation, Fifth Edition , 2014 .

[18]  Thomas Mussweiler,et al.  Subliminal anchoring: Judgmental consequences and underlying mechanisms , 2005 .

[19]  Michael Workman,et al.  Expert decision support system use, disuse, and misuse: a study using the theory of planned behavior , 2005, Comput. Hum. Behav..

[20]  Em Griffin A First Look at Communication Theory , 2005 .

[21]  Lisa Dorn,et al.  Making sense of invulnerability at work—a qualitative study of police drivers , 2003 .

[22]  M. Welsh,et al.  Advocacy, Performance, and Threshold Influences on Decisions to Terminate New Product Development , 2003 .

[23]  Mason A. Carpenter,et al.  STRATEGIC SATISFICING? A BEHAVIORAL--AGENCY THEORY PERSPECTIVE ON STOCK REPURCHASE PROGRAM ANNOUNCEMENTS , 2003 .

[24]  Mark Simon,et al.  The Relationship between Overconfidence and the Introduction of Risky Products: Evidence from a Field Study , 2003 .

[25]  Theresa K. Lant,et al.  Information Cuesand Decision Making , 2002 .

[26]  Joffre Swait,et al.  Choice Environment, Market Complexity, and Consumer Behavior: A Theoretical and Empirical Approach for Incorporating Decision Complexity into Models of Consumer Choice , 2001 .

[27]  J. Greenberg,et al.  A dual-process model of defense against conscious and unconscious death-related thoughts: an extension of terror management theory. , 1999, Psychological review.

[28]  Keith E. Stanovich,et al.  Discrepancies Between Normative and Descriptive Models of Decision Making and the Understanding/Acceptance Principle , 1999, Cognitive Psychology.

[29]  Rex B. Kline,et al.  Principles and Practice of Structural Equation Modeling , 1998 .

[30]  G Narasimham,et al.  Development of scientific reasoning biases: cognitive versus ego-protective explanations. , 1998, Developmental psychology.

[31]  F. Strack,et al.  Explaining the Enigmatic Anchoring Effect: Mechanisms of Selective Accessibility , 1997 .

[32]  Tom Pyszczynski,et al.  Why Do We Need What We Need? A Terror Management Perspective on the Roots of Human Social Motivation , 1997 .

[33]  S Roe-Berning,et al.  The association between illusions of invulnerability and exposure to trauma. , 1997, Journal of traumatic stress.

[34]  Wynne W. Chin,et al.  On the use, usefulness, and ease of use of structural equation modeling in MIS research: a note of caution , 1995 .

[35]  E. Poulton Behavioral decision theory : a new approach , 1994 .

[36]  R. Buehler,et al.  Exploring the "planning fallacy": Why people underestimate their task completion times. , 1994 .

[37]  E. Poulton Behavioral decision theory , 1994 .

[38]  Henry Mintzberg,et al.  The Fall and Rise of Strategic Planning , 1994 .

[39]  John P. Meyer,et al.  Commitment to organizations and occupations: Extension and test of a three-component conceptualization. , 1993 .

[40]  Drazen Prelec,et al.  Preferences for sequences of outcomes. , 1993 .

[41]  R. Nisbett Rules for reasoning , 1993 .

[42]  Richard P. Larrick,et al.  Who uses the normative rules of choice , 1993 .

[43]  A. Tversky,et al.  Choice under Conflict: The Dynamics of Deferred Decision , 1992 .

[44]  S. West,et al.  Multiple Regression: Testing and Interpreting Interactions , 1991 .

[45]  J. Sobel Maximization, Stability of Decision, and Actions in Accordance with Reason , 1990, Philosophy of Science.

[46]  Barbara Tversky,et al.  A Reconciliation of the Evidence on Eyewitness Testimony: Comments on McCloskey and Zaragoza , 1989 .

[47]  James Brian Quinn,et al.  Managing Strategic Change , 1989 .

[48]  David Kelley,et al.  The Art of Reasoning , 1988 .

[49]  J. Stevens,et al.  Applied Multivariate Statistics for the Social Sciences , 1993 .

[50]  A. Tversky,et al.  The hot hand in basketball: On the misperception of random sequences , 1985, Cognitive Psychology.

[51]  A Pollatsek,et al.  Beliefs underlying random sampling , 1984, Memory & cognition.

[52]  A. Tversky,et al.  Extensional versus intuitive reasoning: the conjunction fallacy in probability judgment , 1983 .

[53]  Irene Hanson Frieze,et al.  A Theoretical Perspective for Understanding Reactions to Victimization , 1983 .

[54]  B. Tabachnick,et al.  Using Multivariate Statistics , 1983 .

[55]  F. Terrell,et al.  The illusion of control among depressed patients. , 1979, Journal of abnormal psychology.

[56]  A. Bandura Self-efficacy: toward a unifying theory of behavioral change. , 1977, Psychological review.

[57]  Henry Mintzberg,et al.  The Structure of "Unstructured" Decision Processes , 1976 .

[58]  A. Tversky,et al.  Judgment under Uncertainty: Heuristics and Biases , 1974, Science.

[59]  Nicholas Alex,et al.  On Being Mugged , 1973 .

[60]  A. Tversky,et al.  Subjective Probability: A Judgment of Representativeness , 1972 .