Viability of Fee-Based Email Service for Retail Customers
暂无分享,去创建一个
[1] Gilbert A. Churchill. A Paradigm for Developing Better Measures of Marketing Constructs , 1979 .
[2] John R. Hauser,et al. Design and marketing of new products , 1980 .
[3] Cynthia M. Webster. Hispanic and Anglo Interviewer and Respondent Ethnicity and Gender: The Impact on Survey Response Quality , 1996 .
[4] Albert Levi,et al. Risks in email security. , 2001 .
[5] James E. Bartlett,et al. Organizational research: Determining appropriate sample size in survey research , 2001 .
[6] Sang M. Lee,et al. An integrative model of computer abuse based on social control and general deterrence theories , 2004, Inf. Manag..
[7] Dat-Dao Nguyen,et al. FEE -BASED ONLINE SERVICES : EXPLORING CONSUMERS’ WILLINGNESS TO PAY , 2004, Journal of International Technology and Information Management.
[8] J. Horrigan. BROADBAND ADOPTION AT HOME IN THE UNITED STATES: GROWING BUT SLOWING , 2005 .
[9] Eytan Adar,et al. Valuating Privacy , 2005, WEIS.
[10] Gurpreet Dhillon,et al. Value‐focused assessment of information system security in organizations , 2006, Inf. Syst. J..
[11] Miroslav Bača,et al. Researching and Structuring e-mail Security Criteria , 2007 .
[12] Mo Adam Mahmood,et al. Employees' Behavior towards IS Security Policy Compliance , 2007, 2007 40th Annual Hawaii International Conference on System Sciences (HICSS'07).
[13] S. E. Kruck,et al. Empiracal Study of Students' Computer Security Practices/Perceptions , 2007, J. Comput. Inf. Syst..
[14] Chris Wargo,et al. An Introduction to Insider Threat Management , 2007, Inf. Secur. J. A Glob. Perspect..
[15] Chih-Chien Wang,et al. Using header session messages to anti-spamming , 2007, Comput. Secur..
[16] Simon Heron. Parasitic Malware: Parasitic malware: The resurgence of an old threat , 2008 .
[17] Lein Harn,et al. Design of Fully Deniable Authentication Service for E-mail Applications , 2008, IEEE Communications Letters.
[18] Younghwa Lee,et al. Threat or coping appraisal: determinants of SMB executives’ decision to adopt anti-malware software , 2009, Eur. J. Inf. Syst..
[19] Dario Forte,et al. Phishing Attacks: Anatomy of a phishing attack: A high-level overview , 2009 .
[20] Merrill Warkentin,et al. Behavioral and policy issues in information systems security: the insider threat , 2009, Eur. J. Inf. Syst..
[21] Kang Li,et al. Privacy-Aware Collaborative Spam Filtering , 2009, IEEE Transactions on Parallel and Distributed Systems.
[22] Eugenia Y. Huang,et al. Do Knowledge Workers Use E-Mail Wisely? , 2009, J. Comput. Inf. Syst..
[23] Tero Vartiainen,et al. What levels of moral reasoning and values explain adherence to information security rules? An empirical study , 2009, Eur. J. Inf. Syst..
[24] H. Raghav Rao,et al. Protection motivation and deterrence: a framework for security policy compliance in organisations , 2009, Eur. J. Inf. Syst..
[25] Merrill Warkentin,et al. Fear Appeals and Information Security Behaviors: An Empirical Study , 2010, MIS Q..
[26] Ritu Agarwal,et al. Practicing Safe Computing: A Multimedia Empirical Examination of Home Computer User Security Behavioral Intentions , 2010, MIS Q..