Individuals' Internet Security Perceptions and Behaviors: Polycontextual Contrasts Between the United States and China
暂无分享,去创建一个
[1] K Witte,et al. Predicting risk behaviors: development and validation of a diagnostic scale. , 1996, Journal of health communication.
[2] R R McCrae. Situational determinants of coping responses: loss, threat, and challenge. , 1984, Journal of personality and social psychology.
[3] Kenneth A. Holroyd,et al. The hierarchical factor structure of the coping strategies inventory , 1989, Cognitive Therapy and Research.
[4] Matthew K. O. Lee,et al. Digital Inclusiveness--Longitudinal Study of Internet Adoption by Older Adults , 2006, J. Manag. Inf. Syst..
[5] Deborah Compeau,et al. Computer Self-Efficacy: Development of a Measure and Initial Test , 1995, MIS Q..
[6] Young U. Ryu,et al. International Conference on Information Systems ( ICIS ) December 2005 I Am Fine but You Are Not : Optimistic Bias and Illusion of Control on Information Security , 2017 .
[7] Steven Furnell,et al. Assessing the security perceptions of personal Internet users , 2007, Comput. Secur..
[8] Susannah Fox,et al. Generations online in 2009 , 2009 .
[9] Ritu Agarwal,et al. Practicing Safe Computing: A Multimedia Empirical Examination of Home Computer User Security Behavioral Intentions , 2010, MIS Q..
[10] M. Goldberg,et al. What to Convey in Antismoking Advertisements for Adolescents: The use of Protection Motivation Theory to Identify Effective Message Themes , 2003 .
[11] Younghwa Lee,et al. Investigating factors affecting the adoption of anti-spyware systems , 2005, CACM.
[12] R. W. Rogers,et al. A Protection Motivation Theory of Fear Appeals and Attitude Change1. , 1975, The Journal of psychology.
[13] Qing Hu,et al. The Centrality of Awareness in the Formation of User Behavioral Intention toward Protective Information Technologies , 2007, J. Assoc. Inf. Syst..
[14] R. Lazarus. Coping theory and research: past, present, and future. , 1993, Psychosomatic medicine.
[15] Robert LaRose,et al. Promoting personal responsibility for internet safety , 2008, CACM.
[16] R. Bhagat. Culture's Consequences: Comparing Values, Behaviors, Institutions, and Organizations Across Nations , 2002 .
[17] Cal D. Stoltenberg,et al. Self-efficacy expectancy, outcome expectancy, and outcome value: Relative effects on behavioral intentions. , 1986 .
[18] R W Rogers,et al. Fear appeals and attitude change: effects of a threat's noxiousness, probability of occurrence, and the efficacy of coping responses. , 1976, Journal of personality and social psychology.
[19] Yajiong Xue,et al. Understanding Security Behaviors in Personal Computer Usage: A Threat Avoidance Perspective , 2010, J. Assoc. Inf. Syst..
[20] H. Leventhal,et al. EFFECTS OF FEAR AND SPECIFICITY OF RECOMMENDATION UPON ATTITUDES AND BEHAVIOR. , 1965, Journal of personality and social psychology.
[21] R. W. Rogers,et al. Protection motivation and self-efficacy: A revised theory of fear appeals and attitude change , 1983 .
[22] Yajiong Xue,et al. Avoidance of Information Technology Threats: A Theoretical Perspective , 2009, MIS Q..
[23] Irene Woon,et al. A Protection Motivation Theory Approach to Home Wireless Security , 2005, ICIS.