Readiness for information security of teachers as a function of their personality traits and their assessment of threats
暂无分享,去创建一个
[1] Jerry Chih-Yuan Sun,et al. The moderating roles of gender and social norms on the relationship between protection motivation and risky online behavior among in-service teachers , 2017, Comput. Educ..
[2] Irfan Ahmed,et al. Self-reported secure and insecure cyber behaviour: factor structure and associations with personality factors , 2017 .
[3] Hongliang Chen. Antecedents of positive self-disclosure online: an empirical study of US college students’ Facebook usage , 2017, Psychology research and behavior management.
[4] Tena Velki,et al. Empirical study on the risky behavior and security awareness among secondary school pupils - validation and preliminary results , 2017, 2017 40th International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO).
[5] Malcolm Robert Pattinson,et al. Individual differences and Information Security Awareness , 2017, Comput. Hum. Behav..
[6] Wu He,et al. Gender difference and employees' cybersecurity behaviors , 2017, Comput. Hum. Behav..
[7] Shian-Shyong Tseng,et al. The mediating effect of anti-phishing self-efficacy between college students' internet self-efficacy and anti-phishing behavior and gender difference , 2016, Comput. Hum. Behav..
[8] Lemuria Carter,et al. Dispositional and situational factors: influences on information security policy violations , 2016, Eur. J. Inf. Syst..
[9] R. Shillair. Multiple sources for security : The influence of source networks on coping self-efficacy and protection behavior habits in online safety , 2016 .
[10] Serge Egelman,et al. The Myth of the Average User: Improving Privacy and Security Systems through Individualization , 2015, NSPW.
[11] Malcolm Robert Pattinson,et al. Factors that Influence Information Security Behavior: An Australian Web-Based Study , 2015, HCI.
[12] Stefano Taddei,et al. Surfing on Social Network Sites: A comprehensive instrument to evaluate online self-disclosure and related attitudes , 2015, Comput. Hum. Behav..
[13] Aggeliki Tsohou,et al. Analyzing the role of cognitive and cultural biases in the internalization of information security policies: Recommendations for information security awareness programs , 2015, Comput. Secur..
[14] Zach W. Y. Lee,et al. Self-disclosure in social networking sites: The role of perceived cost, perceived benefits and social influence , 2015, Internet Res..
[15] Merrill Warkentin,et al. An Enhanced Fear Appeal Rhetorical Framework: Leveraging Threats to the Human Asset Through Sanctioning Rhetoric , 2015, MIS Q..
[16] Noa Aharony,et al. What's App: a social capital perspective , 2015, Online Inf. Rev..
[17] Eero Sormunen,et al. Spanning information behaviour across the stages of a learning task: Where do personality and approach to studying matter? , 2014, J. Documentation.
[18] Tejaswini Herath,et al. Understanding Employee Responses to Stressful Information Security Requirements: A Coping Perspective , 2014, J. Manag. Inf. Syst..
[19] Steve Love,et al. Security awareness of computer users: A phishing threat avoidance perspective , 2014, Comput. Hum. Behav..
[20] Jannica Heinström,et al. The Emotional Valence of Information Experience: Relation to Personality and Approach to Studying , 2014 .
[21] Eyong B. Kim,et al. Recommendations for information security awareness training for college students , 2014, Inf. Manag. Comput. Secur..
[22] Aaron Striegel,et al. An exploratory investigation of message-person congruence in information security awareness campaigns , 2014, Comput. Secur..
[23] Malcolm Robert Pattinson,et al. Determining employee awareness using the Human Aspects of Information Security Questionnaire (HAIS-Q) , 2014, Comput. Secur..
[24] N. Aharony,et al. The effect of personal and situational factors on LIS students' and professionals' intentions to use e-books , 2014 .
[25] Dan Bouhnik,et al. Gender differences in the moral judgment and behavior of Israeli adolescents in the internet environment , 2014, J. Assoc. Inf. Sci. Technol..
[26] Noa Aharony,et al. Factors affecting the adoption of Facebook by information professionals , 2013, ASIST.
[27] Guido Alessandri,et al. The determinants of scholastic achievement: The contribution of personality traits, self-esteem, and academic self-efficacy , 2013 .
[28] Yannis Theocharis,et al. Online Political Engagement, Facebook, and Personality Traits , 2013 .
[29] Guido Alessandri,et al. Academic Achievement: The Unique Contribution of Self-Efficacy Beliefs in Self-Regulated Learning beyond Intelligence, Personality Traits, and Self-Esteem. , 2013 .
[30] Shuting Xu,et al. Applying Protection Motivation Theory to Information Security Training for College Students , 2013 .
[31] Nathan L. Clarke,et al. Power to the people? The evolving recognition of human aspects of security , 2012, Comput. Secur..
[32] Lisa Wise,et al. The effects of personality traits, self-esteem, loneliness, and narcissism on Facebook use among university students , 2012, Comput. Hum. Behav..
[33] Jin-Liang Wang,et al. The relationships among the Big Five Personality factors, self-esteem, narcissism, and sensation-seeking to Chinese University students' uses of social networking sites (SNSs) , 2012, Comput. Hum. Behav..
[34] Rebecca LeFebvre. The human element in cyber security: a study on student motivation to act , 2012, InfoSecCD.
[35] Tamara Dinev,et al. Managing Employee Compliance with Information Security Policies: The Critical Role of Top Management and Organizational Culture , 2012, Decis. Sci..
[36] Mikko T. Siponen,et al. Motivating IS security compliance: Insights from Habit and Protection Motivation Theory , 2012, Inf. Manag..
[37] Portia Pusey,et al. Preservice Teacher Concerns about Teaching Cyberethics, Cybersafety, and Cybersecurity: A Focus Group Study , 2012 .
[38] Carol A. Mullen,et al. Self-Efficacy as an Engaged Learner , 2012 .
[39] Lemuria Carter,et al. The Role of Individual Characteristics on Insider Abuse Intentions , 2012, AMCIS.
[40] Natasha F. Veltri,et al. AIS Electronic Library (AISeL) , 2022 .
[41] Yair Amichai-Hamburger,et al. Social network use and personality , 2010, Comput. Hum. Behav..
[42] Ritu Agarwal,et al. Practicing Safe Computing: A Multimedia Empirical Examination of Home Computer User Security Behavioral Intentions , 2010, MIS Q..
[43] Jim Blascovich,et al. Cardiovascular measures independently predict performance in a university course. , 2010, Psychophysiology.
[44] N. Aharony,et al. Web 2.0 use by librarians , 2009 .
[45] Norman A. Johnson,et al. Personality traits and concern for privacy: an empirical study in the context of location-based services , 2008, Eur. J. Inf. Syst..
[46] J. Blascovich. Challenge and Threat , 2008 .
[47] Jim Blascovich,et al. Threatened by the unexpected: physiological responses during social interactions with expectancy-violating partners. , 2007, Journal of personality and social psychology.
[48] LeAnne Coder,et al. Personality Characteristics of Established IT Professionals I: Big Five Personality Characteristics , 2006 .
[49] Shambhu Upadhyaya,et al. Role of Perceived Importance of Information Security: An Exploratory Study of Middle School Children's Information Security Behavior , 2006 .
[50] Irene Woon,et al. A Protection Motivation Theory Approach to Home Wireless Security , 2005, ICIS.
[51] H. Cooper,et al. The Relation Between Self-Beliefs and Academic Achievement: A Meta-Analytic Review , 2004 .
[52] S. Gosling,et al. Development of personality in early and middle adulthood: set like plaster or persistent change? , 2003, Journal of personality and social psychology.
[53] Li-fang Zhang,et al. Measuring thinking styles in addition to measuring personality traits , 2002 .
[54] Gilad Chen,et al. Validation of a New General Self-Efficacy Scale , 2001 .
[55] P. Sheeran,et al. Prediction and Intervention in Health-Related Behavior: A Meta-Analytic Review of Protection Motivation Theory , 2000 .
[56] S. Srivastava,et al. The Big Five Trait taxonomy: History, measurement, and theoretical perspectives. , 1999 .
[57] Albert Bandura,et al. Exploration of Fortuitous Determinants of Life Paths , 1998 .
[58] Philip M. Wilson,et al. The relationship between competitive anxiety and self-presentational concerns , 1998 .
[59] R. Rapee,et al. A cognitive-behavioral model of anxiety in social phobia. , 1997, Behaviour research and therapy.
[60] Paul T. Costa,et al. The Five-Factor Model of Personality and Its Relevance to Personality Disorders , 1992 .
[61] P. Costa,et al. Validation of the five-factor model of personality across instruments and observers. , 1987, Journal of personality and social psychology.
[62] R. L. Archer,et al. Openers: Individuals who elicit intimate self-disclosure. , 1983 .