Perceptions of End-Users on the Requirements in Personal Firewall Software: An Exploratory Study
暂无分享,去创建一个
[1] Lori N. K. Leonard,et al. Website Retailing: Electronic Supply Chain Replenishment , 2003, J. Organ. End User Comput..
[2] Jo Ellen Moore,et al. The Focus of Research in End User Computing: Where Have We Come Since the 1980s? , 2002, J. Organ. End User Comput..
[3] Ciara Heavin,et al. A Theoretical Model and Framework for Understanding Knowledge Management System Implementation , 2007, J. Organ. End User Comput..
[4] Neil A. M. Maiden,et al. Lessons learned during requirements acquisition for COTS systems , 1997, CACM.
[5] Blake Ives,et al. The measurement of user information satisfaction , 1983, CACM.
[6] W. Stephenson. The study of behavior , 1953 .
[7] Kieran Mathieson,et al. Predicting User Intentions: Comparing the Technology Acceptance Model with the Theory of Planned Behavior , 1991, Inf. Syst. Res..
[8] Marcus Goncalves. Firewalls Complete , 1998 .
[9] Mikko T. Siponen,et al. A conceptual foundation for organizational information security awareness , 2000, Inf. Manag. Comput. Secur..
[10] Gloria Gery,et al. Granting three wishes through performance-centered design , 1997, CACM.
[11] Robert O. Briggs,et al. Graduate business students as surrogates for executives in the evaluation of technology , 1996 .
[12] Blake Ives,et al. An empirical study of the impact of user involvement on system usage and information satisfaction , 1986, CACM.
[13] R. J. Torres. Practitioner's Handbook for User Interface Design and Development , 2001 .
[14] Charles E. Grantham,et al. Predicting the usage of an advanced communication technology , 1985 .
[15] John Ingham,et al. Why do people use information technology? A critical review of the technology acceptance model , 2003, Inf. Manag..
[16] J. Doug Tygar,et al. Why Johnny Can't Encrypt: A Usability Evaluation of PGP 5.0 , 1999, USENIX Security Symposium.
[17] Rita C. Summers. Secure Computing: Threats and Safeguards , 1996 .
[18] Gary Hackbarth,et al. Computer playfulness and anxiety: positive and negative mediators of the system experience effect on perceived ease of use , 2003, Inf. Manag..
[19] Detmar W. Straub,et al. Coping With Systems Risk: Security Planning Models for Management Decision Making , 1998, MIS Q..
[20] Paul Kline,et al. An easy guide to factor analysis , 1993 .
[21] Nathaniel Good,et al. Usability and privacy: a study of Kazaa P2P file-sharing , 2003, CHI '03.
[22] James Backhouse,et al. Current directions in IS security research: towards socio‐organizational perspectives , 2001, Inf. Syst. J..
[23] Harold Joseph Highland,et al. A view of information security tomorrow , 1993, Comput. Secur..
[24] Steven R. Brown. Political Subjectivity: Applications of Q Methodology in Political Science. , 1980 .
[25] Elizabeth D. Zwicky,et al. Building Internet firewalls (2nd ed.) , 2000 .
[26] David Albury,et al. Security of computer based information systems , 1986 .
[27] Mo Adam Mahmood,et al. Variables affecting information technology end-user satisfaction: a meta-analysis of the empirical literature , 2000, Int. J. Hum. Comput. Stud..
[28] Abraham Seidmann,et al. Two dimensions of software acquisition , 1996, CACM.
[29] Dominik Dahlem,et al. Semantic Composition of Web Portal Components , 2006, J. Organ. End User Comput..
[30] Robert W. Stone,et al. The Roles of Computer Self-Efficacy and Outcome Expectancy in Influencing the Computer End-User's Organizational Commitment , 2003, J. Organ. End User Comput..
[31] Charles Cresson Wood. A context for information systems security planning , 1988, Comput. Secur..
[32] Sid L. Huff,et al. CIO influence behaviors: the impact of technical background , 2003, Inf. Manag..
[33] William J. Kettinger,et al. Understanding the IS-user divide in IT innovation , 2002, CACM.
[34] Marty V. Deise,et al. Executive's Guide to E-Business: From Tactics to Strategy , 2000 .
[35] Mike Chiasson,et al. Factors influencing the formation of a user's perceptions and use of a DSS software innovation , 2001, DATB.
[36] Richard T. Watson,et al. Q-sorting and MIS Research: A Primer , 2002, Commun. Assoc. Inf. Syst..
[37] Detmar W. Straub,et al. Security concerns of system users: A study of perceptions of the adequacy of security , 1991, Inf. Manag..