Towards Understanding User Behavioral Intentions to Use IT Security: Examining the Impact of IT Security Psychological Climate and Individual Beliefs
暂无分享,去创建一个
[1] Qing Hu,et al. Is spyware an Internet nuisance or public menace? , 2005, CACM.
[2] Robert D Austin,et al. The myth of secure computing. , 2003, Harvard business review.
[3] X. Koufteros. Testing a model of pull production: a paradigm for manufacturing research using structural equation modeling , 1999 .
[4] B. Schneider. Organizational Climates: An Essay. , 1975 .
[5] Detmar W. Straub,et al. Coping With Systems Risk: Security Planning Models for Management Decision Making , 1998, MIS Q..
[6] Viswanath Venkatesh,et al. Gender and age differences in employee decisions about new technology: an extension to the theory of planned behavior , 2005, IEEE Transactions on Engineering Management.
[7] Wesley W. Chu,et al. Protecting Private Information in Online Social Networks , 2008, Intelligence and Security Informatics.
[8] Richard A. Guzzo,et al. Creating a climate and culture for sustainable organizational change , 1996 .
[9] Julie D Nosworthy,et al. Implementing Information Security In The 21st Century Do You Have the Balancing Factors? , 2000, Comput. Secur..
[10] Sebastiaan H. von Solms,et al. Information Security - A Multidimensional Discipline , 2001, Comput. Secur..
[11] Gordon B. Davis,et al. User Acceptance of Information Technology: Toward a Unified View , 2003, MIS Q..
[12] Denise M. Rousseau,et al. The construction of climate in organizational research. , 1988 .
[13] I. Ajzen. The theory of planned behavior , 1991 .
[14] Christopher P. Parker,et al. Relationships between psychological climate perceptions and work outcomes: a meta-analytic review , 2003 .
[15] I. Ajzen,et al. Understanding Attitudes and Predicting Social Behavior , 1980 .
[16] C. Cooper,et al. International review of industrial and organizational psychology , 1986 .
[17] Paul A. Pavlou,et al. Understanding and Predicting Electronic Commerce Adoption: An Extension of the Theory of Planned Behavior , 2006, MIS Q..
[18] James Backhouse,et al. Current directions in IS security research: towards socio‐organizational perspectives , 2001, Inf. Syst. J..