4.5 Article

What we think we know about cybersecurity: an investigation of the relationship between perceived knowledge, internet trust, and protection motivation in a cybercrime context

相关参考文献

注意:仅列出部分参考文献,下载原文获取全部文献信息。
Article Computer Science, Cybernetics

Understanding negotiated anti-malware interruption effects on user decision quality in endpoint security

Mark Khai Shean Tan et al.

Summary: This study found that allowing users to negotiate delayed responses to interruptions can improve decision performance, enhance subjective perceptions of control, improve task resumption, and reduce feelings of interruption and distraction in users within a short period of time.

BEHAVIOUR & INFORMATION TECHNOLOGY (2021)

Article Computer Science, Cybernetics

Factors influencing the information security behaviour of IT employees

Val Hooper et al.

BEHAVIOUR & INFORMATION TECHNOLOGY (2020)

Article Criminology & Penology

Is online fraud just fraud? Examining the efficacy of the digital divide

Cassandra Cross

JOURNAL OF CRIMINOLOGICAL RESEARCH POLICY AND PRACTICE (2019)

Article Computer Science, Information Systems

Understanding Security Behaviors in Personal Computer Usage: A Threat Avoidance Perspective

Huigang Liang et al.

Journal of the Association for Information Systems (2018)

Article Computer Science, Information Systems

An exploratory study of cyber hygiene behaviors and knowledge

Ashley A. Cain et al.

JOURNAL OF INFORMATION SECURITY AND APPLICATIONS (2018)

Article Communication

Inequality in digital skills and the adoption of online safety behaviors

Matias Dodel et al.

INFORMATION COMMUNICATION & SOCIETY (2018)

Article Psychology, Social

Cybercrime Victimization and Subjective Well-Being: An Examination of the Buffering Effect Hypothesis Among Adolescents and Young Adults

Markus Kaakinen et al.

CYBERPSYCHOLOGY BEHAVIOR AND SOCIAL NETWORKING (2018)

Article Information Science & Library Science

Coping Responses in Phishing Detection: An Investigation of Antecedents and Consequences

Jingguo Wang et al.

INFORMATION SYSTEMS RESEARCH (2017)

Article Psychology, Multidisciplinary

Cyber-victimization preventive behavior: A health belief model approach

Matias Dodel et al.

COMPUTERS IN HUMAN BEHAVIOR (2017)

Article Computer Science, Information Systems

Understanding online safety behaviors: A protection motivation theory perspective

Hsin-yi Sandy Tsai et al.

COMPUTERS & SECURITY (2016)

Article Computer Science, Information Systems

It's All Over but the Crying: The Emotional and Financial Impact of Internet Fraud

David Modic et al.

IEEE SECURITY & PRIVACY (2015)

Article Psychology, Social

Individual Differences in Cyber Security Behaviors: An Examination of Who Is Sharing Passwords

Monica Whitty et al.

CYBERPSYCHOLOGY BEHAVIOR AND SOCIAL NETWORKING (2015)

Article Psychology, Multidisciplinary

Online safety begins with you and me: Convincing Internet users to protect, themselves

Ruth Shillair et al.

COMPUTERS IN HUMAN BEHAVIOR (2015)

Article Computer Science, Cybernetics

User preference of cyber security awareness delivery methods

Jemal Abawajy

BEHAVIOUR & INFORMATION TECHNOLOGY (2014)

Article Psychology, Multidisciplinary

Security awareness of computer users: A phishing threat avoidance perspective

Nalin Asanka Gamagedara Arachchilage et al.

COMPUTERS IN HUMAN BEHAVIOR (2014)

Article Public, Environmental & Occupational Health

The Extended Parallel Process Model: Illuminating the Gaps in Research

Lucy Popova

HEALTH EDUCATION & BEHAVIOR (2012)

Article Psychology, Developmental

Stop bugging me: An examination of adolescents' protection behavior against online harassment

May O. Lwin et al.

JOURNAL OF ADOLESCENCE (2012)

Article Computer Science, Artificial Intelligence

Studying users' computer security behavior: A health belief perspective

Boon-Yuen Ng et al.

DECISION SUPPORT SYSTEMS (2009)

Article Computer Science, Information Systems

Threat or coping appraisal: determinants of SMB executives' decision to adopt anti-malware software

Younghwa Lee et al.

EUROPEAN JOURNAL OF INFORMATION SYSTEMS (2009)

Article Computer Science, Information Systems

Protection motivation and deterrence: a framework for security policy compliance in organisations

Tejaswini Herath et al.

EUROPEAN JOURNAL OF INFORMATION SYSTEMS (2009)

Article Communication

Subjective knowledge and fear appeal effectiveness: Implications for message design

Robin L. Nabi et al.

HEALTH COMMUNICATION (2008)

Article Public, Environmental & Occupational Health

Understanding consumer confidence in the safety of food: Its two-dimensional structure and determinants

Janneke de Jonge et al.

RISK ANALYSIS (2007)

Article Psychology, Multidisciplinary

Unrealistic optimism in internet events

Jamonn Campbell et al.

COMPUTERS IN HUMAN BEHAVIOR (2007)

Article Computer Science, Information Systems

On the definition and classification of cybercrime

Sarah Gordon et al.

JOURNAL IN COMPUTER VIROLOGY AND HACKING TECHNIQUES (2006)

Article Computer Science, Cybernetics

Privacy practices of Internet users: Self-reports versus observed behavior

C Jensen et al.

INTERNATIONAL JOURNAL OF HUMAN-COMPUTER STUDIES (2005)

Article Psychology, Multidisciplinary

An overview of online trust: Concepts, elements, and implications

YD Wang et al.

COMPUTERS IN HUMAN BEHAVIOR (2005)

Article Psychology, Social

A meta-analysis of research on protection motivation theory

DL Floyd et al.

JOURNAL OF APPLIED SOCIAL PSYCHOLOGY (2000)