相关参考文献
注意:仅列出部分参考文献,下载原文获取全部文献信息。Understanding negotiated anti-malware interruption effects on user decision quality in endpoint security
Mark Khai Shean Tan et al.
BEHAVIOUR & INFORMATION TECHNOLOGY (2021)
Factors influencing the information security behaviour of IT employees
Val Hooper et al.
BEHAVIOUR & INFORMATION TECHNOLOGY (2020)
An integrated model for assessing cyber-safety behaviors: How cognitive, socioeconomic and digital determinants affect diverse safety practices
Matias Dodel et al.
COMPUTERS & SECURITY (2019)
Is online fraud just fraud? Examining the efficacy of the digital divide
Cassandra Cross
JOURNAL OF CRIMINOLOGICAL RESEARCH POLICY AND PRACTICE (2019)
Understanding Security Behaviors in Personal Computer Usage: A Threat Avoidance Perspective
Huigang Liang et al.
Journal of the Association for Information Systems (2018)
An exploratory study of cyber hygiene behaviors and knowledge
Ashley A. Cain et al.
JOURNAL OF INFORMATION SECURITY AND APPLICATIONS (2018)
Inequality in digital skills and the adoption of online safety behaviors
Matias Dodel et al.
INFORMATION COMMUNICATION & SOCIETY (2018)
Cybercrime Victimization and Subjective Well-Being: An Examination of the Buffering Effect Hypothesis Among Adolescents and Young Adults
Markus Kaakinen et al.
CYBERPSYCHOLOGY BEHAVIOR AND SOCIAL NETWORKING (2018)
Practicing Safe Computing: A Multimethod Empirical Examination of Home Computer User Security Behavioral Intentions
Anderson et al.
MIS QUARTERLY (2017)
Coping Responses in Phishing Detection: An Investigation of Antecedents and Consequences
Jingguo Wang et al.
INFORMATION SYSTEMS RESEARCH (2017)
Cyber-victimization preventive behavior: A health belief model approach
Matias Dodel et al.
COMPUTERS IN HUMAN BEHAVIOR (2017)
Understanding online safety behaviors: A protection motivation theory perspective
Hsin-yi Sandy Tsai et al.
COMPUTERS & SECURITY (2016)
Comparing intention to avoid malware across contexts in a BYOD-enabled Australian university: A Protection Motivation Theory approach
Duy Dang-Pham et al.
COMPUTERS & SECURITY (2015)
It's All Over but the Crying: The Emotional and Financial Impact of Internet Fraud
David Modic et al.
IEEE SECURITY & PRIVACY (2015)
Individual Differences in Cyber Security Behaviors: An Examination of Who Is Sharing Passwords
Monica Whitty et al.
CYBERPSYCHOLOGY BEHAVIOR AND SOCIAL NETWORKING (2015)
Online safety begins with you and me: Convincing Internet users to protect, themselves
Ruth Shillair et al.
COMPUTERS IN HUMAN BEHAVIOR (2015)
User preference of cyber security awareness delivery methods
Jemal Abawajy
BEHAVIOUR & INFORMATION TECHNOLOGY (2014)
Security awareness of computer users: A phishing threat avoidance perspective
Nalin Asanka Gamagedara Arachchilage et al.
COMPUTERS IN HUMAN BEHAVIOR (2014)
Understanding information systems security policy compliance: An integration of the theory of planned behavior and the protection motivation theory
Princely Ifinedo
COMPUTERS & SECURITY (2012)
The Extended Parallel Process Model: Illuminating the Gaps in Research
Lucy Popova
HEALTH EDUCATION & BEHAVIOR (2012)
Stop bugging me: An examination of adolescents' protection behavior against online harassment
May O. Lwin et al.
JOURNAL OF ADOLESCENCE (2012)
Optimistic bias about online privacy risks: Testing the moderating effects of perceived controllability and prior experience
Hichang Cho et al.
COMPUTERS IN HUMAN BEHAVIOR (2010)
Studying users' computer security behavior: A health belief perspective
Boon-Yuen Ng et al.
DECISION SUPPORT SYSTEMS (2009)
Threat or coping appraisal: determinants of SMB executives' decision to adopt anti-malware software
Younghwa Lee et al.
EUROPEAN JOURNAL OF INFORMATION SYSTEMS (2009)
Protection motivation and deterrence: a framework for security policy compliance in organisations
Tejaswini Herath et al.
EUROPEAN JOURNAL OF INFORMATION SYSTEMS (2009)
Determinants of Online Privacy Concern and Its Influence on Privacy Protection Behaviors Among Young Adolescents
Seounmi Youn
JOURNAL OF CONSUMER AFFAIRS (2009)
Subjective knowledge and fear appeal effectiveness: Implications for message design
Robin L. Nabi et al.
HEALTH COMMUNICATION (2008)
Understanding consumer confidence in the safety of food: Its two-dimensional structure and determinants
Janneke de Jonge et al.
RISK ANALYSIS (2007)
Unrealistic optimism in internet events
Jamonn Campbell et al.
COMPUTERS IN HUMAN BEHAVIOR (2007)
On the definition and classification of cybercrime
Sarah Gordon et al.
JOURNAL IN COMPUTER VIROLOGY AND HACKING TECHNIQUES (2006)
Privacy practices of Internet users: Self-reports versus observed behavior
C Jensen et al.
INTERNATIONAL JOURNAL OF HUMAN-COMPUTER STUDIES (2005)
An overview of online trust: Concepts, elements, and implications
YD Wang et al.
COMPUTERS IN HUMAN BEHAVIOR (2005)
Consumer acceptance of electronic commerce: Integrating trust and risk with the technology acceptance model
PA Pavlou
INTERNATIONAL JOURNAL OF ELECTRONIC COMMERCE (2003)
A meta-analysis of research on protection motivation theory
DL Floyd et al.
JOURNAL OF APPLIED SOCIAL PSYCHOLOGY (2000)