共 24 条
[11]
Fear Appeals and Information Security Behaviors: An Empirical Study[J] . Allen C. Johnston,Merrill Warkentin.MIS Quarterly . 2010 (3)
[12]
Understanding Security Behaviors in Personal Computer Usage: A Threat Avoidance Perspective*[J] . Liang,Huigang,Xue,Yajiong.Journal of the Association for Information Systems . 2010 (7)
[13]
Factors mediating disclosure in social network sites[J] . Fred Stutzman,Robert Capra,Jamila Thompson.Computers in Human Behavior . 2010 (1)
[14]
Understanding anti-plagiarism software adoption: An extended protection motivation theory perspective[J] . Younghwa Lee.Decision Support Systems . 2010 (2)
[15]
Anticipated Regret, Risk Perception, or Both: Which is Most Likely Responsible for Our Intention to Gamble?[J] . Shu Li,Kun Zhou,Yue Sun,Li-Lin Rao,Rui Zheng,Zhu-Yuan Liang.Journal of Gambling Studies . 2010 (1)
[16]
Self-efficacy in information security: Its influence on end users' information security practice behavior[J] . Hyeun-Suk Rhee,Cheongtag Kim,Young U. Ryu.Computers & Security . 2009 (8)
[17]
Protection motivation and deterrence: a framework for security policy compliance in organisations[J] . Herath,Tejaswini,Rao,H Raghav.European Journal of Information Systems . 2009 (2)
[18]
User behaviour towards protective information technologies : the role of national cultural differences .2 Tamara Dinev,Jahyun Goo,Qing Hu,Kichan Nam. Information Systems Journal . 2009
[19]
Social Psychophysiology: A Sourcebook .2 Rogers R W,Cacioppo J,Petty R E. New York . 1983
[20]
Threat or coping appraisal: determinants of SMB executives' decision to adopt anti-malware software[J] . Lee,Younghwa,Larsen,Kai R.European Journal of Information Systems . 2009 (2)