Studying users' computer security behavior: A health belief perspective

作者: Boon-Yuen Ng , Atreyi Kankanhalli , Yunjie (Calvin) Xu

DOI: 10.1016/J.DSS.2008.11.010

关键词:

摘要: … of protection motivation theory borrowed from healthcare showed that … in past security behavior studies. Hence, we apply the … of health belief model to preventive healthcare behaviors, …

参考文章(48)
Mohammad Rahim, Boon-Yuen Ng, A Socio-Behavioral Study of Home Computer Users' Intention to Practice Security pacific asia conference on information systems. pp. 20- ,(2005)
Charles Abraham, Paschal Sheeran, The health belief model Cambridge Handbook of Psychology, Health and Medicine, Second Edition. pp. 97- 102 ,(2005) , 10.1017/CBO9780511543579.022
Kregg Aytes, Terry Connolly, A Research Model for Investigating Human Behavior Related to Computer Security americas conference on information systems. pp. 260- ,(2003)
Tamara Dinev, , Qing Hu, , The Centrality of Awareness in the Formation of User Behavioral Intention toward Protective Information Technologies Journal of the Association for Information Systems. ,vol. 8, pp. 23- ,(2007) , 10.17705/1JAIS.00133
Victor Harold Vroom, Work and motivation ,(1964)
R. Power, CSI/FBI computer crime and security survey Computer Security Journal. ,vol. 17, pp. 20- 51 ,(2001)
Amy Louise McClung Hedrick, The effects of piracy in foreign markets on U.S. business UMI Dissertation Information Service. ,(1989)
Irene Woon, Gek-Woo Tan, R. Low, A Protection Motivation Theory Approach to Home Wireless Security international conference on information systems. ,(2005)
Detmar W. Straub, Validating instruments in MIS research Management Information Systems Quarterly. ,vol. 13, pp. 147- 169 ,(1989) , 10.2307/248922
Nancy B. Miller, R. Frank Falk, A Primer for Soft Modeling ,(1992)