References
- AndrichDA rating formulation for ordered response categoriesPyschometirka197843456157310.1007/BF02293814
- AndersonCAgarwalRPracticing safe computing: a multimethod empirical examination of home computer user security behavioural intentionsMIS Quarterly2010343613643
- AndersonRBCognitive appraisal of performance capability in the prevention of drunken driving: a test of self-efficacy theoryJournal of Public Relations Research19957320522910.1207/s1532754xjprr0703_03
- BaronRKennyDThe moderator-mediator variable distinction in social psychological research: conceptual, strategic and statistical considerationsJournal of Personality and Social Psychology19865111173118210.1037/0022-3514.51.6.1173
- BarclayLSocial learning theory: a framework for discrimination researchAcademy of Management Review198274587594
- BanduraAA social learning interpretation of psychological dysfunctionsFoundations of Abnormal Psychology1968293344
- BanduraASelf-efficacy: toward a unifying theory of behavioral changePsychological Review197784219121510.1037/0033-295X.84.2.191
- BanduraASocial Foundations of Thought and Action1986
- BanduraAOrganizational applications of social cognitive theoryAustralian Journal of Management198813227510.1177/031289628801300210
- BanduraACervoneDDifferential engagement of self-reactive influences in cognitive motivationOrganizational Behavior & Human Decision Processes19863819211410.1016/0749-5978(86)90028-2
- BloomPNMilneGRAdlerRAvoiding misuse of information technologies: legal and societal considerationsJournal of Marketing19945819811010.2307/1252254
- BollenKStructural Equations with Latent Variables1989
- BossSRKirschLJAngermeierIShinglerRABossRWIf someone is watching, I’ll do what I’m asked: mandatoriness, control, and information securityEuropean Journal of Information Systems200918215116410.1057/ejis.2009.8
- BulgurcuBCavusogluHBenbasatIInformation security policy compliance: an empirical study of rationality-based beliefs and information security awarenessMIS Quarterly2010343523548
- CarrJSequeiraJPrior family business exposure as intergenerational influence and entrepreneurial intent: a theory of planned behavior approachJournal of Business Research200760101090109810.1016/j.jbusres.2006.12.016
- CenfetelliRBasselierGInterpretation of formative measurement in IS researchMIS Quarterly2009334689707
- ChinWPartial least squares is to Lisrel as principal components analysis is to common factor analysisTechnology Studies19952315319
- ChinWThe partial least squares approach to structural equation modellingModern Methods for Business Research1998295336
- CompeauDHigginsCAComputer self-efficacy: development of a measure and initial testMIS Quarterly199519218921110.2307/249688
- CrittendenWFA social learning theory of cross-functional case educationJournal of Business Research200558796096610.1016/j.jbusres.2003.12.005
- D’arcyJHovavAGalettaDUser awareness of security countermeasures and its impact on information systems misuse: a deterrence approachInformation Systems Research2009201799810.1287/isre.1070.0160
- DhillonGViolation of safeguards by trusted personnel and understanding related information security concernsComputers & Security200120216517310.1016/S0167-4048(01)00209-7
- DiamantopoulosAWinklhoferHIndex construction with formative indicators: an alternative to scale developmentJournal of Marketing Research200138226927710.1509/jmkr.38.2.269.18845
- DinevTBellottoMHartPRussoVSerraIColauttiCPrivacy calculus model in e-commerce – a study of Italy and the Unites StatesEuropean Journal of Information Systems200615438940210.1057/palgrave.ejis.3000590
- FedorowiczJRayAImpact of HIPAA on the integrity of healthcare informationInternational Journal of Healthcare Technology & Management20046214215710.1504/IJHTM.2004.004954
- FishbeinMAjzenIBelief, Attitude, Intention and Behavior: An Introduction to Theory and Research1975
- FishbeinMCappellaJNThe role of theory in developing effective health communicationsJournal of Communication200656s1s1s1710.1111/j.1460-2466.2006.00280.x
- FornellCBooksteinFTwo structural equation models: LISREL and PLS applied to consumer exit-voice theoryJournal of Marketing Research19821944045210.2307/3151718
- FurnellSGennatouMDowlandPA prototype tool for information security awareness and trainingLogistics Information Management2002155/635235710.1108/09576050210447037
- GefenDStraubDBoudreauMStructural equation modelling techniques and regression: guidelines for research practiceCommunications of AIS200077178
- GistMMitchellTSelf-efficacy: a theoretical analysis of its determinants and malleabilityAcademy of Management Review1992172183211
- Goodhue DL and Straub DW (1989) Security concerns of system users: a proposed study of user perceptions of the adequacy of security measures. In Proceedings of the 21st Hawaii International Conference on System Science (HICSS), Kona, HA, January.
- Gupta A (2008) Prescription for change. Wall Street Journal, 20 October.
- HerathTRaoHRProtection motivation and deterrence: a framework for security policy compliance in organisationsEuropean Journal of Information Systems200918210612510.1057/ejis.2009.6
- HillTSmithNMannMCommunicating innovations: convincing computer phobics to adopt innovative technologiesAdvances in Consumer Research1986419422
- HillTSmithNMannMRole of efficacy expectations in predicting the decision to use advanced technologies: the case of computersJournal of Applied Psychology198772230731310.1037/0021-9010.72.2.307
- HofferJAStraubDWThe 9 to 5 underground: are you policing computer crimes?Sloan Management Review19893043543
- Horowitz BT (2010) Data breaches cost health care industry $6 billion annually. eWeek Magazine, 10 November.
- JarvisCMackenzieSPodsakoffPMickDA critical review of construct indicators and measurement model misspecification in marketing and consumer researchJournal of Consumer Research200330219921810.1086/376806
- JohnstonACWarkentinMFear appeals and information security behaviours: an empirical studyMIS Quarterly2010343549566
- KanferRAckermanPLMotivation and cognitive abilities: an integrative/aptitude-treatment interaction approach to skill acquisitionJournal of Applied Psychology198974465769010.1037/0021-9010.74.4.657
- KerlingerFFoundations of Behavioral Research1973
- LangenderferJCookDLOh, what a tangled web we weave: the state of privacy protection in the information economy and recommendations for governanceJournal of Business Research200457473474710.1016/S0148-2963(02)00359-4
- LeachJImproving user security behaviourComputers & Security200322868569210.1016/S0167-4048(03)00007-5
- LaceyDManaging the Human Factor in Information Security: How to Win Over Staff and Influence Business Managers2009
- LeeYLarsenKRThreat or coping appraisal: determinants of SMB executives’ decision to adopt anti-malware softwareEuropean Journal of Information Systems200918217718710.1057/ejis.2009.11
- LochKStraubDKamelSDiffusing the internet in the Arab world: the role of social norms and technological culturationIEEE Transactions on Engineering Management2003501456410.1109/TEM.2002.808257
- MackenzieSPodsakoffPJarvisCThe problem of measurement model misspecification in behavioral and organizational research and some recommended solutionsJournal of Applied Psychology200590471073010.1037/0021-9010.90.4.710
- ManzCCSimsHPJr.Vicarious learning: the influence of modeling on organizational behaviorAcademy of Management Review198161105113
- MarakasGYiMJohnsonRThe multilevel and multifaceted character of computer self-efficacy: toward clarification of the construct and an integrative framework for researchInformation Systems Research19989212616310.1287/isre.9.2.126
- MathieuJEMartineauJWTannenbaumSIIndividual and situational influences on the development of self-efficacy: implications for training effectivenessPersonnel Psychology199346112514710.1111/j.1744-6570.1993.tb00870.x
- MathieuJETannenbaumSISalasEInfluences of individual and situational characteristics on measures of training effectivenessAcademy of Management Journal199235482884710.2307/256317
- MercuriRTThe HIPAA-potamus in health care data securityCommunications of the ACM2004477252810.1145/1005817.1005840
- MyyryLSiponenMPahnilaSVartiainenTVanceAWhat levels of moral reasoning and values explain adherence to information security rules? An empirical studyEuropean Journal of Information Systems200918212613910.1057/ejis.2009.10
- NunnallyJCBernsteinIHPsychometric Theory1994
- Pahnila S, Siponen M and Mahmood A (2007) Employees’ behavior towards IS security policy compliance. In Proceedings of the 40th Hawaii International Conference on System Sciences.
- PetersLHO’ConnorEJSituational constraints and work outcomes: the influences of a frequently overlooked constructAcademy of Management Review198053391397
- PetersLHO’ConnorEJEulbergJRWatsonTWAn examination of situational constraints in air force work settingsHuman Performance19881213314410.1207/s15327043hup0102_4
- PetterSStraubDWRaiASpecifying formative constructs in is researchMIS Quarterly2007314623656
- PhillipsJSFreedmanSMSituational performance constraints and task characteristics: their relationship to motivation and satisfactionJournal of Management198410332133110.1177/014920638401000305
- PodsakoffPMOrganDSelf-reports in organizational research: problems and prospectsJournal of Management198612453154410.1177/014920638601200408
- PodsakoffPMMackenzieSBLeeJYPodsakoffNPCommon method biases in behavioral research: a critical review of the literature and recommended remediesJournal of Applied Psychology200388587990310.1037/0021-9010.88.5.879
- RadcliffSCommentary: legal effect of revealing private information in the US and abroadInformation Systems Management200724434334410.1080/10580530701586086
- Ralls RS and Klein KJ (1991) Trainee cognitive ability and motivation: Effects on computer training performance. In Proceedings of the 6th Annual Conference of Industrial and Organizational Psychology.
- RennieLResearch note: detecting a response set to likert-style attitude items with the rating modelEducation Research and Perspectives198291114118
- RheeHSKimCRyuYUSelf-efficacy in information security: its influence on end users’ information security practice behaviorComputers & Security200928681682610.1016/j.cose.2009.05.008
- Ringle C, Wende S and Will A (2005) SmartPLS 2.0 (beta). [WWW] document www.smartpls.de.
- RobinsonTData security in the age of complianceNetworker200593243010.1145/1086762.1086764
- RotterJBSome implications of a social learning theory for the prediction of goal directed behavior from testing proceduresPsychological Review19606730131610.1037/h0039601
- SalganikMJHeckathordDDSampling and estimation in hidden populations using respondent-driven samplingSociological Methodology200434119323910.1111/j.0081-1750.2004.00152.x
- SasseMABrostoffSWeirichDTransforming the ‘weakest link’ – a human/computer interaction approach to usable and effective securityBT Technology Journal200119312213110.1023/A:1011902718709
- SchunkDHAbility versus effort attributional feedback: differential effects on self-efficacy and achievementJournal of Educational Psychology198375684885610.1037/0022-0663.75.6.848
- SchunkDHSequential attributional feedback and children's achievement behaviorJournal of Educational Psychology19847651159116910.1037/0022-0663.76.6.1159
- SheppardBHartwickJWarshawPThe theory of reasoned action: a meta-analysis of past research with recommendations for modifications and future researchJournal of Consumer Research198815332534310.1086/209170
- ShenJJSamsonLFWashingtonELJohnsonPEdwardsCMaloneABarriers of HIPAA regulation to implementation of health services researchJournal of Medical Systems2006301656910.1007/s10916-006-7406-z
- SiponenMTA conceptual foundation for organizational information assurance awarenessInformation Management and Computer Security200081314110.1108/09685220010371394
- SiponenMTAn analysis of the recent IS security development approaches: descriptive and prescriptive implicationsInformation Security Management – Global Challenges in the Next Millennium2001
- SiponenMVanceANeutralization: new insights into the problem of employee information systems security policy violationsMIS Quarterly2010343487502
- StantonJMStamKRMastrangeloPMJoltonJAAnalysis of end user security behaviorsComputers & Security200524212413310.1016/j.cose.2004.07.001
- StraubDEffective IS security: an empirical studyInformation Systems Research19901325527610.1287/isre.1.3.255
- StraubDWBoudreauMCGefenDValidation guidelines for IS positivist researchCommunications of AIS20041363380427
- StraubDWWelkeRJCoping with system risk: security planning models for management decision makingMIS Quarterly199822444146410.2307/249551
- SulskyLMKlineTJUnderstanding frame-of-reference training success: a social learning theory perspectiveInternational Journal of Training and Development200711212113110.1111/j.1468-2419.2007.00273.x
- TorkzadehGVan dykeTPEffects of training on internet self-efficacy and computer user attitudesComputers in Human Behavior200218547949410.1016/S0747-5632(02)00010-9
- Van vianenAEManagerial self-efficacy, outcome expectancies, and work-role salience as determinants of ambition for a managerial positionJournal of Applied Social Psychology199929363966510.1111/j.1559-1816.1999.tb01406.x
- VogtNCan privacy compliance be monitored?Journal of Health Care Compliance2005745658
- VroomCVon solmsRTowards information security behavioural complianceComputers & Security200423319119810.1016/j.cose.2004.01.012
- WarkentinMWillisonRBehavioral and policy issues in information systems security: the insider threatEuropean Journal of Information Systems200918210110510.1057/ejis.2009.12
- WexleyKNLathamGPDeveloping and Training Human Resources in Organizations1991
- WhitmanEMMattordHJMaking users mindful of IT security; awareness training is vital to keeping the idea of IT security uppermost in employees’ mindsSecurity Management200448113234
- WillisonRBackhouseJOpportunities for computer crime: considering systems risk from a criminological perspectiveEuropean Journal of Information Systems200615440341410.1057/palgrave.ejis.3000592
- WorkmanMBommerWHStraubDSecurity lapses and the omission of information security measures: a threat control model and empirical testComputer in Human Behavior20082462799281610.1016/j.chb.2008.04.005