Trust and risk in e-government adoption, The Journal of Strategic Information Systems, vol.17, issue.2, pp.165-176, 2008. ,
DOI : 10.1016/j.jsis.2007.12.002
Information security policy compliance: An empirical study of rationality-based beliefs and information security awareness, MIS Quarterly, vol.34, issue.3, pp.523-548, 2010. ,
Introducing octave allegro: Improving the information security risk assessment process, 2007. ,
Application of protection motivation theory to adoption of protective technologies, HICSS '09. 42nd Hawaii International Conference on, pp.1-10, 2009. ,
Measuring the Affective and Cognitive Properties of Attitudes: Conceptual and Methodological Issues, Personality and Social Psychology Bulletin, vol.35, issue.6, pp.619-634, 1994. ,
DOI : 10.1177/0146167294206001
Protection Motivation Theory: Understanding Determinants to Backing Up Personal Data, 2010 43rd Hawaii International Conference on System Sciences, pp.1-10, 2010. ,
DOI : 10.1109/HICSS.2010.311
Integration of the cognitive and the psychodynamic unconscious., American Psychologist, vol.49, issue.8, pp.709-724, 1994. ,
DOI : 10.1037/0003-066X.49.8.709
Predicting e-services adoption: a perceived risk facets perspective, International Journal of Human-Computer Studies, vol.59, issue.4, pp.451-474, 2003. ,
DOI : 10.1016/S1071-5819(03)00111-3
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.103.1561
The affect heuristic in judgments of risks and benefits, Journal of Behavioral Decision Making, vol.35, issue.1, pp.1-17, 2000. ,
DOI : 10.1002/(SICI)1099-0771(200001/03)13:1<1::AID-BDM333>3.0.CO;2-S
How safe is safe enough? A psychometric study of attitudes towards technological risks and benefits, Policy Sciences, vol.11, issue.2, pp.127-152, 1978. ,
DOI : 10.1007/BF00143739
Protection motivation and deterrence: a framework for security policy compliance in organisations, European Journal of Information Systems, vol.48, issue.8, pp.106-125, 2009. ,
DOI : 10.1145/1076211.1076238
Perceived usefulness, personal experiences, risk perception and trust as determinants of adoption of e-government services in The Netherlands, Computers in Human Behavior, vol.23, issue.4, pp.1838-1852, 2007. ,
DOI : 10.1016/j.chb.2005.11.003
A Critical Review of Construct Indicators and Measurement Model Misspecification in Marketing and Consumer Research, Journal of Consumer Research, vol.30, issue.2, pp.199-218, 2003. ,
DOI : 10.1086/376806
A survey of trust and reputation systems for online service provision, Decision Support Systems, vol.43, issue.2, pp.618-644, 2007. ,
DOI : 10.1016/j.dss.2005.05.019
A perspective on judgment and choice: Mapping bounded rationality., American Psychologist, vol.58, issue.9, pp.697-720, 2003. ,
DOI : 10.1037/0003-066X.58.9.697
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.186.3636
Representativeness revisited: Attribute substitution in intuitive judgment Heuristics and biases: The psychology of intuitive judgment, pp.49-81, 2002. ,
A trust-based consumer decision-making model in electronic commerce: The role of trust, perceived risk, and their antecedents, Decision Support Systems, vol.44, issue.2, pp.544-564, 2008. ,
DOI : 10.1016/j.dss.2007.07.001
Risk as feelings., Psychological Bulletin, vol.127, issue.2, pp.267-286, 2001. ,
DOI : 10.1037/0033-2909.127.2.267
Model-Driven Risk Analysis: The CORAS Approach, 2011. ,
DOI : 10.1007/978-3-642-12323-8
An integrative model of organizational trust, The Academy of Management Review, vol.20, issue.3, pp.709-734, 1995. ,
Usage Control in Inter-organisational Collaborative Environments ??? A Case Study from an Industry Perspective, Multidisciplinary Research and Practice for Information Systems, pp.317-331, 2012. ,
DOI : 10.1007/978-3-642-32498-7_24
On the adoption of usage control technology in collaborative environments, Proceedings of the 12th International Conference on Innovative Internet Community Systems, pp.142-153, 2012. ,
Consumer acceptance of electronic commerce: Integrating trust and risk with the technology acceptance model, International Journal of Electronic Commerce, vol.7, issue.3, pp.101-134, 2003. ,
Specifying formative constructs in information systems research, MIS Q, vol.31, issue.4, pp.623-656, 2007. ,
A Protection Motivation Theory of Fear Appeals and Attitude Change1, The Journal of Psychology, vol.52, issue.1, 1975. ,
DOI : 10.1037/h0047987
Employees' adherence to information security policies: An empirical study In: New Approaches for Security, Privacy and Trust in Complex Environments, LNCS, vol.232, pp.133-144, 2007. ,
Explaining risk perception: An evaluation of the psychometric paradigm in risk perception research, Rotunde, vol.84, 2004. ,
Perception of risk, Science, vol.236, issue.4799, pp.280-285, 1987. ,
DOI : 10.1126/science.3563507
Rating the Risks, Environment: Science and Policy for Sustainable Development, vol.21, issue.3, pp.14-2036, 1979. ,
DOI : 10.1080/00139157.1979.9933091
The Feeling of Risk: New Perspectives on Risk Perception, Energy & Environment, vol.22, issue.6, 2010. ,
DOI : 10.1260/0958-305X.22.6.835
Risk as Analysis and Risk as Feelings: Some Thoughts about Affect, Reason, Risk, and Rationality, Risk Analysis, vol.19, issue.3, pp.311-322, 2004. ,
DOI : 10.1037//0003-066X.35.2.151
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.201.3647
The affect heuristic, European Journal of Operational Research, vol.177, issue.3, pp.1333-1352, 2007. ,
DOI : 10.1016/j.ejor.2005.04.006
Why Study Risk Perception?, Risk Analysis, vol.83, issue.5, pp.83-93, 1982. ,
DOI : 10.1016/0001-4575(78)90030-1
Risk management guide for information technology systems. NIST Special Publication 800-30, 2002. ,
DOI : 10.6028/nist.sp.800-30
URL : http://www.dtic.mil/get-tr-doc/pdf?AD=ADA396553
A protection motivation theory approach to home wireless security, Proceedings of the Twenty-Sixth International Conference on Information Systems, pp.367-380, 2005. ,