F. Bélanger and L. Carter, Trust and risk in e-government adoption, The Journal of Strategic Information Systems, vol.17, issue.2, pp.165-176, 2008.
DOI : 10.1016/j.jsis.2007.12.002

B. Bulgurcu, H. Cavusoglu, and I. Benbasat, Information security policy compliance: An empirical study of rationality-based beliefs and information security awareness, MIS Quarterly, vol.34, issue.3, pp.523-548, 2010.

R. A. Caralli, J. F. Stevens, L. R. Young, and W. R. Wilson, Introducing octave allegro: Improving the information security risk assessment process, 2007.

T. Chenoweth, R. Minch, and T. Gattiker, Application of protection motivation theory to adoption of protective technologies, HICSS '09. 42nd Hawaii International Conference on, pp.1-10, 2009.

S. L. Crites, L. R. Fabrigar, and R. E. Petty, Measuring the Affective and Cognitive Properties of Attitudes: Conceptual and Methodological Issues, Personality and Social Psychology Bulletin, vol.35, issue.6, pp.619-634, 1994.
DOI : 10.1177/0146167294206001

R. Crossler, Protection Motivation Theory: Understanding Determinants to Backing Up Personal Data, 2010 43rd Hawaii International Conference on System Sciences, pp.1-10, 2010.
DOI : 10.1109/HICSS.2010.311

S. Epstein, Integration of the cognitive and the psychodynamic unconscious., American Psychologist, vol.49, issue.8, pp.709-724, 1994.
DOI : 10.1037/0003-066X.49.8.709

M. S. Featherman and P. A. Pavlou, Predicting e-services adoption: a perceived risk facets perspective, International Journal of Human-Computer Studies, vol.59, issue.4, pp.451-474, 2003.
DOI : 10.1016/S1071-5819(03)00111-3

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.103.1561

M. L. Finucane, A. Alhakami, P. Slovic, and S. M. Johnson, The affect heuristic in judgments of risks and benefits, Journal of Behavioral Decision Making, vol.35, issue.1, pp.1-17, 2000.
DOI : 10.1002/(SICI)1099-0771(200001/03)13:1<1::AID-BDM333>3.0.CO;2-S

B. Fischhoff, P. Slovic, S. Lichtenstein, S. Read, and B. Combs, How safe is safe enough? A psychometric study of attitudes towards technological risks and benefits, Policy Sciences, vol.11, issue.2, pp.127-152, 1978.
DOI : 10.1007/BF00143739

T. Herath and H. R. Rao, Protection motivation and deterrence: a framework for security policy compliance in organisations, European Journal of Information Systems, vol.48, issue.8, pp.106-125, 2009.
DOI : 10.1145/1076211.1076238

M. Horst, M. Kuttschreuter, and J. M. Gutteling, Perceived usefulness, personal experiences, risk perception and trust as determinants of adoption of e-government services in The Netherlands, Computers in Human Behavior, vol.23, issue.4, pp.1838-1852, 2007.
DOI : 10.1016/j.chb.2005.11.003

C. B. Jarvis, S. B. Mackenzie, and P. M. Podsakoff, A Critical Review of Construct Indicators and Measurement Model Misspecification in Marketing and Consumer Research, Journal of Consumer Research, vol.30, issue.2, pp.199-218, 2003.
DOI : 10.1086/376806

A. Jøsang, R. Ismail, and C. Boyd, A survey of trust and reputation systems for online service provision, Decision Support Systems, vol.43, issue.2, pp.618-644, 2007.
DOI : 10.1016/j.dss.2005.05.019

D. Kahneman, A perspective on judgment and choice: Mapping bounded rationality., American Psychologist, vol.58, issue.9, pp.697-720, 2003.
DOI : 10.1037/0003-066X.58.9.697

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.186.3636

D. Kahneman and S. Frederick, Representativeness revisited: Attribute substitution in intuitive judgment Heuristics and biases: The psychology of intuitive judgment, pp.49-81, 2002.

D. J. Kim, D. L. Ferrin, and H. R. Rao, A trust-based consumer decision-making model in electronic commerce: The role of trust, perceived risk, and their antecedents, Decision Support Systems, vol.44, issue.2, pp.544-564, 2008.
DOI : 10.1016/j.dss.2007.07.001

G. F. Loewenstein, E. U. Weber, C. K. Hsee, and N. Welch, Risk as feelings., Psychological Bulletin, vol.127, issue.2, pp.267-286, 2001.
DOI : 10.1037/0033-2909.127.2.267

M. S. Lund, B. Solhaug, and K. Stølen, Model-Driven Risk Analysis: The CORAS Approach, 2011.
DOI : 10.1007/978-3-642-12323-8

R. C. Mayer, J. H. Davis, and F. D. Schoorman, An integrative model of organizational trust, The Academy of Management Review, vol.20, issue.3, pp.709-734, 1995.

?. A. Nyre and M. Jaatun, Usage Control in Inter-organisational Collaborative Environments ??? A Case Study from an Industry Perspective, Multidisciplinary Research and Practice for Information Systems, pp.317-331, 2012.
DOI : 10.1007/978-3-642-32498-7_24

?. A. Nyre and M. G. Jaatun, On the adoption of usage control technology in collaborative environments, Proceedings of the 12th International Conference on Innovative Internet Community Systems, pp.142-153, 2012.

P. A. Pavlou, Consumer acceptance of electronic commerce: Integrating trust and risk with the technology acceptance model, International Journal of Electronic Commerce, vol.7, issue.3, pp.101-134, 2003.

S. Petter, D. Straub, and A. Rai, Specifying formative constructs in information systems research, MIS Q, vol.31, issue.4, pp.623-656, 2007.

R. W. Rogers, A Protection Motivation Theory of Fear Appeals and Attitude Change1, The Journal of Psychology, vol.52, issue.1, 1975.
DOI : 10.1037/h0047987

M. Siponen, S. Pahnila, and A. Mahmood, Employees' adherence to information security policies: An empirical study In: New Approaches for Security, Privacy and Trust in Complex Environments, LNCS, vol.232, pp.133-144, 2007.

L. Sjöberg, B. E. Moen, and T. Rundmo, Explaining risk perception: An evaluation of the psychometric paradigm in risk perception research, Rotunde, vol.84, 2004.

P. Slovic, Perception of risk, Science, vol.236, issue.4799, pp.280-285, 1987.
DOI : 10.1126/science.3563507

P. Slovic, B. Fischhoff, and S. Lichtenstein, Rating the Risks, Environment: Science and Policy for Sustainable Development, vol.21, issue.3, pp.14-2036, 1979.
DOI : 10.1080/00139157.1979.9933091

P. Slovic, The Feeling of Risk: New Perspectives on Risk Perception, Energy & Environment, vol.22, issue.6, 2010.
DOI : 10.1260/0958-305X.22.6.835

P. Slovic, M. L. Finucane, E. Peters, and D. G. Macgregor, Risk as Analysis and Risk as Feelings: Some Thoughts about Affect, Reason, Risk, and Rationality, Risk Analysis, vol.19, issue.3, pp.311-322, 2004.
DOI : 10.1037//0003-066X.35.2.151

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.201.3647

P. Slovic, M. L. Finucane, E. Peters, and D. G. Macgregor, The affect heuristic, European Journal of Operational Research, vol.177, issue.3, pp.1333-1352, 2007.
DOI : 10.1016/j.ejor.2005.04.006

P. Slovic, B. Fischhoff, and S. Lichtenstein, Why Study Risk Perception?, Risk Analysis, vol.83, issue.5, pp.83-93, 1982.
DOI : 10.1016/0001-4575(78)90030-1

G. Stoneburner, A. Goguen, and A. Feringa, Risk management guide for information technology systems. NIST Special Publication 800-30, 2002.
DOI : 10.6028/nist.sp.800-30

URL : http://www.dtic.mil/get-tr-doc/pdf?AD=ADA396553

I. Woon, G. Tan, and R. Low, A protection motivation theory approach to home wireless security, Proceedings of the Twenty-Sixth International Conference on Information Systems, pp.367-380, 2005.