J. Park and R. Sandhu, usage control model, ACM Transactions on Information and System Security, vol.7, issue.1, pp.128-174, 2004.
DOI : 10.1145/984334.984339

?. A. Nyre, Usage Control Enforcement - A Survey, Lecture Notes in Computer Science, vol.6908, pp.38-49, 2011.
DOI : 10.1007/978-3-642-23300-5_4

A. Pretschner, M. Hilty, and D. Basin, Distributed usage control, Communications of the ACM, vol.49, issue.9, pp.39-44, 2006.
DOI : 10.1145/1151030.1151053

P. Norman, H. Boer, and E. R. Seydel, Protection motivation theory Predicting Health Behaviour: Research and Practice with Social Cognition Models, pp.81-126, 2005.

R. W. Rogers, A Protection Motivation Theory of Fear Appeals and Attitude Change1, The Journal of Psychology, vol.52, issue.1, 1975.
DOI : 10.1037/h0047987

E. M. Rogers, Diffusion of Innovations, 2003.

?. A. Nyre and M. G. Jaatun, On the adoption of usage control technology in collaborative environments, Proceedings of the 12th International Conference on Innovative Internet Community Systems, 2012.

C. B. Seaman, Qualitative Methods, Guide to Advanced Empirical Software Engineering, pp.35-62, 2008.
DOI : 10.1007/978-1-84800-044-5_2

C. Robson, Real World Research. 3 edn, 2011.

M. Siponen, S. Pahnila, and A. Mahmood, Employees' adherence to information security policies: An empirical study. In: New Approaches for Security, Privacy and Trust in Complex Environments, LNCS, vol.232, pp.133-144, 2007.
DOI : 10.1007/978-0-387-72367-9_12