User preference of cyber security awareness delivery methods, Behaviour& Information, vol.33, issue.3, pp.237-248, 2014. ,
Are individual differences germane to the acceptance of new information technologies? Decision sciences, vol.30, pp.361-391, 1999. ,
Security awareness of computer users: A phishing threat avoidance perspective, Computers in Human Behavior, vol.38, pp.304-312, 2014. ,
Improving information security awareness and behaviour through dialogue, participation and collective reflection. An intervention study, Computers & Security, vol.29, issue.4, pp.432-445, 2010. ,
Key Issues in Information Systems Management: 1994-95 SIM Delphi Results, MIS Quarterly, vol.20, issue.2, pp.225-242, 1996. ,
Taking time seriously: A theory ofsocioemotional selectivity, American Psychologist, vol.54, pp.165-181, 1999. ,
Economics of ITSecurity Management: Four Improvements to Current Security Practices, Communications of the Association for Information, vol.14, issue.1, p.3, 2004. ,
Age differences in perceptions of online community participation among non-users: An extension of the Technology Acceptance Model, Computers in Human, vol.26, issue.6, pp.1674-1684, 2010. ,
, 2012 International Conference on Computer Systems and Industrial Informatics, towards understanding phishing victims' profile, pp.1-5, 2012.
Understanding the importance of and implementing internal security measures, SANS Institute Reading Room, 2007. ,
, Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing SystemsScaling the security wall: Developing a security behavior intentions scale, pp.2873-2882, 2015.
, The new users' guide: how to raise information security awareness (EN), 2010.
Power to the people? The evolving recognition of human aspects of security, vol.31, pp.983-988, 2012. ,
The challenges of understanding and using security: A survey of end-users, Computers & Security, vol.25, issue.1, pp.27-35, 2006. ,
Protection motivation and deterrence: a framework for security policy compliance in organisations, European Journal of Information Systems, vol.18, issue.2, pp.106-125, 2009. ,
Understanding information systems security policy compliance: An integration of the theory of planned behavior and the protection motivation theory, Computers & Security, vol.31, issue.1, pp.83-95, 2012. ,
A path analytic study of individual characteristics, computer anxiety and attitudes toward microcomputers, Journal, vol.15, issue.3, pp.373-388, 1989. ,
Personal computing acceptance factors in small firms: a structural equation model, MIS quarterly, pp.279-305, 1997. ,
A holistic model of computer abuses within organizations, Information management & computer, vol.10, issue.2, pp.57-63, 2002. ,
An integrative model of computer abuse based on social control and general deterrence theories, Information & Management, vol.41, issue.6, pp.707-718, 2004. ,
Managing information security, McKinsey Quart. Special Edition, vol.2, pp.12-16, 2002. ,
Phishing in a university community: Two large scale phishing experiments, 2012 International Conference on Innovations in Information Technology (IIT), pp.249-254, 2012. ,
The human aspects of information security questionnaire (HAIS-Q): two further validation studies, Computers & Security, vol.66, pp.40-51, 2017. ,
The influence of organizational information security culture on information security decision making, Journal of Cognitive Engineering and Decision, vol.9, issue.2, pp.117-129, 2015. ,
Using the technology acceptance model to explain how attitudes determine Internet usage: The role of perceived access barriers and demographics, Journal of business, vol.59, issue.9, pp.999-1007, 2006. ,
, Security awareness: turning your people into your first line of defence, 2010.
Choice and chance: A conceptual model of paths to information security compromise, Information Systems Research, vol.20, issue.1, pp.121-139, 2009. ,
From the Editor-in-Chief: The human factor in security, Computers and security, vol.24, issue.6, pp.425-426, 2005. ,
A customer loyalty formation model in electronic commerce, Economic Modelling35, pp.559-564, 2013. ,
Information security conscious care behaviour formation in organizations, Computers & Security, vol.53, pp.65-78, 2015. ,
Information security policy compliance model in organizations, Computers & Security, vol.56, pp.70-82, 2016. ,
Assessing IT usage: The role of prior experience, MIS, vol.19, pp.561-570, 1995. ,
Why don't men ever stop to ask for directions? Gender, social influence, and their role in technology acceptance and usage behavior, MIS quarterly, pp.115-139, 2000. ,
User acceptance of information technology: Toward a unified view, MIS quarterly, pp.425-478, 2003. ,
From information security to cyber security. Computers & security, vol.38, pp.97-102, 2013. ,
Towards information security behavioural compliance, Computers & security, vol.23, issue.3, pp.191-198, 2004. ,
Security practitioners in context: Their activities and interactions with other stakeholders within organizations, International Journal of Human-Computer Studies, vol.67, issue.7, pp.584-606, 2009. ,
Individual differences in cyber security behaviors: an examination of who is sharing passwords, Cyberpsychology, Behavior, and Social Networking, vol.18, issue.1, pp.3-7, 2015. ,
Human error: an overlooked but significant information security problem, Computers & Security, vol.12, issue.1, pp.51-60, 1993. ,