1 |
Venkatesh, V. 2000. "Determinants of perceived ease of use: Integrating control, intrinsic motivation, and emotion into the technology acceptance model." Information System Research 11(4):342-365.
DOI
ScienceOn
|
2 |
Rogers, R. W. 1975. "A protection motivation theory of fear appeals and attitude change." Journal of Psychology 91:93-114.
DOI
ScienceOn
|
3 |
Rogers, R. W., and Petty, R. 1983. Cognitive and physiological process in fear appeals and attitude change: A revised theory of protection motivation. Social Psychophysiology, A Source Book, 153-176. New York: Guilford Press.
|
4 |
Rosenstock, I. M. 1974. "The health belief model and preventive health behavior." Health education Monographs 2:354-386.
DOI
|
5 |
Rosenstock, I. M., Strecher, V., and Becker, M. 1994. "The Health Belief Model and HIV risk behavior change." In Preventing AIDS: Theories and methods of behavioral interventions, edited by DiClemente, R. J. & Peterson, J. L., 5-24. New York: Plenum Press.
|
6 |
Weinstein, N. D. 2000. "Perceived probability, perceived severity, and health-protective behavior." Health Psychology 19(1):65-74.
DOI
ScienceOn
|
7 |
Workman, M., Bommer, W. H., and Straub, D. 2008. "Security lapses and the omission of information security measures: A threat control model and empirical test." Computers in Human Behavior 24(6):2799-2816.
DOI
ScienceOn
|
8 |
Youn, S. 2005. "Teenagers' Perception of Online Privacy and Coping Behavior: A Risk-Benefit Appraisal Approach." Journal of Broadcasting & Electronic Media 49(1):86-110.
DOI
ScienceOn
|
9 |
Lee, Y. 2011. "Understanding anti-plagiarism software adoption: An extended protection motivation theory perspective." Decision Support Systems 50:361-369.
DOI
ScienceOn
|
10 |
Gurung, A., Luo, X., and Liao, Q. 2009. "Consumer motivation in taking action against spyware: An empirical investigation." Information Management and Computer Security 17(3):276-289.
DOI
ScienceOn
|
11 |
Jee, B. S., Fan, L., Lee, S. C., and Suh, Y. H. 2011. "Personal Information Protection Behavoir for Information Quality: Health Psychology Theory Perspectives." Journal of Korean Society for Quality Management 39(3):432-443.
|
12 |
Ji, H. J. 2008. "A Study on the Patient Privacy Portection of Medical Information for Internet." The Journal of The Institute of Webcasting, Internet and Telecommunication 8(5):235-236.
|
13 |
Liang, H., and Xue, Y. 2009. "Avoidance of information technology threats: A theoretical perspective." MIS Quarterly 33(1):71-90.
DOI
|
14 |
Liang, H., and Xue, Y. 2010. "Understanding Security Behaviors in Personal Computer Usage: A threat Avoidance Perspective." Journal of the Association for Information Systems 7(2):393-413.
|
15 |
Rhodes, K. 2001. "Operations security awareness: the mind has no firewall." Computer Security Journal 16(2):27-36.
|
16 |
Maddus, J. E., and Rogers, R. W. 1983. "Protection motivation and self-efficacy: A revised theory of fear appeals and attitude change." Journal of Experimental Social Psychology 19:469-479.
DOI
|
17 |
Ng, B. Y., Kankanhalli, A., and Xu, Y. C. 2009. "Studing users' computer security behavior: A health belief perspective." Decision Support System 46(4):815-825.
DOI
ScienceOn
|
18 |
Oliver, R. L., and Berger, P. K. 1979. "A path analysis of preventive health care decision models." Journal of Consumer Research 6(2):113-122.
DOI
ScienceOn
|
19 |
Anderson, C. L., and Agarwal, R. 2006. "Practicing Safe Computing: Message Framing, Self-View, and Home Computer User Security Behavior Intentions." in International Conference on Information Systems, 1543-1561.
|
20 |
Cha, D. P. 2007. "The Role of Threat and Efficacy in the Fear Appeal Messages: Multiplicative Relationship, or Additive Relationship?." Korean Journal of Advertising 9(2):339-363.
|
21 |
Chin, W. W., Marcolin, B. L., and Newsted, P. R. 2003. "A partial least squares latent variable modeling approach for measuring interaction effects: Results from a monte carlo simulation study and an electronic-mail emotion/adoption study." Information Systems Research 14(2):189-217.
DOI
ScienceOn
|
22 |
Choi, J. Y. 2007. "A Study on the Privacy Protection in Hospital Information System." M.S dissertations, University of Wonkwang.
|
23 |
Claar, C. L. 2011. The adoption of computer security: An analysis of home personal computer user behavior using the health belief model. Utah: Utah State University Press.
|
24 |
Bandura, A. 1977. "Self-efficacy: Toward a unifying theory of behavior change." Psychological Review 84:191-215.
DOI
ScienceOn
|
25 |
Compeau, D. R., Higgins, C. A., and Huff, S. 1999. "Social cognitive theory and individual reactions to computing technology: a longitudinal study." MIS Quarterly 23(2):145-158.
DOI
ScienceOn
|
26 |
Davis, F. D. 1989. "Perceived usefulness, perceived ease of use, and user acceptance of information technology." MIS Quarterly 13(3):319-338.
DOI
ScienceOn
|
27 |
Youn, S. 2009. "Determinants of Online Privacy Concern and its Influence on Privacy Protection Behaviors Among Young Adolescents." The Journal of Consumer affairs 43(3):389-418.
DOI
ScienceOn
|