共 53 条
- [1] Ajzen I., The theory of planned behavior, Organizational Behavior and Human Decision Processes, 50, 2, pp. 179-211, (1991)
- [2] Ajzen I., Fishbein M., Understanding attitudes and predicting social behavior, Nebraska Symposium on Motivation, 27, pp. 65-116, (1979)
- [3] Asgharpour F., Liu D., Camp L.J., Experimental evaluations of expert and non-expert computer users' mental models of security risks, The Workshop on the Economics of Information Security (WEIS), Pittsburgh, PA, pp. 1-24, (2007)
- [4] Beautement A., Sasse M.A., Wonham M., The compliance budget: Managing security behaviour in organisations, Proceedings New Security Paradigms Workshop, Lake Tahoe, CA, USA, pp. 47-58, (2009)
- [5] Becker B.J., Wu M.-J., The synthesis of regression slopes in meta-analysis, Statistical Science, 22, 3, pp. 414-429, (2007)
- [6] Brereton P., Kitchenham B., Budgen D., Turner M., Khalil M., Lessons from applying the systematic literature review process within the software engineering domain, Journal of Systems and Software, 80, 4, pp. 571-583, (2007)
- [7] Bulgurcu B., Cavusoglu H., Benbasat I., Effects of individual and organization based beliefs and the moderating role of work experience on insiders' good security behaviors, Proceedings - 12th IEEE International Conference on Computational Science and Engineering, CSE, Vancouver, BC, Canada, 3, pp. 476-481, (2009)
- [8] Bulgurcu B., Cavusoglu H., Benbasat I., Information security policy compliance: An empirical study of rationality-based beliefs and information security awareness, MIS Quarterly: Management Information Systems, 34, SPEC. ISSUE 3, pp. 523-548, (2010)
- [9] Bulgurcu B., Cavusoglu H., Benbasat I., Quality and fairness of an information security policy as antecedents of employees' security engagement in the workplace: An empirical investigation, Proceedings of the Annual Hawaii International Conference on System Sciences, Piscataway, NJ, USA, pp. 1-7, (2010)
- [10] Chan M., Woon I., Perceptions of information security in the workplace: Linking information security climate to compliant behavior, Journal of Information Privacy and Security, 1, 3, pp. 18-41, (2005)