• Publications
  • Influence
Protection motivation and deterrence: a framework for security policy compliance in organisations
TLDR
We evaluate the behaviours of an organisation's employees as related to security policy compliance intentions in an integrated framework that uses PMT, Deterrence Theory, Organisational Commitment, and the DTBP. Expand
  • 911
  • 172
  • PDF
A trust-based consumer decision-making model in electronic commerce: The role of trust, perceived risk, and their antecedents
TLDR
We develop a theoretical framework describing the trust-based decision-making process a consumer uses when making a purchase from a given site, test the proposed model using a Structural Equation Modeling technique on Internet consumer purchasing behavior data collected via a Web survey. Expand
  • 1,964
  • 151
  • PDF
Encouraging information security behaviors in organizations: Role of penalties, pressures and perceived effectiveness
TLDR
We develop and test a theoretical model of the incentive effects of penalties, pressures and perceived effectiveness of employee actions that enhances our understanding of employee compliance to information security policies. Expand
  • 664
  • 109
  • PDF
Trust and Satisfaction, Two Stepping Stones for Successful E-Commerce Relationships: A Longitudinal Exploration
TLDR
This study synthesizes a model of consumer trust and satisfaction in the context of e-commerce that takes a longitudinal approach. Expand
  • 633
  • 49
  • PDF
Community Intelligence and Social Media Services: A Rumor Theoretic Analysis of Tweets During Social Crises
TLDR
This paper studies citizen-driven information processing through Twitter services using data from three social crises: the Mumbai terrorist attacks in 2008, the Toyota recall in 2010, and the Seattle cafe shooting incident in 2012. Expand
  • 392
  • 31
  • PDF
Why do people get phished? Testing individual differences in phishing vulnerability within an integrated, information processing model
TLDR
This research presents an integrated information processing model of phishing susceptibility grounded in the prior research in information process and interpersonal deception. Expand
  • 238
  • 29
  • PDF
Factors Affecting Bloggers' Knowledge Sharing: An Investigation Across Gender
TLDR
Blogs have emerged as an innovative tool for sharing information and knowledge, and they command significant interest from information technology (IT) users as well as providers. Expand
  • 248
  • 23
Coordination in emergency response management
TLDR
Developing a framework to analyze coordination patterns occurring in the emergency response life cycle. Expand
  • 283
  • 21
Self-healing systems - survey and synthesis
TLDR
Self-healing systems attempt to ''heal'' themselves in the sense of recovering from faults and regaining normative performance levels independently the concept derives from a biological system heals a wound. Expand
  • 297
  • 17
  • PDF
Factors influencing online health information search: An empirical analysis of a national cancer-related survey
TLDR
We find that ease of access to Internet services and trust in online health information could affect the three dimensional search behavior listed above. Expand
  • 205
  • 16
...
1
2
3
4
5
...