:::

詳目顯示

回上一頁
題名:Why Do Not We Use Password Managers? A Study on the Intention to Use Password Managers
書刊名:Contemporary Management Research
作者:Ayyagari, RamakrishnaLim, JaejooHoxha, Olger
出版日期:2019
卷期:15:4
頁次:頁227-245
主題關鍵詞:SecurityPasswordsPassword managersPerceived severityPerceived vulnerability
原始連結:連回原系統網址new window
相關次數:
  • 被引用次數被引用次數:期刊(0) 博士論文(0) 專書(0) 專書論文(0)
  • 排除自我引用排除自我引用:0
  • 共同引用共同引用:3
  • 點閱點閱:5
期刊論文
1.Gu, J.-C.、Lee, S.-C.、Suh, Y.-H.(2009)。Determinants of behavioral intention to mobile banking。Expert Systems with Applications,36(9),11605-11616。  new window
2.Milne, S.、Orbell, S.、Sheeran, P.(2002)。Combining motivational and volitional interventions to promote exercise participation: Protection motivation theory and implementation intentions。British Journal of Health Psychology,7(2),163-184。  new window
3.McKnight, D. H.、Carter, M.、Thatcher, J. B.、Clay, P. F.(2011)。Trust in a specific technology: An investigation of its components and measures。ACM Transactions on Management Information Systems,2(2),(12)1-(12)25。  new window
4.Bahmanziari, T.、Pearson, M. J.、Crosby, L.(2003)。Is trust important in technology adoption? A policy capturing approach。Journal of Computer Information Systems,43(4),46-54。  new window
5.Liang, H.、Xue, Y.(2010)。Understanding security behaviors in personal computer usage: A threat avoidance perspective。Journal of the Association for Information Systems,11(7),394-413。  new window
6.Hosmer, D. W.、Hosmer, T.、Le Cessie, S.、Lemeshow, S.(1997)。A comparison of goodness-of-fit tests for the logistic regression model。Statistics in Medicine,16(9),965-980。  new window
7.Lee, Younghwa、Kozar, Kenneth A.、Larsen, Kai R. T.(2003)。The technology acceptance model: Past, present, and future。Communications of the Association for Information Systems,12(50),752-780。  new window
8.Santos, J. R. A.(1999)。Cronbach's alpha: A tool for assessing the reliability of scales。Journal of Extension,37(2),1-5。  new window
9.Rogers, Ronald W.(1975)。A protection motivation theory of fear appeals and attitude change。The Journal of Psychology,91(1),93-114。  new window
10.Malaquias, R. F.、Hwang, Y.(2016)。An empirical study on trust in mobile banking: a developing country perspective。Computers in Human Behavior,54,453-461。  new window
11.Marangunić, N.、Granić, A.(2015)。Technology acceptance model: a literature review from 1986 to 2013。Universal Access in the Information Society,14(1),81-95。  new window
12.Yu, P. L.、Balaji, M. S.、Khong, K. W.(2015)。Building trust in internet banking: a trustworthiness perspective。Industrial Management & Data Systems,115(2),235-252。  new window
13.Ong, Chorng-shyong、Lin, Yi-luen(20151200)。Security, Risk, and Trust in Individuals' Internet Banking Adoption: An Integrated Model。International Journal of Electronic Commerce Studies,6(2),343-354。new window  new window
14.Yang, Yann-jy、Wang, Chih-chien、Chen, Chien-chang(20170600)。Recent Development Trend of Electronic Commerce Research: 2000 to 2016。Contemporary Management Research,13(2),131-142。new window  new window
15.Crossler, R.、Belanger, F.(2014)。An Extended Perspective on Individual Security Behaviors: Protection Motivation Theory and a Unified Security Practices (USP) Instrument。SIGMIS Database,45(4),51-71。  new window
16.Boss, S.、Galletta, D.、Lowry, P. B.、Moody, G. D.、Polak, P.(2015)。What do systems users have to fear? Using fear appeals to engender threats and fear that motivate protective security behaviors。MIS Quarterly,39(4),837-864。  new window
17.Duggan, G. B.、Johnson, H.、Grawemeyer, B.(2012)。Rational security: Modelling everyday password use。International Journal of Human-Computer Studies,70(6),415-431。  new window
18.Gurung, A.、Luo, X.、Liao, Q.(2009)。Consumer motivations in taking action against spyware: an empirical investigation。Information Management & Computer Security,17(3),276-289。  new window
19.Happ, C.、Melzer, A.、Steffgen, G.(2016)。Trick with treat--reciprocity increases the willingness to communicate personal data。Computers in Human Behavior,61,372-377。  new window
20.Herley, C.、Oorschot, P. V.(2012)。A research agenda acknowledging the persistence of passwords。IEEE Security & Privacy,10(1),28-36。  new window
21.Hess, T. J.、McNab, A. L.、Basoglu, K. A.(2014)。Reliability generalization of perceived ease of use, perceived usefulness, and behavioral intentions。MIS Quarterly,38(1),1-28。  new window
22.Hillman, S.、Neustaedter, C.(2017)。Trust and mobile commerce in North America。Computers in Human Behavior,70,10-21。  new window
23.Kneidinger-Müller, B.(2017)。Mobile communication as invader in face-to-face interactions: An analysis of predictors for parallel communication habits。Computers in Human Behavior,73,328-335。  new window
24.Keith, M.、Shao, B.、Steinbart, P. J.(2007)。The usability of passphrases for authentication: An empirical field study。International Journal of Human-Computer Studies,65(1),17-28。  new window
25.Lau, Mei Mei、Lam, Aris Y. C.、Cheung, Ronnie(20160600)。Examining the Factors Influencing Purchase Intention of Smartphones in Hong Kong。Contemporary Management Research,12(2),213-223。new window  new window
26.Lejeune, R.、Alex, N.(1973)。On being mugged: The event and its aftermath。Urban Life and Culture,2(3),259-287。  new window
27.Martens, M.、De Wolf, R.、De Marez, L.(2019)。Investigating and comparing the predictors of the intention towards taking security measures against malware, scams and cybercrime in general。Computers in Human Behavior,92,139-150。  new window
28.Nelson, D.、Vu, K.-P. L.(2010)。Effectiveness of image-based mnemonic techniques for enhancing the memorability and security of user-generated passwords。Computers in Human Behavior,26(4),705-715。  new window
29.Roe-Burning, S.、Straker, G.(1997)。The association between illusions of invulnerability and exposure to trauma。Journal of Traumatic Stress,10(2),319-327。  new window
30.Thompson, N.、McGill, T. J.、Wang, X.(2017)。"Security begins at home": Determinants of home computer and mobile device security behavior。Computers & Security,70,376-391。  new window
31.Zhao, R.、Yue, C.(2014)。Toward a secure and usable cloud-based password manager for web browsers。Computers & Security,46,32-47。  new window
32.West, R.(2008)。The psychology of security。Communications of the ACM,51(4),34-40。  new window
33.Yan, Q.、Han, J.、Li, Y.、Zhou, J.、Deng, R. H.(2015)。Leakage-resilient password entry: challenges, design, and evaluation。Computers & Security,48,196-211。  new window
34.Luarn, Pin、Lin, Hsin-Hui(2005)。Toward An Understanding of The Behavioral Intention Use Mobile Banking。Computers in Human Behavior,21(6),873-891。  new window
35.Davis, Fred D.(1989)。Perceived Usefulness, Perceived Ease of Use, & User Acceptance of Information Technology。MIS Quarterly,13(3),319-340。  new window
會議論文
1.Alkaldi, N.、Renaud, K.(2016)。Why do people adopt, or reject, smartphone password managers?。The EuroUSEC 2016: The 1st European Workshop on Usable Security。  new window
2.Alkaldi, N.、Renaud, K.(2019)。Encouraging password manager adoption by meeting adopter self-determination needs。  new window
3.Allison, P. D.(2014)。Measures of fit for logistic regression。  new window
4.Chenoweth, T.、Minch, R.、Gattiker, T.(2009)。Application of protection motivation theory to adoption of protective technologies。The 2009 42nd Hawaii International Conference on System Sciences,(會議日期: 5-8 Jan. 2009)。  new window
5.Chiasson, S.、van Oorschot, P. C.、Biddle, R.(2006)。A usability study and critique of two password managers。  new window
6.Egelman, S.、Harbach, M.、Peer, E.(2016)。Behavior ever follows intention?: A validation of the security behavior intentions scale (SeBIS)。  new window
7.Karole, A.、Saxena, N.、Christin, N.(2010)。A comparative usability evaluation of traditional password managers。13th the International Conference on Information Security and Cryptology。  new window
8.Komanduri, S.、Shay, R.、Kelley, P. G.、Mazurek, M. L.、Bauer, L.、Christin, N.、Egelman, S.(2011)。Of passwords and people: Measuring the effect of password-composition policies。  new window
9.Li, Z.、He, W.、Akhawe, D.、Song, D.(2014)。The emperor's new password manager: security analysis of web-based password managers。The USENIX Security Symposium。  new window
10.McCarney, D.、Barrera, D.、Clark, J.、Chiasson, S.、van Oorschot, P. C.(2012)。Tapas: design, implementation, and usability evaluation of a password manager。  new window
11.Stobert, E.、Biddle, R.(2014)。The password life cycle: User behaviour in managing passwords。The 10th Symposium On Usable Privacy and Security。  new window
12.Ur, B.、Bees, J.、Segreti, S. M.、Bauer, L.、Christin, N.、Cranor, L. F.(2016)。Do users' perceptions of password security match reality?。  new window
13.Tari, F.、Ozok, A.、Holden, S. H.(2006)。A comparison of perceived and real shoulder-surfing risks between alphanumeric and graphical passwords。The second Symposium On Usable Privacy and Security。  new window
14.Wash, R.、Rader, E.、Berman, R.、Wellmer, Z.(2016)。Understanding password choices: How frequently entered passwords are re-used across websites。The Symposium on Usable Privacy and Security。  new window
學位論文
1.Davis, F. D.(1985)。A Technology Acceptance Model for Empirically Testing New End User Information Systems: Theory and Results(博士論文)。Massachusetts Institute of Technology。  new window
圖書
1.Cohen, Jacob、Cohen, Patricia、West, Stephen G.、Aiken, Leona S.(2014)。Applied Multiple Regression/Correlation Analysis for the Behavioral Sciences。Psychology Press。  new window
其他
1.Bogard, M.(2011)。Logit models: R-square and the percentage of correct predictions,http://econometricsense.blogspot.com/2011/03/logit-models-r-square-and-percentage-。  new window
2.Huth, A.,Orlando, M.,Pesante, L.(2012)。Password security, protection, and management,http://aahuth.com/wp-content/uploads/sites/44/ 2014/02/PasswordMgmt2012-2.pdf。  new window
3.Smith, Aaron(20170126)。Americans and cybersecurity,http://www.pewinternet.org/2017/01/26/americans-and-cybersecurity/。  new window
4.Vance, A.(20100120)。If Your password is 123456, Just make it hackme,https://www.nytimes.com/2010/01/21/technology/21password.html。  new window
 
 
 
 
第一頁 上一頁 下一頁 最後一頁 top
:::
無相關博士論文
 
無相關書籍
 
無相關著作
 
QR Code
QRCODE