scholarly article | Q13442814 |
P6179 | Dimensions Publication ID | 1009912125 |
P356 | DOI | 10.1057/SJ.2015.22 |
P2888 | exact match | https://scigraph.springernature.com/pub.10.1057/sj.2015.22 |
P50 | author | Paul Benjamin Lowry | Q56650255 |
P2093 | author name string | David W Wilson | |
Anthony Vance | |||
P2860 | cites work | The moderator–mediator variable distinction in social psychological research: Conceptual, strategic, and statistical considerations | Q25938996 |
Effects of deindividuation variables on stealing among Halloween trick-or-treaters | Q28314740 | ||
Trust in automation. Part II. Experimental studies of trust and human intervention in a process control simulation | Q30464274 | ||
Common method biases in behavioral research: a critical review of the literature and recommended remedies | Q34265850 | ||
Genetic programming for prevention of cyberterrorism through dynamic and evolving intrusion detection | Q55924155 | ||
The DeLone and McLean Model of Information Systems Success: A Ten-Year Update | Q56001836 | ||
Electronic meeting systems | Q56018354 | ||
Perceived Usefulness, Perceived Ease of Use, and User Acceptance of Information Technology | Q56226554 | ||
A Theoretical Extension of the Technology Acceptance Model: Four Longitudinal Field Studies | Q56226565 | ||
Using an elaboration likelihood approach to better understand the persuasiveness of website privacy assurance cues for online consumers | Q56865791 | ||
The Theory of Reasoned Action: A Meta-Analysis of Past Research with Recommendations for Modifications and Future Research | Q57310400 | ||
Information Systems Success: The Quest for the Dependent Variable | Q57311204 | ||
On the consequences of deindividuation manipulations for the strategic communication of self: Identifiability and the presentation of social identity | Q57916225 | ||
Protecting Critical Information Infrastructure: Developing Cybersecurity Policy | Q58359103 | ||
Dimensions of Business-to-Consumer (B2C) Systems Success in Kuwait | Q59108975 | ||
Is Trust Always Better than Distrust? The Potential Value of Distrust in Newer Virtual Teams Engaged in Short-Term Decision-Making | Q59108985 | ||
Leveraging fairness and reactance theories to deter reactive computer abuse following enhanced organisational information security policies: an empirical study of the influence of counterfactual reasoning and organisational trust | Q59108993 | ||
Proposing the control-reactance compliance model (CRCM) to explain opposing motivations to comply with organisational information security policies | Q59109019 | ||
The Role of Extra-Role Behaviors and Social Controls in Information Security Policy Effectiveness | Q59109032 | ||
A Picture is Worth a Thousand Words: Source Credibility Theory Applied to Logo and Website Design for Heightened Credibility and Consumer Trust | Q59109064 | ||
Autonomous Scientifically Controlled Screening Systems for Detecting Information Purposely Concealed by Individuals | Q59109081 | ||
Partial Least Squares (PLS) Structural Equation Modeling (SEM) for Building and Testing Behavioral Causal Theory: When to Choose It and How to Use It | Q59109110 | ||
When trust and distrust collide online: The engenderment and role of consumer ambivalence in online consumer behavior | Q59109132 | ||
Future directions for behavioral information security research | Q59109155 | ||
The Drivers in the Use of Online Whistle-Blowing Reporting Systems | Q59109183 | ||
Using Accountability to Reduce Access Policy Violations in Information Systems | Q59109197 | ||
Effects of Automated and Participative Decision Support in Computer-Aided Credibility Assessment | Q59109233 | ||
Technology Dominance in Complex Decision Making: The Case of Aided Credibility Assessment | Q59109266 | ||
Explaining and Predicting the Impact of Branding Alliances and Web Site Quality on Initial Consumer Trust of E-Commerce Web Sites | Q59109317 | ||
P433 | issue | 3 | |
P921 | main subject | anonymity | Q308859 |
P304 | page(s) | 979-999 | |
P577 | publication date | 2017-07-01 | |
P1433 | published in | Security Journal | Q15759455 |
P1476 | title | Using trust and anonymity to expand the use of anonymizing systems that improve security across organizations | |
P478 | volume | 30 |
Search more.