Cyberpsychology
  • Dr Steven Brown
  • Cyberpsychology
    • Theory and Models
  • Resume & Experience
    • Dissertation Help
Below are various theories and models that have been used and can be used in cybersecurity research
Behavioral et. al.
Absorptive capacity Theory
Accountability Theory
Activity Theory
Adaptive Structuration Theory
Administrative Behavior Theory
Argumentation Theory
Asch Conformity
Behavioral Decision Model
Belief Action Outcome Framework
Chaos Theory
Cognitive Fit Theory
Cognitive Load Theory
Cognitive Behavioral Therapy
Classical Conditioning
Conditioned Emotional Response
Cognitive Dissonance
Cognitive “purposive” Behaviorism
Consequentialist Ethics
Critical Theory
Csíkszentmihályi’s Flow
Cultural Theory
Deontological Ethics
Diffusion of Innovations Theory
Dynamic Capabilities
Distributed Cognitions Theory
Embodied social presence theory
Equity theory
Evolutionary theory
Eysenck’s Theory
Expectancy-value theory
Expectation Confirmation Theory
False Memory Syndrome
Field Theory
Fishbein's Attitude
General Deterrence Theory
Gestalt Theory of Personality
General Strain theory
Goal Contagion Theory
Gompertz Model (based upon Social Conflict Theory)
Grounded Theory
Hermeneutics
Illusion of Control
Impression Management Theory
Information Processing Theory
Impression Management Theory
Information Asymmetry Theory
Information Security Management Theory
Institutional Theory
Integrated Systems Theory
Keller's Motivational Model
Language action perspective
Law of Effect
Law of Emotion
Learned Helplessness Theory
McClelland’s Needs Theory
Neutralization Theory
Operant Conditioning
Mitchel’s Personality theory
Prospect Theory
Protection Motivation Theory
Self Determination Theory
Self-Efficacy Theory
Social Action Theory
Social Conflict Theory
Social Cognitive Theory
Social Exchange Theory
Social Identity Theory
Social Influence Theory
Social Learning Theory
Socio Technical Systems Theory
Task Closure Theory
Technology Acceptance Model
Technology Threat Avoidance Theory
Theory of Contextualism
Theory of Contiguity
Theory of Equipotentiality
Theory of Planned Behavior
Theory of Protection Motivation
Theory of Reasoned Action
Theory of Planned Behavior
Trait Theory
Virtue Ethics
Unified theory of acceptance and use of technology (UTAUT)
Universal Law of Generalization
Non-Behavioral
Accountability obfuscation
Actor Network theory
Attack Tree and Vague Sets
Bayes Theorem
Bayesian Inference
Bayesian Belief Network
Bayesian Networks
Boundary Object Theory
Broadbent’s Filter Theory Model
Complexity Theory
Cooperative game theory
Conformity Theory
Critical Realism Theory
Customer Based Discrepancy Theory
Customer Focus Theory
Deferred Action Theory
Design Theory
Elaboration Likelihood Model
Fit-Viability Theory
Flow Theory
Game Theory
Garbage Can Theory
General Systems Theory
General Deterrence Theory
Hebbian Theory
Human Agency Theory
Information Warfare
Institutional theory
International Information Systems Theory
Internationalization Theory
Information Technology Portfolio
Knowledge Management
Noncooperative game theory
Organization Based Access Control
Role-base access control
Management (ITPM) model
Mere Exposure Effect
Multi-attribute Utility Theory
Multi-motive Information Systems Continuance Model
Organizational culture theory
Organizational information processing theory
Organizational knowledge creation
Organizational learning theory
Portfolio theory
Process virtualization theory
P3P privacy policies
Poliheuristic decision theory
Privacy-enhancing technologies
Retrieval-induced forgetting
Social Information Processing Theory
Social Learning Theory
Social Network Theory
Social Penetration Theory
Task-technology Fit Model
Technology Dominance Theory
Technology-Organization-Environment TOE Framework
Theory of Information Warfare
Transaction Cost Economics
Tulving’s Model
Zeigarnik Effect
Ablon, L., & Libicki, M. (2015). Hackers’ bazaar: The markets for cybercrime tools and  stolen data. Defense Counsel Journal, 82(2), 143–1

Abu-Al-Aish, A., & Love, S. (2013). Factors influencing students’ acceptance of mlearning: An investigation in higher education. International Review of Research in Open and Distance Learning, 14(5)

Aditya, P., Bhattacharjee, B., Druschel, P., Erdélyi, V., & Lentz, M. (2015). Brave new world: Privacy risks for mobile users. ACM SIGMOBILE Mobile Computing and Communications Review, 18(3), 49–54. https://doi.org/10.1145/2721896.2721907

Adler, A., & Radin, P. (1927). The practice and theory of individual psychology. London: K. Paul, Trench, Trubner & Co.

Ajzen, I. (2002). Perceived behavioral control, self-efficacy, lotus of control, and the theory of planned behavior. Journal of Applied Social Psychology, 32, 1-20.

Ajzen, I., & Fishbein, M. (2005). The influence of attitudes on behavior. In D.Albarracín, B. T. Johnson, & M. P. Zanna (Eds.), The handbook of attitudes (pp.173-221). Mahwah, NJ: Erlbaum

Albrechtsen, E. (2007). A qualitative study of users’ view on information security. Computers &Security, 26, 276–289. doi: 10.1016/j.cose.2006.11.004

Alexander, P. A. (1992). Domain knowledge: Evolving themes and emerging concerns. Educational psychologist, 27(1), 33.

Ali, M., Khan, S. U., & Vasilakos, A. V. (2015). Security in cloud computing: Opportunities and challenges. Information Sciences, 305(2015), 357–383. https://doi.org/10.1016/j.ins.2015.01.025

Alkhater, N., Wills, G., & Walters, R. (2014). Factors influencing an organisation's intention to adopt cloud computing in Saudi Arabia. In 2014 6th International Conference on Cloud Computing Technology and Science (pp. 1040–1044). IEEE.

Alkhunaizan, A., & Love, S. (2012). What drives mobile commerce? An empirical evaluation of the revised UTAUT model. International Journal of Management and Marketing Academy, 2(1), 82–99. doi:10.1016/j.im.2004.07.001

Aljukhadar, M., Senecal, S., & Nantel, J. (2014). Is more always better? Investigating the task-technology fit theory in an online user context. Information & Management, 51(4), 391-397. doi:10.1016/j.im.2013.10.003

Allais, M. (1953).  Le Comportement de l'Homme Rationnel devant le Risque: Critique des Postulats et Axiomes de l'Ecole Americaine. (The Rational Man's Behavior in the Face of Risk: Criticism of Postulates and Axioms of the American School). Econometrica, 21(4), 503-546.

Allport, G (1937). Personality: A psychological interpretation. New York: Holt, Rinehart, & Winston.

Allport, G. W. (1961). Pattern and growth in personality (14 print. ed.). New York: Holt, Rinehart and Winston.
Alhogail, A., & Mirza, A. (2014). A framework of information security culture change. Journal of Theoretical and Applied Information Technology, 64(2), 540–549. Retrieved from
www.jatit.org

Allam, S., Flowerday, S. V., & Flowerday, E. (2014). Smartphone information security awareness: A victim of operational pressures. Computers and Security, 42, 56–65. Retrieved from http://dx.doi.org/10.1016/j.cose.2014.01.005

Almorsy, M., Grundy, J., & Müller, I. (2016). An analysis of the cloud computing security problem. arXiv preprint arXiv:1609.01107

Al-Mukahal, H. M., & Alshare, K. (2014). An examination of factors that influence the number of information security policy violations in Qatari organizations. Information and Computer Security, 23(1), 102–118. doi: 10.1108/ICS-03-2014-0018

Alzoubi, Y. I., Gill, A. Q., & Al-Ani, A. (2016). Empirical studies of geographically distributed agile development communication challenges: A systematic review. Information & Management, 53(1), 22-37. doi:10.1016/j.im.2015.08.003

Anderson, M., Bjork, R., & Bjotk, E. (1994). Remembering Can Cause Forgetting: Retrieval Dynamics in Long-Term Memory. Journal of experimental psychology. Learning, memory, and cognition. 20. 1063-87. 10.1037/0278-7393.20.5.1063.

Arachchilage, N. A. G., & Love, S. (2014). Security awareness of computer users: A phishing threat avoidance perspective. Computers in Human Behavior, 38, 304–312. Retrieved from http://dx.doi.org/10.1016/j.chb.2014.05.046

Ardagna, C. A., Asal, R., Damiani, E., & Vu, Q. H. (2015). From security to assurance in the cloud: A survey. ACM Computing Surveys (CSUR), 48(1), 2. doi:10.1145/2767005

Aronson, E. (1972). The social animal: Elliot Aronson. New York: Viking Press.

Arpaci, I., Kilicer, K., & Bardakci, S. (2015). Effects of security and privacy concerns on educational use of cloud services. Computers in Human Behavior, 45, 93􀀀98. doi:10.1016/j.chb.2014.11.075

Armour, P. G. (2007).  , 50(1), 13-16.   doi:10.1145/1188913.1188930

Asch, S.E. (1951). Effects of group pressure on the modification and distortion of judgments. In H. Guetzkow (Ed.), Groups, leadership and men(pp. 177–190). Pittsburgh, PA:Carnegie Press.

Asch, S.E. (1955). "Opinions and social pressure". Scientific American. 193 (5): 31–35. doi:10.1038/scientificamerican1155-31

Attuquayefio, S. N., & Addo, H. (2014). Using the UTAUT model to analyze students' ICT adoption. International Journal of Education and Development Using Information and Communication Technology, 10(3), 75–86.

Bagozzi, R.P. (2007), The Legacy of the Technology Acceptance Model and a Proposal for a Paradigm Shift, Journal of the Association for Information Systems, 8 (4), pp. 244–254.

Baird, A., Furukawa, M. F., & Raghu, T. S. (2012). Understanding contingencies associated with the early adoption of customer-facing web portals. Journal of Management Information Systems, 29(2), 293-324.

Bajo, M. T., Gómez-Ariza, C. J., Fernandez, A., & Marful, A. (2006). Retrieval-induced forgetting in perceptually driven memory tests. Journal of Experimental Psychology: Learning, Memory, and Cognition, 32(5), 1185-1194. http://dx.doi.org/10.1037/0278-7393.32.5.1185

Bandura, A. (1986). Social foundations of thought and action: A social cognitive theory. Englewood Cliffs, NJ: Prentice-Hall, Inc.

Barkly (2016). 2016 Cybersecurity Confidence Report. Retrieved from https://www.barkly.com/cybersecurity-confidence-report-2016

Basin, D., Jugé, V., Klaedtke, F., & Zălinescu, E. (2013). Enforceable security policies revisited. ACM Transaction on Information and System Security, 16(1), 3, 3–26. doi:http://dx.doi.org/10.1145/2487222.2487225

Barlow, J. B., Warkentin, M., Ormond, D., & Dennis, A. R. (2013). Don’t make excuses! Discouraging neutralization to reduce IT policy violation. Computers & Security, 39(2013), 145–159. Retrieved from http://dx.doi.org/10.1016/j.cose.2013.05.006

Barrett, D. (2009). Workshop: How the acceptance of anonymous surfing and Tor in communications has changed the evidence landscape. Proceedings of the Conference on Digital Forensics, Security and Law, 7.

Beck AT (1972). Depression: Causes and Treatment. Philadelphia: University of Pennsylvania Press. ISBN 0-8122-1032-8.

Beggs, C., & McGowan, R. (2011). Fostering SCADA and IT relationships: an industry perspective. International Journal of Cyber Warfare and Terrorism (IJCWT), 1(3), 1-11.

Bleicher, P. (2003). Software life cycles and kitchen. Applied Clinical Trials, 12(10), 30.

Boeck, H. (2014). An overview of ethical considerations when using RFID with consumers. International Journal of Cyber Society and Education, 7(2), 157–164.https://doi.org/10.7903/ijcse.1172

Boehmer, W. (2008). Appraisal of the effectiveness and efficiency of an information security management system based on ISO 27001. In Proceedings of The Second International Conference on Emerging Security Information, Systems, and Technologies, 224-231.

Booch, G. (2014). The stories we tell ourselves. IEEE Software, 31(2), 18-20.  doi:10.1109/MS.2014.4

Bower, Gordon H. (ed.) (1984). The Psychology of Learning and Motivation. Academic Press

Branco, T., & Santos, H. (2016, June). What is missing for trust in the cloud computing? In Proceedings of the 2016 ACM SIGMIS Conference on Computers and People Research (pp. 27–28). ACM.

Broadbent, D (1958). Perception and Communication. London: Pergamon Press.

Brookes, N., & Clark, R. (2009). Using maturity models to improve project management practice. In POMS 20th Annual Conference, Florida USA.

Broady, T., Chan, A., & Caputi, P. (2010). Comparison of older and younger adults’ attitudes towards and abilities with computers: Implications for training and learning. British Journal of Educational Technology, 41(3), 473-485. doi:10.1111/j.1467-8535.2008.00914.x

Brown, A. L., et al. (1993). Distributed expertise in the Classroom Distributed cognitions: Psychological and educational considerations. Ed. Gavriel Salomon. New York: Cambridge UP, 188-28.

Brown, R. G., and Pluck, G. (2000). Negative symptoms: the ‘pathology’ of motivation and goal-directed behaviour. Trends Neurosci. 23, 412–417. doi: 10.1016/S0166-2236(00)01626-X

Brumfitt, H. A., Askwith, R., & Zhou, B. (2014). A framework for device security in the Internet of Things. Retrieved from http://www.cms.livjm.ac.uk/PGNet2014/papers/1569961261.pdf

Bruner, J. S. (1960). The Process of education. Cambridge, Mass.: Harvard University Press.

Bruner, J. S. (1966). Toward a theory of instruction, Cambridge, Mass.: Belkapp Press.

Burda, D., & Teuteberg, F. (2014). The role of trust and risk perceptions in cloud archiving. Results from an empirical study. Journal of High Technology Management Research, 25(2), 172􀀀187. doi:10.1016/j.hitech.2014.07.008

Burns, S., & Roberts, L. (2013). Applying the theory of planned behavior to predicting online safety behavior. Crime Prevention and Community Safety, 15(1), 48–64. https://doi.org/http://dx.doi.org/10.1057/cpcs.2012.13

Burns, M. J., and Woodruff, R. B. (1992). Delivering value to consumers: Implications for strategy development and implementation. In C. T. Allen, T. J. Madden, T. A. Shimp, R. D. Howell, G. M. Zinkhan,
D. D. Heisley, R. J. Semenik, P. Dickson, V. Zeithami, & R. L. Jenk (Eds.), Marketing Theory and Applications, (1992) (pp. 209-216). Chicago: American Marketing Association.

Bounds, G. M., and Dewhirst, H. D. Assessing progress in managing for customer value. In M. J. Stahl & G. M. Bounds (Eds.), Competing globally through customer value (1991), (pp. 307-339). New York: Quorum

Byres, E. J., Franz, M., & Miller, D. (2004, December). The use of attack trees in assessing vulnerabilities in SCADA systems. In Proceedings of the International Infrastructure Survivability Workshop.

Campbell, D. T., & Fiske, D. W. (1959). Convergent and discriminant validation by the multitrait-multimethod matrix. Psychological Bulletin, 56(2), 81. http://dx.doi.org/10.1037/h0046016

Cannon, W., B. (1915). Bodily changes in pain, hunger, fear, and rage. New York: Appleton-Century-Crofts.

Carol, C., (1972). Cognitive economy in semantic memory. Journal of Experimental Psychology. 92. 149-154. 10.1037/h0032072.
Cassidy, K. (2007). Tuckman Revisited: Proposing a New Model of Group Development for Practitioners. Journal of Experiential Education. 29, 413-417. doi:10.1177/105382590702900318

Cattell, R. B. (1987). Advances in psychology, No. 35. Intelligence: Its structure, growth and action. Oxford, England: North-Holland

Caudle, D. Improving cyber warfare decision-making by incorporating leadership styles and situational context into poliheuristic decision theory. Proceedings of the International Conference On Information Warfare & Security, 2013, 240-247

Cavallari, M. (2011). The organizational relationship between compliance and information security. International Journal of Academic Business World, 5(1), 63–76.

Cebula, J., & Young, L. (2010, December). A taxonomy of operational cyber security risks. Pittsburgh, PA: Carnegie-Mellon Software Engineering Institute (SEI).

Chang, S., & Lin, C. S. (2007). Exploring organizational culture for information security management. Industrial Management and Data Systems, 107, 438–458.doi:10.1108/02635570710734316

Chatterjee, S., Sarker, S., & Valacich, J. S. (2015). The behavioral roots of information systems security: Exploring key factors related to unethical IT Use. Journal of Management Information Systems, 31(4), 49-87.

Chaturvedi, D. A., & Zarger, S. A (2015). A review of security models in cloud computing and an innovative approach. International Journal of Computer Trends and Technology (IJCTT), 30(2), 87–92.

Chebrolu, S. B. (2010). Assessing the relationships among cloud adoption, strategic alignment and information technology effectiveness (Doctoral dissertation). Available from ProQuest Dissertations and Theses database. (UMI No. 762321386)

Chen, P.-Y., Cheng, S.-M., & Chen, K.-C. (2014). Information fusion to defend intentional attack in Internet of Things. IEEE Internet of Things Journal, 1(4), 337–348. https://doi.org/10.1109/JIOT.2014.2337018

Chen, Y., Ramamurthy, K., & Wen, K. (2013). Organizations’ information security policy compliance: Stick or carrot approach. Journal of Management Information Systems, 29(3), 157–188. doi: 10.2753/MIS0742-1222290305

Chen, Y., Ramamurthy, K., & Wen, K. (2015). Impacts of comprehensive information security programs on information security culture. Journal of Computer Information Systems, 55(3), 11–19. doi: 10.1080/08874417.2015.11645767

Cheng, H., & Furnham, A. (2017). Personality traits neuroticism and openness as well as early abnormal eye conditions as predictors of the occurrence of eye problems in adulthood. Health Psychology Open. https://doi.org/10.1177/2055102917716205

Cheolho, Y., Jae-Won, H., & Kim, R. (2012). Exploring factors that influence students' behaviors in information security. Journal of Information Systems Education, 23(4), 407-415.

Chi, H., Yeh, H., & Hung, W. C. (2012). The moderating effect of subjective norm on users’ perceived risk and usage intention. International Journal of Marketing Studies, 4(6), 95􀀀102. doi:10.5539/ijms.v4n6p95

Christensen, K. Ethics of information technology. The human edge: Information technology and helping people (1986), 72–91.

Chu, C., & Zhmoginov, A., & Sandler, M. (2017). CycleGAN: a Master of Steganography.

Compeau, D., Higgins, C. A., & Huff, S. (1999). Social cognitive theory and individual reactions to computing technology: A longitudinal study. MIS Quarterly, 23(2),145–158. doi:10.2307/249749

Craik, K. (1943). The Nature of Explanation. Cambridge: Cambridge University Press.

Creswell, J., & Creswell, D. (2018). Research design: Qualitative, quantitative, and mixed methods app (5th ed.). Thousand Oaks, CA: Sage.

Crossman, A., & Lee-Kelley, L. (2004). Trust, commitment and team working: the paradox of virtual organizations. Global Networks, 4, 375-390. doi:10.1111/j.1471-0374.2004.00099.x

Csíkszentmihályi., M. (2007). Flow the Psychology of Optimal Experience. Harper Perennial Modern Classics

Dahlberg, T., Mallat, N., & Öörni, A. (2003). Trust enhanced technology acceptance model consumer acceptance of mobile payment solutions: Tentative evidence.

Damen, T., Strick, M., Taris, T. W., & Aarts, H. (2018). When conflict influences liking: The case of the Stroop task. PloS one, 13(7), e0199700. doi: 10.1371/journal.pone.0199700

Darwin, C. (2009). The Expression of the Emotions in Man and Animals (Cambridge Library Collection - Darwin, Evolution and Genetics) (F. Darwin, Ed.). Cambridge: Cambridge University Press. doi:10.1017/CBO9780511694110

Davis, F. D. (1989). Perceived usefulness, perceived ease of use, and user acceptance of information technology. MIS Quarterly, 13(3), 319–340. doi:10.2307/249008

Davis, F. D., Bagozzi, R. P., & Warshaw, P. R. (1989). User acceptance of computer technology: A comparison of two theoretical models. Management Science, 35(8), 982–1003. https://doi.org/10.1287/mnsc.35.8.982

Davis, F. D., Bagozzi, R. P., & Warshaw, P. R. (1992). Extrinsic and intrinsic motivation to use computers in the workplace. Journal of Applied Social Psychology, 22(14), 1111-1132.

Deutchman, P., & Sullivan, J. (2018). The Dark Triad and framing effects predict selfish behavior in a one-shot Prisoner’s Dilemma. PloS one, 12(9), 1-15.

Digman JM (June 1989). "Five robust trait dimensions: development, stability, and utility". Journal of Personality. 57 (2): 195–214. doi:10.1111/j.1467-6494.

Ding-Long H., Pei-Luen P. R., & Gavriel, S. (2010) Perception of information security, Behaviour & Information Technology, 29:3, 221-232, DOI: 10.1080/01449290701679361

Ding, Y., Jin, Y., Ren, L., & Hao, K. (2013). An intelligent self-organization scheme for the Internet of Things. IEEE Computational Intelligence Magazine, 8(3), 41–53. https://doi.org/10.1109/MCI.2013.2264251

Dlodlo, N., Foko, T., Mvelase, P., & Mathaba, S. (2012). The state of affairs in Internet of Things research. Electronic Journal of Information Systems Evaluation, 15(3), 244–258

Dreisbach G., & Fischer R. (2012). Conflicts as aversive signals. Brain and Cognition, 78(2), 94–98. pmid:22218295

Drury, M., Conboy, K., & Power, K. (2012). Obstacles to decision making in Agile software development teams. Journal of Systems and Software, 85:6. Pp 1239 – 1254.

Egelman S, Peer E. Scaling the security wall: developing a security behavior intentions scale (SeBIS). Proceedings of the ACM Conference on Human Factors in Computing Systems, Seoul; 2015, pp. 2873–82.

Ekman, P. (1985). Telling Lies: Clues to Deceit in the Marketplace, Politics, and Marriage. W. W. Norton & Company. ISBN 0-393-32188-6

Ekman, P. (2003). Emotions Revealed: Recognizing Faces and Feelings to Improve Communication and Emotional Life. Times Books. ISBN 0-8050-7516-X

Ellsberg, Daniel (1961). Risk, Ambiguity, and the Savage Axioms. Quarterly Journal of Economics. 75 (4): 643–669. doi:10.2307/1884324. JSTOR 1884324.

Engel, J.F., Blackwell, R.D., and Miniard, P.W. Consumer Behavior. New York: Dryden Press, 1986.

Everett, C. (2009). Cloud computing–A question of trust. Computer Fraud & Security, 2009(6), 5–7. doi:10.1016/S1361-3723(09)70071-5

Eysenck, H. J. & Eysenck, Sybil B. G.  (1976).  Psychoticism as a dimension of personality.  London:  Hodder and Stoughton

Festinger, L., & Carlsmith, J. M. (1959). Cognitive consequences of forced compliance. The Journal of Abnormal and Social Psychology, 58(2), 203-210.

Festinger, L., Riecken, H. W., & Schachter, S. (1956). When prophecy fails. When Prophecy Fails: A Social and Psychological Study of a Modern Group that Predicted the Destruction of the World Minneapolis, MN, US: University of Minnesota Press. http://dx.doi.org/10.1037/10030-000

Figliola, P. M., & Fischer, E. A. (2015). Overview and issues for implementation of the federal cloud computing initiative: Implications for federal information technology reform management. Washington, DC: U.S. Library of Congress Congressional Research Service.

Fishbein Martin, and Icek Ajzen. Belief, Attitude, Intention and Behavior: An Introduction to Theory and Research. California: Addison-Wesley, 1975.

Ford, D., & Whaley, G. (2012). Examining collegiality and social justice in academia and the private sector: an exploratory SYMLOG analysis. NMIMS Management Review, 22, 9-36.

Forrester, J. W. (1971) Counterintuitive behavior of social systems. Technology Review.

Forsyth, T., & Johnson, C. (2014). Elinor Ostrom's Legacy: Governing the Commons and the Rational Choice Controversy. Development and Change, 45, 1093-1110. doi:10.1111/dech.12110

Frankl, V. E. (2006). Man's search for meaning. Boston: Beacon Press.

Freud, S. (1920). A general introduction to psychoanalysis. New York, NY, US: Horace Liveright.

Freud, S., & Strachey, J. (1965). The interpretation of dreams. New York: Avon Books

Frey, C. (2013). Perception of success in information technology projects from the perspective of the project manager (Doctoral dissertation, Order No. 3590336, 1431540451, Capella University, Minneapolis, Minnesota).

Frijda, N. H. (2007). The laws of emotion. Mahwah, NJ, US: Lawrence Erlbaum Associates Publishers.

Furnell, S., & Thomson, K.-L. (2009). Recognising and addressing “security fatigue.” Computer Fraud & Security, 2009(11), 7–11. https://doi.org/10.1016/S1361-3723(09)70139-3

Furnham, A., & Cheng, H. (2016). Childhood intelligence predicts adult trait openness: Psychological and demographic indicators. Journal of Individual Differences, 37(2), 105-111. http://dx.doi.org/10.1027/1614-0001/a000194

Future Proofing: Take Your Cybersecurity Confidence to the Next Level. (2018, February 01). Retrieved from https://www.healthcareitnews.com/infographic/future-proofing-take-your-cybersecurity-confidence-next-level

Gashami, J. P. G., Chang, Y., Rho, J. J., & Park, M. C. (2016). Privacy concerns and benefits in SaaS adoption by individual users: A trade-off approach. Information Development, 32(4), 837–852. https://doi.org/10.1177/0266666915571428

Gazdar, G. (1979). Pragmatics: Implicature, Presupposition, and Logical Form. Academic Press, New York.

Giddens, A. The Constitution of Society, Polity Press, Cambridge, UK, 1984.

Gilovich, T. D.; Griffin, D.; Kahneman, D. (2002). "Heuristics and Biases: The Psychology of Intuitive Judgment". New York, NY: Cambridge University Press.

Godlove, T. (2012). Examination of the factors that influence teleworkers’ willingness to comply with information security guidelines. Information Security Journal: A Global Perspective,21, 216–229

Goffman, E. (1959). The presentation of self in everyday life. Garden City, N.Y. Doubleday,

Gold, J. (2012). Protection in the cloud: Risk management and insurance for cloud computing. Journal of Internet Law, 15(12), 1–28.

Gómez-Pinilla F. (2008). Brain foods: the effects of nutrients on brain function. Nature reviews. Neuroscience, 9(7), 568-78.

Gonzalez, J.J. and Sawicka, A., 2002. A framework for human factors in information security. In: Proceedings of the 2002 WSEAS International Conference on Information Security (ICIS’02), Rio de Janeiro.

Gratian, M., & Bandi, S., & Cukier, M., & Dykstra, J., & Ginther, A. (2017). Correlating Human Traits and Cybersecurity Behavior Intentions. Computers & Security. 73. 345–358. 10.1016/j.cose.2017.11.015.

Griffiths, J. (2019, January 10). When Chinese hackers declared war on the rest of us. Retrieved from https://www.technologyreview.com/s/612638/when-chinese-hackers-declared-war-on-the-rest-of-us/

Guba, R. (2008). Engineering human security. Risk Management, 55(12), 58–60.

Guilford, J.P. (1967). The nature of human intelligence. New York, NY, US: McGraw-Hill.

Guthrie, E. R. (1946). Psychological Facts and Psychological Theory., "Psychological Bulletin" Vol. 43, 1-20

Gulenko, I. (2013). Social against social engineering: Concept and development of a Facebook application to raise security and risk awareness. Information Management & Computer Security, 21(2), 91–101.https://doi.org/http://dx.doi.org/10.1108/IMCS-09-2012-0053

Gunawardena, C.N., Zittle, F.J. (1997). Social pressure as a predictor of satisfaction within a computer-mediated conferencing environment. American Journal of Distance Education, 11(3), 8-26.

Gutman, J. A means-end chain model based on consumer categorization processes. Journal of Marketing, (1982), 46 (2), 60-72.

Gutman, J. (1997). Means-end chains as goal hierarchies. Psychology & Marketing, 14, 545-560. Bowers, G.H., Black, J.B., & Turner, T.J. (1979).

Hadyn, I., Teare, R., Scheuing, E., & Armistead, C. (1997). A systems model of effective teamwork. The TQM Magazine, 9, 118 -127. doi:10.1108/09544789710165563

Hammack, S., & Cooper, M., & Lezak, K. (2011). Overlapping neurobiology of learned helplessness and conditioned defeat: Implications for PTSD and mood disorders. Neuropharmacology. 62. 565-75. 10.1016/j.neuropharm.2011.02.024.

Haney, J., & Lutters, W. (2017). The Work of Cybersecurity Advocates. 1663-1670. 10.1145/3027063.3053134.

Haney, J., & Lutters, W. (2018). It's Scary…It's Confusing…It's Dull: How Cybersecurity Advocates Overcome Negative Perceptions of Security. Proceedings of the Fourteenth Symposium on Usable Privacy and Security, Retrieved from https://www.usenix.org/system/files/conference/soups2018/soups2018-haney-perceptions.pdf

Hardwick, J., Anderson, A. R., & Cruickshank, D. (2013). Trust formation processes in innovative collaborations. European Journal of Innovation Management, 16(1), 4-21. doi:10.1108/14601061311292832

Harnesk, D., & Lindström, J. (2011). Shaping security behaviour through discipline and agility implications for information security management. Information Management and Computer Security, 19(4), 262–276. doi:10.1108/09685221111173076

Harper, A. A. (2016). The impact of consumer security awareness on adopting the internet of things: A correlational study (Order No. 10196140). Available from ProQuest Dissertations & Theses Global. (1853097232).

Hebb. D.O (1949). The Organization of Behavior. Wiley: New York;

Hedström, K., Karlsson, F., & Kolkowska, E. (2013). Social action theory for understanding information security non-compliance in hospitals: The importance of user rationale. Information Management & Computer Security, 21(4), 266–287. doi: 10.1108/IMCS-082012-0043

Hedström, K., Kolkowska, E., Karlsson, F., & Allen, J. P. (2011). Value conflicts for information security management. The Journal of Strategic Information Systems, 20(4), 373–384. https://doi.org/10.1016/j.jsis.2011.06.001

Heffer, V. (n.d.) Personality Theory: An Introduction. Retrieved from https://allpsych.com/personalitysynopsis

Heinrich H. (1931). Industrial accident prevention: a scientific approach. McGraw-Hill. OCLC 571338960.
quoted in Hollnagel, Erik (2009). Safer Complex Industrial Environments: A Human Factors Approach. CRC Press. ISBN 1-4200-9248-0.

Henrich, J., Heine, S., & Norenzayan, A. (2010). The weirdest people in the world? Behavioral and Brain Sciences, 33(2-3), 61-83. doi:10.1017/S0140525X0999152X

Heylighen, F., Heath, M., & Van Overwalle, F. (2003). The emergence of distributed cognition: A conceptual framework. Retrieved from https://www.researchgate.net/publication/249812898_The_Emergence_of_Distributed_Cognition_conceptuaframework

Hilgard, E. R., & Bower, G. H. (1966). Theories of learning: [by] Ernest R. Hilgard [and] Gordon H. Bower. New York: Appleton-Century-Crofts.

Horne, Craig & Ahmad, Atif & Maynard, Sean. (2016). A Theory on Information Security. The 27th Australasian Conference on Information Systems, At Wollongong, Australia

Hulme, G. V., & Goodchild, J. (2017, August 03). What is social engineering? How criminals take advantage of human behavior. Retrieved from https://www.csoonline.com/article/2124681/social-engineering/what-is-social-engineering.html

Hungwei, T., & Heng-Yu, K. (2011). The relationships between trust, performance, satisfaction, and development progressions among virtual teams. Quarterly Review of Distance Education, 12(2), 81-94. Retrieved from http://www.infoagepub.com/quarterly-review-of-distance-education.html

Hull, Clark L. (1932). The goal-gradient hypothesis and maze learning. Psychological Review. 39 (1): 25.

Iasiello, E. (2014). Is cyber deterrence an illusory course of action? Journal of Strategic Security, 7(1), 54-67. doi:10.5038/1944-0472.7.1.5

Iivari, J., Hirschheim, R., and Klein, H. K. (2000). A Dynamic Framework for Classifying Information Systems Development Methodologies and Approaches. Journal of Management Information Systems (17:3), 2000, pp. 179-218

Islam, S., Ouedraogo, M., Kalloniatis, C., Mouratidis, H., & Gritzalis, S. (2015). Assurance of security and privacy requirements for cloud deployment model. IEEE Transactions on Cloud Computing, 181.doi:10.1109/TCC.2015.2511719

ISO/IEC 27032:2012 (2012). Information technology - Security techniques - Guidelines for cybersecurity. Retrieved from http://www.iso27001security.com/html/27032.htm

Iulia, I., Reeder, R., & Consolvo, S. (2015). ... no one can hack my mind: comparing expert and non-expert security practices. In Proceedings of the Symposium on Usable Privacy and Security (SOUPS’15), 327-346.

Jarvenpaa, S. L., & Leidner, D. E. (2006). Communication and Trust in Global Virtual Teams. Journal of Computer-Mediated Communication, 3(4), 0-0. doi:10.1111/j.1083-6101.1998.tb00080.x

Ji-Hwan, L., & Chi-Hoon, S. (2013). Effects of trust and perceived risk on user acceptance of a
new technology service. Social Behavior & Personality: An International Journal, 41(4), 587-597. doi:10.2224/sbp.2013.41.4.587

Johnson, P. (2010). Four steps to effective collaboration. Young Adult Library Services, 9(1), 17-19. Retrieved from https://www.questia.com/library/journal/1G1-240588383/four-steps-to-effective-collaboration

Jung, C. G., & Hull, R. F. C. (1980). The archetypes and the collective unconscious. Princeton, N.J.: Princeton University Press.

Kahneman, D., Tversky, A. (1973). On the Psychology of Prediction. Psychological Review. 80 (4): 237–251. doi:10.1037/h0034747.

Kahneman, D.; Tversky, A. (1979). "Prospect Theory: An Analysis of Decision under Risk. Econometrica. 47 (2): 263. doi:10.2307/1914185. ISSN 0012-9682.

Karis, D., Wildman, D., & Mané, A. (2014). Improving Remote Collaboration with Video Conferencing and Video Portals. Human–Computer Interaction, 31(1), 1-58. doi:10.1080/07370024.2014.921506

Kett, H., Kasper, H., Falkner, J., & Weisbecker, A. (2012). Trust factors for the usage of cloud computing in small and medium sized craft enterprises. In International Conference on Grid Economics and Business Models (pp. 169–181). Berlin: Springer.

Khan, K. M., & Malluhi, Q. (2010). Establishing trust in cloud computing. IT Professional Magazine, 12(5), 20-27. doi: http://dx.doi.org/10.1109/mitp.2010.128

Kim, D. and Hall, J. K. (2002), The Role of an Interactive Book Reading Program in the Development of Second Language Pragmatic Competence. The Modern Language Journal, 86: 332-348. doi:10.1111/1540-4781.00153

Kohler, W. (1947). Gestalt psychology (2nd ed.). Oxford, England: Liveright.

Köhler, W. (1948). The mentality of apes, 1917. In W. Dennis (Ed.), Century psychology series. Readings in the history of psychology (pp. 497-505). East Norwalk, CT, US: Appleton-Century-Crofts. http://dx.doi.org/10.1037/11304-054

Koman, V. P. (2016). Age and the acceptance and use of cyber-security: A quantitative survey of U.S. baby boomer mobile-device security practices (Order No. 10075464). Available from ProQuest Dissertations & Theses Global. (1777347121).

Kozlowski, S. W., & Ilgen, D. R. (2006). Enhancing the Effectiveness of Work Groups and Teams. Psychological Science in the Public Interest, 7(3), 77-124. doi:10.1111/j.1529-1006.2006.00030.x

Kray, L.J. & Thompson, L & Galinsky, A. (2001). Battle of the sexes: Gender stereotype confirmation and reactance in negotiations. Journal of Personality and Social Psychology. 80. 942-958. 10.1037/0022-3514.80.6.942.

Krefting, L. (1991). Rigor in qualitative research: The assessment of trustworthiness. American Journal of Occupational Therapy, 45, 214-222

Kruger, J., David, D. (1999). Unskilled and Unaware of It: How Difficulties in Recognizing One's Own Incompetence Lead to Inflated Self-Assessments. Journal of Personality and Social Psychology. American Psychological Association. 77 (6): 1121–1134.

Kuei-Hu, C. Security threat assessment of an internet security system using attack tree and vague sets, 2014.

Kuo, Z. Y. (1930). The genesis of the cat's responses to the rat. Journal of Comparative Psychology, 11(1), 1.

Kuo, Z.Y. (1938). Further study of the behavior of the cat toward the rat. Journal of Comparative Psychology, Vol 25(1), Feb 1938, 1-8

Lacey, D. (2009). Managing the human factor in information security: how to win over staff and influence business managers. West Sussex, UK: Wiley & Sons.

Leavitt, C. C. (2015). The protege learning experience in virtual mentoring: What is learned, how the learning occurs, and assisting and hindering factors (Order No. 3682581).

Lebek, B., Uffen, J., Neumann, M., Hohler, B., & Breitner, M. H. (2014). Information security awareness and behavior: a theory-based literature review. Management Research Review,
37(12), 1049–1092. doi: 10.1108/MRR-04-2013-0085

Leistert, O. (2012). Resistance against cyber-surveillance within social movements and how surveillance adapts. Surveillance & Society, 9(4), 441-456.http://library.queensu.ca/ojs/index.php/surveillance-andsociety/ article/view/cyber_resist/cyber_resist

Lewin, K. (1951). Field theory in social science: selected theoretical papers (Edited by Dorwin Cartwright.). Oxford, England: Harpers.

Lineberry, S. (2007). The human element: the weakest link in information security. Journal of Accountancy, 204, 44–46, 49. Retrieved from ttps://www.journalofaccountancy.com/issues/2007/nov/thehumanelementtheweakestlinkininformationsecurity.html

Limayem, M., Hirt, S. G., & Cheung, C. K. (2007). How habit limits the predictive power of intention: The case of information systems continuance. MIS Quarterly, 31(4), 705-737.

Liu, C. (2015). Types of employee perceptions of information security using Q methodology: An
empirical study. International Journal of Business and Information, 10(4), 557–575

Lorenz, K. (1937). On the formation of the concept of instinct. Natural Sciences, 25(19), 289-300.

Loftus., E. (1979) Eyewitness Testimony. Cambridge, MA: Harvard University Press

Loftus., E. (1999) Lost in the Mall: Misrepresentations and Misunderstandings. Ethics & Behavior, 9(1) 51-60.

Luftman, J. (2000). Assessing business-IT alignment maturity. Communications of the Association for Information Systems, 4(14), 1-51. Retrieved from http://aisel.aisnet.org/cais/vol4/iss1/14/

Lupyan, G. 2013. The difficulties of executing simple algorithms: Why brains make mistakes computers don’t. Cognition 129(3). 615–636.

Madden, T. J., Ellen, P. S., & Ajzen, I. (1992). A comparison of the theory of planned behavior and the theory of reasoned action. Personality and Social Psychology Bulletin, 18(1), 3–9. https://doi.org/10.1177/0146167292181001

Maier, S. F.; Seligman, M. E. P. Learned Helplessness: Theory and Evidence. Journal of Experimental Psychology: General, 105, 1, 3-46, Mar 76

Markus, M., Majchrzak, L. A., and Gasser, L. (2002). A Design Theory for Systems that Support Emergent Knowledge Processes, MIS Quarterly (26:3), 2002, pp. 179-212.

Maslow, A.H. (1943). A theory of human motivation. Psychological Review. 50 (4): 370–96

Matulessy, A., & Humaira, N. (2016). Hacker Personality Profiles Reviewed in Terms of the Big Five Personality Traits. Psychology and Behavioral Sciences. Vol. 5, No. 6, 2016, pp. 137-142. doi: 10.11648/j.pbs.20160506.12

McClelland, D.C. (1987). Human motivation. New York: University of Cambridge.

McNeese, M., Mancuso, V., McNeese, N., Endsley, T., & Forster, P. (2013). Using the living laboratory framework as a basis for understanding next-generation analyst work. Paper presented at the SPIE Defense, Security, and Sensing, Baltimore, Maryland.

Meki Kombe, C. L., & Herman, C. (2017). Can education innovations be sustained after the end of donor funding? The case of a reading intervention programme in Zambia. Educational Review, 69(5), 533-553. doi:10.1080/00131911.2016.1265917

Mell, P. M., & Grance, T. (2011). SP 800-145. The NIST definition of cloud computing. Gaithersburg, MD: National Institute of Standards & Technology.

Michaelidis. G. (2018). The Road to Cybersecurity Is Paved With “Extraordinarily Basic Things”. Behavioral Scientist. Retrieved from http://behavioralscientist.org/the-road-to-cybersecurity-is-paved-with-extraordinarily-basic-things/

Mikton, J. (2015). The Internet of Things: Ethics of our connectivity. The International Schools Journal, 35(1), 56.

Milgram, S. (1963). Behavioral Study of obedience. The Journal of Abnormal and Social Psychology, 67(4), 371-378.

Milgram, S. (1974). Obedience to authority: An experimental view. New York: Harper & Row.

Miller, G. A. (1956). The magical number seven, plus or minus two: some limits on our capacity for processing information. Psychological Review, 63(2), 81-97. http://dx.doi.org/10.1037/h0043158

Miller, N. E. (1967).  Laws of learning relevant to its biological basis.  Proceedings of the American Philosophical Society, 111, 315-325.

Mischel, W., Ebbesen, E. B., & Raskoff Zeiss, A. (1972). Cognitive and attentional mechanisms in delay of gratification. Journal of Personality and Social Psychology, 21(2), 204-218. http://dx.doi.org/10.1037/h0032198

Mischel, W., & Ayduk, O. (2004). Willpower in a cognitive-affective processing system: The dynamics of delay of gratification. In R.F. Baumeister & K.D. Vohs (Eds.), Handbook of Self-Regulation: Research, Theory, and Applications (pp. 99–129). New York: Guilford.

Mohapatra, S. (2017). Cloud computing relationships between deployments model selection and it security (Order No. 10255126). Available from ProQuest Dissertations & Theses Global. (1876037344
Moore, G. E. “Cramming More Components onto Integrated Circuits,” Electronics (38:8), 1965, pp. 114-117.

Moscovici, S. & Duveen, G. & Macey, D. (2008). Psychoanalysis : its image and its public. Polity, Cambridge  Malden, MA

Munger, C. (1994).  A Lesson on Elementary, Worldly Wisdom as It Relates to Investment Management & Business. USC Business School, Retrieved from https://old.ycombinator.com/munger.html

Myerson, R. B. (1991). Game Theory: Analysis of Conflict. Harvard University Press, 1, vii–xi

National Science and Technology Council. 2016 Federal Cybersecurity Research and Development Strategic Plan. ENSURING PROSPERITY AND NATIONAL SECURITY Retrieved from https://www.nitrd.gov/cybersecurity/

Nevin, J.. (1999). Analyzing Thorndike's Law Of Effect: The Question Of Stimulus-response Bonds. Journal of the experimental analysis of behavior. 72. 447-50. 10.1901/jeab.1999.72-447.

Nicholas, R., (1989). Cognitive Economy: The Economic Dimension of the Theory of Knowledge_. University of Pittsburgh Press.

O'Donnell, E., Arnold, V., & Sutton, S. G. (2000). An analysis of the group dynamics surrounding internal control assessment in information systems audit and assurance domains. Journal of Information Systems, 14(1), 97.

Oppenheimer, Daniel. (2012). Hard-to-Read Fonts Promote Better Recall. Harvard business review. 90. 32-3.

Orlikowski, W. J. (1992). The Duality of Technology: Rethinking the Concept of Technology in Organizations, Organization Science (3:3), 1992, pp. 398-427.

Oye, N. D., Aiahad, N., & Abrahim, N. (2014). The history of UTAUT model and its impact on ICT acceptance and usage by academicians. Education and Information Technologies, 19(1), 251–270. https://doi.org/http://dx.doi.org/10.1007/s10639- 012-9189-9

Öztürk, V. (2013). Selection of appropriate software development life cycle using fuzzy logic. Journal of Intelligent & Fuzzy Systems, 25(3), 797-810. doi:10.3233/IFS-120686

Parker, D. B., Swope, S., AND BAKER, B. N. Ethical conflicts in information and computer science, technology, and business.

Pavlov, I. P. (1927). Conditioned reflexes: an investigation of the physiological activity of the cerebral cortex. Oxford, England: Oxford Univ. Press.

Perls, F. S., & Andreas, S. (1969). Gestalt therapy verbatim. Lafayette, Calif.: Real People Press.

Perls, F. S., & Perls, F. S. (1973). The gestalt approach & Eye witness to therapy. Ben Lomond, Calif.: Science & Behavior Books.

Perry, S. (2001). Writing in Flow: Keys to Enhanced Creativity. Writer's Digest Books

Pfleeger, S. L., & Caputo, D. D. (2012). Leveraging behavioral science to mitigate cyber security risk. Computers & Security, 31(4), 597–611

Pinker, S. (1999). How the mind works. New York: W.W. Norton.

Pinyol, I., & Sabater-mir, J. (2013). Computational trust and reputation models for open multi-agent systems: a review. The Artificial Intelligence Review, 40(1), 1-25.doi: 10.1007/s10462-011-9277-z

Plous, S. (1993). The psychology of judgment and decision making. McGraw-Hill. ISBN 978-0-07-050477-6.

Putra, S. J., Subiyakto, A., Kartiwi, M., & Ahlan, A. R. (2016). Measurement of the information system project success of the higher education institutions in Indonesia: a pilot study. International Journal of Business Information Systems, 23, 229. doi:10.1504/ijbis.2016.10000261

Rabai, L. B. A., Jouini, M., Aissa, A. B., & Mili, A. (2012). A cybersecurity model in cloud computing environments. Journal of King Saud University-Computer and Information Sciences, 25(1), 63–75. https://doi.org/10.1016/j.jksuci.2012.06.002

Raza, N., Rashid, I., & Awan, F. A. (2017). Security and management framework for an organization operating in cloud environment. Annals of Telecommunications, 72(5-6), 325-333.

Rehman, M., Esichaikul, V., & Kamal, M. (2012). Factors influencing e-government adoption in Pakistan. Transforming Government: People, Process and Policy, 6(3), 258–282. https://doi.org/http://dx.doi.org/10.1108/17506161211251263

Reynolds, T.J., Gutman, J. Laddering theory, method, analysis and interpretation. Journal of Marketing, 28 (1), (1988), 11-31
Richardson, K. (2019. It's the End of the Gene as We Know It. Nautilus. Issue 68. Retrieved from http://nautil.us/issue/68/context/its-the-end-of-the-gene-as-we-know-it

Rogers, Carl. (1961). On Becoming a Person: A Therapist's View of Psychotherapy. London: Constable

Rogers, E. M. (1995). Diffusion of innovations. New York, NY: Free Press.

Rogers, E. M., & Shoemaker, F. (1983). Diffusion of innovation: A cross-cultural approach. New York, NY: Free Press.

Romero, E., Cruthirds. K.  (May 2006). The Use of Humor in the Workplace. Academy of Management Perspectives. 20 (2): 58–69

Rosenhan, D.L. (1973). On Being Sane in Insane Places. Science. American Association for the Advancement of Science. 179 (4070): 250–258.

Rosch, E. (1975). Cognitive representations of semantic categories. Journal of Experimental Psychology: General, 104, 192-233.

Rosch, E. (1978). Principles of categorization. In E. Rosch & B. B. Lloyd (Eds.), Cognition and categorization. Hillsdale, NJ: Erlbaum. Reprinted in: Margolis, E. and Laurence, S. (Eds.) (1999). Concepts: Core readings. Cambridge, MA: MIT Press

Rousseau, D. M. (1989). Psychological and implied contracts in organizations. Employee Responsibilities & Rights Journal, 2(2), 121-139. doi:10.1007/bf01384942

Ruffin, V. A., Salameh, A. I., Boron, W. F., & Parker, M. D. (2014). Intracellular pH regulation by acid-base transporters in mammalian neurons. Frontiers in physiology, 5, 43. doi:10.3389/fphys.2014.00043

Salkovskis., P., M. (1999) Understanding and treating obsessive compulsive disorder. Behaviour Research and Therapy, 37, S29-S52.

Saltzer, E. B. (1981). Cognitive moderators of the relationship between behavioral intentions and behavior. Journal of Personality and Social Psychology, 41(2), 260-271. doi:10.1037/0022-3514.41.2.260

Schacter, D.. L. (2001) The Seven Sins of Memory: How the Mind Forgets and Remembers. Houghton Mifflin Harcourt

Schmitt, D., & Allik, J., & R., McCrae, & Benet, V., & Alcalay, L., & Ault, L., & Austers, I., & Bennett, K., & Bianchi, G., & Boholst, F., & Ann Borg. C., & Braeckman, J., & G. Brainerd Jr, E., & Caral, L., & Caron, G., & Martina C., & Cunningham, M., & Daibo, I., & de backer, C., & Zupanèiè, A. (2007). The geographic distribution of Big Five personality traits: Patterns and profiles of human self-description across 56 nations. Journal of Cross-Cultural Psychology. 38. 173-212.

Schuessler, J. H. (2009). General deterrence theory: Assessing information systems security effectiveness in large versus small businesses (Doctoral dissertation). Retrieved from http://nsl.cse.unt.edu/~dantu/cae/attachments

Seligman, M. E. P. (1975). A series of books in psychology. Helplessness: On depression, development, and death. New York, NY, US: W H Freeman/Times Books/ Henry Holt & Co.

Semon, R. (1921). The Mneme. London: George Allen & Unwin.

Shepard, R.N. (1987). Toward a universal law of generalization for psychological science. Science, 237 4820, 1317-23.

Shinder, D. Ethical issues for Information Technology security professionals. https://www.computerworld.com/article/2557944/security0/ethical-issues-for-IT-security-professionals.html.

Schneider, S., & Sunyaev, A. (2016). Determinant factors of cloud-sourcing decisions: Reflecting on the IT outsourcing literature in the era of cloud computing. Journal of Information Technology, 31(1), 1–31. https://doi.org/10.1057/jit.2014.25

Shiva, S & Roy, Sankardas & Dasgupta, D. (2010). Game theory for cyber security. 10.1145/1852666.1852704.

Skinner, B. F. (1938). The behavior of organisms: an experimental analysis. Oxford, England: Appleton-Century.

Skinner, B. F. (1990). The behavior of organisms: An experimental analysis. BF Skinner Foundation.

Spinello, R. A. (2011). Cyberethics: Morality and law in cyberspace. Sudbury, MA: Jones and Bartlett.

Stahl, B., Doherty, N., Shaw, M., & Janicke, H. (2014). Critical Theory as an Approach to the Ethics of Information Security. Science & Engineering Ethics, 20(3), 675-699.

Stanton, J. M., & Fagnot, I. J. (2006). Extracting useful information from security assessment interviews. In Proceedings of the 39th Annual Hawaii International Conference on Systems Sciences, 2006.

Stewart, D. W., & Shamdasani, P. N. (2015). Focus groups: Theory and practice (2nd ed.). Thousand Oaks, CA: Sage Publications Inc.

Stroop, J. R. (1935). Studies of interference in serial verbal reactions. Journal of Experimental Psychology, 18(6), 643-662. http://dx.doi.org/10.1037/h0054651

Sun, D., Chang, G., Sun, L., & Wang, X. (2011). Surveying and analyzing security, privacy and trust issues in cloud computing environments. Procedia Engineering, 15, 2852–2856. https://doi.org/10.1016/j.proeng.2011.08.537

Sundararajan, S., Vijayaraghavan, P. K., & Bhasi, M. (2014). Case study on risk management practice in large offshore-outsourced Agile software projects. IET Software, 8(6), 245-257. doi:10.1049/iet-sen.2013.0190

Svantesson, D., & Clarke, R. (2010). Privacy and consumer risks in cloud computing, Computer Law & Security Review, 26(4), 391–397. https://doi.org/10.1016/j.clsr.2010.05.005

Tadda G.P., Salerno J.S. (2010) Overview of Cyber Situation Awareness. In: Jajodia S., Liu P., Swarup V., Wang C. (eds) Cyber Situational Awareness. Advances in Information Security, vol 46. Springer, Boston, MA

Tashi, I., & Ghernaouti-Hélie, S. (2009, March). A Security Management Assurance Model to Holistically Assess the Information Security Posture. In 2009 International Conference on Availability, Reliability and Security, 756-761.

Taylor, S., & Todd, P. (1995). Assessing IT usage: The role of prior experience. MIS Quarterly, 561-570.

Thigpen, C. H., & Cleckley, H. M. (1957). The three faces of Eve. New York, NY, US: McGraw-Hill.

Thompson, R. L., Higgins, C. A., & Howell, J. M. (1991). Personal computing: Toward a conceptual model of utilization. MIS Quarterly, 15(1), 125–143. doi:10.2307/249443

Thorndike, E. L., Bregman, E. O., Cobb, M. V., Woodyard, E., & Inst of Educational Research Div. of Psychology, Teachers Coll, Columbia U. (1926). The measurement of intelligence. New York, NY, US: Teachers College Bureau of Publications. http://dx.doi.org/10.1037/11240-000

Tolman, E. C. (1932). Purposive behavior in animals and men. London, England: Century/Random House UK.

Tolman, E. C. (1948). Cognitive maps in rats and men. Psychological Review, 55(4), 189-208.
http://dx.doi.org/10.1037/h0061626

Tulving, E. (1972). Episodic and semantic memory. In E. Tulving & W. Donaldson, Organization of memory. Oxford, England: Academic Press.

Tulving, E. (1985). Memory and consciousness. Canadian Psychology/Psychologie canadienne, 26(1), 1-12.
http://dx.doi.org/10.1037/h0080017

Turban, E., and Aronson, J. Decision Support Systems and Intelligent Systems, Prentice-Hall, Upper Saddle River, NJ, 2001

Tversky, A., Kahneman, D. (1974). Judgment under uncertainty: Heuristics and biases. Science. 185 (4157): 1124–1131. doi:10.1126/science.185.4157.1124.

Tversky, A., Kahneman, D. (1981). The Framing of decisions and the psychology of choice. Science. 211 (4481): 453–58.

van der Heijden, H. (2004). User acceptance of hedonic information systems. MIS Quarterly, 28(4), 695-704.

Van Rijnsoever, F. J. (2017). (I Can’t Get No) Saturation: A simulation and guidelines for sample sizes in qualitative research. PLOS ONE, 12, e0181689. doi:10.1371/journal.pone.0181689

Vann, J. (2018, December 27). Survey: Maritime industry cybersecurity confidence is mixed. Cybersecurity column. Retrieved from https://pilotonline.com/inside-business/news/columns/article_4d2e7f20-07a7-11e9-bc70-b384a379f1ec.html

Velazquez, M. O. (2014). Trust in the Cloud: A cognitive-behavioral framework of technology adoption for cloud computing in organizations (Doctoral dissertation, Universidad del Turabo (Puerto Rico)).

Venkatesh, V. (2000). Determinants of perceived ease of use: Integrating control, intrinsic motivation, and emotion into the technology acceptance model. Information Systems Research, 11(4), 342–365. doi:10.1287/isre.11.4.342.11872

Venkatesh, V., Morris, M. G., Davis, G. B., & Davis, F. D. (2003). User acceptance of information technology: Toward a unified view. MIS Quarterly, 27(3), 425–478. doi:10.2307/30036540

Von Bertalanffy, L. General System Theory (Rev. ed.), George Braziller, New York, 1973.

von Solms, Rossouw & van Niekerk, Johan. (2013). From information security to cyber security. Computers & Security. 38. 97-102. 10.1016/j.cose.2013.04.004.

Warfield, D. (2011). The perceptions of U.S.-Based IT security professionals about the effectiveness of IT security frameworks: A quantitative study (Doctoral dissertation). Retrieved from ProQuest Dissertations and Theses (UMI No. 3450639).

Watson, J. B. (1994). Psychology as the Behaviorist Views It... Psychological Review. 101. 248-. 10.1037/0033-295X.101.2.248.

Watson, J. B. & Rosalie. R. (1920). Conditioned Emotional Reactions. Journal of Experimental Psychology. 3. 1-14. 10.1037/h0069608

Wakunuma, K. J., & Stahl, B. C. (2014). Tomorrow’s ethics and today's response: An investigation into the ways information systems professionals perceive and address emerging ethical issues. Information Systems Frontiers, 16(3), 383–397. https://doi.org/http://dx.doi.org/10.1007/s10796-014-9490-9

Wei, June. (2010). Knowledge management framework for cyber security learning. International Journal of Management in Education. 4. 10.1504/IJMIE.2010.029884.

Wener, P., & Woodgate, R. L. (2013). Use of a qualitative methodological scaffolding process to design robust interprofessional studies. Journal of Interprofessional Care, 27, 305-312. doi:10.3109/13561820.2013.763775

Vieane, A., Funke, G., Gutzwiller, R., Mancuso, V., Sawyer, B., & Wickens, C. (2016). Addressing human factors gaps in cyber defense. Proceedings of the Human Factors and Ergonomics Society. 60, 770-773. doi:10.1177/1541931213601176

Winnie, P.-M. W. (2014). The impact of trustworthiness and customer e-loyalty and e-satisfaction. International Journal of Academic Research in Business and Social Sciences, 4(3). https://doi.org/10.6007/IJARBSS/v4-i3/718

White, G. L., Hewitt, B., & Kruck, S. E. (2013). Incorporating Global Information Security and Assurance in I.S. Education. Journal of Information Systems Education, 24(1), 11-16.

Wilson, M. P., Benedict, J. A., Snow, G., & Havercamp, M. (2010). Team development and beyond. Journal of Extension, 48(5). Retrieved from https://www.joe.org/

Wingfield, J. C., Maney, D. L., Breuner, C. W., Jacobs, J. D., Lynn, S., Ramenofsky, M., et al. (1998). Ecological bases of hormone–behavior interactions: The “Emergency Life History Stage”. Amer. Zool. 38, 191–206. doi: 10.1093/icb/38.1.191

Whitty, M., Doodson, J., Creese, S., & Hodges, D. (2015). Individual differences in cyber security behaviors: an examination of who is sharing passwords. Cyberpsychology, behavior and social networking, 18(1), 3-7.

Wogalter, M.S., Brelsford, J.W., Desaulniers, D.R., and Laughery, K.R., 1991. Consumer product warnings. The role of hazard perception. Journal of Safety Research, 22, 71.

Wohl, M., & A. Pychyl, T., & H. Bennett, S., (2010). I forgive myself, now I can study: How self-forgiveness for procrastinating can reduce future procrastination. Personality and Individual Differences. 48. 803-808. 10.1016/j.paid.2010.01.029.

Woodcock, M. (2017). Team development manual (2nd ed.). New York, NY: Routledge.

Woody, E. Z., & Szechtman, H. (2013). A biological security motivation system for potential threats: are there implications for policy-making? Frontiers in human neuroscience, 7, 556. doi:10.3389/fnhum.2013.00556

Zafar, H. & Clark, J. G. (2009). Current State of Information Security Research in IS. Communications of the Association for Information Systems, 24(34).

Zajonc, R. B. (1968). Attitudinal Effects of Mere Exposure. Journal of Personality and Social Psychology. 9 (2, Pt.2): 1–27. doi:10.1037/h0025848. ISSN 1939-1315.

Zajonc, R.B. (February 1980). "Feeling and thinking: Preferences need no inferences". American Psychologist. 35 (2): 151–175. doi:10.1037/0003-066x.35.2.151.

Zeigarnik, B. (1938). On finished and unfinished tasks. In W. D. Ellis (Ed.), A source book of Gestalt psychology (pp. 300-314). London, England: Kegan Paul, Trench, Trubner & Company. http://dx.doi.org/10.1037/11496-025

Zhu, B., Joseph, A., & Sastry, S. (2011, October). A taxonomy of cyberattacks on SCADA systems. In Internet of things (iThings/CPSCom), 2011 international conference on and 4th international conference on cyber, physical and social computing, 380-388.

Ziadeh, Z. (2018). NSA Cybersecurity Operators Fight Through Stress for National Security, But at What Cost? Retrieved from https://www.governmentciomedia.com/nsa-cybersecurity-operators-fight-through-stress-national-security-what-cost

Zimbardo, P. G. (1972). The Stanford prison experiment: A simulation study of the psychology of imprisonment conducted August 1971 at Stanford University. Stanford, Calif.: Philip G. Zimbardo, Inc.

Zimbardo, P.G. (2007). The Lucifer effect: understanding how good people turn evil. New York: Random House.
Site powered by Weebly. Managed by Bluehost