Below are various theories and models that have been used and can be used in cybersecurity research
Behavioral et. al.
Absorptive capacity Theory
Accountability Theory Activity Theory Adaptive Structuration Theory Administrative Behavior Theory Argumentation Theory Asch Conformity Behavioral Decision Model Belief Action Outcome Framework Chaos Theory Cognitive Fit Theory Cognitive Load Theory Cognitive Behavioral Therapy Classical Conditioning Conditioned Emotional Response Cognitive Dissonance Cognitive “purposive” Behaviorism Consequentialist Ethics Critical Theory Csíkszentmihályi’s Flow Cultural Theory Deontological Ethics Diffusion of Innovations Theory Dynamic Capabilities Distributed Cognitions Theory Embodied social presence theory Equity theory Evolutionary theory Eysenck’s Theory Expectancy-value theory Expectation Confirmation Theory False Memory Syndrome Field Theory Fishbein's Attitude General Deterrence Theory Gestalt Theory of Personality General Strain theory Goal Contagion Theory Gompertz Model (based upon Social Conflict Theory) Grounded Theory Hermeneutics Illusion of Control Impression Management Theory Information Processing Theory Impression Management Theory Information Asymmetry Theory Information Security Management Theory Institutional Theory Integrated Systems Theory Keller's Motivational Model Language action perspective Law of Effect Law of Emotion Learned Helplessness Theory McClelland’s Needs Theory Neutralization Theory Operant Conditioning Mitchel’s Personality theory Prospect Theory Protection Motivation Theory Self Determination Theory Self-Efficacy Theory Social Action Theory Social Conflict Theory Social Cognitive Theory Social Exchange Theory Social Identity Theory Social Influence Theory Social Learning Theory Socio Technical Systems Theory Task Closure Theory Technology Acceptance Model Technology Threat Avoidance Theory Theory of Contextualism Theory of Contiguity Theory of Equipotentiality Theory of Planned Behavior Theory of Protection Motivation Theory of Reasoned Action Theory of Planned Behavior Trait Theory Virtue Ethics Unified theory of acceptance and use of technology (UTAUT) Universal Law of Generalization |
Non-Behavioral
Accountability obfuscation
Actor Network theory Attack Tree and Vague Sets Bayes Theorem Bayesian Inference Bayesian Belief Network Bayesian Networks Boundary Object Theory Broadbent’s Filter Theory Model Complexity Theory Cooperative game theory Conformity Theory Critical Realism Theory Customer Based Discrepancy Theory Customer Focus Theory Deferred Action Theory Design Theory Elaboration Likelihood Model Fit-Viability Theory Flow Theory Game Theory Garbage Can Theory General Systems Theory General Deterrence Theory Hebbian Theory Human Agency Theory Information Warfare Institutional theory International Information Systems Theory Internationalization Theory Information Technology Portfolio Knowledge Management Noncooperative game theory Organization Based Access Control Role-base access control Management (ITPM) model Mere Exposure Effect Multi-attribute Utility Theory Multi-motive Information Systems Continuance Model Organizational culture theory Organizational information processing theory Organizational knowledge creation Organizational learning theory Portfolio theory Process virtualization theory P3P privacy policies Poliheuristic decision theory Privacy-enhancing technologies Retrieval-induced forgetting Social Information Processing Theory Social Learning Theory Social Network Theory Social Penetration Theory Task-technology Fit Model Technology Dominance Theory Technology-Organization-Environment TOE Framework Theory of Information Warfare Transaction Cost Economics Tulving’s Model Zeigarnik Effect |
Ablon, L., & Libicki, M. (2015). Hackers’ bazaar: The markets for cybercrime tools and stolen data. Defense Counsel Journal, 82(2), 143–1
Abu-Al-Aish, A., & Love, S. (2013). Factors influencing students’ acceptance of mlearning: An investigation in higher education. International Review of Research in Open and Distance Learning, 14(5)
Aditya, P., Bhattacharjee, B., Druschel, P., Erdélyi, V., & Lentz, M. (2015). Brave new world: Privacy risks for mobile users. ACM SIGMOBILE Mobile Computing and Communications Review, 18(3), 49–54. https://doi.org/10.1145/2721896.2721907
Adler, A., & Radin, P. (1927). The practice and theory of individual psychology. London: K. Paul, Trench, Trubner & Co.
Ajzen, I. (2002). Perceived behavioral control, self-efficacy, lotus of control, and the theory of planned behavior. Journal of Applied Social Psychology, 32, 1-20.
Ajzen, I., & Fishbein, M. (2005). The influence of attitudes on behavior. In D.Albarracín, B. T. Johnson, & M. P. Zanna (Eds.), The handbook of attitudes (pp.173-221). Mahwah, NJ: Erlbaum
Albrechtsen, E. (2007). A qualitative study of users’ view on information security. Computers &Security, 26, 276–289. doi: 10.1016/j.cose.2006.11.004
Alexander, P. A. (1992). Domain knowledge: Evolving themes and emerging concerns. Educational psychologist, 27(1), 33.
Ali, M., Khan, S. U., & Vasilakos, A. V. (2015). Security in cloud computing: Opportunities and challenges. Information Sciences, 305(2015), 357–383. https://doi.org/10.1016/j.ins.2015.01.025
Alkhater, N., Wills, G., & Walters, R. (2014). Factors influencing an organisation's intention to adopt cloud computing in Saudi Arabia. In 2014 6th International Conference on Cloud Computing Technology and Science (pp. 1040–1044). IEEE.
Alkhunaizan, A., & Love, S. (2012). What drives mobile commerce? An empirical evaluation of the revised UTAUT model. International Journal of Management and Marketing Academy, 2(1), 82–99. doi:10.1016/j.im.2004.07.001
Aljukhadar, M., Senecal, S., & Nantel, J. (2014). Is more always better? Investigating the task-technology fit theory in an online user context. Information & Management, 51(4), 391-397. doi:10.1016/j.im.2013.10.003
Allais, M. (1953). Le Comportement de l'Homme Rationnel devant le Risque: Critique des Postulats et Axiomes de l'Ecole Americaine. (The Rational Man's Behavior in the Face of Risk: Criticism of Postulates and Axioms of the American School). Econometrica, 21(4), 503-546.
Allport, G (1937). Personality: A psychological interpretation. New York: Holt, Rinehart, & Winston.
Allport, G. W. (1961). Pattern and growth in personality (14 print. ed.). New York: Holt, Rinehart and Winston.
Alhogail, A., & Mirza, A. (2014). A framework of information security culture change. Journal of Theoretical and Applied Information Technology, 64(2), 540–549. Retrieved from
www.jatit.org
Allam, S., Flowerday, S. V., & Flowerday, E. (2014). Smartphone information security awareness: A victim of operational pressures. Computers and Security, 42, 56–65. Retrieved from http://dx.doi.org/10.1016/j.cose.2014.01.005
Almorsy, M., Grundy, J., & Müller, I. (2016). An analysis of the cloud computing security problem. arXiv preprint arXiv:1609.01107
Al-Mukahal, H. M., & Alshare, K. (2014). An examination of factors that influence the number of information security policy violations in Qatari organizations. Information and Computer Security, 23(1), 102–118. doi: 10.1108/ICS-03-2014-0018
Alzoubi, Y. I., Gill, A. Q., & Al-Ani, A. (2016). Empirical studies of geographically distributed agile development communication challenges: A systematic review. Information & Management, 53(1), 22-37. doi:10.1016/j.im.2015.08.003
Anderson, M., Bjork, R., & Bjotk, E. (1994). Remembering Can Cause Forgetting: Retrieval Dynamics in Long-Term Memory. Journal of experimental psychology. Learning, memory, and cognition. 20. 1063-87. 10.1037/0278-7393.20.5.1063.
Arachchilage, N. A. G., & Love, S. (2014). Security awareness of computer users: A phishing threat avoidance perspective. Computers in Human Behavior, 38, 304–312. Retrieved from http://dx.doi.org/10.1016/j.chb.2014.05.046
Ardagna, C. A., Asal, R., Damiani, E., & Vu, Q. H. (2015). From security to assurance in the cloud: A survey. ACM Computing Surveys (CSUR), 48(1), 2. doi:10.1145/2767005
Aronson, E. (1972). The social animal: Elliot Aronson. New York: Viking Press.
Arpaci, I., Kilicer, K., & Bardakci, S. (2015). Effects of security and privacy concerns on educational use of cloud services. Computers in Human Behavior, 45, 9398. doi:10.1016/j.chb.2014.11.075
Armour, P. G. (2007). , 50(1), 13-16. doi:10.1145/1188913.1188930
Asch, S.E. (1951). Effects of group pressure on the modification and distortion of judgments. In H. Guetzkow (Ed.), Groups, leadership and men(pp. 177–190). Pittsburgh, PA:Carnegie Press.
Asch, S.E. (1955). "Opinions and social pressure". Scientific American. 193 (5): 31–35. doi:10.1038/scientificamerican1155-31
Attuquayefio, S. N., & Addo, H. (2014). Using the UTAUT model to analyze students' ICT adoption. International Journal of Education and Development Using Information and Communication Technology, 10(3), 75–86.
Bagozzi, R.P. (2007), The Legacy of the Technology Acceptance Model and a Proposal for a Paradigm Shift, Journal of the Association for Information Systems, 8 (4), pp. 244–254.
Baird, A., Furukawa, M. F., & Raghu, T. S. (2012). Understanding contingencies associated with the early adoption of customer-facing web portals. Journal of Management Information Systems, 29(2), 293-324.
Bajo, M. T., Gómez-Ariza, C. J., Fernandez, A., & Marful, A. (2006). Retrieval-induced forgetting in perceptually driven memory tests. Journal of Experimental Psychology: Learning, Memory, and Cognition, 32(5), 1185-1194. http://dx.doi.org/10.1037/0278-7393.32.5.1185
Bandura, A. (1986). Social foundations of thought and action: A social cognitive theory. Englewood Cliffs, NJ: Prentice-Hall, Inc.
Barkly (2016). 2016 Cybersecurity Confidence Report. Retrieved from https://www.barkly.com/cybersecurity-confidence-report-2016
Basin, D., Jugé, V., Klaedtke, F., & Zălinescu, E. (2013). Enforceable security policies revisited. ACM Transaction on Information and System Security, 16(1), 3, 3–26. doi:http://dx.doi.org/10.1145/2487222.2487225
Barlow, J. B., Warkentin, M., Ormond, D., & Dennis, A. R. (2013). Don’t make excuses! Discouraging neutralization to reduce IT policy violation. Computers & Security, 39(2013), 145–159. Retrieved from http://dx.doi.org/10.1016/j.cose.2013.05.006
Barrett, D. (2009). Workshop: How the acceptance of anonymous surfing and Tor in communications has changed the evidence landscape. Proceedings of the Conference on Digital Forensics, Security and Law, 7.
Beck AT (1972). Depression: Causes and Treatment. Philadelphia: University of Pennsylvania Press. ISBN 0-8122-1032-8.
Beggs, C., & McGowan, R. (2011). Fostering SCADA and IT relationships: an industry perspective. International Journal of Cyber Warfare and Terrorism (IJCWT), 1(3), 1-11.
Bleicher, P. (2003). Software life cycles and kitchen. Applied Clinical Trials, 12(10), 30.
Boeck, H. (2014). An overview of ethical considerations when using RFID with consumers. International Journal of Cyber Society and Education, 7(2), 157–164.https://doi.org/10.7903/ijcse.1172
Boehmer, W. (2008). Appraisal of the effectiveness and efficiency of an information security management system based on ISO 27001. In Proceedings of The Second International Conference on Emerging Security Information, Systems, and Technologies, 224-231.
Booch, G. (2014). The stories we tell ourselves. IEEE Software, 31(2), 18-20. doi:10.1109/MS.2014.4
Bower, Gordon H. (ed.) (1984). The Psychology of Learning and Motivation. Academic Press
Branco, T., & Santos, H. (2016, June). What is missing for trust in the cloud computing? In Proceedings of the 2016 ACM SIGMIS Conference on Computers and People Research (pp. 27–28). ACM.
Broadbent, D (1958). Perception and Communication. London: Pergamon Press.
Brookes, N., & Clark, R. (2009). Using maturity models to improve project management practice. In POMS 20th Annual Conference, Florida USA.
Broady, T., Chan, A., & Caputi, P. (2010). Comparison of older and younger adults’ attitudes towards and abilities with computers: Implications for training and learning. British Journal of Educational Technology, 41(3), 473-485. doi:10.1111/j.1467-8535.2008.00914.x
Brown, A. L., et al. (1993). Distributed expertise in the Classroom Distributed cognitions: Psychological and educational considerations. Ed. Gavriel Salomon. New York: Cambridge UP, 188-28.
Brown, R. G., and Pluck, G. (2000). Negative symptoms: the ‘pathology’ of motivation and goal-directed behaviour. Trends Neurosci. 23, 412–417. doi: 10.1016/S0166-2236(00)01626-X
Brumfitt, H. A., Askwith, R., & Zhou, B. (2014). A framework for device security in the Internet of Things. Retrieved from http://www.cms.livjm.ac.uk/PGNet2014/papers/1569961261.pdf
Bruner, J. S. (1960). The Process of education. Cambridge, Mass.: Harvard University Press.
Bruner, J. S. (1966). Toward a theory of instruction, Cambridge, Mass.: Belkapp Press.
Burda, D., & Teuteberg, F. (2014). The role of trust and risk perceptions in cloud archiving. Results from an empirical study. Journal of High Technology Management Research, 25(2), 172187. doi:10.1016/j.hitech.2014.07.008
Burns, S., & Roberts, L. (2013). Applying the theory of planned behavior to predicting online safety behavior. Crime Prevention and Community Safety, 15(1), 48–64. https://doi.org/http://dx.doi.org/10.1057/cpcs.2012.13
Burns, M. J., and Woodruff, R. B. (1992). Delivering value to consumers: Implications for strategy development and implementation. In C. T. Allen, T. J. Madden, T. A. Shimp, R. D. Howell, G. M. Zinkhan,
D. D. Heisley, R. J. Semenik, P. Dickson, V. Zeithami, & R. L. Jenk (Eds.), Marketing Theory and Applications, (1992) (pp. 209-216). Chicago: American Marketing Association.
Bounds, G. M., and Dewhirst, H. D. Assessing progress in managing for customer value. In M. J. Stahl & G. M. Bounds (Eds.), Competing globally through customer value (1991), (pp. 307-339). New York: Quorum
Byres, E. J., Franz, M., & Miller, D. (2004, December). The use of attack trees in assessing vulnerabilities in SCADA systems. In Proceedings of the International Infrastructure Survivability Workshop.
Campbell, D. T., & Fiske, D. W. (1959). Convergent and discriminant validation by the multitrait-multimethod matrix. Psychological Bulletin, 56(2), 81. http://dx.doi.org/10.1037/h0046016
Cannon, W., B. (1915). Bodily changes in pain, hunger, fear, and rage. New York: Appleton-Century-Crofts.
Carol, C., (1972). Cognitive economy in semantic memory. Journal of Experimental Psychology. 92. 149-154. 10.1037/h0032072.
Cassidy, K. (2007). Tuckman Revisited: Proposing a New Model of Group Development for Practitioners. Journal of Experiential Education. 29, 413-417. doi:10.1177/105382590702900318
Cattell, R. B. (1987). Advances in psychology, No. 35. Intelligence: Its structure, growth and action. Oxford, England: North-Holland
Caudle, D. Improving cyber warfare decision-making by incorporating leadership styles and situational context into poliheuristic decision theory. Proceedings of the International Conference On Information Warfare & Security, 2013, 240-247
Cavallari, M. (2011). The organizational relationship between compliance and information security. International Journal of Academic Business World, 5(1), 63–76.
Cebula, J., & Young, L. (2010, December). A taxonomy of operational cyber security risks. Pittsburgh, PA: Carnegie-Mellon Software Engineering Institute (SEI).
Chang, S., & Lin, C. S. (2007). Exploring organizational culture for information security management. Industrial Management and Data Systems, 107, 438–458.doi:10.1108/02635570710734316
Chatterjee, S., Sarker, S., & Valacich, J. S. (2015). The behavioral roots of information systems security: Exploring key factors related to unethical IT Use. Journal of Management Information Systems, 31(4), 49-87.
Chaturvedi, D. A., & Zarger, S. A (2015). A review of security models in cloud computing and an innovative approach. International Journal of Computer Trends and Technology (IJCTT), 30(2), 87–92.
Chebrolu, S. B. (2010). Assessing the relationships among cloud adoption, strategic alignment and information technology effectiveness (Doctoral dissertation). Available from ProQuest Dissertations and Theses database. (UMI No. 762321386)
Chen, P.-Y., Cheng, S.-M., & Chen, K.-C. (2014). Information fusion to defend intentional attack in Internet of Things. IEEE Internet of Things Journal, 1(4), 337–348. https://doi.org/10.1109/JIOT.2014.2337018
Chen, Y., Ramamurthy, K., & Wen, K. (2013). Organizations’ information security policy compliance: Stick or carrot approach. Journal of Management Information Systems, 29(3), 157–188. doi: 10.2753/MIS0742-1222290305
Chen, Y., Ramamurthy, K., & Wen, K. (2015). Impacts of comprehensive information security programs on information security culture. Journal of Computer Information Systems, 55(3), 11–19. doi: 10.1080/08874417.2015.11645767
Cheng, H., & Furnham, A. (2017). Personality traits neuroticism and openness as well as early abnormal eye conditions as predictors of the occurrence of eye problems in adulthood. Health Psychology Open. https://doi.org/10.1177/2055102917716205
Cheolho, Y., Jae-Won, H., & Kim, R. (2012). Exploring factors that influence students' behaviors in information security. Journal of Information Systems Education, 23(4), 407-415.
Chi, H., Yeh, H., & Hung, W. C. (2012). The moderating effect of subjective norm on users’ perceived risk and usage intention. International Journal of Marketing Studies, 4(6), 95102. doi:10.5539/ijms.v4n6p95
Christensen, K. Ethics of information technology. The human edge: Information technology and helping people (1986), 72–91.
Chu, C., & Zhmoginov, A., & Sandler, M. (2017). CycleGAN: a Master of Steganography.
Compeau, D., Higgins, C. A., & Huff, S. (1999). Social cognitive theory and individual reactions to computing technology: A longitudinal study. MIS Quarterly, 23(2),145–158. doi:10.2307/249749
Craik, K. (1943). The Nature of Explanation. Cambridge: Cambridge University Press.
Creswell, J., & Creswell, D. (2018). Research design: Qualitative, quantitative, and mixed methods app (5th ed.). Thousand Oaks, CA: Sage.
Crossman, A., & Lee-Kelley, L. (2004). Trust, commitment and team working: the paradox of virtual organizations. Global Networks, 4, 375-390. doi:10.1111/j.1471-0374.2004.00099.x
Csíkszentmihályi., M. (2007). Flow the Psychology of Optimal Experience. Harper Perennial Modern Classics
Dahlberg, T., Mallat, N., & Öörni, A. (2003). Trust enhanced technology acceptance model consumer acceptance of mobile payment solutions: Tentative evidence.
Damen, T., Strick, M., Taris, T. W., & Aarts, H. (2018). When conflict influences liking: The case of the Stroop task. PloS one, 13(7), e0199700. doi: 10.1371/journal.pone.0199700
Darwin, C. (2009). The Expression of the Emotions in Man and Animals (Cambridge Library Collection - Darwin, Evolution and Genetics) (F. Darwin, Ed.). Cambridge: Cambridge University Press. doi:10.1017/CBO9780511694110
Davis, F. D. (1989). Perceived usefulness, perceived ease of use, and user acceptance of information technology. MIS Quarterly, 13(3), 319–340. doi:10.2307/249008
Davis, F. D., Bagozzi, R. P., & Warshaw, P. R. (1989). User acceptance of computer technology: A comparison of two theoretical models. Management Science, 35(8), 982–1003. https://doi.org/10.1287/mnsc.35.8.982
Davis, F. D., Bagozzi, R. P., & Warshaw, P. R. (1992). Extrinsic and intrinsic motivation to use computers in the workplace. Journal of Applied Social Psychology, 22(14), 1111-1132.
Deutchman, P., & Sullivan, J. (2018). The Dark Triad and framing effects predict selfish behavior in a one-shot Prisoner’s Dilemma. PloS one, 12(9), 1-15.
Digman JM (June 1989). "Five robust trait dimensions: development, stability, and utility". Journal of Personality. 57 (2): 195–214. doi:10.1111/j.1467-6494.
Ding-Long H., Pei-Luen P. R., & Gavriel, S. (2010) Perception of information security, Behaviour & Information Technology, 29:3, 221-232, DOI: 10.1080/01449290701679361
Ding, Y., Jin, Y., Ren, L., & Hao, K. (2013). An intelligent self-organization scheme for the Internet of Things. IEEE Computational Intelligence Magazine, 8(3), 41–53. https://doi.org/10.1109/MCI.2013.2264251
Dlodlo, N., Foko, T., Mvelase, P., & Mathaba, S. (2012). The state of affairs in Internet of Things research. Electronic Journal of Information Systems Evaluation, 15(3), 244–258
Dreisbach G., & Fischer R. (2012). Conflicts as aversive signals. Brain and Cognition, 78(2), 94–98. pmid:22218295
Drury, M., Conboy, K., & Power, K. (2012). Obstacles to decision making in Agile software development teams. Journal of Systems and Software, 85:6. Pp 1239 – 1254.
Egelman S, Peer E. Scaling the security wall: developing a security behavior intentions scale (SeBIS). Proceedings of the ACM Conference on Human Factors in Computing Systems, Seoul; 2015, pp. 2873–82.
Ekman, P. (1985). Telling Lies: Clues to Deceit in the Marketplace, Politics, and Marriage. W. W. Norton & Company. ISBN 0-393-32188-6
Ekman, P. (2003). Emotions Revealed: Recognizing Faces and Feelings to Improve Communication and Emotional Life. Times Books. ISBN 0-8050-7516-X
Ellsberg, Daniel (1961). Risk, Ambiguity, and the Savage Axioms. Quarterly Journal of Economics. 75 (4): 643–669. doi:10.2307/1884324. JSTOR 1884324.
Engel, J.F., Blackwell, R.D., and Miniard, P.W. Consumer Behavior. New York: Dryden Press, 1986.
Everett, C. (2009). Cloud computing–A question of trust. Computer Fraud & Security, 2009(6), 5–7. doi:10.1016/S1361-3723(09)70071-5
Eysenck, H. J. & Eysenck, Sybil B. G. (1976). Psychoticism as a dimension of personality. London: Hodder and Stoughton
Festinger, L., & Carlsmith, J. M. (1959). Cognitive consequences of forced compliance. The Journal of Abnormal and Social Psychology, 58(2), 203-210.
Festinger, L., Riecken, H. W., & Schachter, S. (1956). When prophecy fails. When Prophecy Fails: A Social and Psychological Study of a Modern Group that Predicted the Destruction of the World Minneapolis, MN, US: University of Minnesota Press. http://dx.doi.org/10.1037/10030-000
Figliola, P. M., & Fischer, E. A. (2015). Overview and issues for implementation of the federal cloud computing initiative: Implications for federal information technology reform management. Washington, DC: U.S. Library of Congress Congressional Research Service.
Fishbein Martin, and Icek Ajzen. Belief, Attitude, Intention and Behavior: An Introduction to Theory and Research. California: Addison-Wesley, 1975.
Ford, D., & Whaley, G. (2012). Examining collegiality and social justice in academia and the private sector: an exploratory SYMLOG analysis. NMIMS Management Review, 22, 9-36.
Forrester, J. W. (1971) Counterintuitive behavior of social systems. Technology Review.
Forsyth, T., & Johnson, C. (2014). Elinor Ostrom's Legacy: Governing the Commons and the Rational Choice Controversy. Development and Change, 45, 1093-1110. doi:10.1111/dech.12110
Frankl, V. E. (2006). Man's search for meaning. Boston: Beacon Press.
Freud, S. (1920). A general introduction to psychoanalysis. New York, NY, US: Horace Liveright.
Freud, S., & Strachey, J. (1965). The interpretation of dreams. New York: Avon Books
Frey, C. (2013). Perception of success in information technology projects from the perspective of the project manager (Doctoral dissertation, Order No. 3590336, 1431540451, Capella University, Minneapolis, Minnesota).
Frijda, N. H. (2007). The laws of emotion. Mahwah, NJ, US: Lawrence Erlbaum Associates Publishers.
Furnell, S., & Thomson, K.-L. (2009). Recognising and addressing “security fatigue.” Computer Fraud & Security, 2009(11), 7–11. https://doi.org/10.1016/S1361-3723(09)70139-3
Furnham, A., & Cheng, H. (2016). Childhood intelligence predicts adult trait openness: Psychological and demographic indicators. Journal of Individual Differences, 37(2), 105-111. http://dx.doi.org/10.1027/1614-0001/a000194
Future Proofing: Take Your Cybersecurity Confidence to the Next Level. (2018, February 01). Retrieved from https://www.healthcareitnews.com/infographic/future-proofing-take-your-cybersecurity-confidence-next-level
Gashami, J. P. G., Chang, Y., Rho, J. J., & Park, M. C. (2016). Privacy concerns and benefits in SaaS adoption by individual users: A trade-off approach. Information Development, 32(4), 837–852. https://doi.org/10.1177/0266666915571428
Gazdar, G. (1979). Pragmatics: Implicature, Presupposition, and Logical Form. Academic Press, New York.
Giddens, A. The Constitution of Society, Polity Press, Cambridge, UK, 1984.
Gilovich, T. D.; Griffin, D.; Kahneman, D. (2002). "Heuristics and Biases: The Psychology of Intuitive Judgment". New York, NY: Cambridge University Press.
Godlove, T. (2012). Examination of the factors that influence teleworkers’ willingness to comply with information security guidelines. Information Security Journal: A Global Perspective,21, 216–229
Goffman, E. (1959). The presentation of self in everyday life. Garden City, N.Y. Doubleday,
Gold, J. (2012). Protection in the cloud: Risk management and insurance for cloud computing. Journal of Internet Law, 15(12), 1–28.
Gómez-Pinilla F. (2008). Brain foods: the effects of nutrients on brain function. Nature reviews. Neuroscience, 9(7), 568-78.
Gonzalez, J.J. and Sawicka, A., 2002. A framework for human factors in information security. In: Proceedings of the 2002 WSEAS International Conference on Information Security (ICIS’02), Rio de Janeiro.
Gratian, M., & Bandi, S., & Cukier, M., & Dykstra, J., & Ginther, A. (2017). Correlating Human Traits and Cybersecurity Behavior Intentions. Computers & Security. 73. 345–358. 10.1016/j.cose.2017.11.015.
Griffiths, J. (2019, January 10). When Chinese hackers declared war on the rest of us. Retrieved from https://www.technologyreview.com/s/612638/when-chinese-hackers-declared-war-on-the-rest-of-us/
Guba, R. (2008). Engineering human security. Risk Management, 55(12), 58–60.
Guilford, J.P. (1967). The nature of human intelligence. New York, NY, US: McGraw-Hill.
Guthrie, E. R. (1946). Psychological Facts and Psychological Theory., "Psychological Bulletin" Vol. 43, 1-20
Gulenko, I. (2013). Social against social engineering: Concept and development of a Facebook application to raise security and risk awareness. Information Management & Computer Security, 21(2), 91–101.https://doi.org/http://dx.doi.org/10.1108/IMCS-09-2012-0053
Gunawardena, C.N., Zittle, F.J. (1997). Social pressure as a predictor of satisfaction within a computer-mediated conferencing environment. American Journal of Distance Education, 11(3), 8-26.
Gutman, J. A means-end chain model based on consumer categorization processes. Journal of Marketing, (1982), 46 (2), 60-72.
Gutman, J. (1997). Means-end chains as goal hierarchies. Psychology & Marketing, 14, 545-560. Bowers, G.H., Black, J.B., & Turner, T.J. (1979).
Hadyn, I., Teare, R., Scheuing, E., & Armistead, C. (1997). A systems model of effective teamwork. The TQM Magazine, 9, 118 -127. doi:10.1108/09544789710165563
Hammack, S., & Cooper, M., & Lezak, K. (2011). Overlapping neurobiology of learned helplessness and conditioned defeat: Implications for PTSD and mood disorders. Neuropharmacology. 62. 565-75. 10.1016/j.neuropharm.2011.02.024.
Haney, J., & Lutters, W. (2017). The Work of Cybersecurity Advocates. 1663-1670. 10.1145/3027063.3053134.
Haney, J., & Lutters, W. (2018). It's Scary…It's Confusing…It's Dull: How Cybersecurity Advocates Overcome Negative Perceptions of Security. Proceedings of the Fourteenth Symposium on Usable Privacy and Security, Retrieved from https://www.usenix.org/system/files/conference/soups2018/soups2018-haney-perceptions.pdf
Hardwick, J., Anderson, A. R., & Cruickshank, D. (2013). Trust formation processes in innovative collaborations. European Journal of Innovation Management, 16(1), 4-21. doi:10.1108/14601061311292832
Harnesk, D., & Lindström, J. (2011). Shaping security behaviour through discipline and agility implications for information security management. Information Management and Computer Security, 19(4), 262–276. doi:10.1108/09685221111173076
Harper, A. A. (2016). The impact of consumer security awareness on adopting the internet of things: A correlational study (Order No. 10196140). Available from ProQuest Dissertations & Theses Global. (1853097232).
Hebb. D.O (1949). The Organization of Behavior. Wiley: New York;
Hedström, K., Karlsson, F., & Kolkowska, E. (2013). Social action theory for understanding information security non-compliance in hospitals: The importance of user rationale. Information Management & Computer Security, 21(4), 266–287. doi: 10.1108/IMCS-082012-0043
Hedström, K., Kolkowska, E., Karlsson, F., & Allen, J. P. (2011). Value conflicts for information security management. The Journal of Strategic Information Systems, 20(4), 373–384. https://doi.org/10.1016/j.jsis.2011.06.001
Heffer, V. (n.d.) Personality Theory: An Introduction. Retrieved from https://allpsych.com/personalitysynopsis
Heinrich H. (1931). Industrial accident prevention: a scientific approach. McGraw-Hill. OCLC 571338960.
quoted in Hollnagel, Erik (2009). Safer Complex Industrial Environments: A Human Factors Approach. CRC Press. ISBN 1-4200-9248-0.
Henrich, J., Heine, S., & Norenzayan, A. (2010). The weirdest people in the world? Behavioral and Brain Sciences, 33(2-3), 61-83. doi:10.1017/S0140525X0999152X
Heylighen, F., Heath, M., & Van Overwalle, F. (2003). The emergence of distributed cognition: A conceptual framework. Retrieved from https://www.researchgate.net/publication/249812898_The_Emergence_of_Distributed_Cognition_conceptuaframework
Hilgard, E. R., & Bower, G. H. (1966). Theories of learning: [by] Ernest R. Hilgard [and] Gordon H. Bower. New York: Appleton-Century-Crofts.
Horne, Craig & Ahmad, Atif & Maynard, Sean. (2016). A Theory on Information Security. The 27th Australasian Conference on Information Systems, At Wollongong, Australia
Hulme, G. V., & Goodchild, J. (2017, August 03). What is social engineering? How criminals take advantage of human behavior. Retrieved from https://www.csoonline.com/article/2124681/social-engineering/what-is-social-engineering.html
Hungwei, T., & Heng-Yu, K. (2011). The relationships between trust, performance, satisfaction, and development progressions among virtual teams. Quarterly Review of Distance Education, 12(2), 81-94. Retrieved from http://www.infoagepub.com/quarterly-review-of-distance-education.html
Hull, Clark L. (1932). The goal-gradient hypothesis and maze learning. Psychological Review. 39 (1): 25.
Iasiello, E. (2014). Is cyber deterrence an illusory course of action? Journal of Strategic Security, 7(1), 54-67. doi:10.5038/1944-0472.7.1.5
Iivari, J., Hirschheim, R., and Klein, H. K. (2000). A Dynamic Framework for Classifying Information Systems Development Methodologies and Approaches. Journal of Management Information Systems (17:3), 2000, pp. 179-218
Islam, S., Ouedraogo, M., Kalloniatis, C., Mouratidis, H., & Gritzalis, S. (2015). Assurance of security and privacy requirements for cloud deployment model. IEEE Transactions on Cloud Computing, 181.doi:10.1109/TCC.2015.2511719
ISO/IEC 27032:2012 (2012). Information technology - Security techniques - Guidelines for cybersecurity. Retrieved from http://www.iso27001security.com/html/27032.htm
Iulia, I., Reeder, R., & Consolvo, S. (2015). ... no one can hack my mind: comparing expert and non-expert security practices. In Proceedings of the Symposium on Usable Privacy and Security (SOUPS’15), 327-346.
Jarvenpaa, S. L., & Leidner, D. E. (2006). Communication and Trust in Global Virtual Teams. Journal of Computer-Mediated Communication, 3(4), 0-0. doi:10.1111/j.1083-6101.1998.tb00080.x
Ji-Hwan, L., & Chi-Hoon, S. (2013). Effects of trust and perceived risk on user acceptance of a
new technology service. Social Behavior & Personality: An International Journal, 41(4), 587-597. doi:10.2224/sbp.2013.41.4.587
Johnson, P. (2010). Four steps to effective collaboration. Young Adult Library Services, 9(1), 17-19. Retrieved from https://www.questia.com/library/journal/1G1-240588383/four-steps-to-effective-collaboration
Jung, C. G., & Hull, R. F. C. (1980). The archetypes and the collective unconscious. Princeton, N.J.: Princeton University Press.
Kahneman, D., Tversky, A. (1973). On the Psychology of Prediction. Psychological Review. 80 (4): 237–251. doi:10.1037/h0034747.
Kahneman, D.; Tversky, A. (1979). "Prospect Theory: An Analysis of Decision under Risk. Econometrica. 47 (2): 263. doi:10.2307/1914185. ISSN 0012-9682.
Karis, D., Wildman, D., & Mané, A. (2014). Improving Remote Collaboration with Video Conferencing and Video Portals. Human–Computer Interaction, 31(1), 1-58. doi:10.1080/07370024.2014.921506
Kett, H., Kasper, H., Falkner, J., & Weisbecker, A. (2012). Trust factors for the usage of cloud computing in small and medium sized craft enterprises. In International Conference on Grid Economics and Business Models (pp. 169–181). Berlin: Springer.
Khan, K. M., & Malluhi, Q. (2010). Establishing trust in cloud computing. IT Professional Magazine, 12(5), 20-27. doi: http://dx.doi.org/10.1109/mitp.2010.128
Kim, D. and Hall, J. K. (2002), The Role of an Interactive Book Reading Program in the Development of Second Language Pragmatic Competence. The Modern Language Journal, 86: 332-348. doi:10.1111/1540-4781.00153
Kohler, W. (1947). Gestalt psychology (2nd ed.). Oxford, England: Liveright.
Köhler, W. (1948). The mentality of apes, 1917. In W. Dennis (Ed.), Century psychology series. Readings in the history of psychology (pp. 497-505). East Norwalk, CT, US: Appleton-Century-Crofts. http://dx.doi.org/10.1037/11304-054
Koman, V. P. (2016). Age and the acceptance and use of cyber-security: A quantitative survey of U.S. baby boomer mobile-device security practices (Order No. 10075464). Available from ProQuest Dissertations & Theses Global. (1777347121).
Kozlowski, S. W., & Ilgen, D. R. (2006). Enhancing the Effectiveness of Work Groups and Teams. Psychological Science in the Public Interest, 7(3), 77-124. doi:10.1111/j.1529-1006.2006.00030.x
Kray, L.J. & Thompson, L & Galinsky, A. (2001). Battle of the sexes: Gender stereotype confirmation and reactance in negotiations. Journal of Personality and Social Psychology. 80. 942-958. 10.1037/0022-3514.80.6.942.
Krefting, L. (1991). Rigor in qualitative research: The assessment of trustworthiness. American Journal of Occupational Therapy, 45, 214-222
Kruger, J., David, D. (1999). Unskilled and Unaware of It: How Difficulties in Recognizing One's Own Incompetence Lead to Inflated Self-Assessments. Journal of Personality and Social Psychology. American Psychological Association. 77 (6): 1121–1134.
Kuei-Hu, C. Security threat assessment of an internet security system using attack tree and vague sets, 2014.
Kuo, Z. Y. (1930). The genesis of the cat's responses to the rat. Journal of Comparative Psychology, 11(1), 1.
Kuo, Z.Y. (1938). Further study of the behavior of the cat toward the rat. Journal of Comparative Psychology, Vol 25(1), Feb 1938, 1-8
Lacey, D. (2009). Managing the human factor in information security: how to win over staff and influence business managers. West Sussex, UK: Wiley & Sons.
Leavitt, C. C. (2015). The protege learning experience in virtual mentoring: What is learned, how the learning occurs, and assisting and hindering factors (Order No. 3682581).
Lebek, B., Uffen, J., Neumann, M., Hohler, B., & Breitner, M. H. (2014). Information security awareness and behavior: a theory-based literature review. Management Research Review,
37(12), 1049–1092. doi: 10.1108/MRR-04-2013-0085
Leistert, O. (2012). Resistance against cyber-surveillance within social movements and how surveillance adapts. Surveillance & Society, 9(4), 441-456.http://library.queensu.ca/ojs/index.php/surveillance-andsociety/ article/view/cyber_resist/cyber_resist
Lewin, K. (1951). Field theory in social science: selected theoretical papers (Edited by Dorwin Cartwright.). Oxford, England: Harpers.
Lineberry, S. (2007). The human element: the weakest link in information security. Journal of Accountancy, 204, 44–46, 49. Retrieved from ttps://www.journalofaccountancy.com/issues/2007/nov/thehumanelementtheweakestlinkininformationsecurity.html
Limayem, M., Hirt, S. G., & Cheung, C. K. (2007). How habit limits the predictive power of intention: The case of information systems continuance. MIS Quarterly, 31(4), 705-737.
Liu, C. (2015). Types of employee perceptions of information security using Q methodology: An
empirical study. International Journal of Business and Information, 10(4), 557–575
Lorenz, K. (1937). On the formation of the concept of instinct. Natural Sciences, 25(19), 289-300.
Loftus., E. (1979) Eyewitness Testimony. Cambridge, MA: Harvard University Press
Loftus., E. (1999) Lost in the Mall: Misrepresentations and Misunderstandings. Ethics & Behavior, 9(1) 51-60.
Luftman, J. (2000). Assessing business-IT alignment maturity. Communications of the Association for Information Systems, 4(14), 1-51. Retrieved from http://aisel.aisnet.org/cais/vol4/iss1/14/
Lupyan, G. 2013. The difficulties of executing simple algorithms: Why brains make mistakes computers don’t. Cognition 129(3). 615–636.
Madden, T. J., Ellen, P. S., & Ajzen, I. (1992). A comparison of the theory of planned behavior and the theory of reasoned action. Personality and Social Psychology Bulletin, 18(1), 3–9. https://doi.org/10.1177/0146167292181001
Maier, S. F.; Seligman, M. E. P. Learned Helplessness: Theory and Evidence. Journal of Experimental Psychology: General, 105, 1, 3-46, Mar 76
Markus, M., Majchrzak, L. A., and Gasser, L. (2002). A Design Theory for Systems that Support Emergent Knowledge Processes, MIS Quarterly (26:3), 2002, pp. 179-212.
Maslow, A.H. (1943). A theory of human motivation. Psychological Review. 50 (4): 370–96
Matulessy, A., & Humaira, N. (2016). Hacker Personality Profiles Reviewed in Terms of the Big Five Personality Traits. Psychology and Behavioral Sciences. Vol. 5, No. 6, 2016, pp. 137-142. doi: 10.11648/j.pbs.20160506.12
McClelland, D.C. (1987). Human motivation. New York: University of Cambridge.
McNeese, M., Mancuso, V., McNeese, N., Endsley, T., & Forster, P. (2013). Using the living laboratory framework as a basis for understanding next-generation analyst work. Paper presented at the SPIE Defense, Security, and Sensing, Baltimore, Maryland.
Meki Kombe, C. L., & Herman, C. (2017). Can education innovations be sustained after the end of donor funding? The case of a reading intervention programme in Zambia. Educational Review, 69(5), 533-553. doi:10.1080/00131911.2016.1265917
Mell, P. M., & Grance, T. (2011). SP 800-145. The NIST definition of cloud computing. Gaithersburg, MD: National Institute of Standards & Technology.
Michaelidis. G. (2018). The Road to Cybersecurity Is Paved With “Extraordinarily Basic Things”. Behavioral Scientist. Retrieved from http://behavioralscientist.org/the-road-to-cybersecurity-is-paved-with-extraordinarily-basic-things/
Mikton, J. (2015). The Internet of Things: Ethics of our connectivity. The International Schools Journal, 35(1), 56.
Milgram, S. (1963). Behavioral Study of obedience. The Journal of Abnormal and Social Psychology, 67(4), 371-378.
Milgram, S. (1974). Obedience to authority: An experimental view. New York: Harper & Row.
Miller, G. A. (1956). The magical number seven, plus or minus two: some limits on our capacity for processing information. Psychological Review, 63(2), 81-97. http://dx.doi.org/10.1037/h0043158
Miller, N. E. (1967). Laws of learning relevant to its biological basis. Proceedings of the American Philosophical Society, 111, 315-325.
Mischel, W., Ebbesen, E. B., & Raskoff Zeiss, A. (1972). Cognitive and attentional mechanisms in delay of gratification. Journal of Personality and Social Psychology, 21(2), 204-218. http://dx.doi.org/10.1037/h0032198
Mischel, W., & Ayduk, O. (2004). Willpower in a cognitive-affective processing system: The dynamics of delay of gratification. In R.F. Baumeister & K.D. Vohs (Eds.), Handbook of Self-Regulation: Research, Theory, and Applications (pp. 99–129). New York: Guilford.
Mohapatra, S. (2017). Cloud computing relationships between deployments model selection and it security (Order No. 10255126). Available from ProQuest Dissertations & Theses Global. (1876037344
Moore, G. E. “Cramming More Components onto Integrated Circuits,” Electronics (38:8), 1965, pp. 114-117.
Moscovici, S. & Duveen, G. & Macey, D. (2008). Psychoanalysis : its image and its public. Polity, Cambridge Malden, MA
Munger, C. (1994). A Lesson on Elementary, Worldly Wisdom as It Relates to Investment Management & Business. USC Business School, Retrieved from https://old.ycombinator.com/munger.html
Myerson, R. B. (1991). Game Theory: Analysis of Conflict. Harvard University Press, 1, vii–xi
National Science and Technology Council. 2016 Federal Cybersecurity Research and Development Strategic Plan. ENSURING PROSPERITY AND NATIONAL SECURITY Retrieved from https://www.nitrd.gov/cybersecurity/
Nevin, J.. (1999). Analyzing Thorndike's Law Of Effect: The Question Of Stimulus-response Bonds. Journal of the experimental analysis of behavior. 72. 447-50. 10.1901/jeab.1999.72-447.
Nicholas, R., (1989). Cognitive Economy: The Economic Dimension of the Theory of Knowledge_. University of Pittsburgh Press.
O'Donnell, E., Arnold, V., & Sutton, S. G. (2000). An analysis of the group dynamics surrounding internal control assessment in information systems audit and assurance domains. Journal of Information Systems, 14(1), 97.
Oppenheimer, Daniel. (2012). Hard-to-Read Fonts Promote Better Recall. Harvard business review. 90. 32-3.
Orlikowski, W. J. (1992). The Duality of Technology: Rethinking the Concept of Technology in Organizations, Organization Science (3:3), 1992, pp. 398-427.
Oye, N. D., Aiahad, N., & Abrahim, N. (2014). The history of UTAUT model and its impact on ICT acceptance and usage by academicians. Education and Information Technologies, 19(1), 251–270. https://doi.org/http://dx.doi.org/10.1007/s10639- 012-9189-9
Öztürk, V. (2013). Selection of appropriate software development life cycle using fuzzy logic. Journal of Intelligent & Fuzzy Systems, 25(3), 797-810. doi:10.3233/IFS-120686
Parker, D. B., Swope, S., AND BAKER, B. N. Ethical conflicts in information and computer science, technology, and business.
Pavlov, I. P. (1927). Conditioned reflexes: an investigation of the physiological activity of the cerebral cortex. Oxford, England: Oxford Univ. Press.
Perls, F. S., & Andreas, S. (1969). Gestalt therapy verbatim. Lafayette, Calif.: Real People Press.
Perls, F. S., & Perls, F. S. (1973). The gestalt approach & Eye witness to therapy. Ben Lomond, Calif.: Science & Behavior Books.
Perry, S. (2001). Writing in Flow: Keys to Enhanced Creativity. Writer's Digest Books
Pfleeger, S. L., & Caputo, D. D. (2012). Leveraging behavioral science to mitigate cyber security risk. Computers & Security, 31(4), 597–611
Pinker, S. (1999). How the mind works. New York: W.W. Norton.
Pinyol, I., & Sabater-mir, J. (2013). Computational trust and reputation models for open multi-agent systems: a review. The Artificial Intelligence Review, 40(1), 1-25.doi: 10.1007/s10462-011-9277-z
Plous, S. (1993). The psychology of judgment and decision making. McGraw-Hill. ISBN 978-0-07-050477-6.
Putra, S. J., Subiyakto, A., Kartiwi, M., & Ahlan, A. R. (2016). Measurement of the information system project success of the higher education institutions in Indonesia: a pilot study. International Journal of Business Information Systems, 23, 229. doi:10.1504/ijbis.2016.10000261
Rabai, L. B. A., Jouini, M., Aissa, A. B., & Mili, A. (2012). A cybersecurity model in cloud computing environments. Journal of King Saud University-Computer and Information Sciences, 25(1), 63–75. https://doi.org/10.1016/j.jksuci.2012.06.002
Raza, N., Rashid, I., & Awan, F. A. (2017). Security and management framework for an organization operating in cloud environment. Annals of Telecommunications, 72(5-6), 325-333.
Rehman, M., Esichaikul, V., & Kamal, M. (2012). Factors influencing e-government adoption in Pakistan. Transforming Government: People, Process and Policy, 6(3), 258–282. https://doi.org/http://dx.doi.org/10.1108/17506161211251263
Reynolds, T.J., Gutman, J. Laddering theory, method, analysis and interpretation. Journal of Marketing, 28 (1), (1988), 11-31
Richardson, K. (2019. It's the End of the Gene as We Know It. Nautilus. Issue 68. Retrieved from http://nautil.us/issue/68/context/its-the-end-of-the-gene-as-we-know-it
Rogers, Carl. (1961). On Becoming a Person: A Therapist's View of Psychotherapy. London: Constable
Rogers, E. M. (1995). Diffusion of innovations. New York, NY: Free Press.
Rogers, E. M., & Shoemaker, F. (1983). Diffusion of innovation: A cross-cultural approach. New York, NY: Free Press.
Romero, E., Cruthirds. K. (May 2006). The Use of Humor in the Workplace. Academy of Management Perspectives. 20 (2): 58–69
Rosenhan, D.L. (1973). On Being Sane in Insane Places. Science. American Association for the Advancement of Science. 179 (4070): 250–258.
Rosch, E. (1975). Cognitive representations of semantic categories. Journal of Experimental Psychology: General, 104, 192-233.
Rosch, E. (1978). Principles of categorization. In E. Rosch & B. B. Lloyd (Eds.), Cognition and categorization. Hillsdale, NJ: Erlbaum. Reprinted in: Margolis, E. and Laurence, S. (Eds.) (1999). Concepts: Core readings. Cambridge, MA: MIT Press
Rousseau, D. M. (1989). Psychological and implied contracts in organizations. Employee Responsibilities & Rights Journal, 2(2), 121-139. doi:10.1007/bf01384942
Ruffin, V. A., Salameh, A. I., Boron, W. F., & Parker, M. D. (2014). Intracellular pH regulation by acid-base transporters in mammalian neurons. Frontiers in physiology, 5, 43. doi:10.3389/fphys.2014.00043
Salkovskis., P., M. (1999) Understanding and treating obsessive compulsive disorder. Behaviour Research and Therapy, 37, S29-S52.
Saltzer, E. B. (1981). Cognitive moderators of the relationship between behavioral intentions and behavior. Journal of Personality and Social Psychology, 41(2), 260-271. doi:10.1037/0022-3514.41.2.260
Schacter, D.. L. (2001) The Seven Sins of Memory: How the Mind Forgets and Remembers. Houghton Mifflin Harcourt
Schmitt, D., & Allik, J., & R., McCrae, & Benet, V., & Alcalay, L., & Ault, L., & Austers, I., & Bennett, K., & Bianchi, G., & Boholst, F., & Ann Borg. C., & Braeckman, J., & G. Brainerd Jr, E., & Caral, L., & Caron, G., & Martina C., & Cunningham, M., & Daibo, I., & de backer, C., & Zupanèiè, A. (2007). The geographic distribution of Big Five personality traits: Patterns and profiles of human self-description across 56 nations. Journal of Cross-Cultural Psychology. 38. 173-212.
Schuessler, J. H. (2009). General deterrence theory: Assessing information systems security effectiveness in large versus small businesses (Doctoral dissertation). Retrieved from http://nsl.cse.unt.edu/~dantu/cae/attachments
Seligman, M. E. P. (1975). A series of books in psychology. Helplessness: On depression, development, and death. New York, NY, US: W H Freeman/Times Books/ Henry Holt & Co.
Semon, R. (1921). The Mneme. London: George Allen & Unwin.
Shepard, R.N. (1987). Toward a universal law of generalization for psychological science. Science, 237 4820, 1317-23.
Shinder, D. Ethical issues for Information Technology security professionals. https://www.computerworld.com/article/2557944/security0/ethical-issues-for-IT-security-professionals.html.
Schneider, S., & Sunyaev, A. (2016). Determinant factors of cloud-sourcing decisions: Reflecting on the IT outsourcing literature in the era of cloud computing. Journal of Information Technology, 31(1), 1–31. https://doi.org/10.1057/jit.2014.25
Shiva, S & Roy, Sankardas & Dasgupta, D. (2010). Game theory for cyber security. 10.1145/1852666.1852704.
Skinner, B. F. (1938). The behavior of organisms: an experimental analysis. Oxford, England: Appleton-Century.
Skinner, B. F. (1990). The behavior of organisms: An experimental analysis. BF Skinner Foundation.
Spinello, R. A. (2011). Cyberethics: Morality and law in cyberspace. Sudbury, MA: Jones and Bartlett.
Stahl, B., Doherty, N., Shaw, M., & Janicke, H. (2014). Critical Theory as an Approach to the Ethics of Information Security. Science & Engineering Ethics, 20(3), 675-699.
Stanton, J. M., & Fagnot, I. J. (2006). Extracting useful information from security assessment interviews. In Proceedings of the 39th Annual Hawaii International Conference on Systems Sciences, 2006.
Stewart, D. W., & Shamdasani, P. N. (2015). Focus groups: Theory and practice (2nd ed.). Thousand Oaks, CA: Sage Publications Inc.
Stroop, J. R. (1935). Studies of interference in serial verbal reactions. Journal of Experimental Psychology, 18(6), 643-662. http://dx.doi.org/10.1037/h0054651
Sun, D., Chang, G., Sun, L., & Wang, X. (2011). Surveying and analyzing security, privacy and trust issues in cloud computing environments. Procedia Engineering, 15, 2852–2856. https://doi.org/10.1016/j.proeng.2011.08.537
Sundararajan, S., Vijayaraghavan, P. K., & Bhasi, M. (2014). Case study on risk management practice in large offshore-outsourced Agile software projects. IET Software, 8(6), 245-257. doi:10.1049/iet-sen.2013.0190
Svantesson, D., & Clarke, R. (2010). Privacy and consumer risks in cloud computing, Computer Law & Security Review, 26(4), 391–397. https://doi.org/10.1016/j.clsr.2010.05.005
Tadda G.P., Salerno J.S. (2010) Overview of Cyber Situation Awareness. In: Jajodia S., Liu P., Swarup V., Wang C. (eds) Cyber Situational Awareness. Advances in Information Security, vol 46. Springer, Boston, MA
Tashi, I., & Ghernaouti-Hélie, S. (2009, March). A Security Management Assurance Model to Holistically Assess the Information Security Posture. In 2009 International Conference on Availability, Reliability and Security, 756-761.
Taylor, S., & Todd, P. (1995). Assessing IT usage: The role of prior experience. MIS Quarterly, 561-570.
Thigpen, C. H., & Cleckley, H. M. (1957). The three faces of Eve. New York, NY, US: McGraw-Hill.
Thompson, R. L., Higgins, C. A., & Howell, J. M. (1991). Personal computing: Toward a conceptual model of utilization. MIS Quarterly, 15(1), 125–143. doi:10.2307/249443
Thorndike, E. L., Bregman, E. O., Cobb, M. V., Woodyard, E., & Inst of Educational Research Div. of Psychology, Teachers Coll, Columbia U. (1926). The measurement of intelligence. New York, NY, US: Teachers College Bureau of Publications. http://dx.doi.org/10.1037/11240-000
Tolman, E. C. (1932). Purposive behavior in animals and men. London, England: Century/Random House UK.
Tolman, E. C. (1948). Cognitive maps in rats and men. Psychological Review, 55(4), 189-208.
http://dx.doi.org/10.1037/h0061626
Tulving, E. (1972). Episodic and semantic memory. In E. Tulving & W. Donaldson, Organization of memory. Oxford, England: Academic Press.
Tulving, E. (1985). Memory and consciousness. Canadian Psychology/Psychologie canadienne, 26(1), 1-12.
http://dx.doi.org/10.1037/h0080017
Turban, E., and Aronson, J. Decision Support Systems and Intelligent Systems, Prentice-Hall, Upper Saddle River, NJ, 2001
Tversky, A., Kahneman, D. (1974). Judgment under uncertainty: Heuristics and biases. Science. 185 (4157): 1124–1131. doi:10.1126/science.185.4157.1124.
Tversky, A., Kahneman, D. (1981). The Framing of decisions and the psychology of choice. Science. 211 (4481): 453–58.
van der Heijden, H. (2004). User acceptance of hedonic information systems. MIS Quarterly, 28(4), 695-704.
Van Rijnsoever, F. J. (2017). (I Can’t Get No) Saturation: A simulation and guidelines for sample sizes in qualitative research. PLOS ONE, 12, e0181689. doi:10.1371/journal.pone.0181689
Vann, J. (2018, December 27). Survey: Maritime industry cybersecurity confidence is mixed. Cybersecurity column. Retrieved from https://pilotonline.com/inside-business/news/columns/article_4d2e7f20-07a7-11e9-bc70-b384a379f1ec.html
Velazquez, M. O. (2014). Trust in the Cloud: A cognitive-behavioral framework of technology adoption for cloud computing in organizations (Doctoral dissertation, Universidad del Turabo (Puerto Rico)).
Venkatesh, V. (2000). Determinants of perceived ease of use: Integrating control, intrinsic motivation, and emotion into the technology acceptance model. Information Systems Research, 11(4), 342–365. doi:10.1287/isre.11.4.342.11872
Venkatesh, V., Morris, M. G., Davis, G. B., & Davis, F. D. (2003). User acceptance of information technology: Toward a unified view. MIS Quarterly, 27(3), 425–478. doi:10.2307/30036540
Von Bertalanffy, L. General System Theory (Rev. ed.), George Braziller, New York, 1973.
von Solms, Rossouw & van Niekerk, Johan. (2013). From information security to cyber security. Computers & Security. 38. 97-102. 10.1016/j.cose.2013.04.004.
Warfield, D. (2011). The perceptions of U.S.-Based IT security professionals about the effectiveness of IT security frameworks: A quantitative study (Doctoral dissertation). Retrieved from ProQuest Dissertations and Theses (UMI No. 3450639).
Watson, J. B. (1994). Psychology as the Behaviorist Views It... Psychological Review. 101. 248-. 10.1037/0033-295X.101.2.248.
Watson, J. B. & Rosalie. R. (1920). Conditioned Emotional Reactions. Journal of Experimental Psychology. 3. 1-14. 10.1037/h0069608
Wakunuma, K. J., & Stahl, B. C. (2014). Tomorrow’s ethics and today's response: An investigation into the ways information systems professionals perceive and address emerging ethical issues. Information Systems Frontiers, 16(3), 383–397. https://doi.org/http://dx.doi.org/10.1007/s10796-014-9490-9
Wei, June. (2010). Knowledge management framework for cyber security learning. International Journal of Management in Education. 4. 10.1504/IJMIE.2010.029884.
Wener, P., & Woodgate, R. L. (2013). Use of a qualitative methodological scaffolding process to design robust interprofessional studies. Journal of Interprofessional Care, 27, 305-312. doi:10.3109/13561820.2013.763775
Vieane, A., Funke, G., Gutzwiller, R., Mancuso, V., Sawyer, B., & Wickens, C. (2016). Addressing human factors gaps in cyber defense. Proceedings of the Human Factors and Ergonomics Society. 60, 770-773. doi:10.1177/1541931213601176
Winnie, P.-M. W. (2014). The impact of trustworthiness and customer e-loyalty and e-satisfaction. International Journal of Academic Research in Business and Social Sciences, 4(3). https://doi.org/10.6007/IJARBSS/v4-i3/718
White, G. L., Hewitt, B., & Kruck, S. E. (2013). Incorporating Global Information Security and Assurance in I.S. Education. Journal of Information Systems Education, 24(1), 11-16.
Wilson, M. P., Benedict, J. A., Snow, G., & Havercamp, M. (2010). Team development and beyond. Journal of Extension, 48(5). Retrieved from https://www.joe.org/
Wingfield, J. C., Maney, D. L., Breuner, C. W., Jacobs, J. D., Lynn, S., Ramenofsky, M., et al. (1998). Ecological bases of hormone–behavior interactions: The “Emergency Life History Stage”. Amer. Zool. 38, 191–206. doi: 10.1093/icb/38.1.191
Whitty, M., Doodson, J., Creese, S., & Hodges, D. (2015). Individual differences in cyber security behaviors: an examination of who is sharing passwords. Cyberpsychology, behavior and social networking, 18(1), 3-7.
Wogalter, M.S., Brelsford, J.W., Desaulniers, D.R., and Laughery, K.R., 1991. Consumer product warnings. The role of hazard perception. Journal of Safety Research, 22, 71.
Wohl, M., & A. Pychyl, T., & H. Bennett, S., (2010). I forgive myself, now I can study: How self-forgiveness for procrastinating can reduce future procrastination. Personality and Individual Differences. 48. 803-808. 10.1016/j.paid.2010.01.029.
Woodcock, M. (2017). Team development manual (2nd ed.). New York, NY: Routledge.
Woody, E. Z., & Szechtman, H. (2013). A biological security motivation system for potential threats: are there implications for policy-making? Frontiers in human neuroscience, 7, 556. doi:10.3389/fnhum.2013.00556
Zafar, H. & Clark, J. G. (2009). Current State of Information Security Research in IS. Communications of the Association for Information Systems, 24(34).
Zajonc, R. B. (1968). Attitudinal Effects of Mere Exposure. Journal of Personality and Social Psychology. 9 (2, Pt.2): 1–27. doi:10.1037/h0025848. ISSN 1939-1315.
Zajonc, R.B. (February 1980). "Feeling and thinking: Preferences need no inferences". American Psychologist. 35 (2): 151–175. doi:10.1037/0003-066x.35.2.151.
Zeigarnik, B. (1938). On finished and unfinished tasks. In W. D. Ellis (Ed.), A source book of Gestalt psychology (pp. 300-314). London, England: Kegan Paul, Trench, Trubner & Company. http://dx.doi.org/10.1037/11496-025
Zhu, B., Joseph, A., & Sastry, S. (2011, October). A taxonomy of cyberattacks on SCADA systems. In Internet of things (iThings/CPSCom), 2011 international conference on and 4th international conference on cyber, physical and social computing, 380-388.
Ziadeh, Z. (2018). NSA Cybersecurity Operators Fight Through Stress for National Security, But at What Cost? Retrieved from https://www.governmentciomedia.com/nsa-cybersecurity-operators-fight-through-stress-national-security-what-cost
Zimbardo, P. G. (1972). The Stanford prison experiment: A simulation study of the psychology of imprisonment conducted August 1971 at Stanford University. Stanford, Calif.: Philip G. Zimbardo, Inc.
Zimbardo, P.G. (2007). The Lucifer effect: understanding how good people turn evil. New York: Random House.
Abu-Al-Aish, A., & Love, S. (2013). Factors influencing students’ acceptance of mlearning: An investigation in higher education. International Review of Research in Open and Distance Learning, 14(5)
Aditya, P., Bhattacharjee, B., Druschel, P., Erdélyi, V., & Lentz, M. (2015). Brave new world: Privacy risks for mobile users. ACM SIGMOBILE Mobile Computing and Communications Review, 18(3), 49–54. https://doi.org/10.1145/2721896.2721907
Adler, A., & Radin, P. (1927). The practice and theory of individual psychology. London: K. Paul, Trench, Trubner & Co.
Ajzen, I. (2002). Perceived behavioral control, self-efficacy, lotus of control, and the theory of planned behavior. Journal of Applied Social Psychology, 32, 1-20.
Ajzen, I., & Fishbein, M. (2005). The influence of attitudes on behavior. In D.Albarracín, B. T. Johnson, & M. P. Zanna (Eds.), The handbook of attitudes (pp.173-221). Mahwah, NJ: Erlbaum
Albrechtsen, E. (2007). A qualitative study of users’ view on information security. Computers &Security, 26, 276–289. doi: 10.1016/j.cose.2006.11.004
Alexander, P. A. (1992). Domain knowledge: Evolving themes and emerging concerns. Educational psychologist, 27(1), 33.
Ali, M., Khan, S. U., & Vasilakos, A. V. (2015). Security in cloud computing: Opportunities and challenges. Information Sciences, 305(2015), 357–383. https://doi.org/10.1016/j.ins.2015.01.025
Alkhater, N., Wills, G., & Walters, R. (2014). Factors influencing an organisation's intention to adopt cloud computing in Saudi Arabia. In 2014 6th International Conference on Cloud Computing Technology and Science (pp. 1040–1044). IEEE.
Alkhunaizan, A., & Love, S. (2012). What drives mobile commerce? An empirical evaluation of the revised UTAUT model. International Journal of Management and Marketing Academy, 2(1), 82–99. doi:10.1016/j.im.2004.07.001
Aljukhadar, M., Senecal, S., & Nantel, J. (2014). Is more always better? Investigating the task-technology fit theory in an online user context. Information & Management, 51(4), 391-397. doi:10.1016/j.im.2013.10.003
Allais, M. (1953). Le Comportement de l'Homme Rationnel devant le Risque: Critique des Postulats et Axiomes de l'Ecole Americaine. (The Rational Man's Behavior in the Face of Risk: Criticism of Postulates and Axioms of the American School). Econometrica, 21(4), 503-546.
Allport, G (1937). Personality: A psychological interpretation. New York: Holt, Rinehart, & Winston.
Allport, G. W. (1961). Pattern and growth in personality (14 print. ed.). New York: Holt, Rinehart and Winston.
Alhogail, A., & Mirza, A. (2014). A framework of information security culture change. Journal of Theoretical and Applied Information Technology, 64(2), 540–549. Retrieved from
www.jatit.org
Allam, S., Flowerday, S. V., & Flowerday, E. (2014). Smartphone information security awareness: A victim of operational pressures. Computers and Security, 42, 56–65. Retrieved from http://dx.doi.org/10.1016/j.cose.2014.01.005
Almorsy, M., Grundy, J., & Müller, I. (2016). An analysis of the cloud computing security problem. arXiv preprint arXiv:1609.01107
Al-Mukahal, H. M., & Alshare, K. (2014). An examination of factors that influence the number of information security policy violations in Qatari organizations. Information and Computer Security, 23(1), 102–118. doi: 10.1108/ICS-03-2014-0018
Alzoubi, Y. I., Gill, A. Q., & Al-Ani, A. (2016). Empirical studies of geographically distributed agile development communication challenges: A systematic review. Information & Management, 53(1), 22-37. doi:10.1016/j.im.2015.08.003
Anderson, M., Bjork, R., & Bjotk, E. (1994). Remembering Can Cause Forgetting: Retrieval Dynamics in Long-Term Memory. Journal of experimental psychology. Learning, memory, and cognition. 20. 1063-87. 10.1037/0278-7393.20.5.1063.
Arachchilage, N. A. G., & Love, S. (2014). Security awareness of computer users: A phishing threat avoidance perspective. Computers in Human Behavior, 38, 304–312. Retrieved from http://dx.doi.org/10.1016/j.chb.2014.05.046
Ardagna, C. A., Asal, R., Damiani, E., & Vu, Q. H. (2015). From security to assurance in the cloud: A survey. ACM Computing Surveys (CSUR), 48(1), 2. doi:10.1145/2767005
Aronson, E. (1972). The social animal: Elliot Aronson. New York: Viking Press.
Arpaci, I., Kilicer, K., & Bardakci, S. (2015). Effects of security and privacy concerns on educational use of cloud services. Computers in Human Behavior, 45, 9398. doi:10.1016/j.chb.2014.11.075
Armour, P. G. (2007). , 50(1), 13-16. doi:10.1145/1188913.1188930
Asch, S.E. (1951). Effects of group pressure on the modification and distortion of judgments. In H. Guetzkow (Ed.), Groups, leadership and men(pp. 177–190). Pittsburgh, PA:Carnegie Press.
Asch, S.E. (1955). "Opinions and social pressure". Scientific American. 193 (5): 31–35. doi:10.1038/scientificamerican1155-31
Attuquayefio, S. N., & Addo, H. (2014). Using the UTAUT model to analyze students' ICT adoption. International Journal of Education and Development Using Information and Communication Technology, 10(3), 75–86.
Bagozzi, R.P. (2007), The Legacy of the Technology Acceptance Model and a Proposal for a Paradigm Shift, Journal of the Association for Information Systems, 8 (4), pp. 244–254.
Baird, A., Furukawa, M. F., & Raghu, T. S. (2012). Understanding contingencies associated with the early adoption of customer-facing web portals. Journal of Management Information Systems, 29(2), 293-324.
Bajo, M. T., Gómez-Ariza, C. J., Fernandez, A., & Marful, A. (2006). Retrieval-induced forgetting in perceptually driven memory tests. Journal of Experimental Psychology: Learning, Memory, and Cognition, 32(5), 1185-1194. http://dx.doi.org/10.1037/0278-7393.32.5.1185
Bandura, A. (1986). Social foundations of thought and action: A social cognitive theory. Englewood Cliffs, NJ: Prentice-Hall, Inc.
Barkly (2016). 2016 Cybersecurity Confidence Report. Retrieved from https://www.barkly.com/cybersecurity-confidence-report-2016
Basin, D., Jugé, V., Klaedtke, F., & Zălinescu, E. (2013). Enforceable security policies revisited. ACM Transaction on Information and System Security, 16(1), 3, 3–26. doi:http://dx.doi.org/10.1145/2487222.2487225
Barlow, J. B., Warkentin, M., Ormond, D., & Dennis, A. R. (2013). Don’t make excuses! Discouraging neutralization to reduce IT policy violation. Computers & Security, 39(2013), 145–159. Retrieved from http://dx.doi.org/10.1016/j.cose.2013.05.006
Barrett, D. (2009). Workshop: How the acceptance of anonymous surfing and Tor in communications has changed the evidence landscape. Proceedings of the Conference on Digital Forensics, Security and Law, 7.
Beck AT (1972). Depression: Causes and Treatment. Philadelphia: University of Pennsylvania Press. ISBN 0-8122-1032-8.
Beggs, C., & McGowan, R. (2011). Fostering SCADA and IT relationships: an industry perspective. International Journal of Cyber Warfare and Terrorism (IJCWT), 1(3), 1-11.
Bleicher, P. (2003). Software life cycles and kitchen. Applied Clinical Trials, 12(10), 30.
Boeck, H. (2014). An overview of ethical considerations when using RFID with consumers. International Journal of Cyber Society and Education, 7(2), 157–164.https://doi.org/10.7903/ijcse.1172
Boehmer, W. (2008). Appraisal of the effectiveness and efficiency of an information security management system based on ISO 27001. In Proceedings of The Second International Conference on Emerging Security Information, Systems, and Technologies, 224-231.
Booch, G. (2014). The stories we tell ourselves. IEEE Software, 31(2), 18-20. doi:10.1109/MS.2014.4
Bower, Gordon H. (ed.) (1984). The Psychology of Learning and Motivation. Academic Press
Branco, T., & Santos, H. (2016, June). What is missing for trust in the cloud computing? In Proceedings of the 2016 ACM SIGMIS Conference on Computers and People Research (pp. 27–28). ACM.
Broadbent, D (1958). Perception and Communication. London: Pergamon Press.
Brookes, N., & Clark, R. (2009). Using maturity models to improve project management practice. In POMS 20th Annual Conference, Florida USA.
Broady, T., Chan, A., & Caputi, P. (2010). Comparison of older and younger adults’ attitudes towards and abilities with computers: Implications for training and learning. British Journal of Educational Technology, 41(3), 473-485. doi:10.1111/j.1467-8535.2008.00914.x
Brown, A. L., et al. (1993). Distributed expertise in the Classroom Distributed cognitions: Psychological and educational considerations. Ed. Gavriel Salomon. New York: Cambridge UP, 188-28.
Brown, R. G., and Pluck, G. (2000). Negative symptoms: the ‘pathology’ of motivation and goal-directed behaviour. Trends Neurosci. 23, 412–417. doi: 10.1016/S0166-2236(00)01626-X
Brumfitt, H. A., Askwith, R., & Zhou, B. (2014). A framework for device security in the Internet of Things. Retrieved from http://www.cms.livjm.ac.uk/PGNet2014/papers/1569961261.pdf
Bruner, J. S. (1960). The Process of education. Cambridge, Mass.: Harvard University Press.
Bruner, J. S. (1966). Toward a theory of instruction, Cambridge, Mass.: Belkapp Press.
Burda, D., & Teuteberg, F. (2014). The role of trust and risk perceptions in cloud archiving. Results from an empirical study. Journal of High Technology Management Research, 25(2), 172187. doi:10.1016/j.hitech.2014.07.008
Burns, S., & Roberts, L. (2013). Applying the theory of planned behavior to predicting online safety behavior. Crime Prevention and Community Safety, 15(1), 48–64. https://doi.org/http://dx.doi.org/10.1057/cpcs.2012.13
Burns, M. J., and Woodruff, R. B. (1992). Delivering value to consumers: Implications for strategy development and implementation. In C. T. Allen, T. J. Madden, T. A. Shimp, R. D. Howell, G. M. Zinkhan,
D. D. Heisley, R. J. Semenik, P. Dickson, V. Zeithami, & R. L. Jenk (Eds.), Marketing Theory and Applications, (1992) (pp. 209-216). Chicago: American Marketing Association.
Bounds, G. M., and Dewhirst, H. D. Assessing progress in managing for customer value. In M. J. Stahl & G. M. Bounds (Eds.), Competing globally through customer value (1991), (pp. 307-339). New York: Quorum
Byres, E. J., Franz, M., & Miller, D. (2004, December). The use of attack trees in assessing vulnerabilities in SCADA systems. In Proceedings of the International Infrastructure Survivability Workshop.
Campbell, D. T., & Fiske, D. W. (1959). Convergent and discriminant validation by the multitrait-multimethod matrix. Psychological Bulletin, 56(2), 81. http://dx.doi.org/10.1037/h0046016
Cannon, W., B. (1915). Bodily changes in pain, hunger, fear, and rage. New York: Appleton-Century-Crofts.
Carol, C., (1972). Cognitive economy in semantic memory. Journal of Experimental Psychology. 92. 149-154. 10.1037/h0032072.
Cassidy, K. (2007). Tuckman Revisited: Proposing a New Model of Group Development for Practitioners. Journal of Experiential Education. 29, 413-417. doi:10.1177/105382590702900318
Cattell, R. B. (1987). Advances in psychology, No. 35. Intelligence: Its structure, growth and action. Oxford, England: North-Holland
Caudle, D. Improving cyber warfare decision-making by incorporating leadership styles and situational context into poliheuristic decision theory. Proceedings of the International Conference On Information Warfare & Security, 2013, 240-247
Cavallari, M. (2011). The organizational relationship between compliance and information security. International Journal of Academic Business World, 5(1), 63–76.
Cebula, J., & Young, L. (2010, December). A taxonomy of operational cyber security risks. Pittsburgh, PA: Carnegie-Mellon Software Engineering Institute (SEI).
Chang, S., & Lin, C. S. (2007). Exploring organizational culture for information security management. Industrial Management and Data Systems, 107, 438–458.doi:10.1108/02635570710734316
Chatterjee, S., Sarker, S., & Valacich, J. S. (2015). The behavioral roots of information systems security: Exploring key factors related to unethical IT Use. Journal of Management Information Systems, 31(4), 49-87.
Chaturvedi, D. A., & Zarger, S. A (2015). A review of security models in cloud computing and an innovative approach. International Journal of Computer Trends and Technology (IJCTT), 30(2), 87–92.
Chebrolu, S. B. (2010). Assessing the relationships among cloud adoption, strategic alignment and information technology effectiveness (Doctoral dissertation). Available from ProQuest Dissertations and Theses database. (UMI No. 762321386)
Chen, P.-Y., Cheng, S.-M., & Chen, K.-C. (2014). Information fusion to defend intentional attack in Internet of Things. IEEE Internet of Things Journal, 1(4), 337–348. https://doi.org/10.1109/JIOT.2014.2337018
Chen, Y., Ramamurthy, K., & Wen, K. (2013). Organizations’ information security policy compliance: Stick or carrot approach. Journal of Management Information Systems, 29(3), 157–188. doi: 10.2753/MIS0742-1222290305
Chen, Y., Ramamurthy, K., & Wen, K. (2015). Impacts of comprehensive information security programs on information security culture. Journal of Computer Information Systems, 55(3), 11–19. doi: 10.1080/08874417.2015.11645767
Cheng, H., & Furnham, A. (2017). Personality traits neuroticism and openness as well as early abnormal eye conditions as predictors of the occurrence of eye problems in adulthood. Health Psychology Open. https://doi.org/10.1177/2055102917716205
Cheolho, Y., Jae-Won, H., & Kim, R. (2012). Exploring factors that influence students' behaviors in information security. Journal of Information Systems Education, 23(4), 407-415.
Chi, H., Yeh, H., & Hung, W. C. (2012). The moderating effect of subjective norm on users’ perceived risk and usage intention. International Journal of Marketing Studies, 4(6), 95102. doi:10.5539/ijms.v4n6p95
Christensen, K. Ethics of information technology. The human edge: Information technology and helping people (1986), 72–91.
Chu, C., & Zhmoginov, A., & Sandler, M. (2017). CycleGAN: a Master of Steganography.
Compeau, D., Higgins, C. A., & Huff, S. (1999). Social cognitive theory and individual reactions to computing technology: A longitudinal study. MIS Quarterly, 23(2),145–158. doi:10.2307/249749
Craik, K. (1943). The Nature of Explanation. Cambridge: Cambridge University Press.
Creswell, J., & Creswell, D. (2018). Research design: Qualitative, quantitative, and mixed methods app (5th ed.). Thousand Oaks, CA: Sage.
Crossman, A., & Lee-Kelley, L. (2004). Trust, commitment and team working: the paradox of virtual organizations. Global Networks, 4, 375-390. doi:10.1111/j.1471-0374.2004.00099.x
Csíkszentmihályi., M. (2007). Flow the Psychology of Optimal Experience. Harper Perennial Modern Classics
Dahlberg, T., Mallat, N., & Öörni, A. (2003). Trust enhanced technology acceptance model consumer acceptance of mobile payment solutions: Tentative evidence.
Damen, T., Strick, M., Taris, T. W., & Aarts, H. (2018). When conflict influences liking: The case of the Stroop task. PloS one, 13(7), e0199700. doi: 10.1371/journal.pone.0199700
Darwin, C. (2009). The Expression of the Emotions in Man and Animals (Cambridge Library Collection - Darwin, Evolution and Genetics) (F. Darwin, Ed.). Cambridge: Cambridge University Press. doi:10.1017/CBO9780511694110
Davis, F. D. (1989). Perceived usefulness, perceived ease of use, and user acceptance of information technology. MIS Quarterly, 13(3), 319–340. doi:10.2307/249008
Davis, F. D., Bagozzi, R. P., & Warshaw, P. R. (1989). User acceptance of computer technology: A comparison of two theoretical models. Management Science, 35(8), 982–1003. https://doi.org/10.1287/mnsc.35.8.982
Davis, F. D., Bagozzi, R. P., & Warshaw, P. R. (1992). Extrinsic and intrinsic motivation to use computers in the workplace. Journal of Applied Social Psychology, 22(14), 1111-1132.
Deutchman, P., & Sullivan, J. (2018). The Dark Triad and framing effects predict selfish behavior in a one-shot Prisoner’s Dilemma. PloS one, 12(9), 1-15.
Digman JM (June 1989). "Five robust trait dimensions: development, stability, and utility". Journal of Personality. 57 (2): 195–214. doi:10.1111/j.1467-6494.
Ding-Long H., Pei-Luen P. R., & Gavriel, S. (2010) Perception of information security, Behaviour & Information Technology, 29:3, 221-232, DOI: 10.1080/01449290701679361
Ding, Y., Jin, Y., Ren, L., & Hao, K. (2013). An intelligent self-organization scheme for the Internet of Things. IEEE Computational Intelligence Magazine, 8(3), 41–53. https://doi.org/10.1109/MCI.2013.2264251
Dlodlo, N., Foko, T., Mvelase, P., & Mathaba, S. (2012). The state of affairs in Internet of Things research. Electronic Journal of Information Systems Evaluation, 15(3), 244–258
Dreisbach G., & Fischer R. (2012). Conflicts as aversive signals. Brain and Cognition, 78(2), 94–98. pmid:22218295
Drury, M., Conboy, K., & Power, K. (2012). Obstacles to decision making in Agile software development teams. Journal of Systems and Software, 85:6. Pp 1239 – 1254.
Egelman S, Peer E. Scaling the security wall: developing a security behavior intentions scale (SeBIS). Proceedings of the ACM Conference on Human Factors in Computing Systems, Seoul; 2015, pp. 2873–82.
Ekman, P. (1985). Telling Lies: Clues to Deceit in the Marketplace, Politics, and Marriage. W. W. Norton & Company. ISBN 0-393-32188-6
Ekman, P. (2003). Emotions Revealed: Recognizing Faces and Feelings to Improve Communication and Emotional Life. Times Books. ISBN 0-8050-7516-X
Ellsberg, Daniel (1961). Risk, Ambiguity, and the Savage Axioms. Quarterly Journal of Economics. 75 (4): 643–669. doi:10.2307/1884324. JSTOR 1884324.
Engel, J.F., Blackwell, R.D., and Miniard, P.W. Consumer Behavior. New York: Dryden Press, 1986.
Everett, C. (2009). Cloud computing–A question of trust. Computer Fraud & Security, 2009(6), 5–7. doi:10.1016/S1361-3723(09)70071-5
Eysenck, H. J. & Eysenck, Sybil B. G. (1976). Psychoticism as a dimension of personality. London: Hodder and Stoughton
Festinger, L., & Carlsmith, J. M. (1959). Cognitive consequences of forced compliance. The Journal of Abnormal and Social Psychology, 58(2), 203-210.
Festinger, L., Riecken, H. W., & Schachter, S. (1956). When prophecy fails. When Prophecy Fails: A Social and Psychological Study of a Modern Group that Predicted the Destruction of the World Minneapolis, MN, US: University of Minnesota Press. http://dx.doi.org/10.1037/10030-000
Figliola, P. M., & Fischer, E. A. (2015). Overview and issues for implementation of the federal cloud computing initiative: Implications for federal information technology reform management. Washington, DC: U.S. Library of Congress Congressional Research Service.
Fishbein Martin, and Icek Ajzen. Belief, Attitude, Intention and Behavior: An Introduction to Theory and Research. California: Addison-Wesley, 1975.
Ford, D., & Whaley, G. (2012). Examining collegiality and social justice in academia and the private sector: an exploratory SYMLOG analysis. NMIMS Management Review, 22, 9-36.
Forrester, J. W. (1971) Counterintuitive behavior of social systems. Technology Review.
Forsyth, T., & Johnson, C. (2014). Elinor Ostrom's Legacy: Governing the Commons and the Rational Choice Controversy. Development and Change, 45, 1093-1110. doi:10.1111/dech.12110
Frankl, V. E. (2006). Man's search for meaning. Boston: Beacon Press.
Freud, S. (1920). A general introduction to psychoanalysis. New York, NY, US: Horace Liveright.
Freud, S., & Strachey, J. (1965). The interpretation of dreams. New York: Avon Books
Frey, C. (2013). Perception of success in information technology projects from the perspective of the project manager (Doctoral dissertation, Order No. 3590336, 1431540451, Capella University, Minneapolis, Minnesota).
Frijda, N. H. (2007). The laws of emotion. Mahwah, NJ, US: Lawrence Erlbaum Associates Publishers.
Furnell, S., & Thomson, K.-L. (2009). Recognising and addressing “security fatigue.” Computer Fraud & Security, 2009(11), 7–11. https://doi.org/10.1016/S1361-3723(09)70139-3
Furnham, A., & Cheng, H. (2016). Childhood intelligence predicts adult trait openness: Psychological and demographic indicators. Journal of Individual Differences, 37(2), 105-111. http://dx.doi.org/10.1027/1614-0001/a000194
Future Proofing: Take Your Cybersecurity Confidence to the Next Level. (2018, February 01). Retrieved from https://www.healthcareitnews.com/infographic/future-proofing-take-your-cybersecurity-confidence-next-level
Gashami, J. P. G., Chang, Y., Rho, J. J., & Park, M. C. (2016). Privacy concerns and benefits in SaaS adoption by individual users: A trade-off approach. Information Development, 32(4), 837–852. https://doi.org/10.1177/0266666915571428
Gazdar, G. (1979). Pragmatics: Implicature, Presupposition, and Logical Form. Academic Press, New York.
Giddens, A. The Constitution of Society, Polity Press, Cambridge, UK, 1984.
Gilovich, T. D.; Griffin, D.; Kahneman, D. (2002). "Heuristics and Biases: The Psychology of Intuitive Judgment". New York, NY: Cambridge University Press.
Godlove, T. (2012). Examination of the factors that influence teleworkers’ willingness to comply with information security guidelines. Information Security Journal: A Global Perspective,21, 216–229
Goffman, E. (1959). The presentation of self in everyday life. Garden City, N.Y. Doubleday,
Gold, J. (2012). Protection in the cloud: Risk management and insurance for cloud computing. Journal of Internet Law, 15(12), 1–28.
Gómez-Pinilla F. (2008). Brain foods: the effects of nutrients on brain function. Nature reviews. Neuroscience, 9(7), 568-78.
Gonzalez, J.J. and Sawicka, A., 2002. A framework for human factors in information security. In: Proceedings of the 2002 WSEAS International Conference on Information Security (ICIS’02), Rio de Janeiro.
Gratian, M., & Bandi, S., & Cukier, M., & Dykstra, J., & Ginther, A. (2017). Correlating Human Traits and Cybersecurity Behavior Intentions. Computers & Security. 73. 345–358. 10.1016/j.cose.2017.11.015.
Griffiths, J. (2019, January 10). When Chinese hackers declared war on the rest of us. Retrieved from https://www.technologyreview.com/s/612638/when-chinese-hackers-declared-war-on-the-rest-of-us/
Guba, R. (2008). Engineering human security. Risk Management, 55(12), 58–60.
Guilford, J.P. (1967). The nature of human intelligence. New York, NY, US: McGraw-Hill.
Guthrie, E. R. (1946). Psychological Facts and Psychological Theory., "Psychological Bulletin" Vol. 43, 1-20
Gulenko, I. (2013). Social against social engineering: Concept and development of a Facebook application to raise security and risk awareness. Information Management & Computer Security, 21(2), 91–101.https://doi.org/http://dx.doi.org/10.1108/IMCS-09-2012-0053
Gunawardena, C.N., Zittle, F.J. (1997). Social pressure as a predictor of satisfaction within a computer-mediated conferencing environment. American Journal of Distance Education, 11(3), 8-26.
Gutman, J. A means-end chain model based on consumer categorization processes. Journal of Marketing, (1982), 46 (2), 60-72.
Gutman, J. (1997). Means-end chains as goal hierarchies. Psychology & Marketing, 14, 545-560. Bowers, G.H., Black, J.B., & Turner, T.J. (1979).
Hadyn, I., Teare, R., Scheuing, E., & Armistead, C. (1997). A systems model of effective teamwork. The TQM Magazine, 9, 118 -127. doi:10.1108/09544789710165563
Hammack, S., & Cooper, M., & Lezak, K. (2011). Overlapping neurobiology of learned helplessness and conditioned defeat: Implications for PTSD and mood disorders. Neuropharmacology. 62. 565-75. 10.1016/j.neuropharm.2011.02.024.
Haney, J., & Lutters, W. (2017). The Work of Cybersecurity Advocates. 1663-1670. 10.1145/3027063.3053134.
Haney, J., & Lutters, W. (2018). It's Scary…It's Confusing…It's Dull: How Cybersecurity Advocates Overcome Negative Perceptions of Security. Proceedings of the Fourteenth Symposium on Usable Privacy and Security, Retrieved from https://www.usenix.org/system/files/conference/soups2018/soups2018-haney-perceptions.pdf
Hardwick, J., Anderson, A. R., & Cruickshank, D. (2013). Trust formation processes in innovative collaborations. European Journal of Innovation Management, 16(1), 4-21. doi:10.1108/14601061311292832
Harnesk, D., & Lindström, J. (2011). Shaping security behaviour through discipline and agility implications for information security management. Information Management and Computer Security, 19(4), 262–276. doi:10.1108/09685221111173076
Harper, A. A. (2016). The impact of consumer security awareness on adopting the internet of things: A correlational study (Order No. 10196140). Available from ProQuest Dissertations & Theses Global. (1853097232).
Hebb. D.O (1949). The Organization of Behavior. Wiley: New York;
Hedström, K., Karlsson, F., & Kolkowska, E. (2013). Social action theory for understanding information security non-compliance in hospitals: The importance of user rationale. Information Management & Computer Security, 21(4), 266–287. doi: 10.1108/IMCS-082012-0043
Hedström, K., Kolkowska, E., Karlsson, F., & Allen, J. P. (2011). Value conflicts for information security management. The Journal of Strategic Information Systems, 20(4), 373–384. https://doi.org/10.1016/j.jsis.2011.06.001
Heffer, V. (n.d.) Personality Theory: An Introduction. Retrieved from https://allpsych.com/personalitysynopsis
Heinrich H. (1931). Industrial accident prevention: a scientific approach. McGraw-Hill. OCLC 571338960.
quoted in Hollnagel, Erik (2009). Safer Complex Industrial Environments: A Human Factors Approach. CRC Press. ISBN 1-4200-9248-0.
Henrich, J., Heine, S., & Norenzayan, A. (2010). The weirdest people in the world? Behavioral and Brain Sciences, 33(2-3), 61-83. doi:10.1017/S0140525X0999152X
Heylighen, F., Heath, M., & Van Overwalle, F. (2003). The emergence of distributed cognition: A conceptual framework. Retrieved from https://www.researchgate.net/publication/249812898_The_Emergence_of_Distributed_Cognition_conceptuaframework
Hilgard, E. R., & Bower, G. H. (1966). Theories of learning: [by] Ernest R. Hilgard [and] Gordon H. Bower. New York: Appleton-Century-Crofts.
Horne, Craig & Ahmad, Atif & Maynard, Sean. (2016). A Theory on Information Security. The 27th Australasian Conference on Information Systems, At Wollongong, Australia
Hulme, G. V., & Goodchild, J. (2017, August 03). What is social engineering? How criminals take advantage of human behavior. Retrieved from https://www.csoonline.com/article/2124681/social-engineering/what-is-social-engineering.html
Hungwei, T., & Heng-Yu, K. (2011). The relationships between trust, performance, satisfaction, and development progressions among virtual teams. Quarterly Review of Distance Education, 12(2), 81-94. Retrieved from http://www.infoagepub.com/quarterly-review-of-distance-education.html
Hull, Clark L. (1932). The goal-gradient hypothesis and maze learning. Psychological Review. 39 (1): 25.
Iasiello, E. (2014). Is cyber deterrence an illusory course of action? Journal of Strategic Security, 7(1), 54-67. doi:10.5038/1944-0472.7.1.5
Iivari, J., Hirschheim, R., and Klein, H. K. (2000). A Dynamic Framework for Classifying Information Systems Development Methodologies and Approaches. Journal of Management Information Systems (17:3), 2000, pp. 179-218
Islam, S., Ouedraogo, M., Kalloniatis, C., Mouratidis, H., & Gritzalis, S. (2015). Assurance of security and privacy requirements for cloud deployment model. IEEE Transactions on Cloud Computing, 181.doi:10.1109/TCC.2015.2511719
ISO/IEC 27032:2012 (2012). Information technology - Security techniques - Guidelines for cybersecurity. Retrieved from http://www.iso27001security.com/html/27032.htm
Iulia, I., Reeder, R., & Consolvo, S. (2015). ... no one can hack my mind: comparing expert and non-expert security practices. In Proceedings of the Symposium on Usable Privacy and Security (SOUPS’15), 327-346.
Jarvenpaa, S. L., & Leidner, D. E. (2006). Communication and Trust in Global Virtual Teams. Journal of Computer-Mediated Communication, 3(4), 0-0. doi:10.1111/j.1083-6101.1998.tb00080.x
Ji-Hwan, L., & Chi-Hoon, S. (2013). Effects of trust and perceived risk on user acceptance of a
new technology service. Social Behavior & Personality: An International Journal, 41(4), 587-597. doi:10.2224/sbp.2013.41.4.587
Johnson, P. (2010). Four steps to effective collaboration. Young Adult Library Services, 9(1), 17-19. Retrieved from https://www.questia.com/library/journal/1G1-240588383/four-steps-to-effective-collaboration
Jung, C. G., & Hull, R. F. C. (1980). The archetypes and the collective unconscious. Princeton, N.J.: Princeton University Press.
Kahneman, D., Tversky, A. (1973). On the Psychology of Prediction. Psychological Review. 80 (4): 237–251. doi:10.1037/h0034747.
Kahneman, D.; Tversky, A. (1979). "Prospect Theory: An Analysis of Decision under Risk. Econometrica. 47 (2): 263. doi:10.2307/1914185. ISSN 0012-9682.
Karis, D., Wildman, D., & Mané, A. (2014). Improving Remote Collaboration with Video Conferencing and Video Portals. Human–Computer Interaction, 31(1), 1-58. doi:10.1080/07370024.2014.921506
Kett, H., Kasper, H., Falkner, J., & Weisbecker, A. (2012). Trust factors for the usage of cloud computing in small and medium sized craft enterprises. In International Conference on Grid Economics and Business Models (pp. 169–181). Berlin: Springer.
Khan, K. M., & Malluhi, Q. (2010). Establishing trust in cloud computing. IT Professional Magazine, 12(5), 20-27. doi: http://dx.doi.org/10.1109/mitp.2010.128
Kim, D. and Hall, J. K. (2002), The Role of an Interactive Book Reading Program in the Development of Second Language Pragmatic Competence. The Modern Language Journal, 86: 332-348. doi:10.1111/1540-4781.00153
Kohler, W. (1947). Gestalt psychology (2nd ed.). Oxford, England: Liveright.
Köhler, W. (1948). The mentality of apes, 1917. In W. Dennis (Ed.), Century psychology series. Readings in the history of psychology (pp. 497-505). East Norwalk, CT, US: Appleton-Century-Crofts. http://dx.doi.org/10.1037/11304-054
Koman, V. P. (2016). Age and the acceptance and use of cyber-security: A quantitative survey of U.S. baby boomer mobile-device security practices (Order No. 10075464). Available from ProQuest Dissertations & Theses Global. (1777347121).
Kozlowski, S. W., & Ilgen, D. R. (2006). Enhancing the Effectiveness of Work Groups and Teams. Psychological Science in the Public Interest, 7(3), 77-124. doi:10.1111/j.1529-1006.2006.00030.x
Kray, L.J. & Thompson, L & Galinsky, A. (2001). Battle of the sexes: Gender stereotype confirmation and reactance in negotiations. Journal of Personality and Social Psychology. 80. 942-958. 10.1037/0022-3514.80.6.942.
Krefting, L. (1991). Rigor in qualitative research: The assessment of trustworthiness. American Journal of Occupational Therapy, 45, 214-222
Kruger, J., David, D. (1999). Unskilled and Unaware of It: How Difficulties in Recognizing One's Own Incompetence Lead to Inflated Self-Assessments. Journal of Personality and Social Psychology. American Psychological Association. 77 (6): 1121–1134.
Kuei-Hu, C. Security threat assessment of an internet security system using attack tree and vague sets, 2014.
Kuo, Z. Y. (1930). The genesis of the cat's responses to the rat. Journal of Comparative Psychology, 11(1), 1.
Kuo, Z.Y. (1938). Further study of the behavior of the cat toward the rat. Journal of Comparative Psychology, Vol 25(1), Feb 1938, 1-8
Lacey, D. (2009). Managing the human factor in information security: how to win over staff and influence business managers. West Sussex, UK: Wiley & Sons.
Leavitt, C. C. (2015). The protege learning experience in virtual mentoring: What is learned, how the learning occurs, and assisting and hindering factors (Order No. 3682581).
Lebek, B., Uffen, J., Neumann, M., Hohler, B., & Breitner, M. H. (2014). Information security awareness and behavior: a theory-based literature review. Management Research Review,
37(12), 1049–1092. doi: 10.1108/MRR-04-2013-0085
Leistert, O. (2012). Resistance against cyber-surveillance within social movements and how surveillance adapts. Surveillance & Society, 9(4), 441-456.http://library.queensu.ca/ojs/index.php/surveillance-andsociety/ article/view/cyber_resist/cyber_resist
Lewin, K. (1951). Field theory in social science: selected theoretical papers (Edited by Dorwin Cartwright.). Oxford, England: Harpers.
Lineberry, S. (2007). The human element: the weakest link in information security. Journal of Accountancy, 204, 44–46, 49. Retrieved from ttps://www.journalofaccountancy.com/issues/2007/nov/thehumanelementtheweakestlinkininformationsecurity.html
Limayem, M., Hirt, S. G., & Cheung, C. K. (2007). How habit limits the predictive power of intention: The case of information systems continuance. MIS Quarterly, 31(4), 705-737.
Liu, C. (2015). Types of employee perceptions of information security using Q methodology: An
empirical study. International Journal of Business and Information, 10(4), 557–575
Lorenz, K. (1937). On the formation of the concept of instinct. Natural Sciences, 25(19), 289-300.
Loftus., E. (1979) Eyewitness Testimony. Cambridge, MA: Harvard University Press
Loftus., E. (1999) Lost in the Mall: Misrepresentations and Misunderstandings. Ethics & Behavior, 9(1) 51-60.
Luftman, J. (2000). Assessing business-IT alignment maturity. Communications of the Association for Information Systems, 4(14), 1-51. Retrieved from http://aisel.aisnet.org/cais/vol4/iss1/14/
Lupyan, G. 2013. The difficulties of executing simple algorithms: Why brains make mistakes computers don’t. Cognition 129(3). 615–636.
Madden, T. J., Ellen, P. S., & Ajzen, I. (1992). A comparison of the theory of planned behavior and the theory of reasoned action. Personality and Social Psychology Bulletin, 18(1), 3–9. https://doi.org/10.1177/0146167292181001
Maier, S. F.; Seligman, M. E. P. Learned Helplessness: Theory and Evidence. Journal of Experimental Psychology: General, 105, 1, 3-46, Mar 76
Markus, M., Majchrzak, L. A., and Gasser, L. (2002). A Design Theory for Systems that Support Emergent Knowledge Processes, MIS Quarterly (26:3), 2002, pp. 179-212.
Maslow, A.H. (1943). A theory of human motivation. Psychological Review. 50 (4): 370–96
Matulessy, A., & Humaira, N. (2016). Hacker Personality Profiles Reviewed in Terms of the Big Five Personality Traits. Psychology and Behavioral Sciences. Vol. 5, No. 6, 2016, pp. 137-142. doi: 10.11648/j.pbs.20160506.12
McClelland, D.C. (1987). Human motivation. New York: University of Cambridge.
McNeese, M., Mancuso, V., McNeese, N., Endsley, T., & Forster, P. (2013). Using the living laboratory framework as a basis for understanding next-generation analyst work. Paper presented at the SPIE Defense, Security, and Sensing, Baltimore, Maryland.
Meki Kombe, C. L., & Herman, C. (2017). Can education innovations be sustained after the end of donor funding? The case of a reading intervention programme in Zambia. Educational Review, 69(5), 533-553. doi:10.1080/00131911.2016.1265917
Mell, P. M., & Grance, T. (2011). SP 800-145. The NIST definition of cloud computing. Gaithersburg, MD: National Institute of Standards & Technology.
Michaelidis. G. (2018). The Road to Cybersecurity Is Paved With “Extraordinarily Basic Things”. Behavioral Scientist. Retrieved from http://behavioralscientist.org/the-road-to-cybersecurity-is-paved-with-extraordinarily-basic-things/
Mikton, J. (2015). The Internet of Things: Ethics of our connectivity. The International Schools Journal, 35(1), 56.
Milgram, S. (1963). Behavioral Study of obedience. The Journal of Abnormal and Social Psychology, 67(4), 371-378.
Milgram, S. (1974). Obedience to authority: An experimental view. New York: Harper & Row.
Miller, G. A. (1956). The magical number seven, plus or minus two: some limits on our capacity for processing information. Psychological Review, 63(2), 81-97. http://dx.doi.org/10.1037/h0043158
Miller, N. E. (1967). Laws of learning relevant to its biological basis. Proceedings of the American Philosophical Society, 111, 315-325.
Mischel, W., Ebbesen, E. B., & Raskoff Zeiss, A. (1972). Cognitive and attentional mechanisms in delay of gratification. Journal of Personality and Social Psychology, 21(2), 204-218. http://dx.doi.org/10.1037/h0032198
Mischel, W., & Ayduk, O. (2004). Willpower in a cognitive-affective processing system: The dynamics of delay of gratification. In R.F. Baumeister & K.D. Vohs (Eds.), Handbook of Self-Regulation: Research, Theory, and Applications (pp. 99–129). New York: Guilford.
Mohapatra, S. (2017). Cloud computing relationships between deployments model selection and it security (Order No. 10255126). Available from ProQuest Dissertations & Theses Global. (1876037344
Moore, G. E. “Cramming More Components onto Integrated Circuits,” Electronics (38:8), 1965, pp. 114-117.
Moscovici, S. & Duveen, G. & Macey, D. (2008). Psychoanalysis : its image and its public. Polity, Cambridge Malden, MA
Munger, C. (1994). A Lesson on Elementary, Worldly Wisdom as It Relates to Investment Management & Business. USC Business School, Retrieved from https://old.ycombinator.com/munger.html
Myerson, R. B. (1991). Game Theory: Analysis of Conflict. Harvard University Press, 1, vii–xi
National Science and Technology Council. 2016 Federal Cybersecurity Research and Development Strategic Plan. ENSURING PROSPERITY AND NATIONAL SECURITY Retrieved from https://www.nitrd.gov/cybersecurity/
Nevin, J.. (1999). Analyzing Thorndike's Law Of Effect: The Question Of Stimulus-response Bonds. Journal of the experimental analysis of behavior. 72. 447-50. 10.1901/jeab.1999.72-447.
Nicholas, R., (1989). Cognitive Economy: The Economic Dimension of the Theory of Knowledge_. University of Pittsburgh Press.
O'Donnell, E., Arnold, V., & Sutton, S. G. (2000). An analysis of the group dynamics surrounding internal control assessment in information systems audit and assurance domains. Journal of Information Systems, 14(1), 97.
Oppenheimer, Daniel. (2012). Hard-to-Read Fonts Promote Better Recall. Harvard business review. 90. 32-3.
Orlikowski, W. J. (1992). The Duality of Technology: Rethinking the Concept of Technology in Organizations, Organization Science (3:3), 1992, pp. 398-427.
Oye, N. D., Aiahad, N., & Abrahim, N. (2014). The history of UTAUT model and its impact on ICT acceptance and usage by academicians. Education and Information Technologies, 19(1), 251–270. https://doi.org/http://dx.doi.org/10.1007/s10639- 012-9189-9
Öztürk, V. (2013). Selection of appropriate software development life cycle using fuzzy logic. Journal of Intelligent & Fuzzy Systems, 25(3), 797-810. doi:10.3233/IFS-120686
Parker, D. B., Swope, S., AND BAKER, B. N. Ethical conflicts in information and computer science, technology, and business.
Pavlov, I. P. (1927). Conditioned reflexes: an investigation of the physiological activity of the cerebral cortex. Oxford, England: Oxford Univ. Press.
Perls, F. S., & Andreas, S. (1969). Gestalt therapy verbatim. Lafayette, Calif.: Real People Press.
Perls, F. S., & Perls, F. S. (1973). The gestalt approach & Eye witness to therapy. Ben Lomond, Calif.: Science & Behavior Books.
Perry, S. (2001). Writing in Flow: Keys to Enhanced Creativity. Writer's Digest Books
Pfleeger, S. L., & Caputo, D. D. (2012). Leveraging behavioral science to mitigate cyber security risk. Computers & Security, 31(4), 597–611
Pinker, S. (1999). How the mind works. New York: W.W. Norton.
Pinyol, I., & Sabater-mir, J. (2013). Computational trust and reputation models for open multi-agent systems: a review. The Artificial Intelligence Review, 40(1), 1-25.doi: 10.1007/s10462-011-9277-z
Plous, S. (1993). The psychology of judgment and decision making. McGraw-Hill. ISBN 978-0-07-050477-6.
Putra, S. J., Subiyakto, A., Kartiwi, M., & Ahlan, A. R. (2016). Measurement of the information system project success of the higher education institutions in Indonesia: a pilot study. International Journal of Business Information Systems, 23, 229. doi:10.1504/ijbis.2016.10000261
Rabai, L. B. A., Jouini, M., Aissa, A. B., & Mili, A. (2012). A cybersecurity model in cloud computing environments. Journal of King Saud University-Computer and Information Sciences, 25(1), 63–75. https://doi.org/10.1016/j.jksuci.2012.06.002
Raza, N., Rashid, I., & Awan, F. A. (2017). Security and management framework for an organization operating in cloud environment. Annals of Telecommunications, 72(5-6), 325-333.
Rehman, M., Esichaikul, V., & Kamal, M. (2012). Factors influencing e-government adoption in Pakistan. Transforming Government: People, Process and Policy, 6(3), 258–282. https://doi.org/http://dx.doi.org/10.1108/17506161211251263
Reynolds, T.J., Gutman, J. Laddering theory, method, analysis and interpretation. Journal of Marketing, 28 (1), (1988), 11-31
Richardson, K. (2019. It's the End of the Gene as We Know It. Nautilus. Issue 68. Retrieved from http://nautil.us/issue/68/context/its-the-end-of-the-gene-as-we-know-it
Rogers, Carl. (1961). On Becoming a Person: A Therapist's View of Psychotherapy. London: Constable
Rogers, E. M. (1995). Diffusion of innovations. New York, NY: Free Press.
Rogers, E. M., & Shoemaker, F. (1983). Diffusion of innovation: A cross-cultural approach. New York, NY: Free Press.
Romero, E., Cruthirds. K. (May 2006). The Use of Humor in the Workplace. Academy of Management Perspectives. 20 (2): 58–69
Rosenhan, D.L. (1973). On Being Sane in Insane Places. Science. American Association for the Advancement of Science. 179 (4070): 250–258.
Rosch, E. (1975). Cognitive representations of semantic categories. Journal of Experimental Psychology: General, 104, 192-233.
Rosch, E. (1978). Principles of categorization. In E. Rosch & B. B. Lloyd (Eds.), Cognition and categorization. Hillsdale, NJ: Erlbaum. Reprinted in: Margolis, E. and Laurence, S. (Eds.) (1999). Concepts: Core readings. Cambridge, MA: MIT Press
Rousseau, D. M. (1989). Psychological and implied contracts in organizations. Employee Responsibilities & Rights Journal, 2(2), 121-139. doi:10.1007/bf01384942
Ruffin, V. A., Salameh, A. I., Boron, W. F., & Parker, M. D. (2014). Intracellular pH regulation by acid-base transporters in mammalian neurons. Frontiers in physiology, 5, 43. doi:10.3389/fphys.2014.00043
Salkovskis., P., M. (1999) Understanding and treating obsessive compulsive disorder. Behaviour Research and Therapy, 37, S29-S52.
Saltzer, E. B. (1981). Cognitive moderators of the relationship between behavioral intentions and behavior. Journal of Personality and Social Psychology, 41(2), 260-271. doi:10.1037/0022-3514.41.2.260
Schacter, D.. L. (2001) The Seven Sins of Memory: How the Mind Forgets and Remembers. Houghton Mifflin Harcourt
Schmitt, D., & Allik, J., & R., McCrae, & Benet, V., & Alcalay, L., & Ault, L., & Austers, I., & Bennett, K., & Bianchi, G., & Boholst, F., & Ann Borg. C., & Braeckman, J., & G. Brainerd Jr, E., & Caral, L., & Caron, G., & Martina C., & Cunningham, M., & Daibo, I., & de backer, C., & Zupanèiè, A. (2007). The geographic distribution of Big Five personality traits: Patterns and profiles of human self-description across 56 nations. Journal of Cross-Cultural Psychology. 38. 173-212.
Schuessler, J. H. (2009). General deterrence theory: Assessing information systems security effectiveness in large versus small businesses (Doctoral dissertation). Retrieved from http://nsl.cse.unt.edu/~dantu/cae/attachments
Seligman, M. E. P. (1975). A series of books in psychology. Helplessness: On depression, development, and death. New York, NY, US: W H Freeman/Times Books/ Henry Holt & Co.
Semon, R. (1921). The Mneme. London: George Allen & Unwin.
Shepard, R.N. (1987). Toward a universal law of generalization for psychological science. Science, 237 4820, 1317-23.
Shinder, D. Ethical issues for Information Technology security professionals. https://www.computerworld.com/article/2557944/security0/ethical-issues-for-IT-security-professionals.html.
Schneider, S., & Sunyaev, A. (2016). Determinant factors of cloud-sourcing decisions: Reflecting on the IT outsourcing literature in the era of cloud computing. Journal of Information Technology, 31(1), 1–31. https://doi.org/10.1057/jit.2014.25
Shiva, S & Roy, Sankardas & Dasgupta, D. (2010). Game theory for cyber security. 10.1145/1852666.1852704.
Skinner, B. F. (1938). The behavior of organisms: an experimental analysis. Oxford, England: Appleton-Century.
Skinner, B. F. (1990). The behavior of organisms: An experimental analysis. BF Skinner Foundation.
Spinello, R. A. (2011). Cyberethics: Morality and law in cyberspace. Sudbury, MA: Jones and Bartlett.
Stahl, B., Doherty, N., Shaw, M., & Janicke, H. (2014). Critical Theory as an Approach to the Ethics of Information Security. Science & Engineering Ethics, 20(3), 675-699.
Stanton, J. M., & Fagnot, I. J. (2006). Extracting useful information from security assessment interviews. In Proceedings of the 39th Annual Hawaii International Conference on Systems Sciences, 2006.
Stewart, D. W., & Shamdasani, P. N. (2015). Focus groups: Theory and practice (2nd ed.). Thousand Oaks, CA: Sage Publications Inc.
Stroop, J. R. (1935). Studies of interference in serial verbal reactions. Journal of Experimental Psychology, 18(6), 643-662. http://dx.doi.org/10.1037/h0054651
Sun, D., Chang, G., Sun, L., & Wang, X. (2011). Surveying and analyzing security, privacy and trust issues in cloud computing environments. Procedia Engineering, 15, 2852–2856. https://doi.org/10.1016/j.proeng.2011.08.537
Sundararajan, S., Vijayaraghavan, P. K., & Bhasi, M. (2014). Case study on risk management practice in large offshore-outsourced Agile software projects. IET Software, 8(6), 245-257. doi:10.1049/iet-sen.2013.0190
Svantesson, D., & Clarke, R. (2010). Privacy and consumer risks in cloud computing, Computer Law & Security Review, 26(4), 391–397. https://doi.org/10.1016/j.clsr.2010.05.005
Tadda G.P., Salerno J.S. (2010) Overview of Cyber Situation Awareness. In: Jajodia S., Liu P., Swarup V., Wang C. (eds) Cyber Situational Awareness. Advances in Information Security, vol 46. Springer, Boston, MA
Tashi, I., & Ghernaouti-Hélie, S. (2009, March). A Security Management Assurance Model to Holistically Assess the Information Security Posture. In 2009 International Conference on Availability, Reliability and Security, 756-761.
Taylor, S., & Todd, P. (1995). Assessing IT usage: The role of prior experience. MIS Quarterly, 561-570.
Thigpen, C. H., & Cleckley, H. M. (1957). The three faces of Eve. New York, NY, US: McGraw-Hill.
Thompson, R. L., Higgins, C. A., & Howell, J. M. (1991). Personal computing: Toward a conceptual model of utilization. MIS Quarterly, 15(1), 125–143. doi:10.2307/249443
Thorndike, E. L., Bregman, E. O., Cobb, M. V., Woodyard, E., & Inst of Educational Research Div. of Psychology, Teachers Coll, Columbia U. (1926). The measurement of intelligence. New York, NY, US: Teachers College Bureau of Publications. http://dx.doi.org/10.1037/11240-000
Tolman, E. C. (1932). Purposive behavior in animals and men. London, England: Century/Random House UK.
Tolman, E. C. (1948). Cognitive maps in rats and men. Psychological Review, 55(4), 189-208.
http://dx.doi.org/10.1037/h0061626
Tulving, E. (1972). Episodic and semantic memory. In E. Tulving & W. Donaldson, Organization of memory. Oxford, England: Academic Press.
Tulving, E. (1985). Memory and consciousness. Canadian Psychology/Psychologie canadienne, 26(1), 1-12.
http://dx.doi.org/10.1037/h0080017
Turban, E., and Aronson, J. Decision Support Systems and Intelligent Systems, Prentice-Hall, Upper Saddle River, NJ, 2001
Tversky, A., Kahneman, D. (1974). Judgment under uncertainty: Heuristics and biases. Science. 185 (4157): 1124–1131. doi:10.1126/science.185.4157.1124.
Tversky, A., Kahneman, D. (1981). The Framing of decisions and the psychology of choice. Science. 211 (4481): 453–58.
van der Heijden, H. (2004). User acceptance of hedonic information systems. MIS Quarterly, 28(4), 695-704.
Van Rijnsoever, F. J. (2017). (I Can’t Get No) Saturation: A simulation and guidelines for sample sizes in qualitative research. PLOS ONE, 12, e0181689. doi:10.1371/journal.pone.0181689
Vann, J. (2018, December 27). Survey: Maritime industry cybersecurity confidence is mixed. Cybersecurity column. Retrieved from https://pilotonline.com/inside-business/news/columns/article_4d2e7f20-07a7-11e9-bc70-b384a379f1ec.html
Velazquez, M. O. (2014). Trust in the Cloud: A cognitive-behavioral framework of technology adoption for cloud computing in organizations (Doctoral dissertation, Universidad del Turabo (Puerto Rico)).
Venkatesh, V. (2000). Determinants of perceived ease of use: Integrating control, intrinsic motivation, and emotion into the technology acceptance model. Information Systems Research, 11(4), 342–365. doi:10.1287/isre.11.4.342.11872
Venkatesh, V., Morris, M. G., Davis, G. B., & Davis, F. D. (2003). User acceptance of information technology: Toward a unified view. MIS Quarterly, 27(3), 425–478. doi:10.2307/30036540
Von Bertalanffy, L. General System Theory (Rev. ed.), George Braziller, New York, 1973.
von Solms, Rossouw & van Niekerk, Johan. (2013). From information security to cyber security. Computers & Security. 38. 97-102. 10.1016/j.cose.2013.04.004.
Warfield, D. (2011). The perceptions of U.S.-Based IT security professionals about the effectiveness of IT security frameworks: A quantitative study (Doctoral dissertation). Retrieved from ProQuest Dissertations and Theses (UMI No. 3450639).
Watson, J. B. (1994). Psychology as the Behaviorist Views It... Psychological Review. 101. 248-. 10.1037/0033-295X.101.2.248.
Watson, J. B. & Rosalie. R. (1920). Conditioned Emotional Reactions. Journal of Experimental Psychology. 3. 1-14. 10.1037/h0069608
Wakunuma, K. J., & Stahl, B. C. (2014). Tomorrow’s ethics and today's response: An investigation into the ways information systems professionals perceive and address emerging ethical issues. Information Systems Frontiers, 16(3), 383–397. https://doi.org/http://dx.doi.org/10.1007/s10796-014-9490-9
Wei, June. (2010). Knowledge management framework for cyber security learning. International Journal of Management in Education. 4. 10.1504/IJMIE.2010.029884.
Wener, P., & Woodgate, R. L. (2013). Use of a qualitative methodological scaffolding process to design robust interprofessional studies. Journal of Interprofessional Care, 27, 305-312. doi:10.3109/13561820.2013.763775
Vieane, A., Funke, G., Gutzwiller, R., Mancuso, V., Sawyer, B., & Wickens, C. (2016). Addressing human factors gaps in cyber defense. Proceedings of the Human Factors and Ergonomics Society. 60, 770-773. doi:10.1177/1541931213601176
Winnie, P.-M. W. (2014). The impact of trustworthiness and customer e-loyalty and e-satisfaction. International Journal of Academic Research in Business and Social Sciences, 4(3). https://doi.org/10.6007/IJARBSS/v4-i3/718
White, G. L., Hewitt, B., & Kruck, S. E. (2013). Incorporating Global Information Security and Assurance in I.S. Education. Journal of Information Systems Education, 24(1), 11-16.
Wilson, M. P., Benedict, J. A., Snow, G., & Havercamp, M. (2010). Team development and beyond. Journal of Extension, 48(5). Retrieved from https://www.joe.org/
Wingfield, J. C., Maney, D. L., Breuner, C. W., Jacobs, J. D., Lynn, S., Ramenofsky, M., et al. (1998). Ecological bases of hormone–behavior interactions: The “Emergency Life History Stage”. Amer. Zool. 38, 191–206. doi: 10.1093/icb/38.1.191
Whitty, M., Doodson, J., Creese, S., & Hodges, D. (2015). Individual differences in cyber security behaviors: an examination of who is sharing passwords. Cyberpsychology, behavior and social networking, 18(1), 3-7.
Wogalter, M.S., Brelsford, J.W., Desaulniers, D.R., and Laughery, K.R., 1991. Consumer product warnings. The role of hazard perception. Journal of Safety Research, 22, 71.
Wohl, M., & A. Pychyl, T., & H. Bennett, S., (2010). I forgive myself, now I can study: How self-forgiveness for procrastinating can reduce future procrastination. Personality and Individual Differences. 48. 803-808. 10.1016/j.paid.2010.01.029.
Woodcock, M. (2017). Team development manual (2nd ed.). New York, NY: Routledge.
Woody, E. Z., & Szechtman, H. (2013). A biological security motivation system for potential threats: are there implications for policy-making? Frontiers in human neuroscience, 7, 556. doi:10.3389/fnhum.2013.00556
Zafar, H. & Clark, J. G. (2009). Current State of Information Security Research in IS. Communications of the Association for Information Systems, 24(34).
Zajonc, R. B. (1968). Attitudinal Effects of Mere Exposure. Journal of Personality and Social Psychology. 9 (2, Pt.2): 1–27. doi:10.1037/h0025848. ISSN 1939-1315.
Zajonc, R.B. (February 1980). "Feeling and thinking: Preferences need no inferences". American Psychologist. 35 (2): 151–175. doi:10.1037/0003-066x.35.2.151.
Zeigarnik, B. (1938). On finished and unfinished tasks. In W. D. Ellis (Ed.), A source book of Gestalt psychology (pp. 300-314). London, England: Kegan Paul, Trench, Trubner & Company. http://dx.doi.org/10.1037/11496-025
Zhu, B., Joseph, A., & Sastry, S. (2011, October). A taxonomy of cyberattacks on SCADA systems. In Internet of things (iThings/CPSCom), 2011 international conference on and 4th international conference on cyber, physical and social computing, 380-388.
Ziadeh, Z. (2018). NSA Cybersecurity Operators Fight Through Stress for National Security, But at What Cost? Retrieved from https://www.governmentciomedia.com/nsa-cybersecurity-operators-fight-through-stress-national-security-what-cost
Zimbardo, P. G. (1972). The Stanford prison experiment: A simulation study of the psychology of imprisonment conducted August 1971 at Stanford University. Stanford, Calif.: Philip G. Zimbardo, Inc.
Zimbardo, P.G. (2007). The Lucifer effect: understanding how good people turn evil. New York: Random House.