• Reference Citation Analysis
  • v
  • v
  • Find an Article
Find an Article PDF (4632670)   Today's Articles (1726)   Subscriber (49929)
For: Renaud K, Otondo R, Warkentin M. “This is the way ‘I’ create my passwords” ... does the endowment effect deter people from changing the way they create their passwords? Comput Secur 2019. [DOI: 10.1016/j.cose.2018.12.018] [Citation(s) in RCA: 11] [Impact Index Per Article: 2.2] [Reference Citation Analysis] [What about the content of this article? (0)] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 10/27/2022]
Number Cited by Other Article(s)
1
Securing online accounts and assets: An examination of personal investments and protection motivation. INTERNATIONAL JOURNAL OF INFORMATION MANAGEMENT 2023. [DOI: 10.1016/j.ijinfomgt.2022.102590] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/07/2022]
2
Ifinedo P. Exploring Personal and Environmental Factors that Can Reduce Nonmalicious Information Security Violations. INFORMATION SYSTEMS MANAGEMENT 2022. [DOI: 10.1080/10580530.2022.2131944] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 11/05/2022]
3
Renaud K, Coles-Kemp L. Accessible and Inclusive Cyber Security: A Nuanced and Complex Challenge. SN COMPUTER SCIENCE 2022;3:346. [PMID: 35755325 PMCID: PMC9215151 DOI: 10.1007/s42979-022-01239-1] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 11/16/2021] [Accepted: 05/31/2022] [Indexed: 12/03/2022]
4
Alkaldi N, Renaud K. MIGRANT. DATA BASE FOR ADVANCES IN INFORMATION SYSTEMS 2022. [DOI: 10.1145/3533692.3533698] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 10/18/2022]
5
An application and empirical test of the Capability Opportunity Motivation-Behaviour model to data leakage prevention in financial organizations. Comput Secur 2020. [DOI: 10.1016/j.cose.2020.101970] [Citation(s) in RCA: 8] [Impact Index Per Article: 2.0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/19/2022]
6
van Schaik P, Renaud K, Wilson C, Jansen J, Onibokun J. Risk as affect: The affect heuristic in cybersecurity. Comput Secur 2020. [DOI: 10.1016/j.cose.2019.101651] [Citation(s) in RCA: 13] [Impact Index Per Article: 3.3] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/27/2022]
PrevPage 1 of 1 1Next
© 2004-2024 Baishideng Publishing Group Inc. All rights reserved. 7041 Koll Center Parkway, Suite 160, Pleasanton, CA 94566, USA