Skip to content
Branch: master
Find file Copy path
Find file Copy path
Fetching contributors…
Cannot retrieve contributors at this time
24 lines (12 sloc) 2.02 KB

References used in

Alkaldi, N. and Renaud, K. (2016) Why Do People Adopt, or Reject, Smartphone Password Managers? In: EuroUSEC 2016: The 1st European Workshop on Usable Security, Darmstadt, Germany, 18 July 2016, ISBN 1891562452.

Crossler, R. E., Johnston, A. C., Lowry, P. B., Hu, Q., Warkentin, M., & Baskerville, R. (2013). Future directions for behavioral information security research. Computers & Security, 32, 90–101.

Cybersecurity Ventures (2017). Cybercrime Report 2017 Edition. Retrieved from

Deci E.L., Ryan R.M. (2014) Autonomy and need satisfaction in close relationships: Relationships motivation theory. In: Weinstein N. (eds) Human Motivation and Interpersonal Relationships. Springer, Dordrecht.

Finkelstein, S. R., & Fishbach, A. (2011). Tell me what I did wrong: Experts seek and respond to negative feedback. Journal of Consumer Research, 39, 22–38.

Gigerenzer, Gerd. Risk savvy: How to make good decisions. Penguin, 2015.

Kardas, M., & O’Brien, E. (2018). Easier Seen Than Done: Merely Watching Others Perform Can Foster an Illusion of Skill Acquisition. Psychological Science, Online first publication.

Kok, G., Peters, G. J. Y., Kessels, L. T., Ten Hoor, G. A., & Ruiter, R. A. (2017). Ignoring theory and misinterpreting evidence: The false belief in fear appeals. Health Psychology Review, Online First Publication.

Menard, P., Bott, G. J., & Crossler, R. E. (2017). User motivations in protecting information security: Protection motivation theory versus self-determination theory. Journal of Management Information Systems, 34, 1203–1230.

Olmstead, K., Smith, Aaron. (2017a). Americans’ experiences with data security. Retrieved from

Olmstead, K., Smith, Aaron. (2017b). What the public knows about cybersecurity. Retrieved from

You can’t perform that action at this time.