Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/journals/dss/dss92.bht:"
@article{DBLP:journals/dss/AndersonJVKE16, author = {Bonnie Brinton Anderson and Jeffrey L. Jenkins and Anthony Vance and C. Brock Kirwan and David Eargle}, title = {Your memory is working against you: How eye tracking and memory explain habituation to security warnings}, journal = {Decis. Support Syst.}, volume = {92}, pages = {3--13}, year = {2016}, url = {https://doi.org/10.1016/j.dss.2016.09.010}, doi = {10.1016/J.DSS.2016.09.010}, timestamp = {Thu, 20 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dss/AndersonJVKE16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dss/ChunCS16, author = {Se{-}Hak Chun and Wooje Cho and Ramanath Subramanyam}, title = {Transaction security investments in online marketplaces: An analytical examination of financial liabilities}, journal = {Decis. Support Syst.}, volume = {92}, pages = {91--102}, year = {2016}, url = {https://doi.org/10.1016/j.dss.2016.09.015}, doi = {10.1016/J.DSS.2016.09.015}, timestamp = {Thu, 20 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dss/ChunCS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dss/LuoZ16, author = {Xin Robert Luo and Dmitry Zhdanov}, title = {Special issue introduction: {A} comprehensive perspective on information systems security - technical advances and behavioral issues}, journal = {Decis. Support Syst.}, volume = {92}, pages = {1--2}, year = {2016}, url = {https://doi.org/10.1016/j.dss.2016.10.003}, doi = {10.1016/J.DSS.2016.10.003}, timestamp = {Thu, 20 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dss/LuoZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dss/MousavizadehKC16, author = {Mohammadreza Mousavizadeh and Dan J. Kim and Rui Chen}, title = {Effects of assurance mechanisms and consumer concerns on online purchase decisions: An empirical study}, journal = {Decis. Support Syst.}, volume = {92}, pages = {79--90}, year = {2016}, url = {https://doi.org/10.1016/j.dss.2016.09.011}, doi = {10.1016/J.DSS.2016.09.011}, timestamp = {Thu, 08 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dss/MousavizadehKC16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dss/Padayachee16, author = {Keshnee Padayachee}, title = {An assessment of opportunity-reducing techniques in information security: An insider threat perspective}, journal = {Decis. Support Syst.}, volume = {92}, pages = {47--56}, year = {2016}, url = {https://doi.org/10.1016/j.dss.2016.09.012}, doi = {10.1016/J.DSS.2016.09.012}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dss/Padayachee16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dss/SilvaHBM16, author = {Leiser Silva and Carol Hsu and James Backhouse and Aidan McDonnell}, title = {Resistance and power in a security certification scheme: The case of c: cure}, journal = {Decis. Support Syst.}, volume = {92}, pages = {68--78}, year = {2016}, url = {https://doi.org/10.1016/j.dss.2016.09.014}, doi = {10.1016/J.DSS.2016.09.014}, timestamp = {Thu, 20 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dss/SilvaHBM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dss/WarkentinJSB16, author = {Merrill Warkentin and Allen C. Johnston and Jordan Shropshire and William D. Barnett}, title = {Continuance of protective security behavior: {A} longitudinal study}, journal = {Decis. Support Syst.}, volume = {92}, pages = {25--35}, year = {2016}, url = {https://doi.org/10.1016/j.dss.2016.09.013}, doi = {10.1016/J.DSS.2016.09.013}, timestamp = {Wed, 16 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dss/WarkentinJSB16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dss/YazdanmehrW16, author = {Adel Yazdanmehr and Jingguo Wang}, title = {Employees' information security policy compliance: {A} norm activation perspective}, journal = {Decis. Support Syst.}, volume = {92}, pages = {36--46}, year = {2016}, url = {https://doi.org/10.1016/j.dss.2016.09.009}, doi = {10.1016/J.DSS.2016.09.009}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dss/YazdanmehrW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dss/YuS16, author = {Yu Andy Wu and Carol S. Saunders}, title = {Governing the fiduciary relationship in information security services}, journal = {Decis. Support Syst.}, volume = {92}, pages = {57--67}, year = {2016}, url = {https://doi.org/10.1016/j.dss.2016.09.008}, doi = {10.1016/J.DSS.2016.09.008}, timestamp = {Thu, 20 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dss/YuS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dss/ZhouKZL16, author = {Lina Zhou and Yin Kang and Dongsong Zhang and Jianwei Lai}, title = {Harmonized authentication based on ThumbStroke dynamics on touch screen mobile phones}, journal = {Decis. Support Syst.}, volume = {92}, pages = {14--24}, year = {2016}, url = {https://doi.org/10.1016/j.dss.2016.09.007}, doi = {10.1016/J.DSS.2016.09.007}, timestamp = {Thu, 20 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dss/ZhouKZL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.