Search dblp for Publications

export results for "toc:db/journals/dss/dss92.bht:"

 download as .bib file

@article{DBLP:journals/dss/AndersonJVKE16,
  author       = {Bonnie Brinton Anderson and
                  Jeffrey L. Jenkins and
                  Anthony Vance and
                  C. Brock Kirwan and
                  David Eargle},
  title        = {Your memory is working against you: How eye tracking and memory explain
                  habituation to security warnings},
  journal      = {Decis. Support Syst.},
  volume       = {92},
  pages        = {3--13},
  year         = {2016},
  url          = {https://doi.org/10.1016/j.dss.2016.09.010},
  doi          = {10.1016/J.DSS.2016.09.010},
  timestamp    = {Thu, 20 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dss/AndersonJVKE16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dss/ChunCS16,
  author       = {Se{-}Hak Chun and
                  Wooje Cho and
                  Ramanath Subramanyam},
  title        = {Transaction security investments in online marketplaces: An analytical
                  examination of financial liabilities},
  journal      = {Decis. Support Syst.},
  volume       = {92},
  pages        = {91--102},
  year         = {2016},
  url          = {https://doi.org/10.1016/j.dss.2016.09.015},
  doi          = {10.1016/J.DSS.2016.09.015},
  timestamp    = {Thu, 20 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dss/ChunCS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dss/LuoZ16,
  author       = {Xin Robert Luo and
                  Dmitry Zhdanov},
  title        = {Special issue introduction: {A} comprehensive perspective on information
                  systems security - technical advances and behavioral issues},
  journal      = {Decis. Support Syst.},
  volume       = {92},
  pages        = {1--2},
  year         = {2016},
  url          = {https://doi.org/10.1016/j.dss.2016.10.003},
  doi          = {10.1016/J.DSS.2016.10.003},
  timestamp    = {Thu, 20 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dss/LuoZ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dss/MousavizadehKC16,
  author       = {Mohammadreza Mousavizadeh and
                  Dan J. Kim and
                  Rui Chen},
  title        = {Effects of assurance mechanisms and consumer concerns on online purchase
                  decisions: An empirical study},
  journal      = {Decis. Support Syst.},
  volume       = {92},
  pages        = {79--90},
  year         = {2016},
  url          = {https://doi.org/10.1016/j.dss.2016.09.011},
  doi          = {10.1016/J.DSS.2016.09.011},
  timestamp    = {Thu, 08 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dss/MousavizadehKC16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dss/Padayachee16,
  author       = {Keshnee Padayachee},
  title        = {An assessment of opportunity-reducing techniques in information security:
                  An insider threat perspective},
  journal      = {Decis. Support Syst.},
  volume       = {92},
  pages        = {47--56},
  year         = {2016},
  url          = {https://doi.org/10.1016/j.dss.2016.09.012},
  doi          = {10.1016/J.DSS.2016.09.012},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dss/Padayachee16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dss/SilvaHBM16,
  author       = {Leiser Silva and
                  Carol Hsu and
                  James Backhouse and
                  Aidan McDonnell},
  title        = {Resistance and power in a security certification scheme: The case
                  of c: cure},
  journal      = {Decis. Support Syst.},
  volume       = {92},
  pages        = {68--78},
  year         = {2016},
  url          = {https://doi.org/10.1016/j.dss.2016.09.014},
  doi          = {10.1016/J.DSS.2016.09.014},
  timestamp    = {Thu, 20 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dss/SilvaHBM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dss/WarkentinJSB16,
  author       = {Merrill Warkentin and
                  Allen C. Johnston and
                  Jordan Shropshire and
                  William D. Barnett},
  title        = {Continuance of protective security behavior: {A} longitudinal study},
  journal      = {Decis. Support Syst.},
  volume       = {92},
  pages        = {25--35},
  year         = {2016},
  url          = {https://doi.org/10.1016/j.dss.2016.09.013},
  doi          = {10.1016/J.DSS.2016.09.013},
  timestamp    = {Wed, 16 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dss/WarkentinJSB16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dss/YazdanmehrW16,
  author       = {Adel Yazdanmehr and
                  Jingguo Wang},
  title        = {Employees' information security policy compliance: {A} norm activation
                  perspective},
  journal      = {Decis. Support Syst.},
  volume       = {92},
  pages        = {36--46},
  year         = {2016},
  url          = {https://doi.org/10.1016/j.dss.2016.09.009},
  doi          = {10.1016/J.DSS.2016.09.009},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dss/YazdanmehrW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dss/YuS16,
  author       = {Yu Andy Wu and
                  Carol S. Saunders},
  title        = {Governing the fiduciary relationship in information security services},
  journal      = {Decis. Support Syst.},
  volume       = {92},
  pages        = {57--67},
  year         = {2016},
  url          = {https://doi.org/10.1016/j.dss.2016.09.008},
  doi          = {10.1016/J.DSS.2016.09.008},
  timestamp    = {Thu, 20 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dss/YuS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dss/ZhouKZL16,
  author       = {Lina Zhou and
                  Yin Kang and
                  Dongsong Zhang and
                  Jianwei Lai},
  title        = {Harmonized authentication based on ThumbStroke dynamics on touch screen
                  mobile phones},
  journal      = {Decis. Support Syst.},
  volume       = {92},
  pages        = {14--24},
  year         = {2016},
  url          = {https://doi.org/10.1016/j.dss.2016.09.007},
  doi          = {10.1016/J.DSS.2016.09.007},
  timestamp    = {Thu, 20 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dss/ZhouKZL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics