Dec 24, 2004 | Journal article, Research library
This paper seeks to properly define routines to facilitate further empirical research into how routines are built and how routines can be changed. Broadly, it defines routines as dispositions that trigger patterns of behaviours in a group of individuals, following...
Mar 15, 2004 | Journal article, Research library
This paper uses an information-processing model of deception detection to understand the reasons underlying Internet consumers’ success and failure at detecting forms of intentional deception that occur on the Internet. Eighty MBA students visited either a real...
May 9, 2003 | Journal article, Research library
This paper explores why some people say they’d like to protect their personal data then take few measures to do so. Hypotheses include limited information, self-control problems, behavioural distortions, and bounded rationality. The authors suggest an experimental...
Dec 1, 2002 | Journal article, Research library
To illustrate the differing thoughts and emotions involved in guiding habitual and nonhabitual behavior, 2 diary studies were conducted in which participants provided hourly reports of their ongoing experiences. When participants were engaged in habitual behavior,...
Aug 15, 2002 | Journal article, Research library
Personal information is scarce in computer-mediated communication. So when information about the sender is attached with his or her e-mail, this could induce a powerful effect toward the receptor. Two experiments were carried out where males and females were solicited...
Jan 9, 2001 | Journal article, Research library
This paper argues that simply blaming users for security breaches will not lead to more effective security systems and that security designers must address the causes of undesirable user behaviour to design effective security systems. Focusing on passwords in...