You are here: Home Contents V8 N1 V8N1_Phelps.html
Personal tools

Information System Security: Self-Efficacy and Implementation Effectiveness



Full text

Journal of Information Systems Security
Volume 8, Number 1 (2012)
Pages 321
ISSN 1551-0123 (Print)
ISSN 1551-0808 (Online)
Daniel C. Phelps — Carnegie Mellon University Qatar, Qatar
John N. Gathegi — University of South Florida, USA
Michael Workman — Florida Institute of Technology, USA
Misook Heo — Duquesne University, USA
Information Institute Publishing, Washington DC, USA




Armstrong, J. S. & Overton, T. (1977). Estimating Nonresponse Bias in Mail Surveys. Journal of Marketing, 51, 71-86. 

Bandura, A. (1977). Self-Efficacy:  Toward a Unifying Theory of Behavioral Change. Psychological Review, 84, 191-215. 

Bandura, A.(1986). Social Foundations of Thought and Action: A Social Cognitive Theory. Prentice-Hall. Bandura, A. (1994). Self-Efficacy. In V.S.Ramachaudran (Ed.), Encyclopedia of Human Behavior (pp. 71-81). New York: Academic Press. 

Barling, J. & Beatie, R. (1983). Self-Efficacy  Beliefs and Sales Performance. Journal of Organizational Behavior Management, 5, 51. 

Betz, N. E. & Hackett, G. (1981). The Relationship of Career-Related Self-Efficacy Expectations to Perceived Career Options in College Women and Men. Journal of Counseling Psychology, 38, 417-452. 

Biever, E. J. (1997). Securing Public Workstations by  Maintaining Software Centrally. Library Hi Tech, 15:1-2, 27-29. 

Brakel, G. (1997). Public Workstation Security. Library Hi Tech, 15:1-2, 24-26. 

Brandt, D. S. (2003). A Different Spin on Security. Computers in Libraries, 23, 34-36. 

Breeding, M. (1997). Designing Secure Library Networks. Library Hi Tech, 15:1-2, 11-20. 

Brown, I. & Inouye, D. K. (1978). Learned Helplessness Through Modeling:  The Role of Perceived Similarity in Competence. Journal of Personality and Social Psychology, 36, 900-908. 

Collins, J. L. (1982). Self Efficacy and Ability in Acheivement Behavior. In New York: American Educational Research Association. 

Creswell, J. W. (1994). Research Design : Qualitative and Quantitative Approaches. Sage Publications. 

Fore, J. A. (1997). Things That Go "Bump" in the Virtual Night. Library Hi Tech, 15:1-2, 84-91. 

Garrison, W. V. & McClellan, G. A. (1997). Tao of Gateway:  Providing Internet Access to Licensed Databases. Library Hi Tech, 15:1-2, 39-54. 

German, G. (1997). To Catch a Hacker. Library Hi Tech, 15:1-2, 96-98. 

Gist, M., Schwoerer, C., & Rosen, B. (1989). Effects of Alternative Training Methods on Self-Efficacy and Performance in Computer Software Training. Journal of Applied Psychology, 74, 884-891. 

Gupta, A. & Hammond, R. (2005). Information systems security issues and decisions for small businesses: An empirical examination. Information Management & Computer Security, 13, 297. 

Kabay, M. E. (2005). Improving Information Assurance Education Key to Improving Secure(ity) Management. Journal of Network and Systems Management, 13, 247. 

Koga, J. S. (1990). Security and the PC-Based Public Workstation. Online, 14, 63-70. 

Locke, E. A., Frederick, E., Lee, C., & Bobko, P. (1984). Effect of Self-Efficacy, Goals, and Task Strategies on Task Performance. Journal of Applied Psychology, 69, 241-251. 

Lynch, C. (1997). The Changing Role in a Networked Information Environment. Library Hi Tech, 15:1-2, 30-38. 

Marmion, D. (1997). A Commercial Software Approach to Workstation Security. Library Hi Tech, 15:1-2, 21-23. 

Muir, S. (1997). After the Break in Occurs: How to Handle the Student Hacker. Library Hi Tech, 15:1-2, 92-95. 

Multon, K. D., Brown, S. D., & Lent, R. W. (1991). Relation of Self-Efficacy  Beliefs to Academic Outcomes - A Meta-Analytic Investigation. Journal of Counseling Psychology, 38, 30-38. 

National Institute of Technology (1995). Special Pub 800-12 -- An Introduction to Computer Security: The NIST Handbook. 

Newby, G. (2000). Information Security for Libraries. 

Robertson, G. (2003). Investigating Risk:  Assessing and Analyzing Trouble Before It Strikes. Library Mosaics, 14, 18-19. 

Rosaschi, J. (1997). Give Yourself a Break; Don't give the Hackers One. Library Hi Tech, 15:1-2, 99-102. 

Schultz, E. (2004). Security training and awareness—fitting a square peg in a round hole. Computers & Security, 23, 1-2. 

Schunk, D. H. (1981). Modeling and Attributional Effects on Children's Acheivement:  A Self-Efficacy Analysis. Journal of Educational Psychology, 73, 93-105. 

SPSS, i. (1999). SPSS Base 9.0: Applications Guide. Chicago: SPSS. 

Stanton, J., Stam, K., Mastrangelo, P., & Jolton, J. (2005). Analysis of end user security behaviors. Computers & Security, 24, 124. 

Straub, D. (1986). Controlling Computer Abuse: An Empirical Study of Effective Security Countermeasures. DBA Indiana University. 

Straub, D. (1990). Effective IS Security: An Empirical Study. Information Systems Research, 1, 255-276. 

Stumpf, S. A., Brief, A. P., & Hartman, K. (1987). Self-Efficacy Expectations and Coping with Career-Related Events. Journal of Vocational Behavior, 31, 91-108. 

Wade, J. (2004). The Weak Link in IT Security. Risk Management, 51, 32-37. 

Wang, A. Y. & Newlin, M. H. (2002). Predictors of web-student performance: the role of self-efficacy and reasons for taking an on-line class. Computers in Human Behavior, 18, 151-163. 

Wood, R. & Bandura, A. (1989). Social Cognitive Theory of Organizational Management. Academy of Management Review, 14, 361-384. 

Xu, H. & Chen, H. (1999). What do Employers Expect? The Educating Systems Librarian Research Project 1. The Electronic Library, 17, 171-179. 

Xu, H. & Chen, H. (2000). Can We Meet The Challenge? The Educating Systems Librarian Research Project 3. The Electronic Library, 19, 315-327. 

Xu, H. & Chen, H. (2000). Whom Do Employers Actually Hire?  The Educating Systems Librarian Research Project Report 2. The Electronic Library, 18, 171-182. 

Young, M., Kyrillidou, M., & Blixrud, J. (2002). ARL Supplementary Statistics Washington, D.C.: Association of Research Libraries.