Search
Now showing items 1-6 of 6
How do firms present choice to consumers? Some unusual decision constructs along the B2C transaction process
(2015)
Certain features amongst some online retailers are atypical of ‘good’ design; the
transaction process presents consumers with optional extras that not only slowed the
process down, but also stressed and agitated consumers. ...
An eye tracking pilot study of optional decision constructs in B2C transactional processes
(14th International Conference on WWW/INTERNET (ICWI), 2015-10)
Previous research indicated the design of certain decision constructs could be unclear to users in the business to consumer
(B2C) transactional process. This pilot study, using eye tracking and cued retrospective think-aloud ...
Linking threat avoidance and security adoption: a theoretical model For SMEs
(AIS Electronic Library (AISeL), 2015-06-07)
A deficiency exists in the Information Systems Security literature because of the tendency to regard IT threat avoidance and IT security adoption as separate behaviours. In addressing the deficiency this research in progress ...
The insider threat - understanding the aberrant thinking of the rogue" Trusted Agent"
(AIS Electronic Library (AISeL), 2015-05-29)
A deficiency exists in the Information Systems Security literature because of the paucity of research
aimed at understanding the mind of the insider criminal . Much of the academic and popular press
focuses on external ...
Investigation of employee security behaviour: A grounded theory approach
(Springer, 2015-05-09)
At a time of rapid business globalisation, it is necessary to
understand employee security behaviour within diverse cultural settings. While
general deterrence theory has been extensively used in Behavioural Informatio ...
A survey of cyberbullying amongst students in Ireland's higher education sector
(International Association for Development of the Information Society, 2015-10-26)
Cyberbullying is an extension of traditional bullying where victims are harassed via the internet or mobile phones. This
study investigated the victims’ experiences of cyberbullying including the prevalence, type and ...