1. Bridging the gap between organizational and user perspectives of security in the clinical domain;Adams;Int. J. Hum. Comput. Stud.,2005
2. Users are not the enemy;Adams;Commun. ACM,1999
3. The ultimate invasion of privacy: identity theft;Aïmeur,2011
4. Akhtar M. (2008). What is self-efficacy? Bandura's 4 Sources of Efficacy Beliefs. http://positivepsychology.org.uk/self-efficacy-definition-bandura-meaning/.
5. Akter S, D'Ambra J, & Ray P. (2011). An evaluation of PLS based complex models: the roles of power analysis, predictive relevance and GoF index.