J. Shropshire, M. Warkentin, A. C. Johnston and M. B. Schmidt, “Personality and IT security: An Application of the Five-Factor Model,” Proceedings of the 12th Americas Conference on Information Systems, Acapulco (Mexico), Acapulco, 4-6 August 2006, pp. 3443-3449.
 W. Wang, “How Personality Factors Affects Continuance Intention: An Empirical Investigation of Instant Messaging,” Proceedings of the 14th Pacific Asia Conference on Information Systems, Taipei, 9-12 July 2010, p. 113.
 B. Lebek, J. Uffen, M. Neumann, B. Hohler and M. H. Breitner, “Employees’ Information Security Awareness and Behavior: A Literature Review,” Proceedings of the 45th Hawaii International Conference on System Science, Maui (USA), Wailea, 7-10 January 2013, pp. 2978-2987.
 S. Devaraj, R. F. Easley and J. M. Crant, “How Does Personalty Matter? Relating Five-Factor Model to Technology Acceptance and Use,” Information Systems Research, Vol. 19, No. 1, 2008, pp. 93-115. http://dx.doi.org/10.1287/isre.1070.0153
 O. Nov and C. Ye, “Personality and Technology Acceptance: Personal Innovativeness in IT, Openness and Resistance to Change,” Proceedings of the 41st Hawaii International Conference on System Science, Big Island (USA), Waikoloa, 7-10 January 2008, p. 448.
 R. A. Botha, S. M. Furnell and N. L. Clarke, “From Desktop to Mobile: Examining the Security Experience,” Computer and Security, Vol. 28, No. 3-4, 2009, pp. 130-137. http://dx.doi.org/10.1016/ j.cose.2008.11.001
 Z. Tu and Y. Yuan, “Understanding User’s Behaviours in Coping with Security Threat of Mobile Devices Loss and Theft,” Proceedings of the 45th Hawaii International Conference on System Science, Maui, 4-7 January 2012, pp. 1393-1402.
 R. W. Smith and A. Pridgen, “STAAF: Scaling Android Application Analysis with a Modular Framework,” Proceedings of the 45th Hawaii International Conference on System Sciences, Maui, 4-7 January 2012, pp. 5432-5440.
 J. D’Arcy, A. Hovav and D. Galletta, “User Awareness of Security Countermeasures and Its Impact on Information Systems Misuse,” Information Systems Research, Vol. 20, No. 1, 2009, pp. 79-98. http://dx.doi.org/10.1287/isre.1070.0160
 N. L. Clarke andS. M. Furnell, “Authentication of Users on Mobile Telephones—A Survey of Attitudes and Practices,” Computer & Security, Vol. 24, No. 7, 2005, pp. 519-527. http://dx.doi.org/10.1016/ j.cose.2005.08.003
 N. Ben-Asher, N. Kirschnick, H. Sieger, J. Meyer and S. M?ller, “On the Need for Different Security Methods on Mobile Phones,” Proceedings of the 13th International Conference on Human Computer Interaction with Mobile Devices and Services, Stockholm, 30 August-2 September 2011, pp. 465-473.
 P. Costa, R. McCrae and D. Dye, “Facet Scales for Agreeableness and Conscientiousness: A Revision of the NEO Personality Inventory,” Personality Individual Differences, Vol. 9, No. 12, 1991, pp. 887-898. http://dx.doi.org/10.1016/0191-8869(91)90177-D
 M. R. Barrick, M. K. Mount and T. A. Judge, “Personality and Performance at the Beginning of the New Millennium: What Do We Know and Where Do We Go Next?” International Journal of Selection & Assessment, Vol. 9, No. 1-2, 2001, pp. 9-29. http://dx.doi.org/10.1111/1468-2389.00160
 T. A. Judge, J. E. Bono, R. Ilies and M. W. Gerhardt, “Personality and Leadership: A Qualitative and Quantitative Review,” Journal of Applied Psychology, Vol. 87, No. 4, 2002, pp. 765-780. http://dx.doi.org/10.1037/0021-9010.87.4.765
 I. Junglas, N. Johnson and C. Spitzmüller, “Personality Traits and Concern of Privacy: An empirical Study in the Context of Location-Based Services,” European Journal of Information Systems, Vol. 17, No. 4, 2008, pp. 387-402. http://dx.doi.org/10.1057/ejis.2008.29
 B. Bulgurcu, H. Cavusoglu and I. Benbasat, “Information Security Policy Compliance: An Empirical Study of Rationality-Based Beliefs and Information Security Awareness,” MIS Quarterly, Vol. 34, No. 3, 2010, pp. 523-548.
 S. Goswami, H. H. Teo and H. C. Chan, “Decision-Maker Mindfulness in IT Adoption: The Role of Informed Culture and Individual Personality,” Proceedings of the 30th International Conference on Information Systems, Phoenix, 15-18 December 2009, p. 203.
 Q. Hu, T. Dinev, P. Hart and D. Cooke, “Top Management Championship and Individual Behavior towards Information Security: An Integrative Model,” Proceedings of the 16th European Conference on Information Systems, Galway, 9-11 June 2008, pp. 1310-1321.
 G. Bansal, “Security Concerns in the Nomological Network of Trust and Big5: First Order vs. Second Order,” Proceedings of the 32nd International Conference on Information Systems, Shanghai, 7 December 2011, Paper 9.
 J. C. McElroy, A. R. Hendrickson, A. M. Townsend and S. M. DeMarie, “Dispositional Factors in Internet Use: Personality versus Cognitive Styles,” MIS Quarterly, Vol. 31, No. 4, 2007, pp. 809-820.
 A. R. Korukonda, “Differences that do Matter: A Dialectic Analysis of Individual Characteristics and Personality Dimensions Contributing to Computer Anxiety,” Computers in Human Behavior, Vol. 23, No. 4, 2007, pp. 1921-1942. http://dx.doi.org/10.1016/j.chb.2006.02.003
 A. G. Kotulic and J. G. Clark, “Why There Aren’t More Information Security Research Studies,” Information & Management, Vol. 41, No. 5, 2004, pp. 597-607. http://dx.doi.org/10.1016/ j.im.2003.08.001
 H. Dai, A. F. Salam and R. King, “Service Convenience and Relational Exchange in Electronic Mediated Environment: An Empirical Investigation,” Proceedings of the 29th International Conference on Information Systems, Paris, 14-17 December 2008, pp. 1-20.
 C. B. Jarvis, S. B. MacKenzie and P. M. Podsakoff, “A Critical Review of Construct Indicators and Measurement Model Misspecification in Marketing and Consumer Research,” Journal of Consumer Research, Vol. 30, No. 2, 2003, pp. 199-218. http://dx.doi.org/10.1086/376806
 V. Venkatesh and H. Bala, “Technology Acceptance Model 3 and a Research Agenda on Interventions,” Decision Sciences, Vol. 39, No. 2, 2008, pp. 273-315. http://dx.doi.org/10.1111/ j.1540-5915.2008.00192.x
 F. Weiβ and J. M. Leimeister, “Consumerization-IT Innovations from the Consumer Market as a Challenge for Corporate IT,” Business and Information Systems Engineering, Vol. 4, No. 6, 2012, pp. 363-366.