4.5 Article

E-waste information security protection motivation: the role of optimism bias

Related references

Note: Only part of the references are listed.
Article Computer Science, Information Systems

Cyber Risk Assessment and Mitigation (CRAM) Framework Using Logit and Probit Models for Cyber Insurance

Arunabha Mukhopadhyay et al.

INFORMATION SYSTEMS FRONTIERS (2019)

Article Computer Science, Cybernetics

Using protection motivation theory in the design of nudges to improve online security behavior

Rene van Bavel et al.

INTERNATIONAL JOURNAL OF HUMAN-COMPUTER STUDIES (2019)

Article Computer Science, Artificial Intelligence

Quality matters: Evoking subjective norms and coping appraisals by system design to increase security intentions

Mark Grimes et al.

DECISION SUPPORT SYSTEMS (2019)

Article Information Science & Library Science

Cognitive-affective drivers of employees' daily compliance with information security policies: A multilevel, longitudinal study

John D'Arcy et al.

INFORMATION SYSTEMS JOURNAL (2019)

Article Computer Science, Information Systems

Are we ready for cyberterrorist attacks?-Examining the role of individual resilience

Jian Hua et al.

INFORMATION & MANAGEMENT (2018)

Article Computer Science, Information Systems

Self-control, organizational context, and rational choice in Internet abuses at work

Han Li et al.

INFORMATION & MANAGEMENT (2018)

Article Computer Science, Information Systems

Understanding Security Behaviors in Personal Computer Usage: A Threat Avoidance Perspective

Huigang Liang et al.

Journal of the Association for Information Systems (2018)

Article Environmental Sciences

E-waste environmental and information security threat: GCC countries vulnerabilities

Jaafar Alghazo et al.

EURO-MEDITERRANEAN JOURNAL FOR ENVIRONMENTAL INTEGRATION (2018)

Article Computer Science, Information Systems

An Enhanced Fear Appeal Rhetorical Framework: Leveraging Threats to the Human Asset Through Sanctioning Rhetoric

Allen C. Johnston et al.

MIS QUARTERLY (2017)

Article Computer Science, Information Systems

User Motivations in Protecting Information Security: Protection Motivation Theory Versus Self-Determination Theory

Philip Menard et al.

JOURNAL OF MANAGEMENT INFORMATION SYSTEMS (2017)

Article Computer Science, Information Systems

Avoidance of Information Technology Threats: A Theoretical Perspective

Liang et al.

MIS QUARTERLY (2017)

Article Computer Science, Information Systems

Investigating User Resistance to Information Systems Implementation: A Status Quo Bias Perspective

Kim et al.

MIS QUARTERLY (2017)

Article Computer Science, Information Systems

Fear Appeals and Information Security Behaviors: An Empirical Study

Johnston et al.

MIS QUARTERLY (2017)

Review Computer Science, Information Systems

To Fear or Not to Fear? A Critical Review and Analysis of Fear Appeals in the Information Security Context

Jeffrey D. Wall et al.

COMMUNICATIONS OF THE ASSOCIATION FOR INFORMATION SYSTEMS (2017)

Article Psychology, Multidisciplinary

Why do you keep doing that? The biasing effects of mental states on IT continued usage intentions

Zachary R. Steelman et al.

COMPUTERS IN HUMAN BEHAVIOR (2017)

Article Computer Science, Information Systems

Impact of Users' Security Awareness on Desktop Security Behavior: A Protection Motivation Theory Perspective

Bartlomiej Hanus et al.

INFORMATION SYSTEMS MANAGEMENT (2016)

Article Computer Science, Artificial Intelligence

Employees' information security policy compliance: A norm activation perspective

Adel Yazdanmehr et al.

DECISION SUPPORT SYSTEMS (2016)

Article Computer Science, Artificial Intelligence

Continuance of protective security behavior: A longitudinal study

Merrill Warkentin et al.

DECISION SUPPORT SYSTEMS (2016)

Article Computer Science, Information Systems

Learning to cope with information security risks regarding mobile device loss or theft: An empirical examination

Zhiling Tu et al.

INFORMATION & MANAGEMENT (2015)

Article Psychology, Social

Optimistic Bias and Facebook Use: Self-Other Discrepancies About Potential Risks and Benefits of Facebook Use

Sunny Jung Kim et al.

CYBERPSYCHOLOGY BEHAVIOR AND SOCIAL NETWORKING (2015)

Article Computer Science, Information Systems

Employees' adherence to information security policies: An exploratory field study

Mikko Siponen et al.

INFORMATION & MANAGEMENT (2014)

Article Computer Science, Information Systems

THREAT PROTECTION AND CONVENIENCE: ANTECEDENTS OF CLOUD-BASED DATA BACKUP

Philip Menard et al.

JOURNAL OF COMPUTER INFORMATION SYSTEMS (2014)

Article Computer Science, Information Systems

Putting on the Thinking Cap: Using NeuroIS to Understand Information Processing Biases in Virtual Teams

Randall K. Minas et al.

JOURNAL OF MANAGEMENT INFORMATION SYSTEMS (2014)

Article Psychology, Multidisciplinary

Security awareness of computer users: A phishing threat avoidance perspective

Nalin Asanka Gamagedara Arachchilage et al.

COMPUTERS IN HUMAN BEHAVIOR (2014)

Article Communication

Understanding user behaviour in coping with security threats of mobile device loss and theftl

Zhiling Tu et al.

INTERNATIONAL JOURNAL OF MOBILE COMMUNICATIONS (2014)

Review Psychology

Sources of Method Bias in Social Science Research and Recommendations on How to Control It

Philip M. Podsakoff et al.

ANNUAL REVIEW OF PSYCHOLOGY, VOL 63 (2012)

Article Computer Science, Information Systems

Unrealistic optimism on information security management

Hyeun-Suk Rhee et al.

COMPUTERS & SECURITY (2012)

Article Computer Science, Information Systems

Motivating IS security compliance: Insights from Habit and Protection Motivation Theory

Anthony Vance et al.

INFORMATION & MANAGEMENT (2012)

Article Psychology, Multidisciplinary

It won't happen to me: An assessment of optimism bias in music piracy

Ankur Nandedkar et al.

COMPUTERS IN HUMAN BEHAVIOR (2012)

Article Computer Science, Information Systems

Self-efficacy in information security: its influence on end users' information security practice behavior

Hyeun-Suk Rhee et al.

COMPUTERS & SECURITY (2009)

Article Computer Science, Artificial Intelligence

Studying users' computer security behavior: A health belief perspective

Boon-Yuen Ng et al.

DECISION SUPPORT SYSTEMS (2009)

Article Computer Science, Information Systems

Threat or coping appraisal: determinants of SMB executives' decision to adopt anti-malware software

Younghwa Lee et al.

EUROPEAN JOURNAL OF INFORMATION SYSTEMS (2009)

Article Computer Science, Information Systems

Protection motivation and deterrence: a framework for security policy compliance in organisations

Tejaswini Herath et al.

EUROPEAN JOURNAL OF INFORMATION SYSTEMS (2009)

Article Engineering, Electrical & Electronic

Mental Models of Privacy and Security

L. Jean Camp

IEEE TECHNOLOGY AND SOCIETY MAGAZINE (2009)

Article Economics

Cognitive abilities and behavioral biases

Joerg Oechssler et al.

JOURNAL OF ECONOMIC BEHAVIOR & ORGANIZATION (2009)

Article Psychology, Multidisciplinary

Security lapses and the omission of information security measures: A threat control model and empirical test

Michael Workman et al.

COMPUTERS IN HUMAN BEHAVIOR (2008)

Article Psychology, Multidisciplinary

Unrealistic optimism in internet events

Jamonn Campbell et al.

COMPUTERS IN HUMAN BEHAVIOR (2007)

Article Business

Self-accountability emotions and fear appeals: Motivating behavior

K Passyn et al.

JOURNAL OF CONSUMER RESEARCH (2006)

Article Computer Science, Cybernetics

Predicting the use of web-based information systems: self-efficacy, enjoyment, learning goal orientation, and the technology acceptance model

MY Yi et al.

INTERNATIONAL JOURNAL OF HUMAN-COMPUTER STUDIES (2003)

Article Information Science & Library Science

The role of multimedia in changing first impression bias

KH Lim et al.

INFORMATION SYSTEMS RESEARCH (2000)

Article Psychology, Social

A meta-analysis of research on protection motivation theory

DL Floyd et al.

JOURNAL OF APPLIED SOCIAL PSYCHOLOGY (2000)