Related references
Note: Only part of the references are listed.Cyber Risk Assessment and Mitigation (CRAM) Framework Using Logit and Probit Models for Cyber Insurance
Arunabha Mukhopadhyay et al.
INFORMATION SYSTEMS FRONTIERS (2019)
Using protection motivation theory in the design of nudges to improve online security behavior
Rene van Bavel et al.
INTERNATIONAL JOURNAL OF HUMAN-COMPUTER STUDIES (2019)
Quality matters: Evoking subjective norms and coping appraisals by system design to increase security intentions
Mark Grimes et al.
DECISION SUPPORT SYSTEMS (2019)
Cognitive-affective drivers of employees' daily compliance with information security policies: A multilevel, longitudinal study
John D'Arcy et al.
INFORMATION SYSTEMS JOURNAL (2019)
Are we ready for cyberterrorist attacks?-Examining the role of individual resilience
Jian Hua et al.
INFORMATION & MANAGEMENT (2018)
Self-control, organizational context, and rational choice in Internet abuses at work
Han Li et al.
INFORMATION & MANAGEMENT (2018)
Understanding Security Behaviors in Personal Computer Usage: A Threat Avoidance Perspective
Huigang Liang et al.
Journal of the Association for Information Systems (2018)
E-waste environmental and information security threat: GCC countries vulnerabilities
Jaafar Alghazo et al.
EURO-MEDITERRANEAN JOURNAL FOR ENVIRONMENTAL INTEGRATION (2018)
An Enhanced Fear Appeal Rhetorical Framework: Leveraging Threats to the Human Asset Through Sanctioning Rhetoric
Allen C. Johnston et al.
MIS QUARTERLY (2017)
A trust-risk perspective on social commerce use: an examination of the biasing role of habit
Samira Farivar et al.
INTERNET RESEARCH (2017)
User Motivations in Protecting Information Security: Protection Motivation Theory Versus Self-Determination Theory
Philip Menard et al.
JOURNAL OF MANAGEMENT INFORMATION SYSTEMS (2017)
Avoidance of Information Technology Threats: A Theoretical Perspective
Liang et al.
MIS QUARTERLY (2017)
Investigating User Resistance to Information Systems Implementation: A Status Quo Bias Perspective
Kim et al.
MIS QUARTERLY (2017)
Fear Appeals and Information Security Behaviors: An Empirical Study
Johnston et al.
MIS QUARTERLY (2017)
Information Security Policy Compliance: An Empirical Study of Rationality-Based Beliefs and Information Security Awareness
Bulgurcu et al.
MIS QUARTERLY (2017)
To Fear or Not to Fear? A Critical Review and Analysis of Fear Appeals in the Information Security Context
Jeffrey D. Wall et al.
COMMUNICATIONS OF THE ASSOCIATION FOR INFORMATION SYSTEMS (2017)
Why do you keep doing that? The biasing effects of mental states on IT continued usage intentions
Zachary R. Steelman et al.
COMPUTERS IN HUMAN BEHAVIOR (2017)
Impact of Users' Security Awareness on Desktop Security Behavior: A Protection Motivation Theory Perspective
Bartlomiej Hanus et al.
INFORMATION SYSTEMS MANAGEMENT (2016)
Employees' information security policy compliance: A norm activation perspective
Adel Yazdanmehr et al.
DECISION SUPPORT SYSTEMS (2016)
Continuance of protective security behavior: A longitudinal study
Merrill Warkentin et al.
DECISION SUPPORT SYSTEMS (2016)
Analyzing the role of cognitive and cultural biases in the internalization of information security policies: Recommendations for information security awareness programs
Aggeliki Tsohou et al.
COMPUTERS & SECURITY (2015)
Learning to cope with information security risks regarding mobile device loss or theft: An empirical examination
Zhiling Tu et al.
INFORMATION & MANAGEMENT (2015)
WHAT DO SYSTEMS USERS HAVE TO FEAR? USING FEAR APPEALS TO ENGENDER THREATS AND FEAR THAT MOTIVATE PROTECTIVE SECURITY BEHAVIORS
Scott R. Boss et al.
MIS QUARTERLY (2015)
Optimistic Bias and Facebook Use: Self-Other Discrepancies About Potential Risks and Benefits of Facebook Use
Sunny Jung Kim et al.
CYBERPSYCHOLOGY BEHAVIOR AND SOCIAL NETWORKING (2015)
Employees' adherence to information security policies: An exploratory field study
Mikko Siponen et al.
INFORMATION & MANAGEMENT (2014)
THREAT PROTECTION AND CONVENIENCE: ANTECEDENTS OF CLOUD-BASED DATA BACKUP
Philip Menard et al.
JOURNAL OF COMPUTER INFORMATION SYSTEMS (2014)
Putting on the Thinking Cap: Using NeuroIS to Understand Information Processing Biases in Virtual Teams
Randall K. Minas et al.
JOURNAL OF MANAGEMENT INFORMATION SYSTEMS (2014)
Security awareness of computer users: A phishing threat avoidance perspective
Nalin Asanka Gamagedara Arachchilage et al.
COMPUTERS IN HUMAN BEHAVIOR (2014)
Is Your Banker Leaking Your Personal Information? The Roles of Ethics and Individual-Level Cultural Characteristics in Predicting Organizational Computer Abuse
Paul Benjamin Lowry et al.
JOURNAL OF BUSINESS ETHICS (2014)
Understanding Compliance with Bring Your Own Device Policies Utilizing Protection Motivation Theory: Bridging the Intention-Behavior Gap
Robert E. Crossler et al.
JOURNAL OF INFORMATION SYSTEMS (2014)
Understanding user behaviour in coping with security threats of mobile device loss and theftl
Zhiling Tu et al.
INTERNATIONAL JOURNAL OF MOBILE COMMUNICATIONS (2014)
Understanding the violation of IS security policy in organizations: An integrated model based on social control and deterrence theory
Lijiao Cheng et al.
COMPUTERS & SECURITY (2013)
Sources of Method Bias in Social Science Research and Recommendations on How to Control It
Philip M. Podsakoff et al.
ANNUAL REVIEW OF PSYCHOLOGY, VOL 63 (2012)
Unrealistic optimism on information security management
Hyeun-Suk Rhee et al.
COMPUTERS & SECURITY (2012)
Understanding information systems security policy compliance: An integration of the theory of planned behavior and the protection motivation theory
Princely Ifinedo
COMPUTERS & SECURITY (2012)
Motivating IS security compliance: Insights from Habit and Protection Motivation Theory
Anthony Vance et al.
INFORMATION & MANAGEMENT (2012)
It won't happen to me: An assessment of optimism bias in music piracy
Ankur Nandedkar et al.
COMPUTERS IN HUMAN BEHAVIOR (2012)
Optimistic bias about online privacy risks: Testing the moderating effects of perceived controllability and prior experience
Hichang Cho et al.
COMPUTERS IN HUMAN BEHAVIOR (2010)
Self-efficacy in information security: its influence on end users' information security practice behavior
Hyeun-Suk Rhee et al.
COMPUTERS & SECURITY (2009)
Studying users' computer security behavior: A health belief perspective
Boon-Yuen Ng et al.
DECISION SUPPORT SYSTEMS (2009)
Threat or coping appraisal: determinants of SMB executives' decision to adopt anti-malware software
Younghwa Lee et al.
EUROPEAN JOURNAL OF INFORMATION SYSTEMS (2009)
Protection motivation and deterrence: a framework for security policy compliance in organisations
Tejaswini Herath et al.
EUROPEAN JOURNAL OF INFORMATION SYSTEMS (2009)
Mental Models of Privacy and Security
L. Jean Camp
IEEE TECHNOLOGY AND SOCIETY MAGAZINE (2009)
Cognitive abilities and behavioral biases
Joerg Oechssler et al.
JOURNAL OF ECONOMIC BEHAVIOR & ORGANIZATION (2009)
Determinants of Online Privacy Concern and Its Influence on Privacy Protection Behaviors Among Young Adolescents
Seounmi Youn
JOURNAL OF CONSUMER AFFAIRS (2009)
Security lapses and the omission of information security measures: A threat control model and empirical test
Michael Workman et al.
COMPUTERS IN HUMAN BEHAVIOR (2008)
Unrealistic optimism in internet events
Jamonn Campbell et al.
COMPUTERS IN HUMAN BEHAVIOR (2007)
Self-accountability emotions and fear appeals: Motivating behavior
K Passyn et al.
JOURNAL OF CONSUMER RESEARCH (2006)
Predicting the use of web-based information systems: self-efficacy, enjoyment, learning goal orientation, and the technology acceptance model
MY Yi et al.
INTERNATIONAL JOURNAL OF HUMAN-COMPUTER STUDIES (2003)
The role of multimedia in changing first impression bias
KH Lim et al.
INFORMATION SYSTEMS RESEARCH (2000)
A meta-analysis of research on protection motivation theory
DL Floyd et al.
JOURNAL OF APPLIED SOCIAL PSYCHOLOGY (2000)