B Lebek, J Uffen, M Neumann, B Hohler… - Management …, 2014 - emerald.com
Purpose–This paper aims to provide an overview of theories used in the field of employees' information systems (IS) security behavior over the past decade. Research gaps and …
X Zhang, S Liu, X Chen, L Wang, B Gao… - Information & Management, 2018 - Elsevier
This study explores the antecedents and consequences of health information privacy concerns in online health communities by integrating the dual calculus and protection …
We use coping theory to explore an underlying relationship between employee stress caused by burdensome, complex, and ambiguous information security requirements …
Because violations of information security (ISec) and privacy have become ubiquitous in both personal and work environments, academic attention to ISec and privacy has taken on …
Internet users experience a variety of online security threats that require them to enact safety precautions. Protection motivation theory (PMT) provides a theoretical framework for …
Purpose The purpose of this paper is to provide a comprehensive insight into the deciding factors affecting an individual's intention to adopt mobile banking (m-banking) services in …
This paper investigates how individuals cope with IT security threats by taking into account both problem-focused and emotion-focused coping. While problem-focused coping (PFC) …
Personal computing users are vulnerable to information security threats, as they must independently make decisions about how to protect themselves, often with little …
Decision-making in the context of organizational information security is highly dependent on various information. For information security managers, not only relevant information has to …