Security risks and protection in online learning: A survey

Y Chen, W He - International Review of Research in Open and …, 2013 - erudit.org
This paper describes a survey of online learning which attempts to determine online
learning providers' awareness of potential security risks and the protection measures that …

User motivations in protecting information security: Protection motivation theory versus self-determination theory

P Menard, GJ Bott, RE Crossler - Journal of Management …, 2017 - Taylor & Francis
Managers desiring to protect information systems must understand how to most effectively
motivate users to engage in secure behaviors. Information security researchers have …

An enhanced fear appeal rhetorical framework

AC Johnston, M Warkentin, M Siponen - MIS quarterly, 2015 - JSTOR
Fear appeals, which are used widely in information security campaigns, have become
common tools in motivating individual compliance with information security policies and …

Future directions for behavioral information security research

RE Crossler, AC Johnston, PB Lowry, Q Hu… - computers & …, 2013 - Elsevier
Information Security (InfoSec) research is far reaching and includes many approaches to
deal with protecting and mitigating threats to the information assets and technical resources …

Impact of users' security awareness on desktop security behavior: A protection motivation theory perspective

B Hanus, YA Wu - Information Systems Management, 2016 - Taylor & Francis
This article uses the protection motivation theory to study the impact of information security
awareness on desktop security behavior. It contributes to the literature by examining the …

Information privacy concerns, antecedents and privacy measure use in social networking sites: Evidence from Malaysia

N Mohamed, IH Ahmad - Computers in human behavior, 2012 - Elsevier
The research aims at gaining insights into information privacy concerns, its antecedents and
privacy measure use in social networking sites. The Social Cognitive, Protection Motivation …

[PDF][PDF] Protection motivation theory: A review

D Marikyan, S Papagiannidis - … : This handbook is …, 2023 - research-information.bris.ac.uk
Protection Motivation Theory (PMT) was introduced by (Rogers, 1975) and further revised in
1983 (Rogers, 1983) to explain the impact of persuasive communication on behaviour, with …

“Security begins at home”: Determinants of home computer and mobile device security behavior

N Thompson, TJ McGill, X Wang - computers & security, 2017 - Elsevier
Personal computing users are vulnerable to information security threats, as they must
independently make decisions about how to protect themselves, often with little …

Exploring how consumers cope with online behavioral advertising

CD Ham - International Journal of Advertising, 2017 - Taylor & Francis
This study explores how consumers cope with a computer technology-driven persuasion
tactic called online behavioral advertising (OBA). By tracking consumers' online behaviors …

The impact of security awareness on information technology professionals' behavior

R Torten, C Reaiche, S Boyle - Computers & Security, 2018 - Elsevier
Protecting digital assets is a growing concern for corporations, as cyberattacks affect
business performance, reputation, and compromise intellectual property. Information …