Semantic Filter
show all semantic filters
Found 10 articles
  • Examining the Differential Effectiveness of Fear Appeals in Information Security Management Using Two-Stage Meta-Analysis

    PDF

    2023 | Journal of Management Information Systems | Citations: 0

    Authors: Lowry, Paul Benjamin; Moody, Gregory D.; Parameswaran, Srikanth; Brown, Nicholas James

    Abstract: Most of the information security management research involving fear appeals is g ... Expand

    Semantic filters: extended parallel process model

    Topics: H1N1 flu self efficacy Python data quality information security management

    Methods: structural equation modeling meta analysis statistical hypothesis test hierarchical linear modeling statistical power analysis

    Theories: fear appeal theory extended parallel process model protection motivation theory

  • Beyond adaptive security coping behaviors: Theory and empirical evidence

    PDF

    2022 | Information & Management | Citations: 10

    Authors: Chen, Yan; Luo, Xin (Robert); Li, Han

    Abstract: Extant research seldom focuses on maladaptive security coping behaviors. Applyin ... Expand

    Semantic filters: extended parallel process model

    Topics: internet technology IT security threat IT security data security self efficacy

    Methods: survey PLS tool descriptive statistic partial least squares regression literature study

    Theories: extended parallel process model protection motivation theory

  • Understanding Inconsistent Employee Compliance with Information Security Policies Through the Lens of the Extended Parallel Process Model

    PDF

    2021 | Information Systems Research | Citations: 28

    Authors: Chen, Yan; Galletta, Dennis F.; Lowry, Paul Benjamin; Luo, Xin (Robert); Moody, Gregory D.; Willison, Robert

    Abstract: Organizational information security (ISec) threats have exploded with advances i ... Expand

    Semantic filters: extended parallel process model

    Topics: self efficacy accounting IT security threat productivity data quality

    Methods: literature sample structural equation modeling survey ANOVA parametric test

    Theories: extended parallel process model

  • The Impact of Threat and Efficacy on Information Security Behavior: Applying an Extended Parallel Process Model to the Fear of Ransomware.

    PDF

    2021 | HICSS | Citations: 0

    Authors: Masuch, Kristin; Hengstler, Sebastian; Schulze, Laura; Trang, Simon

    Abstract: Information security has become an increasingly important aspect in companies an ... Expand

    Semantic filters: extended parallel process model

    Topics: ransomware behavioral intention data security cybersecurity behavior self efficacy

    Methods: survey structural equation modeling partial least squares regression theoretical contribution design artifact

    Theories: extended parallel process model

  • Are You Coping or Copping Out? Wearable Users’ Information Privacy Perspective

    2020 | Americas Conference on Information Systems | Citations: 0

    Authors: Baskaran, Krutheeka; Mathew, Saji K.; Sugumaran, Vijayan

    Abstract: With the advent of wearable devices, we leave a huge digital footprint with eve ... Expand

    Semantic filters: extended parallel process model

    Topics: privacy information privacy concern smart wearable device fitness tracker internet technology

    Methods: survey parametric test survey design one-way ANOVA data transformation

    Theories: extended parallel process model

  • Providing Theoretical Foundations: Developing an Integrated Set of Guidelines for Theory Adaptation

    PDF

    2018 | Communications of the Association for Information Systems | Citations: 4

    Authors: Crossler, Robert E.; Di Gangi, Paul M.; Johnston, Allen C.; Bélanger, France; Warkentin, Merrill

    Abstract: Developing and advancing theory in the information systems (IS) discipline requi ... Expand

    Semantic filters: extended parallel process model

    Topics: IS discipline information security policy compliance reference discipline organizational context data security

    Methods: theory development qualitative interview theoretical contribution qualitative content analysis triangulation

    Theories: protection motivation theory information systems theory psychological theory theory of change extended parallel process model

  • Behind Cyber Doors: Securing the Internet of Self

    2018 | Americas Conference on Information Systems | Citations: 0

    Authors: Nehme, Alaa; George, Joey F

    Abstract: The role of citizens in securing their smart homes is critical. We develop a res ... Expand

    Semantic filters: extended parallel process model

    Topics: internet of things mobile system internet technology smart home IT security

    Methods: survey partial least squares regression theoretical contribution

    Theories: extended parallel process model protection motivation theory

  • Examining Internet Users’ Adaptive and Maladaptive Security Behaviors Using the Extended Parallel Process Model

    2017 | International Conference on Information Systems | Citations: 0

    Authors: Chen, Yan

    Abstract: Realizing the importance of the behavioral aspect of information security (ISec) ... Expand

    Semantic filters: extended parallel process model

    Topics: IT security threat internet technology self efficacy IT security training electronic commerce

    Methods: survey literature study mediation analysis parametric test ANOVA

    Theories: extended parallel process model fear appeal theory

  • Coping Responses in Phishing Detection: An Investigation of Antecedents and Consequences

    PDF

    2017 | Information Systems Research | Citations: 157

    Authors: Wang, Jingguo; Li, Yuan; Rao, H. Raghav

    Abstract: This study investigates users’ coping responses in the process of phishing email ... Expand

    Semantic filters: extended parallel process model

    Topics: phishing electronic mail email phishing data security internet technology

    Methods: survey experiment machine learning descriptive statistic partial least squares regression

    Theories: extended parallel process model

  • What Do Systems Users Have to Fear? Using Fear Appeals to Engender Threats and Fear That Motivate Protective Security Behaviors

    2015 | Management Information Systems Quarterly | Citations: 666

    Authors: Boss, Scott R.; Galletta, Dennis F.; Benjamin Lowry, Paul; Moody, Gregory D.; Polak, Peter

    Abstract: Because violations of information security (ISec) and privacy have become ubiqui ... Expand

    Semantic filters: extended parallel process model

    Topics: backup malware self efficacy website social influence

    Methods: longitudinal research experiment survey cross sectional research self reported survey

    Theories: health belief model technology threat avoidance theory extended parallel process model