2023 | Journal of Management Information Systems | Citations: 0
Authors: Lowry, Paul Benjamin; Moody, Gregory D.; Parameswaran, Srikanth; Brown, Nicholas James
Abstract: Most of the information security management research involving fear appeals is g ... Expand
Semantic filters: extended parallel process model
Topics: H1N1 flu self efficacy Python data quality information security management
Methods: structural equation modeling meta analysis statistical hypothesis test hierarchical linear modeling statistical power analysis
Theories: fear appeal theory extended parallel process model protection motivation theory
2022 | Information & Management | Citations: 10
Authors: Chen, Yan; Luo, Xin (Robert); Li, Han
Abstract: Extant research seldom focuses on maladaptive security coping behaviors. Applyin ... Expand
Semantic filters: extended parallel process model
Topics: internet technology IT security threat IT security data security self efficacy
Methods: survey PLS tool descriptive statistic partial least squares regression literature study
Theories: extended parallel process model protection motivation theory
2021 | Information Systems Research | Citations: 28
Authors: Chen, Yan; Galletta, Dennis F.; Lowry, Paul Benjamin; Luo, Xin (Robert); Moody, Gregory D.; Willison, Robert
Abstract: Organizational information security (ISec) threats have exploded with advances i ... Expand
Semantic filters: extended parallel process model
Topics: self efficacy accounting IT security threat productivity data quality
Methods: literature sample structural equation modeling survey ANOVA parametric test
Theories: extended parallel process model
2021 | HICSS | Citations: 0
Authors: Masuch, Kristin; Hengstler, Sebastian; Schulze, Laura; Trang, Simon
Abstract: Information security has become an increasingly important aspect in companies an ... Expand
Semantic filters: extended parallel process model
Topics: ransomware behavioral intention data security cybersecurity behavior self efficacy
Methods: survey structural equation modeling partial least squares regression theoretical contribution design artifact
Theories: extended parallel process model
2020 | Americas Conference on Information Systems | Citations: 0
Authors: Baskaran, Krutheeka; Mathew, Saji K.; Sugumaran, Vijayan
Abstract: With the advent of wearable devices, we leave a huge digital footprint with eve ... Expand
Semantic filters: extended parallel process model
Topics: privacy information privacy concern smart wearable device fitness tracker internet technology
Methods: survey parametric test survey design one-way ANOVA data transformation
Theories: extended parallel process model
2018 | Communications of the Association for Information Systems | Citations: 4
Authors: Crossler, Robert E.; Di Gangi, Paul M.; Johnston, Allen C.; Bélanger, France; Warkentin, Merrill
Abstract: Developing and advancing theory in the information systems (IS) discipline requi ... Expand
Semantic filters: extended parallel process model
Topics: IS discipline information security policy compliance reference discipline organizational context data security
Methods: theory development qualitative interview theoretical contribution qualitative content analysis triangulation
Theories: protection motivation theory information systems theory psychological theory theory of change extended parallel process model
2018 | Americas Conference on Information Systems | Citations: 0
Authors: Nehme, Alaa; George, Joey F
Abstract: The role of citizens in securing their smart homes is critical. We develop a res ... Expand
Semantic filters: extended parallel process model
Topics: internet of things mobile system internet technology smart home IT security
Methods: survey partial least squares regression theoretical contribution
Theories: extended parallel process model protection motivation theory
2017 | International Conference on Information Systems | Citations: 0
Authors: Chen, Yan
Abstract: Realizing the importance of the behavioral aspect of information security (ISec) ... Expand
Semantic filters: extended parallel process model
Topics: IT security threat internet technology self efficacy IT security training electronic commerce
Methods: survey literature study mediation analysis parametric test ANOVA
Theories: extended parallel process model fear appeal theory
2017 | Information Systems Research | Citations: 157
Authors: Wang, Jingguo; Li, Yuan; Rao, H. Raghav
Abstract: This study investigates users’ coping responses in the process of phishing email ... Expand
Semantic filters: extended parallel process model
Topics: phishing electronic mail email phishing data security internet technology
Methods: survey experiment machine learning descriptive statistic partial least squares regression
Theories: extended parallel process model
2015 | Management Information Systems Quarterly | Citations: 666
Authors: Boss, Scott R.; Galletta, Dennis F.; Benjamin Lowry, Paul; Moody, Gregory D.; Polak, Peter
Abstract: Because violations of information security (ISec) and privacy have become ubiqui ... Expand
Semantic filters: extended parallel process model
Topics: backup malware self efficacy website social influence
Methods: longitudinal research experiment survey cross sectional research self reported survey
Theories: health belief model technology threat avoidance theory extended parallel process model