2023 | Information & Management | Citations: 0
Authors: Fard Bahreini, Amir; Cavusoglu, Hasan; Cenfetelli, Ronald T.
Abstract: The increasing use of information technology artifacts in daily life makes secur ... Expand
Semantic filters: multi-factor authentication
Topics: mobile application data security decision making self efficacy mobile application market
Methods: survey descriptive statistic structural equation modeling literature study post-hoc analysis
Theories: theory of bounded rationality
2023 | HICSS | Citations: 0
Authors: Mattson, Tom; Aurigemma, Sal; Ren, Jie
Abstract: Most of the theories used in the behavioral security literature explain the vari ... Expand
Semantic filters: multi-factor authentication
Topics: multi-factor authentication behavioral intention electronic mail data security data breach
Methods: qualitative coding personal interview logistic regression
Theories: attitude theory
2023 | Journal of the Association for Information Systems | Citations: 0
Authors: Mattson, Thomas; Aurigemma, Sal; Ren, Jie
Abstract: Regardless of what security professionals do to motivate personal users to adop ... Expand
Semantic filters: multi-factor authentication
Topics: multi-factor authentication behavioral intention self efficacy password electronic mail
Methods: experimental group experiment survey design chi squared test descriptive statistic
2023 | Information Systems Frontiers | Citations: 0
Authors: Ogbanufe, Obi M.; Baham, Corey
Abstract: Authentication plays an important role in securing our systems but is threatened ... Expand
Semantic filters: multi-factor authentication
Topics: electronic authentication multi-factor authentication IT security mobile system cloud storage
Methods: survey theory development structural equation modeling facial recognition system biometric measurement
Theories: protection motivation theory
2023 | International Journal of Information Management | Citations: 0
Authors: Ogbanufe, Obi
Abstract: This paper examines how personal investment influence the use of multi-factor au ... Expand
Semantic filters: multi-factor authentication
Topics: self efficacy electronic authentication IT security multi-factor authentication data security
Methods: survey structural equation modeling partial least squares path modeling correlation analysis survey design
Theories: protection motivation theory
2023 | International Conference on Information Systems | Citations: 0
Authors: Shaikh, Faheem Ahmed
Abstract: ... Expand
Semantic filters: multi-factor authentication
Topics: IT security security policy electronic mail password IS education
Methods: descriptive statistic survey experimental group chi squared test theory development
Theories: construal level theory
2021 | International Conference on Information Systems | Citations: 0
Authors: Alhelaly, Yasser; Dhillon, Gurpreet; Oliveira, Tiago
Abstract: ... Expand
Semantic filters: multi-factor authentication
Topics: mobile application identity theft password user expectation multi-factor authentication
Methods: case study qualitative interview mixed method interpretative method personal interview
Theories: expectancy–value theory
2021 | Journal of the Association for Information Systems | Citations: 0
Authors: Jenkins, Jeffrey; Durcikova, Alexandra; Jay F. Nunamaker, Jr
Abstract: Although users often express strong positive intentions to follow security polic ... Expand
Semantic filters: multi-factor authentication
Topics: security policy password data breach lean manufacturing IT security training
Methods: experiment experimental group survey statistical hypothesis test regression analysis method
Theories: theory of planned behavior protection motivation theory deterrence theory theory of bounded rationality
2021 | Journal of Management Information Systems | Citations: 13
Authors: Ng, Ka Chung; Zhang, Xiaojun; Thong, James Y. L.; Tam, Kar Yan
Abstract: A popular information security-related motivation theory is the Protection Motiv ... Expand
Semantic filters: multi-factor authentication
Topics: data security multi-factor authentication electronic mail IT security social norm
Methods: experimental group survey theory development polynomial regression descriptive statistic
2020 | HICSS | Citations: 0
Authors: Gaia, Joana; Ramamurthy, Bina; Sanders, G Lawrence; Sanders, Sean Patrick; Upadhyaya, Shambhu; Wang, Xunyi; Yoo, Chul Woo
Abstract: Several suggestions will be made on what This paper investigates the psychologic ... Expand
Semantic filters: multi-factor authentication
Topics: criminality computer crime information privacy law IT security threat database system
Methods: survey partial least squares regression conceptual modelling PLS tool literature study
Theories: rational choice theory big five model