Semantic Filter
show all semantic filters
Found 21 articles
  • How “What you think you know about cybersecurity” can help users make more secure decisions

    PDF

    2023 | Information & Management | Citations: 0

    Authors: Fard Bahreini, Amir; Cavusoglu, Hasan; Cenfetelli, Ronald T.

    Abstract: The increasing use of information technology artifacts in daily life makes secur ... Expand

    Semantic filters: multi-factor authentication

    Topics: mobile application data security decision making self efficacy mobile application market

    Methods: survey descriptive statistic structural equation modeling literature study post-hoc analysis

    Theories: theory of bounded rationality

  • Close the Intention-Behavior Gap via Attitudes: Case Study of the Volitional Adoption of a Two-Factor Authentication Service

    2023 | HICSS | Citations: 0

    Authors: Mattson, Tom; Aurigemma, Sal; Ren, Jie

    Abstract: Most of the theories used in the behavioral security literature explain the vari ... Expand

    Semantic filters: multi-factor authentication

    Topics: multi-factor authentication behavioral intention electronic mail data security data breach

    Methods: qualitative coding personal interview logistic regression

    Theories: attitude theory

  • Positively Fearful: Activating the Individual’s HERO Within to Explain Volitional Security Technology Adoption

    PDF

    2023 | Journal of the Association for Information Systems | Citations: 0

    Authors: Mattson, Thomas; Aurigemma, Sal; Ren, Jie

    Abstract: Regardless of what security professionals do to motivate personal users to adop ... Expand

    Semantic filters: multi-factor authentication

    Topics: multi-factor authentication behavioral intention self efficacy password electronic mail

    Methods: experimental group experiment survey design chi squared test descriptive statistic

  • Using Multi-Factor Authentication for Online Account Security: Examining the Influence of Anticipated Regret

    PDF

    2023 | Information Systems Frontiers | Citations: 0

    Authors: Ogbanufe, Obi M.; Baham, Corey

    Abstract: Authentication plays an important role in securing our systems but is threatened ... Expand

    Semantic filters: multi-factor authentication

    Topics: electronic authentication multi-factor authentication IT security mobile system cloud storage

    Methods: survey theory development structural equation modeling facial recognition system biometric measurement

    Theories: protection motivation theory

  • Securing online accounts and assets: An examination of personal investments and protection motivation

    PDF

    2023 | International Journal of Information Management | Citations: 0

    Authors: Ogbanufe, Obi

    Abstract: This paper examines how personal investment influence the use of multi-factor au ... Expand

    Semantic filters: multi-factor authentication

    Topics: self efficacy electronic authentication IT security multi-factor authentication data security

    Methods: survey structural equation modeling partial least squares path modeling correlation analysis survey design

    Theories: protection motivation theory

  • The Influence of Temporal Focus on Employee Preferences in Cybersecurity Training

    2023 | International Conference on Information Systems | Citations: 0

    Authors: Shaikh, Faheem Ahmed

    Abstract: ... Expand

    Semantic filters: multi-factor authentication

    Topics: IT security security policy electronic mail password IS education

    Methods: descriptive statistic survey experimental group chi squared test theory development

    Theories: construal level theory

  • Using the Expectancy-Value Theory of Motivation to Understand the Gaps in Mobile Identity Protection.

    2021 | International Conference on Information Systems | Citations: 0

    Authors: Alhelaly, Yasser; Dhillon, Gurpreet; Oliveira, Tiago

    Abstract: ... Expand

    Semantic filters: multi-factor authentication

    Topics: mobile application identity theft password user expectation multi-factor authentication

    Methods: case study qualitative interview mixed method interpretative method personal interview

    Theories: expectancy–value theory

  • Mitigating the Security Intention-Behavior Gap: The Moderating Role of Required Effort on the Intention-Behavior Relationship

    PDF

    2021 | Journal of the Association for Information Systems | Citations: 0

    Authors: Jenkins, Jeffrey; Durcikova, Alexandra; Jay F. Nunamaker, Jr

    Abstract: Although users often express strong positive intentions to follow security polic ... Expand

    Semantic filters: multi-factor authentication

    Topics: security policy password data breach lean manufacturing IT security training

    Methods: experiment experimental group survey statistical hypothesis test regression analysis method

    Theories: theory of planned behavior protection motivation theory deterrence theory theory of bounded rationality

  • Protecting Against Threats to Information Security: An Attitudinal Ambivalence Perspective

    PDF

    2021 | Journal of Management Information Systems | Citations: 13

    Authors: Ng, Ka Chung; Zhang, Xiaojun; Thong, James Y. L.; Tam, Kar Yan

    Abstract: A popular information security-related motivation theory is the Protection Motiv ... Expand

    Semantic filters: multi-factor authentication

    Topics: data security multi-factor authentication electronic mail IT security social norm

    Methods: experimental group survey theory development polynomial regression descriptive statistic

  • Psychological Profiling of Hacking Potential

    2020 | HICSS | Citations: 0

    Authors: Gaia, Joana; Ramamurthy, Bina; Sanders, G Lawrence; Sanders, Sean Patrick; Upadhyaya, Shambhu; Wang, Xunyi; Yoo, Chul Woo

    Abstract: Several suggestions will be made on what This paper investigates the psychologic ... Expand

    Semantic filters: multi-factor authentication

    Topics: criminality computer crime information privacy law IT security threat database system

    Methods: survey partial least squares regression conceptual modelling PLS tool literature study

    Theories: rational choice theory big five model