Semantic Filter
show all semantic filters
Found 29 articles
  • Applying Dispositional, Situational, and Organizational Risk Propensity to Technology Threat Avoidance Theory - A tripartite View

    2023 | European Conference On Information Systems | Citations: 0

    Authors: Pfaff, Theresa; Nastjuk, Ilja; Matschak, Tizian

    Abstract: Human error is one of the biggest cybersecurity vulnerabilities in organization ... Expand

    Semantic filters: technology threat avoidance theory

    Topics: electronic mail self efficacy malware website IT security

    Methods: survey experiment PLS tool partial least squares path modeling computational algorithm

    Theories: technology threat avoidance theory

  • Protection Motivation Theory in Information Security Behavior Research: Reconsidering the Fundamentals

    2023 | Communications of the Association for Information Systems | Citations: 0

    Authors: Siponen, Mikko; Rönkkö, Mikko; Fufan, Liu; Haag, Steffi; Laatikainen, Gabriella

    Abstract: Scholars commonly use protection motivation theory (PMT) by Rogers to examine i ... Expand

    Semantic filters: technology threat avoidance theory

    Topics: malware data security behavioral intention self efficacy social influence

    Methods: functional magnetic resonance imaging literature study experiment experimental group structural equation modeling

    Theories: protection motivation theory technology threat avoidance theory

  • Employee responses to information security related stress: Coping and violation intention

    PDF

    2023 | Information Systems Journal | Citations: 1

    Authors: Yazdanmehr, Adel; Li, Yuan; Wang, Jingguo

    Abstract: Studies on employee responses to the information security policy (ISP) demands t ... Expand

    Semantic filters: technology threat avoidance theory

    Topics: self efficacy security policy data security problem solving internet technology

    Methods: survey descriptive statistic partial least squares regression survey design factor analysis

    Theories: technology threat avoidance theory

  • Risk Taking Behaviors Using Public Wi-Fi™

    PDF

    2022 | Information Systems Frontiers | Citations: 0

    Authors: Choi, Hoon S.; Carpenter, Darrell; Ko, Myung S.

    Abstract: Dramatic increases in public Wi-Fi™ (hereafter referred to as Wi-Fi) availabilit ... Expand

    Semantic filters: technology threat avoidance theory

    Topics: wireless LAN usage intention intrinsic motivation information system use self efficacy

    Methods: survey statistical hypothesis test structural equation modeling partial least squares regression data transformation

    Theories: technology threat avoidance theory prospect theory self determination theory

  • Assessing and Enhancing Adversarial Robustness of Predictive Analytics: An Empirically Tested Design Framework

    PDF

    2022 | Journal of Management Information Systems | Citations: 4

    Authors: Li, Weifeng; Chai, Yidong

    Abstract: As predictive analytics increasingly applies supervised machine learning (SML) m ... Expand

    Semantic filters: technology threat avoidance theory

    Topics: email spam electronic mail artificial intelligence decision making risk management

    Methods: machine learning ensemble learning experiment computational algorithm meta design

    Theories: technology threat avoidance theory

  • Emotional reactions and coping responses of employees to a cyber-attack: A case study

    PDF

    2021 | International Journal of Information Management | Citations: 0

    Authors: Stacey, Patrick; Taylor, Rebecca; Olowosule, Omotolani; Spanaki, Konstantina

    Abstract: Cybersecurity is a serious threat to information technology (IT) systems, with m ... Expand

    Semantic filters: technology threat avoidance theory

    Topics: IT security IT security threat IT workforce electronic mail pseudonymity

    Methods: qualitative interview case study personal interview conceptual modelling theory development

    Theories: appraisal theory technology threat avoidance theory technology acceptance theory

  • Nothing but Cash? Mobile Payment Acceptance in Germany

    2020 | International Conference on Information Systems | Citations: 0

    Authors: Baersch, Soeren; Siepermann, Markus; Lackes, Richard; Wulfhorst, Valerie

    Abstract: The introduction of mobile payment (MP) has gained increasing attention from Ger ... Expand

    Semantic filters: technology threat avoidance theory

    Topics: usage intention social influence self efficacy iOS Android

    Methods: survey statistical power analysis parametric test Student's t-test statistical hypothesis test

    Theories: technology acceptance theory technology threat avoidance theory

  • Motivating information security policy compliance: The critical role of supervisor-subordinate guanxi and organizational commitment

    PDF

    2020 | International Journal of Information Management | Citations: 0

    Authors: Liu, Chenhui; Wang, Nengmin; Liang, Huigang

    Abstract: Employees’ non-compliance with organizational information security policy (ISP) ... Expand

    Semantic filters: technology threat avoidance theory

    Topics: organizational commitment self efficacy information management IT security information security management

    Methods: survey partial least squares regression descriptive statistic data transformation statistical hypothesis test

    Theories: social psychology theory social exchange theory technology threat avoidance theory

  • Toward Security Capitulation Theory

    2020 | Americas Conference on Information Systems | Citations: 0

    Authors: McLeod, Alexander; Dolezel, Diane

    Abstract: This paper describes an exploratory study of capitulation theory which explains ... Expand

    Semantic filters: technology threat avoidance theory

    Topics: IT security threat privacy IT security cybersecurity behavior

    Methods: survey structural equation modeling survey design partial least squares path modeling theory development

    Theories: protection motivation theory technology threat avoidance theory

  • Having Two Conflicting Goals in Mind: The Tension Between IS Security and Privacy when Avoiding Threats

    2020 | HICSS | Citations: 1

    Authors: Olt, Christian M; Wagner, Amina

    Abstract: Despite users of personal IT devices perceive high risks of losing their persona ... Expand

    Semantic filters: technology threat avoidance theory

    Topics: information privacy concern privacy usage intention backup IT security

    Methods: archival research survey post-hoc analysis partial least squares regression theoretical contribution

    Theories: technology threat avoidance theory privacy calculus theory protection motivation theory