2023 | European Conference On Information Systems | Citations: 0
Authors: Pfaff, Theresa; Nastjuk, Ilja; Matschak, Tizian
Abstract: Human error is one of the biggest cybersecurity vulnerabilities in organization ... Expand
Semantic filters: technology threat avoidance theory
Topics: electronic mail self efficacy malware website IT security
Methods: survey experiment PLS tool partial least squares path modeling computational algorithm
Theories: technology threat avoidance theory
2023 | Communications of the Association for Information Systems | Citations: 0
Authors: Siponen, Mikko; Rönkkö, Mikko; Fufan, Liu; Haag, Steffi; Laatikainen, Gabriella
Abstract: Scholars commonly use protection motivation theory (PMT) by Rogers to examine i ... Expand
Semantic filters: technology threat avoidance theory
Topics: malware data security behavioral intention self efficacy social influence
Methods: functional magnetic resonance imaging literature study experiment experimental group structural equation modeling
Theories: protection motivation theory technology threat avoidance theory
2023 | Information Systems Journal | Citations: 1
Authors: Yazdanmehr, Adel; Li, Yuan; Wang, Jingguo
Abstract: Studies on employee responses to the information security policy (ISP) demands t ... Expand
Semantic filters: technology threat avoidance theory
Topics: self efficacy security policy data security problem solving internet technology
Methods: survey descriptive statistic partial least squares regression survey design factor analysis
Theories: technology threat avoidance theory
2022 | Information Systems Frontiers | Citations: 0
Authors: Choi, Hoon S.; Carpenter, Darrell; Ko, Myung S.
Abstract: Dramatic increases in public Wi-Fi™ (hereafter referred to as Wi-Fi) availabilit ... Expand
Semantic filters: technology threat avoidance theory
Topics: wireless LAN usage intention intrinsic motivation information system use self efficacy
Methods: survey statistical hypothesis test structural equation modeling partial least squares regression data transformation
Theories: technology threat avoidance theory prospect theory self determination theory
2022 | Journal of Management Information Systems | Citations: 4
Authors: Li, Weifeng; Chai, Yidong
Abstract: As predictive analytics increasingly applies supervised machine learning (SML) m ... Expand
Semantic filters: technology threat avoidance theory
Topics: email spam electronic mail artificial intelligence decision making risk management
Methods: machine learning ensemble learning experiment computational algorithm meta design
Theories: technology threat avoidance theory
2021 | International Journal of Information Management | Citations: 0
Authors: Stacey, Patrick; Taylor, Rebecca; Olowosule, Omotolani; Spanaki, Konstantina
Abstract: Cybersecurity is a serious threat to information technology (IT) systems, with m ... Expand
Semantic filters: technology threat avoidance theory
Topics: IT security IT security threat IT workforce electronic mail pseudonymity
Methods: qualitative interview case study personal interview conceptual modelling theory development
Theories: appraisal theory technology threat avoidance theory technology acceptance theory
2020 | International Conference on Information Systems | Citations: 0
Authors: Baersch, Soeren; Siepermann, Markus; Lackes, Richard; Wulfhorst, Valerie
Abstract: The introduction of mobile payment (MP) has gained increasing attention from Ger ... Expand
Semantic filters: technology threat avoidance theory
Topics: usage intention social influence self efficacy iOS Android
Methods: survey statistical power analysis parametric test Student's t-test statistical hypothesis test
Theories: technology acceptance theory technology threat avoidance theory
2020 | International Journal of Information Management | Citations: 0
Authors: Liu, Chenhui; Wang, Nengmin; Liang, Huigang
Abstract: Employees’ non-compliance with organizational information security policy (ISP) ... Expand
Semantic filters: technology threat avoidance theory
Topics: organizational commitment self efficacy information management IT security information security management
Methods: survey partial least squares regression descriptive statistic data transformation statistical hypothesis test
Theories: social psychology theory social exchange theory technology threat avoidance theory
2020 | Americas Conference on Information Systems | Citations: 0
Authors: McLeod, Alexander; Dolezel, Diane
Abstract: This paper describes an exploratory study of capitulation theory which explains ... Expand
Semantic filters: technology threat avoidance theory
Topics: IT security threat privacy IT security cybersecurity behavior
Methods: survey structural equation modeling survey design partial least squares path modeling theory development
Theories: protection motivation theory technology threat avoidance theory
2020 | HICSS | Citations: 1
Authors: Olt, Christian M; Wagner, Amina
Abstract: Despite users of personal IT devices perceive high risks of losing their persona ... Expand
Semantic filters: technology threat avoidance theory
Topics: information privacy concern privacy usage intention backup IT security
Methods: archival research survey post-hoc analysis partial least squares regression theoretical contribution
Theories: technology threat avoidance theory privacy calculus theory protection motivation theory