2013
DOI: 10.1080/15536548.2013.10845672
|View full text |Cite
|
Sign up to set email alerts
|

Applying Protection Motivation Theory to Information Security Training for College Students

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

2
30
2

Year Published

2015
2015
2022
2022

Publication Types

Select...
4
1
1

Relationship

0
6

Authors

Journals

citations
Cited by 49 publications
(34 citation statements)
references
References 20 publications
2
30
2
Order By: Relevance
“…Subsequently, both constructs of coping appraisal have weak positive effects on the intention for a compliant security behavior, thereby supporting H3 and H4. This finding corresponds with [17,21] and contradicts prior research [30]. Our results clearly indicate that employees, which belief that they can mitigate information security risks with their compliant behavior, have a higher intention to act according to the ISP.…”
Section: Discussion Of the Resultscontrasting
confidence: 80%
See 2 more Smart Citations
“…Subsequently, both constructs of coping appraisal have weak positive effects on the intention for a compliant security behavior, thereby supporting H3 and H4. This finding corresponds with [17,21] and contradicts prior research [30]. Our results clearly indicate that employees, which belief that they can mitigate information security risks with their compliant behavior, have a higher intention to act according to the ISP.…”
Section: Discussion Of the Resultscontrasting
confidence: 80%
“…PMT has been considered as one the most powerful theories explaining individuals' intentions to engage in compliant actions [9,20]. In the context of information security compliance, prior studies reported positive effects of all constructs of PMT on self-reported behavioral intentions [20,21,30,36]. Our research aim is to extend these studies by focusing on the evaluation of the impact of ISA programs on employees' protection motivation, which should in turn impact the intention to comply, thereby conceptualizing protection motivation as mediator.…”
Section: Research Background and Hypothesesmentioning
confidence: 93%
See 1 more Smart Citation
“…Any efforts related to the adoption of this technology are regarded as response cost. Rationally, an online user may be reluctant to change his/her current technology in use, if the response cost is high for adopting a new one [6]. Therefore, we hypothesize that H5: Response Cost has a negative effect on online users' attitude toward QR codes adoption.…”
mentioning
confidence: 97%
“…For example, if an online user believes that a certain anti-malware software is effective on securing his/her computer, the intention for him/her to install this software would be consequently high [6]. In our context, the response efficacy refers to online users' belief that QR codes can effectively help them protect their account information.…”
mentioning
confidence: 99%