2020
DOI: 10.4018/jdm.2020040101
|View full text |Cite
|
Sign up to set email alerts
|

Experience Matters

Abstract: Information systems security is a major organizational concern. This study examines the role of vicarious experience on an individual's behavioral intent to perform a secure recommended response. The protection motivation theory model is expanded to include vicarious experience, which was examined through the separate constructs of vicarious threat experience and vicarious response experience. This study closes a gap in the literature by including vicarious experience in the PMT model and confirming its role a… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
5

Relationship

1
4

Authors

Journals

citations
Cited by 5 publications
(1 citation statement)
references
References 53 publications
(12 reference statements)
0
1
0
Order By: Relevance
“…integrators in industry-4.0, which contributes to the large-scale deployment of low-power and lossy (LLN) networks (Ghaleb et al, 2018) that enable networked connection among People, processes, data, and things here Things are physical devices and objects connected to the internet for intelligent decision-making; Real-time insight Data is mainly used to leverage these data into more useful information for decision-making, and the process is used to deliver the right information to the right person (or machine) at the right time and finally, People involved in more Relevant, valuable ways. Despite the rise, one of the major inconveniences slowing rapid adaption is the 'security' (Mutchler & Warkentin, 2020;Zhou & Jing, 2020) of these devices (Suresh Babu et al, 2016). The myriad of companies that manufacture them and the multiple protocols from the many standards that existing out there is one of the major reasons why there is still a non-standardized approach to solving these problems.…”
Section: Introductionmentioning
confidence: 99%
“…integrators in industry-4.0, which contributes to the large-scale deployment of low-power and lossy (LLN) networks (Ghaleb et al, 2018) that enable networked connection among People, processes, data, and things here Things are physical devices and objects connected to the internet for intelligent decision-making; Real-time insight Data is mainly used to leverage these data into more useful information for decision-making, and the process is used to deliver the right information to the right person (or machine) at the right time and finally, People involved in more Relevant, valuable ways. Despite the rise, one of the major inconveniences slowing rapid adaption is the 'security' (Mutchler & Warkentin, 2020;Zhou & Jing, 2020) of these devices (Suresh Babu et al, 2016). The myriad of companies that manufacture them and the multiple protocols from the many standards that existing out there is one of the major reasons why there is still a non-standardized approach to solving these problems.…”
Section: Introductionmentioning
confidence: 99%