2023
DOI: 10.1111/1745-9133.12641
|View full text |Cite
|
Sign up to set email alerts
|

What motivates users to adopt cybersecurity practices? A survey experiment assessing protection motivation theory

Cassandra E. Dodge,
Nathan Fisk,
George W. Burruss
et al.

Abstract: Research SummaryA 2 × 2 × 3 fully crossed factorial experiment is used to examine the linkages between key dimensions of protection motivation theory (PMT; perceived severity of risk, vulnerability to risk, and response costs) and the intentions to adopt information technology (IT) cybersecurity recommendations after being informed of degrees of risk in the vignettes. Data in this study consist of a nationwide sample of 720 American adults. Results from a series of fractional logistic regressions indicate supp… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...

Citation Types

0
0
0

Year Published

2024
2024
2024
2024

Publication Types

Select...
2
1
1
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
references
References 52 publications
0
0
0
Order By: Relevance