Theories in online information privacy research: A critical review and an integrated framework

Y Li - Decision support systems, 2012 - Elsevier
To study the formation of online consumers' information privacy concern and its effect,
scholars from different perspectives applied multiple theories in research. To date, there has …

Protection motivation theory in information systems security research: A review of the past and a road map for the future

S Haag, M Siponen, F Liu - ACM SIGMIS Database: the DATABASE for …, 2021 - dl.acm.org
Protection motivation theory (PMT) is one of the most commonly used theories to examine
information security behaviors. Our systematic review of the application of PMT in …

Factors influencing the adoption of telemedicine health services during COVID-19 pandemic crisis: an integrative research model

S Rahi, MM Khan, M Alghizzawi - Enterprise Information Systems, 2021 - Taylor & Francis
This study aims to investigate patient's behaviour towards the adoption of telemedicine
health services with the integration of three well-Known theories, namely, unified theory of …

A test of protection motivation theory in the information security literature: A meta-analytic structural equation modeling approach

J Mou, JF Cohen, A Bhattacherjee… - Journal of the Association …, 2022 - aisel.aisnet.org
Abstract Information security is one of the important domains of information systems
research today, with protection motivation theory (PMT) one of its most influential theoretical …

Encouraging users to improve password security and memorability

M Yıldırım, I Mackie - International Journal of Information Security, 2019 - Springer
Security issues in text-based password authentication are rarely caused by technical issues,
but rather by the limitations of human memory, and human perceptions together with their …

Information privacy concerns, antecedents and privacy measure use in social networking sites: Evidence from Malaysia

N Mohamed, IH Ahmad - Computers in human behavior, 2012 - Elsevier
The research aims at gaining insights into information privacy concerns, its antecedents and
privacy measure use in social networking sites. The Social Cognitive, Protection Motivation …

“Security begins at home”: Determinants of home computer and mobile device security behavior

N Thompson, TJ McGill, X Wang - computers & security, 2017 - Elsevier
Personal computing users are vulnerable to information security threats, as they must
independently make decisions about how to protect themselves, often with little …
J Wang, Y Li, HR Rao - Information Systems Research, 2017 - pubsonline.informs.org
This study investigates users' co** responses in the process of phishing email detection.
Three common responses are identified based on the co** literature: task-focused co** …