Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Theories in online information privacy research: A critical review and an integrated framework
Y Li - Decision support systems, 2012 - Elsevier
To study the formation of online consumers' information privacy concern and its effect,
scholars from different perspectives applied multiple theories in research. To date, there has …
scholars from different perspectives applied multiple theories in research. To date, there has …
Protection motivation theory in information systems security research: A review of the past and a road map for the future
Protection motivation theory (PMT) is one of the most commonly used theories to examine
information security behaviors. Our systematic review of the application of PMT in …
information security behaviors. Our systematic review of the application of PMT in …
Factors influencing the adoption of telemedicine health services during COVID-19 pandemic crisis: an integrative research model
This study aims to investigate patient's behaviour towards the adoption of telemedicine
health services with the integration of three well-Known theories, namely, unified theory of …
health services with the integration of three well-Known theories, namely, unified theory of …
What do systems users have to fear? Using fear appeals to engender threats and fear that motivate protective security behaviors
Because violations of information security (ISec) and privacy have become ubiquitous in
both personal and work environments, academic attention to ISec and privacy has taken on …
both personal and work environments, academic attention to ISec and privacy has taken on …
A test of protection motivation theory in the information security literature: A meta-analytic structural equation modeling approach
Abstract Information security is one of the important domains of information systems
research today, with protection motivation theory (PMT) one of its most influential theoretical …
research today, with protection motivation theory (PMT) one of its most influential theoretical …
Encouraging users to improve password security and memorability
M Yıldırım, I Mackie - International Journal of Information Security, 2019 - Springer
Security issues in text-based password authentication are rarely caused by technical issues,
but rather by the limitations of human memory, and human perceptions together with their …
but rather by the limitations of human memory, and human perceptions together with their …
Information privacy concerns, antecedents and privacy measure use in social networking sites: Evidence from Malaysia
N Mohamed, IH Ahmad - Computers in human behavior, 2012 - Elsevier
The research aims at gaining insights into information privacy concerns, its antecedents and
privacy measure use in social networking sites. The Social Cognitive, Protection Motivation …
privacy measure use in social networking sites. The Social Cognitive, Protection Motivation …
“Security begins at home”: Determinants of home computer and mobile device security behavior
Personal computing users are vulnerable to information security threats, as they must
independently make decisions about how to protect themselves, often with little …
independently make decisions about how to protect themselves, often with little …
This study investigates users' co** responses in the process of phishing email detection.
Three common responses are identified based on the co** literature: task-focused co** …
Three common responses are identified based on the co** literature: task-focused co** …