Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Self-Efficacy and Security Behavior: Results from a Systematic Review of Research Methods
Amidst growing IT security challenges, psychological underpinnings of security behaviors
have received considerable interest, eg cybersecurity Self-Efficacy (SE), the belief in one's …
have received considerable interest, eg cybersecurity Self-Efficacy (SE), the belief in one's …
A test of protection motivation theory in the information security literature: A meta-analytic structural equation modeling approach
Abstract Information security is one of the important domains of information systems
research today, with protection motivation theory (PMT) one of its most influential theoretical …
research today, with protection motivation theory (PMT) one of its most influential theoretical …
The role of self-efficacy on the adoption of information systems security innovations: a meta-analysis assessment
Self-efficacy is the most frequently examined attribute in the adoption of Information Systems
(IS) security innovations. Yet, the role of self-efficacy in the adoption of IS security …
(IS) security innovations. Yet, the role of self-efficacy in the adoption of IS security …
[HTML][HTML] " No point worrying"–The role of threat devaluation in information security behavior
Extant information security research is characterized by a focus on problem-focused security
behaviours, while overlooking the internal, and emotion-focused co** responses that …
behaviours, while overlooking the internal, and emotion-focused co** responses that …
Cyber security fear appeals: Unexpectedly complicated
Cyber security researchers are starting to experiment with fear appeals, with a wide variety
of designs and reported efficaciousness. This makes it hard to derive recommendations for …
of designs and reported efficaciousness. This makes it hard to derive recommendations for …
Exploring potential gender differences in information security and privacy
Purpose Information technology users often fail to adopt necessary security and privacy
measures, leading to increased risk of cybercrimes. There has been limited research on how …
measures, leading to increased risk of cybercrimes. There has been limited research on how …
Emotions in fear communication: A cross‐cultural neuromarketing approach
This research analyzes how the receiver's emotional response to fear communication differs
across cultural groups of origin (Europe vs. Latin America), as well as individual traits such …
across cultural groups of origin (Europe vs. Latin America), as well as individual traits such …
Maladaptive behaviour in response to email phishing threats: The roles of rewards and response costs
S Bax, T McGill, V Hobbs - Computers & Security, 2021 - Elsevier
Email users are vulnerable to phishing threats and a greater understanding of how to protect
them is needed. This research investigates how response costs and rewards influence …
them is needed. This research investigates how response costs and rewards influence …
Online consumer demand during and after natural disasters: Evidence from the COVID-19 pandemic
W Shin, J Park, HW Kim - Information & Management, 2024 - Elsevier
Natural disasters arouse threats of health and economic damage, altering consumer
behavior in both the short term and the long term. By adapting co** theory to health and …
behavior in both the short term and the long term. By adapting co** theory to health and …
Gender differences in information security perceptions and behaviour
Information security is of universal concern to computer users from all walks of life. Though
gender differences in technology adoption are well researched, scant attention has been …
gender differences in technology adoption are well researched, scant attention has been …