Self-Efficacy and Security Behavior: Results from a Systematic Review of Research Methods

N Borgert, L Jansen, I Böse, J Friedauer… - Proceedings of the …, 2024 - dl.acm.org
Amidst growing IT security challenges, psychological underpinnings of security behaviors
have received considerable interest, eg cybersecurity Self-Efficacy (SE), the belief in one's …

A test of protection motivation theory in the information security literature: A meta-analytic structural equation modeling approach

J Mou, JF Cohen, A Bhattacherjee… - Journal of the Association …, 2022 - aisel.aisnet.org
Abstract Information security is one of the important domains of information systems
research today, with protection motivation theory (PMT) one of its most influential theoretical …

The role of self-efficacy on the adoption of information systems security innovations: a meta-analysis assessment

MA Hameed, NAG Arachchilage - Personal and Ubiquitous Computing, 2021 - Springer
Self-efficacy is the most frequently examined attribute in the adoption of Information Systems
(IS) security innovations. Yet, the role of self-efficacy in the adoption of IS security …

[HTML][HTML] " No point worrying"–The role of threat devaluation in information security behavior

N Thompson, T McGill, N Narula - Computers & Security, 2024 - Elsevier
Extant information security research is characterized by a focus on problem-focused security
behaviours, while overlooking the internal, and emotion-focused co** responses that …

Cyber security fear appeals: Unexpectedly complicated

K Renaud, M Dupuis - Proceedings of the new security paradigms …, 2019 - dl.acm.org
Cyber security researchers are starting to experiment with fear appeals, with a wide variety
of designs and reported efficaciousness. This makes it hard to derive recommendations for …

Exploring potential gender differences in information security and privacy

T McGill, N Thompson - Information & Computer Security, 2021 - emerald.com
Purpose Information technology users often fail to adopt necessary security and privacy
measures, leading to increased risk of cybercrimes. There has been limited research on how …

Emotions in fear communication: A cross‐cultural neuromarketing approach

JM Mas, A Gómez, O Carrero - Psychology & Marketing, 2024 - Wiley Online Library
This research analyzes how the receiver's emotional response to fear communication differs
across cultural groups of origin (Europe vs. Latin America), as well as individual traits such …

Maladaptive behaviour in response to email phishing threats: The roles of rewards and response costs

S Bax, T McGill, V Hobbs - Computers & Security, 2021 - Elsevier
Email users are vulnerable to phishing threats and a greater understanding of how to protect
them is needed. This research investigates how response costs and rewards influence …

Online consumer demand during and after natural disasters: Evidence from the COVID-19 pandemic

W Shin, J Park, HW Kim - Information & Management, 2024 - Elsevier
Natural disasters arouse threats of health and economic damage, altering consumer
behavior in both the short term and the long term. By adapting co** theory to health and …

Gender differences in information security perceptions and behaviour

T McGill, N Thompson - 29th Australasian Conference on …, 2018 - espace.curtin.edu.au
Information security is of universal concern to computer users from all walks of life. Though
gender differences in technology adoption are well researched, scant attention has been …