Examining the differential effectiveness of fear appeals in information security management using two-stage meta-analysis
Most of the information security management research involving fear appeals is guided by
either protection motivation theory or the extended parallel processing model. Over time …
either protection motivation theory or the extended parallel processing model. Over time …
An integrated model of voice-user interface continuance intention: the gender effect
Advanced speech recognition technology facilitated the development of voice-based smart
devices. Voice user interface (VUI) is now a common feature on smartphones, computers …
devices. Voice user interface (VUI) is now a common feature on smartphones, computers …
Dispositional mindfulness as an antecedent of privacy concerns: A protection motivation theory perspective
This study investigates the effects of mindfulness, an important personality trait, on people's
perceptions of privacy. Using protection motivation theory as a conceptual foundation, the …
perceptions of privacy. Using protection motivation theory as a conceptual foundation, the …
Development and validation of the Need for Privacy Scale (NFP-S)
The need for privacy has been gaining importance in various disciplines and areas of
communication, including computer-mediated, interpersonal, and health communication …
communication, including computer-mediated, interpersonal, and health communication …
Online privacy breaches, offline consequences: Construction and validation of the concerns with the protection of informational privacy scale
Concerns with protecting privacy, especially of online data, has been a goal of privacy
scholarship for years. Because most data are transferred online, many instruments focus on …
scholarship for years. Because most data are transferred online, many instruments focus on …
A study on designing video tutorials for promoting security features: A case study in the context of two-factor authentication (2fa)
This article investigates the effectiveness of informational videos that are designed to
provide an introduction to two-step verification (ie, 2FA) and in turn seeks to improve the …
provide an introduction to two-step verification (ie, 2FA) and in turn seeks to improve the …
Consumer digital trust: The main trends and research directions
ВА Ребязина, ЭО Тункевичус - Российский журнал менеджмента, 2021 - rjm.spbu.ru
The objective of this paper is to systematize the research on the consumer digital trust from
2016 to 2022 and to determine existing and future research trends. The authors apply a …
2016 to 2022 and to determine existing and future research trends. The authors apply a …
Understanding negotiated anti-malware interruption effects on user decision quality in endpoint security
MKS Tan, S Goode, A Richardson - Behaviour & Information …, 2021 - Taylor & Francis
Anti-malware software must be frequently updated in order to protect the system and the
user from attack. Makers of this software must choose between interrupting the user to …
user from attack. Makers of this software must choose between interrupting the user to …
Kee** the user in the cloud: a cognitive social capital antecedent to use continuance and trust-commitment in personal cloud storage services
S Goode - Behaviour & Information Technology, 2019 - Taylor & Francis
While personal cloud storage services are popular, providers experience difficulty retaining
users. Two explanations of user continuance intention, being use continuance theory and …
users. Two explanations of user continuance intention, being use continuance theory and …
Confront, accept or reinterpret? Co** mediation effects on attribution in cloud service failure
S Goode - Journal of Organizational Computing and Electronic …, 2020 - Taylor & Francis
Online service failure can be disruptive to end users, leading some to confront the service
provider to vent their anger and anxiety. Prior research holds that users' attributions …
provider to vent their anger and anxiety. Prior research holds that users' attributions …