Examining the differential effectiveness of fear appeals in information security management using two-stage meta-analysis

PB Lowry, GD Moody, S Parameswaran… - Journal of …, 2023 - Taylor & Francis
Most of the information security management research involving fear appeals is guided by
either protection motivation theory or the extended parallel processing model. Over time …

An integrated model of voice-user interface continuance intention: the gender effect

QN Nguyen, A Ta, V Prybutok - International Journal of Human …, 2019 - Taylor & Francis
Advanced speech recognition technology facilitated the development of voice-based smart
devices. Voice user interface (VUI) is now a common feature on smartphones, computers …

Dispositional mindfulness as an antecedent of privacy concerns: A protection motivation theory perspective

A Ioannou, I Tussyadiah, A Marshan - Psychology & Marketing, 2021 - Wiley Online Library
This study investigates the effects of mindfulness, an important personality trait, on people's
perceptions of privacy. Using protection motivation theory as a conceptual foundation, the …

Development and validation of the Need for Privacy Scale (NFP-S)

R Frener, J Dombrowski, S Trepte - Communication Methods and …, 2024 - Taylor & Francis
The need for privacy has been gaining importance in various disciplines and areas of
communication, including computer-mediated, interpersonal, and health communication …

Online privacy breaches, offline consequences: Construction and validation of the concerns with the protection of informational privacy scale

E Durnell, K Okabe-Miyamoto… - International Journal of …, 2020 - Taylor & Francis
Concerns with protecting privacy, especially of online data, has been a goal of privacy
scholarship for years. Because most data are transferred online, many instruments focus on …

A study on designing video tutorials for promoting security features: A case study in the context of two-factor authentication (2fa)

Y Albayram, MMH Khan, M Fagan - International Journal of Human …, 2017 - Taylor & Francis
This article investigates the effectiveness of informational videos that are designed to
provide an introduction to two-step verification (ie, 2FA) and in turn seeks to improve the …

Consumer digital trust: The main trends and research directions

ВА Ребязина, ЭО Тункевичус - Российский журнал менеджмента, 2021 - rjm.spbu.ru
The objective of this paper is to systematize the research on the consumer digital trust from
2016 to 2022 and to determine existing and future research trends. The authors apply a …

Understanding negotiated anti-malware interruption effects on user decision quality in endpoint security

MKS Tan, S Goode, A Richardson - Behaviour & Information …, 2021 - Taylor & Francis
Anti-malware software must be frequently updated in order to protect the system and the
user from attack. Makers of this software must choose between interrupting the user to …

Kee** the user in the cloud: a cognitive social capital antecedent to use continuance and trust-commitment in personal cloud storage services

S Goode - Behaviour & Information Technology, 2019 - Taylor & Francis
While personal cloud storage services are popular, providers experience difficulty retaining
users. Two explanations of user continuance intention, being use continuance theory and …

Confront, accept or reinterpret? Co** mediation effects on attribution in cloud service failure

S Goode - Journal of Organizational Computing and Electronic …, 2020 - Taylor & Francis
Online service failure can be disruptive to end users, leading some to confront the service
provider to vent their anger and anxiety. Prior research holds that users' attributions …