The role of self-efficacy on the adoption of information systems security innovations: a meta-analysis assessment

MA Hameed, NAG Arachchilage - Personal and Ubiquitous Computing, 2021 - Springer
Self-efficacy is the most frequently examined attribute in the adoption of Information Systems
(IS) security innovations. Yet, the role of self-efficacy in the adoption of IS security …

The impact of ignorance and bias on information security protection motivation: a case of e-waste handling

H Chen, Y Yuan - Internet Research, 2022 - emerald.com
Purpose Protection motivation theory (PMT) explains that the intention to cope with
information security risks is based on informed threat and co** appraisals. However …

Unraveling the dynamics of password manager adoption: a deeper dive into critical factors

X Tian - Information & Computer Security, 2025 - emerald.com
Purpose The purpose of this study is to comprehensively explore the password manager
adoption landscape, delving into crucial factors such as performance, trust, social influence …

“It Basically Started Using Me:” An Observational Study of Password Manager Usage

S Oesch, S Ruoti, J Simmons, A Gautam - Proceedings of the 2022 CHI …, 2022 - dl.acm.org
There is limited information regarding how users employ password managers in the wild
and why they use them in that manner. To address this knowledge gap, we conduct …

Approaching IT security & avoiding threats in the smart home context

A Nehme, JF George - Journal of Management Information …, 2022 - Taylor & Francis
Not securing smart home devices has proven a threat to cyberspace. This has underscored
the importance of using fear appeals to promote users' information security behavior. We …

" I just stopped using one and started using the other": Motivations, Techniques, and Challenges When Switching Password Managers

CW Munyendo, P Mayer, AJ Aviv - Proceedings of the 2023 ACM …, 2023 - dl.acm.org
This paper explores what motivates password manager (PM) users in the US to switch from
one PM to another, the techniques they employ when switching, and challenges they …

Protection Motivation Theory in information security behavior research: reconsidering the fundamentals

M Siponen, M Rönkkö, L Fufan, S Haag… - Communications of the …, 2024 - jyx.jyu.fi
Scholars commonly use protection motivation theory (PMT) by Rogers to examine
information systems (IS) security behaviors and behavioral intentions. A recent, influential …

E-waste information security protection motivation: the role of optimism bias

H Chen, O Turel, Y Yuan - Information Technology & People, 2022 - emerald.com
Purpose Electronic waste (e-waste) such as discarded computers and smartphones may
contain large amounts of confidential data. Improper handling of remaining information in e …

Comparing the effectiveness of text-based and video-based delivery in motivating users to adopt a password manager

Y Albayram, J Liu, S Cangonj - … of the 2021 European Symposium on …, 2021 - dl.acm.org
Despite security experts advising the use of password managers to securely manage online
account passwords, the adoption rate of password managers among users is still low. To …

Understanding dynamics of initial trust and its antecedents in password managers adoption intention among young adults

A Farooq, A Dubinina, S Virtanen, J Isoaho - Procedia Computer Science, 2021 - Elsevier
Security professionals often suggest password managers as one of the best measures for
the end-users. However, the end-users have shown reluctance in adopting them, mostly due …