The role of self-efficacy on the adoption of information systems security innovations: a meta-analysis assessment
MA Hameed, NAG Arachchilage - Personal and Ubiquitous Computing, 2021 - Springer
Self-efficacy is the most frequently examined attribute in the adoption of Information Systems
(IS) security innovations. Yet, the role of self-efficacy in the adoption of IS security …
(IS) security innovations. Yet, the role of self-efficacy in the adoption of IS security …
The impact of ignorance and bias on information security protection motivation: a case of e-waste handling
Purpose Protection motivation theory (PMT) explains that the intention to cope with
information security risks is based on informed threat and co** appraisals. However …
information security risks is based on informed threat and co** appraisals. However …
Unraveling the dynamics of password manager adoption: a deeper dive into critical factors
X Tian - Information & Computer Security, 2025 - emerald.com
Purpose The purpose of this study is to comprehensively explore the password manager
adoption landscape, delving into crucial factors such as performance, trust, social influence …
adoption landscape, delving into crucial factors such as performance, trust, social influence …
“It Basically Started Using Me:” An Observational Study of Password Manager Usage
There is limited information regarding how users employ password managers in the wild
and why they use them in that manner. To address this knowledge gap, we conduct …
and why they use them in that manner. To address this knowledge gap, we conduct …
Approaching IT security & avoiding threats in the smart home context
Not securing smart home devices has proven a threat to cyberspace. This has underscored
the importance of using fear appeals to promote users' information security behavior. We …
the importance of using fear appeals to promote users' information security behavior. We …
" I just stopped using one and started using the other": Motivations, Techniques, and Challenges When Switching Password Managers
This paper explores what motivates password manager (PM) users in the US to switch from
one PM to another, the techniques they employ when switching, and challenges they …
one PM to another, the techniques they employ when switching, and challenges they …
Protection Motivation Theory in information security behavior research: reconsidering the fundamentals
Scholars commonly use protection motivation theory (PMT) by Rogers to examine
information systems (IS) security behaviors and behavioral intentions. A recent, influential …
information systems (IS) security behaviors and behavioral intentions. A recent, influential …
E-waste information security protection motivation: the role of optimism bias
Purpose Electronic waste (e-waste) such as discarded computers and smartphones may
contain large amounts of confidential data. Improper handling of remaining information in e …
contain large amounts of confidential data. Improper handling of remaining information in e …
Comparing the effectiveness of text-based and video-based delivery in motivating users to adopt a password manager
Y Albayram, J Liu, S Cangonj - … of the 2021 European Symposium on …, 2021 - dl.acm.org
Despite security experts advising the use of password managers to securely manage online
account passwords, the adoption rate of password managers among users is still low. To …
account passwords, the adoption rate of password managers among users is still low. To …
Understanding dynamics of initial trust and its antecedents in password managers adoption intention among young adults
Security professionals often suggest password managers as one of the best measures for
the end-users. However, the end-users have shown reluctance in adopting them, mostly due …
the end-users. However, the end-users have shown reluctance in adopting them, mostly due …