Digital health innovation: exploring adoption of COVID-19 digital contact tracing apps
With the outbreak of COVID-19, contact tracing is becoming a used intervention to control
the spread of this highly infectious disease. This article explores an individual's intention to …
the spread of this highly infectious disease. This article explores an individual's intention to …
Bring Your Own Device (BYOD) as reversed IT adoption: Insights into managers' co** strategies
Abstract The adoption of Bring Your Own Device (BYOD), initiated by employees, refers to
the provision and use of personal mobile devices and applications for both private and …
the provision and use of personal mobile devices and applications for both private and …
A test of protection motivation theory in the information security literature: A meta-analytic structural equation modeling approach
Abstract Information security is one of the important domains of information systems
research today, with protection motivation theory (PMT) one of its most influential theoretical …
research today, with protection motivation theory (PMT) one of its most influential theoretical …
Impact of AIS success on decision-making effectiveness among SMEs in less developed countries
HM Al-Hattami - Information Technology for Development, 2024 - Taylor & Francis
Accounting information system (AIS) is becoming increasingly paramount for SMEs in order
to boost decision-making effectiveness (DME). The issue is no longer whether SMEs use …
to boost decision-making effectiveness (DME). The issue is no longer whether SMEs use …
Motivating information security policy compliance: The critical role of supervisor-subordinate guanxi and organizational commitment
C Liu, N Wang, H Liang - International Journal of Information Management, 2020 - Elsevier
Employees' non-compliance with organizational information security policy (ISP) when using
informational resources has become the main reason for continuous security incidents …
informational resources has become the main reason for continuous security incidents …
[HTML][HTML] Organizational and team culture as antecedents of protection motivation among IT employees
S Sharma, E Aparicio - Computers & Security, 2022 - Elsevier
The rapid development of technology and information systems has led to higher information
security-related issues in an organization. The age of remote working (ie, telecommuting) …
security-related issues in an organization. The age of remote working (ie, telecommuting) …
Going through the emotions of regret and fear: Revisiting protection motivation for identity theft protection
O Ogbanufe, R Pavur - International Journal of Information Management, 2022 - Elsevier
We explore why and how individuals adaptively and maladaptively respond to the threat of
identity theft. We use protection motivation theory and regret theory, shedding light on how …
identity theft. We use protection motivation theory and regret theory, shedding light on how …
Beyond adaptive security co** behaviors: Theory and empirical evidence
Extant research seldom focuses on maladaptive security co** behaviors. Applying the
extended parallel process model, this study has developed a research model to reveal the …
extended parallel process model, this study has developed a research model to reveal the …
Redefining threat appraisals of organizational insiders and exploring the moderating role of fear in cyberattack protection motivation
Increasingly sophisticated cyberattacks often systematically target organizational insiders.
Their motivation for self-protection has therefore an important role in cybersecurity of …
Their motivation for self-protection has therefore an important role in cybersecurity of …
Fear appeals and co** appeals for health product promotion: Impulsive purchasing or psychological distancing?
S Fu, X Zheng, H Wang, Y Luo - Journal of Retailing and Consumer …, 2023 - Elsevier
The prevalence of online health communities (OHCs) motivates health product companies to
manipulate persuasion-based marketing strategies, including fear appeals and co** …
manipulate persuasion-based marketing strategies, including fear appeals and co** …