Digital health innovation: exploring adoption of COVID-19 digital contact tracing apps

S Sharma, G Singh, R Sharma, P Jones… - IEEE Transactions …, 2020 - ieeexplore.ieee.org
With the outbreak of COVID-19, contact tracing is becoming a used intervention to control
the spread of this highly infectious disease. This article explores an individual's intention to …

Bring Your Own Device (BYOD) as reversed IT adoption: Insights into managers' co** strategies

Y Barlette, A Jaouen, P Baillette - International journal of information …, 2021 - Elsevier
Abstract The adoption of Bring Your Own Device (BYOD), initiated by employees, refers to
the provision and use of personal mobile devices and applications for both private and …

A test of protection motivation theory in the information security literature: A meta-analytic structural equation modeling approach

J Mou, JF Cohen, A Bhattacherjee… - Journal of the Association …, 2022 - aisel.aisnet.org
Abstract Information security is one of the important domains of information systems
research today, with protection motivation theory (PMT) one of its most influential theoretical …

Impact of AIS success on decision-making effectiveness among SMEs in less developed countries

HM Al-Hattami - Information Technology for Development, 2024 - Taylor & Francis
Accounting information system (AIS) is becoming increasingly paramount for SMEs in order
to boost decision-making effectiveness (DME). The issue is no longer whether SMEs use …

Motivating information security policy compliance: The critical role of supervisor-subordinate guanxi and organizational commitment

C Liu, N Wang, H Liang - International Journal of Information Management, 2020 - Elsevier
Employees' non-compliance with organizational information security policy (ISP) when using
informational resources has become the main reason for continuous security incidents …

[HTML][HTML] Organizational and team culture as antecedents of protection motivation among IT employees

S Sharma, E Aparicio - Computers & Security, 2022 - Elsevier
The rapid development of technology and information systems has led to higher information
security-related issues in an organization. The age of remote working (ie, telecommuting) …

Going through the emotions of regret and fear: Revisiting protection motivation for identity theft protection

O Ogbanufe, R Pavur - International Journal of Information Management, 2022 - Elsevier
We explore why and how individuals adaptively and maladaptively respond to the threat of
identity theft. We use protection motivation theory and regret theory, shedding light on how …

Beyond adaptive security co** behaviors: Theory and empirical evidence

Y Chen, XR Luo, H Li - Information & Management, 2022 - Elsevier
Extant research seldom focuses on maladaptive security co** behaviors. Applying the
extended parallel process model, this study has developed a research model to reveal the …

Redefining threat appraisals of organizational insiders and exploring the moderating role of fear in cyberattack protection motivation

S Vrhovec, A Mihelič - Computers & Security, 2021 - Elsevier
Increasingly sophisticated cyberattacks often systematically target organizational insiders.
Their motivation for self-protection has therefore an important role in cybersecurity of …

Fear appeals and co** appeals for health product promotion: Impulsive purchasing or psychological distancing?

S Fu, X Zheng, H Wang, Y Luo - Journal of Retailing and Consumer …, 2023 - Elsevier
The prevalence of online health communities (OHCs) motivates health product companies to
manipulate persuasion-based marketing strategies, including fear appeals and co** …