Adaptive and Maladaptive Coping with an It Threat
暂无分享,去创建一个
[1] Detmar W. Straub,et al. Structural Equation Modeling and Regression: Guidelines for Research Practice , 2000, Commun. Assoc. Inf. Syst..
[2] P. Sheeran,et al. Prediction and Intervention in Health-Related Behavior: A Meta-Analytic Review of Protection Motivation Theory , 2000 .
[3] Xinguang Chen,et al. A Cluster Randomized Controlled Trial of an Adolescent HIV Prevention Program Among Bahamian Youth: Effect at 12 Months Post-Intervention , 2009, AIDS and Behavior.
[4] Steven Prentice-Dunn,et al. Protection Motivation Theory and Stages of Change in Sun Protective Behavior , 2009, Journal of health psychology.
[5] Mikko T. Siponen,et al. Motivating IS security compliance: Insights from Habit and Protection Motivation Theory , 2012, Inf. Manag..
[6] Ritu Agarwal,et al. Practicing Safe Computing: A Multimedia Empirical Examination of Home Computer User Security Behavioral Intentions , 2010, MIS Q..
[7] E. Seydel,et al. Protection Motivation Theory , 2022 .
[8] E. Hardin,et al. Understanding the gender gap: Social cognitive changes during an introductory stem course. , 2016, Journal of counseling psychology.
[9] S. Orbell,et al. Can protection motivation theory predict behaviour? A longitudinal test exploring the role of previous behaviour , 1998 .
[10] Younghwa Lee,et al. An empirical investigation of anti-spyware software adoption: A multitheoretical perspective , 2008, Inf. Manag..
[11] R. Rimal,et al. Perceived risk and efficacy beliefs as motivators of change: Use of the risk perception attitude (RPA) framework to understand health behaviors , 2003 .
[12] Merrill Warkentin,et al. Threat Protection and Convenience: Antecedents of Cloud-Based Data Backup , 2014, J. Comput. Inf. Syst..
[13] G. Kok,et al. Behavioural intentions in response to an influenza pandemic , 2010, BMC public health.
[14] C. Fornell,et al. Evaluating structural equation models with unobservable variables and measurement error. , 1981 .
[15] Kim Witte,et al. Addressing Underlying Mechanisms to HIV/AIDS Preventive Behaviors in Ethiopia , 2002 .
[16] Mikko T. Siponen,et al. Neutralization: New Insights into the Problem of Employee Systems Security Policy Violations , 2010, MIS Q..
[17] R W Rogers,et al. Identifying effective components of alcohol misuse prevention programs. , 1982, Journal of studies on alcohol.
[18] L. Tucker,et al. A reliability coefficient for maximum likelihood factor analysis , 1973 .
[19] Atreyi Kankanhalli,et al. Studying users' computer security behavior: A health belief perspective , 2009, Decis. Support Syst..
[20] R. Rogers. Cognitive and physiological processes in fear appeals and attitude change: a revised theory of prote , 1983 .
[21] Richard G. Netemeyer,et al. Handbook of Marketing Scales , 1999 .
[22] Rui Chen,et al. Security services as coping mechanisms: an investigation into user intention to adopt an email authentication service , 2014, Inf. Syst. J..
[23] Richard G. Netemeyer,et al. Handbook of Marketing Scales: Multi-Item Measures for Marketing and Consumer Behavior Research , 1993 .
[24] Izak Benbasat,et al. Development of an Instrument to Measure the Perceptions of Adopting an Information Technology Innovation , 1991, Inf. Syst. Res..
[25] Dennis F. Galletta,et al. What Do Systems Users Have to Fear? Using Fear Appeals to Engender Threats and Fear that Motivate Protective Security Behaviors , 2015, MIS Q..
[26] Princely Ifinedo,et al. Understanding information systems security policy compliance: An integration of the theory of planned behavior and the protection motivation theory , 2012, Comput. Secur..
[27] Mary Sumner,et al. Information Security Threats: A Comparative Analysis of Impact, Probability, and Preparedness , 2009, Inf. Syst. Manag..
[28] C. Carver,et al. Assessing coping strategies: a theoretically based approach. , 1989, Journal of personality and social psychology.
[29] Robert LaRose,et al. Keeping our network safe: a model of online protection behaviour , 2008, Behav. Inf. Technol..
[30] G. Ruxton. The unequal variance t-test is an underused alternative to Student's t-test and the Mann–Whitney U test , 2006 .
[31] Steven Prentice-Dunn,et al. Protection Motivation Theory and Skin Cancer Risk: The Role of Individual Differences in Responses to Persuasive Appeals , 2005 .
[32] Mo Adam Mahmood,et al. Employees' adherence to information security policies: An exploratory field study , 2014, Inf. Manag..
[33] Irene Woon,et al. A Protection Motivation Theory Approach to Home Wireless Security , 2005, ICIS.
[34] Tejaswini Herath,et al. Understanding Employee Responses to Stressful Information Security Requirements: A Coping Perspective , 2014, J. Manag. Inf. Syst..
[35] Qing Hu,et al. Future directions for behavioral information security research , 2013, Comput. Secur..
[36] R. W. Rogers,et al. Effects of components of protection-motivation theory on adaptive and maladaptive coping with a health threat. , 1987, Journal of personality and social psychology.
[37] Wynne W. Chin. The partial least squares approach for structural equation modeling. , 1998 .
[38] R W Rogers,et al. Fear appeals and attitude change: effects of a threat's noxiousness, probability of occurrence, and the efficacy of coping responses. , 1976, Journal of personality and social psychology.
[39] Chun-Lin Lee,et al. The Influence of Computer Literacy and Computer Anxiety on Computer Self-Efficacy: The Moderating Effect of Gender , 2014, Cyberpsychology Behav. Soc. Netw..
[40] Yajiong Xue,et al. Understanding Security Behaviors in Personal Computer Usage: A Threat Avoidance Perspective , 2010, J. Assoc. Inf. Syst..
[41] S. Lippke,et al. The protection motivation theory within the stages of the transtheoretical model - stage-specific interplay of variables and prediction of exercise stage transitions. , 2009, British journal of health psychology.
[42] R. Bagozzi,et al. On the evaluation of structural equation models , 1988 .
[43] P. Sheeran,et al. Combining motivational and volitional interventions to promote exercise participation: protection motivation theory and implementation intentions. , 2002, British journal of health psychology.
[44] P. Bentler,et al. Cutoff criteria for fit indexes in covariance structure analysis : Conventional criteria versus new alternatives , 1999 .
[45] Yu Andy Wu,et al. Impact of Users’ Security Awareness on Desktop Security Behavior: A Protection Motivation Theory Perspective , 2016, Inf. Syst. Manag..
[46] R. Rimal. Perceived Risk and Self-Efficacy as Motivators: Understanding Individuals' Long-Term Use of Health Information. , 2001 .
[47] K. Witte. Putting the fear back into fear appeals: The extended parallel process model , 1992 .
[48] D. Lakens,et al. Additional file to "Why Psychologists Should by Default Use Welch's t-test Instead of Student's t-test." (in press for the International Review of Social Psychology) , 2017 .
[49] Fred D. Davis. Perceived Usefulness, Perceived Ease of Use, and User Acceptance of Information Technology , 1989, MIS Q..
[50] Wynne W. Chin,et al. Advancing the Theory of Adaptive Structuration: The Development of a Scale to Measure Faithfulness of Appropriation , 1997, Inf. Syst. Res..
[51] Qing Hu,et al. Is spyware an Internet nuisance or public menace? , 2005, CACM.
[52] H. Leventhal,et al. Findings and Theory in the Study of Fear Communications , 1970 .
[53] Lee A. Freeman,et al. Are Men More Technology-Oriented Than Women? The Role of Gender on the Development of General Computer Self-Efficacy of College Students , 2010, AMCIS.
[54] M. Conner,et al. Predicting health behaviour : research and practice with social cognition models , 2005 .
[55] Younghwa Lee,et al. Threat or coping appraisal: determinants of SMB executives’ decision to adopt anti-malware software , 2009, Eur. J. Inf. Syst..
[56] R. Stine,et al. Bootstrapping Goodness-of-Fit Measures in Structural Equation Models , 1992 .
[57] Qing Hu,et al. The Centrality of Awareness in the Formation of User Behavioral Intention toward Protective Information Technologies , 2007, J. Assoc. Inf. Syst..
[58] R. W. Rogers,et al. Protection Motivation Theory and preventive health: beyond the Health Belief Model , 1986 .
[59] Allan F Williams,et al. Perceived Risk and Other Predictors and Correlates of Teenagers' Safety Belt Use During the First Year of Licensure , 2008, Traffic injury prevention.
[60] R R McCrae. Situational determinants of coping responses: loss, threat, and challenge. , 1984, Journal of personality and social psychology.
[61] H. Raghav Rao,et al. Protection motivation and deterrence: a framework for security policy compliance in organisations , 2009, Eur. J. Inf. Syst..
[62] Dominic Abrams,et al. Exploring teenagers' adaptive and maladaptive thinking in relation to the threat of hiv infection. , 1994, Psychology & health.
[63] Merrill Warkentin,et al. Fear Appeals and Information Security Behaviors: An Empirical Study , 2010, MIS Q..
[64] M. Allen,et al. A Meta-Analysis of Fear Appeals: Implications for Effective Public Health Campaigns , 2000, Health education & behavior : the official publication of the Society for Public Health Education.
[65] A. Good,et al. Can the effectiveness of health promotion campaigns be improved using self-efficacy and self-affirmation interventions? An analysis of sun protection messages , 2011, Psychology & health.
[66] Yajiong Xue,et al. Avoidance of Information Technology Threats: A Theoretical Perspective , 2009, MIS Q..
[67] Robert Ho,et al. Predicting Intention for Protective Health Behaviour: A test of the Protection versus the Ordered Protection Motivation Model , 2000 .
[68] D. Lakens,et al. Why Psychologists Should by Default Use Welch's t-test Instead of Student's t-test with Unequal Group Sizes , 2017 .
[69] Dahui Li,et al. Fighting identity theft: The coping perspective , 2012, Decis. Support Syst..
[70] James C. Anderson,et al. STRUCTURAL EQUATION MODELING IN PRACTICE: A REVIEW AND RECOMMENDED TWO-STEP APPROACH , 1988 .
[71] Detmar W. Straub,et al. Security lapses and the omission of information security measures: A threat control model and empirical test , 2008, Comput. Hum. Behav..