Blockchain adoption: A study of cognitive factors underpinning decision making

[1]  Diane Dolezel,et al.  Information Security Policy Non-Compliance: Can Capitulation Theory Explain User Behaviors? , 2021, Computers & Security.

[2]  Julian Szymanski,et al.  Blockchain technologies to address smart city and society challenges , 2021, Comput. Hum. Behav..

[3]  Zach W. Y. Lee,et al.  Blockchain technology and trust relationships in trade finance , 2021 .

[4]  Lyn E. Pleger,et al.  Making public concerns tangible: An empirical study of German and UK citizens' perception of data protection and data security , 2021, Comput. Hum. Behav..

[5]  Emilio Esposito,et al.  Surfing blockchain wave, or drowning? Shaping the future of distributed ledgers and decentralized technologies , 2021 .

[6]  Vikas Kumar,et al.  A machine learning based approach for predicting blockchain adoption in supply Chain , 2020, Technological Forecasting and Social Change.

[7]  Shahryar Ghorbani,et al.  Expert oriented approach for analyzing the blockchain adoption barriers in humanitarian supply chain , 2020 .

[8]  Irman Hermadi,et al.  Preliminary User Studies on Consumer Perception Towards Blockchain-Based Livestock Traceability Platform in Indonesia: An Implication to Design , 2020, 2020 International Conference on Computer Science and Its Application in Agriculture (ICOSICA).

[9]  Schahram Dustdar,et al.  COM-PACE: Compliance-Aware Cloud Application Engineering Using Blockchain , 2020, IEEE Internet Computing.

[10]  Donncha Kavanagh,et al.  Cryptocurrencies and the emergence of blockocracy , 2020, Inf. Soc..

[11]  J. Rho,et al.  Accepting financial transactions using blockchain technology and cryptocurrency: A customer perspective approach , 2020 .

[12]  Marijn Janssen,et al.  Blockchain for next generation services in banking and finance: cost, benefit, risk and opportunity analysis , 2020, J. Enterp. Inf. Manag..

[13]  Primavera De Filippi,et al.  Blockchain as a confidence machine: The problem of trust & challenges of governance , 2020, Technology in Society.

[14]  Merrill Warkentin,et al.  Using the security triad to assess blockchain technology in public sector applications , 2020, Int. J. Inf. Manag..

[15]  Meikang Qiu,et al.  Differential Privacy-Based Blockchain for Industrial Internet-of-Things , 2020, IEEE Transactions on Industrial Informatics.

[16]  Stefan Tönnissen,et al.  Analysing the impact of blockchain-technology for operations and supply chain management: An explanatory model drawn from multiple case studies , 2020, Int. J. Inf. Manag..

[17]  Rajiv Sabherwal,et al.  Mobile application security: Role of perceived privacy as the predictor of security perceptions , 2020, Int. J. Inf. Manag..

[18]  Shanshan Dai,et al.  Will concerns for ski tourism promote pro‐environmental behaviour? An implication of protection motivation theory , 2020, International Journal of Tourism Research.

[19]  Yogesh Kumar Dwivedi,et al.  Blockchain technology for enhancing swift-trust, collaboration and resilience within a humanitarian supply chain setting , 2020, Int. J. Prod. Res..

[20]  Vishanth Weerakkody,et al.  A framework for analysing blockchain technology adoption: Integrating institutional, market and technical factors , 2020, Int. J. Inf. Manag..

[21]  Pierfrancesco Bellini,et al.  Smart City IoT Platform Respecting GDPR Privacy and Security Aspects , 2020, IEEE Access.

[22]  Omer Rana,et al.  Enhancing User Privacy in IoT: Integration of GDPR and Blockchain , 2019, BlockSys.

[23]  Yogesh Kumar Dwivedi,et al.  Blockchain research, practice and policy: Applications, benefits, limitations, emerging research themes and research agenda , 2019, Int. J. Inf. Manag..

[24]  Don D.H. Shin,et al.  Blockchain: The emerging technology of digital trust , 2019, Telematics Informatics.

[25]  Peter Andras,et al.  User perception of Bitcoin usability and security across novice users , 2019, Int. J. Hum. Comput. Stud..

[26]  Byeong Ho Kang,et al.  A Survey on Blockchain-Based Internet Service Architecture: Requirements, Challenges, Trends, and Future , 2019, IEEE Access.

[27]  Jeannette Paschen,et al.  How blockchain technologies impact your business model , 2019, Business Horizons.

[28]  Jiafu Wan,et al.  A Blockchain-Based Solution for Enhancing Security and Privacy in Smart Factory , 2019, IEEE Transactions on Industrial Informatics.

[29]  Gerhard Schwabe,et al.  Exploring Blockchain Value Creation: The Case of the Car Ecosystem , 2019, HICSS.

[30]  Stephen Boyle,et al.  The impact of security awarness on information technology professionals' behavior , 2018, Comput. Secur..

[31]  Paul van Schaik,et al.  Testing a model of precautionary online behaviour: The case of online banking , 2018, Comput. Hum. Behav..

[32]  Madini O. Alassafi,et al.  Blockchain with Internet of Things: Benefits, Challenges, and Future Directions , 2018, International Journal of Intelligent Systems and Applications.

[33]  Suling Jia,et al.  Digital enablement of blockchain: Evidence from HNA group , 2018, Int. J. Inf. Manag..

[34]  Frederick T. Sheldon,et al.  Blockchain: properties and misconceptions , 2017 .

[35]  Xiwei Xu,et al.  Adaptable Blockchain-Based Systems: A Case Study for Product Traceability , 2017, IEEE Software.

[36]  N. Kshetri Blockchain's roles in strengthening cybersecurity and protecting privacy , 2017 .

[37]  Benedikt Notheisen,et al.  Trading Real-World Assets on Blockchain , 2017, Business & Information Systems Engineering.

[38]  Robert E. Crossler,et al.  User Motivations in Protecting Information Security: Protection Motivation Theory Versus Self-Determination Theory , 2017, J. Manag. Inf. Syst..

[39]  Savvas Papagiannidis,et al.  The influence of prior knowledge structures on website attitudes and behavioral intentions , 2017, Comput. Hum. Behav..

[40]  Pierluigi Cuccuru,et al.  Beyond bitcoin: an early overview on smart contracts , 2017, Int. J. Law Inf. Technol..

[41]  Aggelos Kiayias,et al.  Ouroboros: A Provably Secure Proof-of-Stake Blockchain Protocol , 2017, CRYPTO.

[42]  Zibin Zheng,et al.  An Overview of Blockchain Technology: Architecture, Consensus, and Future Trends , 2017, 2017 IEEE International Congress on Big Data (BigData Congress).

[43]  Ben A. Amaba,et al.  Blockchain technology innovations , 2017, 2017 IEEE Technology & Engineering Management Conference (TEMSCON).

[44]  Jon D. Elhai,et al.  Anxiety about electronic data hacking: Predictors and relations with digital privacy protection behavior , 2017, Internet Res..

[45]  Charlie Wilson,et al.  Benefits and risks of smart home technologies , 2017 .

[46]  Ariel M. Aloe,et al.  Extracting the Variance Inflation Factor and Other Multicollinearity Diagnostics from Typical Regression Results , 2017 .

[47]  Sooyong Park,et al.  Where Is Current Research on Blockchain Technology?—A Systematic Review , 2016, PloS one.

[48]  Ingo Weber,et al.  New kids on the block: an analysis of modern blockchains , 2016, ArXiv.

[49]  Robert LaRose,et al.  Understanding online safety behaviors: A protection motivation theory perspective , 2016, Comput. Secur..

[50]  Francisco J. Liébana-Cabanillas,et al.  Determinants of the intention to use NFC technology as a payment system: an acceptance model approach , 2015, Information Systems and e-Business Management.

[51]  Yu Andy Wu,et al.  Impact of Users’ Security Awareness on Desktop Security Behavior: A Protection Motivation Theory Perspective , 2016, Inf. Syst. Manag..

[52]  Francisco J. Liébana-Cabanillas,et al.  User behaviour in QR mobile payment system: the QR Payment Acceptance Model , 2015, Technol. Anal. Strateg. Manag..

[53]  A. Hayes An Index and Test of Linear Moderated Mediation , 2015, Multivariate behavioral research.

[54]  Grant Packard,et al.  Compensatory Knowledge Signaling in Consumer Word-of-Mouth , 2013 .

[55]  Mikko T. Siponen,et al.  Motivating IS security compliance: Insights from Habit and Protection Motivation Theory , 2012, Inf. Manag..

[56]  Viswanath Venkatesh,et al.  Consumer Acceptance and Use of Information Technology: Extending the Unified Theory of Acceptance and Use of Technology , 2012, MIS Q..

[57]  Princely Ifinedo,et al.  Understanding information systems security policy compliance: An integration of the theory of planned behavior and the protection motivation theory , 2012, Comput. Secur..

[58]  Merrill Warkentin,et al.  Fear Appeals and Information Security Behaviors: An Empirical Study , 2010, MIS Q..

[59]  Yajiong Xue,et al.  Understanding Security Behaviors in Personal Computer Usage: A Threat Avoidance Perspective , 2010, J. Assoc. Inf. Syst..

[60]  H. Raghav Rao,et al.  Protection motivation and deterrence: a framework for security policy compliance in organisations , 2009, Eur. J. Inf. Syst..

[61]  Yajiong Xue,et al.  Avoidance of Information Technology Threats: A Theoretical Perspective , 2009, MIS Q..

[62]  Dennis F. Galletta,et al.  User Awareness of Security Countermeasures and Its Impact on Information Systems Misuse: A Deterrence Approach , 2009, Inf. Syst. Res..

[63]  Robert P. Minch,et al.  Application of Protection Motivation Theory to Adoption of Protective Technologies , 2009, 2009 42nd Hawaii International Conference on System Sciences.

[64]  G. Latham,et al.  The Effect of Training in Verbal Self-Guidance on the Self-Efficacy and Performance of Native North Americans in the Selection Interview. , 2006 .

[65]  Mun Y. Yi,et al.  Understanding information technology acceptance by individual professionals: Toward an integrative view , 2006, Inf. Manag..

[66]  Tamara Dinev,et al.  An Extended Privacy Calculus Model for E-Commerce Transactions , 2006, Inf. Syst. Res..

[67]  Mayuram S. Krishnan,et al.  The Personalization Privacy Paradox: An Empirical Evaluation of Information Transparency and the Willingness to be Profiled Online for Personalization , 2006, MIS Q..

[68]  Richard A. Posthuma,et al.  Predictors of self-efficacy for cognitive ability employment testing , 2005 .

[69]  Vallabh Sambamurthy,et al.  Sources of Influence on Beliefs about Information Technolgoy Use: An Empirical Study of Knowledge Workers , 2003, MIS Q..

[70]  E. Rogers,et al.  Diffusion of innovations , 1964, Encyclopedia of Sport Management.

[71]  Paul A. Pavlou,et al.  Predicting E-Services Adoption: A Perceived Risk Facets Perspective , 2002, Int. J. Hum. Comput. Stud..

[72]  Jacky Swan,et al.  A knowledge‐focused perspective on the diffusion and adoption of complex information technologies: the BPR example , 2000, Inf. Syst. J..

[73]  R. W. Rogers,et al.  A meta-analysis of research on protection motivation theory. , 2000 .

[74]  L. Flynn,et al.  A Short, Reliable Measure of Subjective Knowledge , 1999 .

[75]  Ritu Agarwal,et al.  A Conceptual and Operational Definition of Personal Innovativeness in the Domain of Information Technology , 1998, Inf. Syst. Res..

[76]  David L. Mothersbaugh,et al.  Consumer Knowledge Assessment , 1994 .

[77]  Peter Wright,et al.  The Persuasion Knowledge Model: How People Cope with Persuasion Attempts , 1994 .

[78]  Marilyn E. Gist,et al.  Self-Efficacy: A Theoretical Analysis of Its Determinants and Malleability , 1992 .

[79]  A. Bandura,et al.  Tests of the generality of self-efficacy theory , 1980, Cognitive Therapy and Research.

[80]  R W Rogers,et al.  Fear appeals and attitude change: effects of a threat's noxiousness, probability of occurrence, and the efficacy of coping responses. , 1976, Journal of personality and social psychology.

[81]  Savvas Papagiannidis,et al.  Blockchain in a Business Model: Exploring Benefits and Risks , 2021, I3E.

[82]  Pia V. Ingold,et al.  Resume = Resume? The effects of blockchain, social media, and classical resumes on resume fraud and applicant reactions to resumes , 2021, Comput. Hum. Behav..

[83]  Manjul Gupta,et al.  The effects of individual-level espoused national cultural values on the willingness to use Bitcoin-like blockchain currencies , 2021, Int. J. Inf. Manag..

[84]  S. Folkman,et al.  Stress: Appraisal and Coping , 2020, Encyclopedia of Behavioral Medicine.

[85]  Alexander J. McLeod,et al.  Toward Security Capitulation Theory , 2020, AMCIS.

[86]  Hany F. Atlam,et al.  Chapter One - Technical aspects of blockchain and IoT , 2019, Adv. Comput..

[87]  M. Sethumadhavan,et al.  Survey of consensus protocols on blockchain applications , 2017, 2017 4th International Conference on Advanced Computing and Communication Systems (ICACCS).

[88]  Roman Beck,et al.  Blockchain - the Gateway to Trust-Free Cryptographic Transactions , 2016, ECIS.

[89]  Douglas G. Bonett,et al.  Cronbach's alpha reliability: Interval estimation, hypothesis testing, and sample size planning , 2015 .

[90]  Younghwa Lee,et al.  Understanding anti-plagiarism software adoption: An extended protection motivation theory perspective , 2011, Decis. Support Syst..

[91]  Irene Woon,et al.  A Protection Motivation Theory Approach to Home Wireless Security , 2005, ICIS.

[92]  M. Culnan,et al.  Information Privacy Concerns, Procedural Fairness, and Impersonal Trust: An Empirical Investigation , 1999 .

[93]  E. Seydel,et al.  Protection Motivation Theory , 2022 .