Semantic Filter
show all semantic filters
Found 12 articles
  • Examining the Differential Effectiveness of Fear Appeals in Information Security Management Using Two-Stage Meta-Analysis

    PDF

    2023 | Journal of Management Information Systems | Citations: 0

    Authors: Lowry, Paul Benjamin; Moody, Gregory D.; Parameswaran, Srikanth; Brown, Nicholas James

    Abstract: Most of the information security management research involving fear appeals is g ... Expand

    Semantic filters: fear appeal theory

    Topics: H1N1 flu self efficacy Python data quality information security management

    Methods: structural equation modeling meta analysis statistical hypothesis test hierarchical linear modeling statistical power analysis

    Theories: fear appeal theory extended parallel process model protection motivation theory

  • Approaching IT Security & Avoiding Threats in the Smart Home Context

    PDF

    2022 | Journal of Management Information Systems | Citations: 1

    Authors: Nehme, Alaa; George, Joey F.

    Abstract: Not securing smart home devices has proven a threat to cyberspace. This has unde ... Expand

    Semantic filters: fear appeal theory

    Topics: smart home data security self efficacy mobile system data quality

    Methods: survey post-hoc analysis experiment robustness check chi squared test

    Theories: fear appeal theory appraisal theory protection motivation theory

  • Do Security Fear Appeals Work When They Interrupt Tasks? A Multi-Method Examination of Password Strength

    2022 | Management Information Systems Quarterly | Citations: 0

    Authors: Vance, Anthony; Eargle, David; Eggett, Dennis; Straub, Detmar; Ouimet, Kirk

    Abstract: Weak passwords are one of the most pervasive threats in cybersecurity. Facing th ... Expand

    Semantic filters: fear appeal theory

    Topics: password website IT security self efficacy mobile application

    Methods: focus group experiment field experiment theory development experimental group

    Theories: fear appeal theory

  • Discovering the interplay between defensive avoidance and continued use intention of anti-malware software among experienced home users: A moderated mediation model

    PDF

    2022 | Information & Management | Citations: 0

    Authors: Xie, Yitian; Siponen, Mikko; Moody, Greg; Zheng, Xiaosong

    Abstract: Dismissing or disregarding security notifications (defensive avoidance) may lead ... Expand

    Semantic filters: fear appeal theory

    Topics: malware participatory design usage intention behavioral intention home computer

    Methods: design methodology mediation analysis survey descriptive statistic SEM tool

    Theories: fear appeal theory

  • Using susceptibility claims to motivate behaviour change in IT security

    PDF

    2021 | European Journal of Information Systems | Citations: 1

    Authors: Jensen, Matthew L.; Durcikova, Alexandra; Wright, Ryan T.

    Abstract: Organisations face growing IT security risks with substantial consequences for m ... Expand

    Semantic filters: fear appeal theory

    Topics: password phishing IT security IT security threat self efficacy

    Methods: experiment field experiment theory development longitudinal research structured literature research

    Theories: fear appeal theory protection motivation theory

  • Editorial: A Brief Retrospective (2013-2019)

    PDF

    2020 | Journal of the Association for Information Systems | Citations: 0

    Authors: Sarker, Suprateek; Palvia, Prashant; Oguz, Abdullah; Wu, Caven; Xiao, Xiao

    Abstract: ... Expand

    Semantic filters: fear appeal theory

    Topics: privacy information system use systems design health information system electronic commerce

    Methods: literature sample theory development grounded theory design theory structured literature research

    Theories: privacy calculus theory technology acceptance model actor network theory general systems theory theory of affordance

  • Perceived argument quality's effect on threat and coping appraisals in fear appeals: An experiment and exploration of realism check heuristics

    PDF

    2019 | Information & Management | Citations: 18

    Authors: Wall, Jeffrey D.; Warkentin, Merrill

    Abstract: Persuasion is key to encourage compliance with information security policies thr ... Expand

    Semantic filters: fear appeal theory

    Topics: self efficacy laptop computer behavioral intention electronic mail data security

    Methods: ANOVA parametric test multivariate analysis of variance experiment survey design

    Theories: fear appeal theory self determination theory

  • Examining Internet Users’ Adaptive and Maladaptive Security Behaviors Using the Extended Parallel Process Model

    2017 | International Conference on Information Systems | Citations: 0

    Authors: Chen, Yan

    Abstract: Realizing the importance of the behavioral aspect of information security (ISec) ... Expand

    Semantic filters: fear appeal theory

    Topics: IT security threat internet technology self efficacy IT security training electronic commerce

    Methods: survey literature study mediation analysis parametric test ANOVA

    Theories: extended parallel process model fear appeal theory

  • To fear or not to fear? A critical review and analysis of fear appeals in the information security context

    PDF

    2017 | Communications of the Association for Information Systems | Citations: 28

    Authors: Wall, Jeffrey D.; Buche, Mari W.

    Abstract: Controlling organizational insiders’ security behaviors is an important manageme ... Expand

    Semantic filters: fear appeal theory

    Topics: data security privacy self efficacy knowledge representation job satisfaction

    Methods: literature study literature sample qualitative content analysis ontological modelling cross sectional research

    Theories: fear appeal theory

  • Neural Correlates of Protection Motivation for Secure IT Behaviors: An fMRI Examination

    2016 | Journal of the Association for Information Systems | Citations: 55

    Authors: Warkentin, Merrill; Walden, Eric; Johnston, Allen C.; Straub, Detmar William

    Abstract: Information security management programs have long included "fear appeals", mana ... Expand

    Semantic filters: fear appeal theory

    Topics: IT security IT security threat behavioral intention self efficacy cybersecurity behavior

    Methods: functional magnetic resonance imaging experimental design laboratory experiment experiment regression analysis method

    Theories: fear appeal theory