2023 | Journal of Management Information Systems | Citations: 0
Authors: Lowry, Paul Benjamin; Moody, Gregory D.; Parameswaran, Srikanth; Brown, Nicholas James
Abstract: Most of the information security management research involving fear appeals is g ... Expand
Semantic filters: fear appeal theory
Topics: H1N1 flu self efficacy Python data quality information security management
Methods: structural equation modeling meta analysis statistical hypothesis test hierarchical linear modeling statistical power analysis
Theories: fear appeal theory extended parallel process model protection motivation theory
2022 | Journal of Management Information Systems | Citations: 1
Authors: Nehme, Alaa; George, Joey F.
Abstract: Not securing smart home devices has proven a threat to cyberspace. This has unde ... Expand
Semantic filters: fear appeal theory
Topics: smart home data security self efficacy mobile system data quality
Methods: survey post-hoc analysis experiment robustness check chi squared test
Theories: fear appeal theory appraisal theory protection motivation theory
2022 | Management Information Systems Quarterly | Citations: 0
Authors: Vance, Anthony; Eargle, David; Eggett, Dennis; Straub, Detmar; Ouimet, Kirk
Abstract: Weak passwords are one of the most pervasive threats in cybersecurity. Facing th ... Expand
Semantic filters: fear appeal theory
Topics: password website IT security self efficacy mobile application
Methods: focus group experiment field experiment theory development experimental group
Theories: fear appeal theory
2022 | Information & Management | Citations: 0
Authors: Xie, Yitian; Siponen, Mikko; Moody, Greg; Zheng, Xiaosong
Abstract: Dismissing or disregarding security notifications (defensive avoidance) may lead ... Expand
Semantic filters: fear appeal theory
Topics: malware participatory design usage intention behavioral intention home computer
Methods: design methodology mediation analysis survey descriptive statistic SEM tool
Theories: fear appeal theory
2021 | European Journal of Information Systems | Citations: 1
Authors: Jensen, Matthew L.; Durcikova, Alexandra; Wright, Ryan T.
Abstract: Organisations face growing IT security risks with substantial consequences for m ... Expand
Semantic filters: fear appeal theory
Topics: password phishing IT security IT security threat self efficacy
Methods: experiment field experiment theory development longitudinal research structured literature research
Theories: fear appeal theory protection motivation theory
2020 | Journal of the Association for Information Systems | Citations: 0
Authors: Sarker, Suprateek; Palvia, Prashant; Oguz, Abdullah; Wu, Caven; Xiao, Xiao
Abstract: ... Expand
Semantic filters: fear appeal theory
Topics: privacy information system use systems design health information system electronic commerce
Methods: literature sample theory development grounded theory design theory structured literature research
Theories: privacy calculus theory technology acceptance model actor network theory general systems theory theory of affordance
2019 | Information & Management | Citations: 18
Authors: Wall, Jeffrey D.; Warkentin, Merrill
Abstract: Persuasion is key to encourage compliance with information security policies thr ... Expand
Semantic filters: fear appeal theory
Topics: self efficacy laptop computer behavioral intention electronic mail data security
Methods: ANOVA parametric test multivariate analysis of variance experiment survey design
Theories: fear appeal theory self determination theory
2017 | International Conference on Information Systems | Citations: 0
Authors: Chen, Yan
Abstract: Realizing the importance of the behavioral aspect of information security (ISec) ... Expand
Semantic filters: fear appeal theory
Topics: IT security threat internet technology self efficacy IT security training electronic commerce
Methods: survey literature study mediation analysis parametric test ANOVA
Theories: extended parallel process model fear appeal theory
2017 | Communications of the Association for Information Systems | Citations: 28
Authors: Wall, Jeffrey D.; Buche, Mari W.
Abstract: Controlling organizational insiders’ security behaviors is an important manageme ... Expand
Semantic filters: fear appeal theory
Topics: data security privacy self efficacy knowledge representation job satisfaction
Methods: literature study literature sample qualitative content analysis ontological modelling cross sectional research
Theories: fear appeal theory
2016 | Journal of the Association for Information Systems | Citations: 55
Authors: Warkentin, Merrill; Walden, Eric; Johnston, Allen C.; Straub, Detmar William
Abstract: Information security management programs have long included "fear appeals", mana ... Expand
Semantic filters: fear appeal theory
Topics: IT security IT security threat behavioral intention self efficacy cybersecurity behavior
Methods: functional magnetic resonance imaging experimental design laboratory experiment experiment regression analysis method
Theories: fear appeal theory