Continuance of protective security behavior: A longitudinal study (original) (raw)
Related papers
Protection motivation and deterrence: a framework for security policy compliance in organisations
European Journal of Information Systems, 2009
Enforcing Information Security Protection: Risk Propensity and Self-Efficacy Perspectives
Proceedings of the 50th Hawaii International Conference on System Sciences (2017), 2017
Application of Protection Motivation Theory to Adoption of Protective Technologies
2009
Behavioral information security: two end user survey studies of motivation and security practices
Proceedings of the Tenth …, 2004
An Extended Perspective on Individual Security Behaviors
ACM SIGMIS Database: the DATABASE for Advances in Information Systems, 2014
Computers & Security, 2012
An Integrative Behavioral Model of Information Security Policy Compliance
The Scientific World Journal, 2014
Unpacking Security Policy Compliance: The Motivators and Barriers of Employees' Security Behaviors
2015
Tawei (David) Wang, Paul Benjamin Lowry, Feng Xu
Information Systems Journal, 2024
Understanding online safety behaviors: A protection motivation theory perspective
Computers & Security, 2016
Taxonomy of compliant information security behavior
Computers & Security, 2012
Scott R Boss, Dennis Galletta, Greg Moody, Paul Benjamin Lowry
Computers & Security, 2009
MIS Quarterly
WHAT INFLUENCES INFORMATION SECURITY BEHAVIOR? A STUDY WITH BRAZILIAN USERS
JISTEM - Journal of Information Systems and Technology Management , 2016
Review of Behavioural Theories in Security Compliance and Research Challenge
InSITE Conference, 2017
Dewald Roode Workshop on IS Security Research 2010, IFIP WG 8.11 / 11.13, Waltham, Massachusetts, USA, October 8–9, 2010
Information Systems Behavior on System Security in the Perspective of “Theory of Reasoned Action”
2021
SSRN Electronic Journal, 2013
Dewald Roode Workshop in Information Systems Security 2011, Blacksburg, Virginia, USA, September 22–23, pp. 1–51
2019 Conference on Information Communications Technology and Society (ICTAS), 2021
Journal of Information Privacy and Security, 2013
Explaining Users Security Behavior with the Security Belief Model
Journal of Organizational Computing and Electronic Commerce, 2014
2018
Assessing Information Security Compliant Behaviour Using the Self Determination Theory
2021
Fear Appeals and Information Security Behaviors: An Empirical Study
MIS Quarterly
Exploring the Impacts of Individual Styles on Security Compliance Behavior: A Preliminary Analysis
2017
Securing personal information assets: Testing antecedents of behavioral intentions
An Empirical Study of Home User Intentions towards Computer Security
Proceedings of the 52nd Hawaii International Conference on System Sciences, 2019