Continuance of protective security behavior: A longitudinal study (original) (raw)

Protection motivation and deterrence: a framework for security policy compliance in organisations

T. Herath

European Journal of Information Systems, 2009

View PDFchevron_right

An Extended Perspective on Individual Security Behaviors: Protection Motivation Theory and a Unified Security Practices (USP) Instrument

France Belanger

View PDFchevron_right

Enforcing Information Security Protection: Risk Propensity and Self-Efficacy Perspectives

quynh nguyen

Proceedings of the 50th Hawaii International Conference on System Sciences (2017), 2017

View PDFchevron_right

Application of Protection Motivation Theory to Adoption of Protective Technologies

Tom Gattiker

2009

View PDFchevron_right

Behavioral information security: two end user survey studies of motivation and security practices

Jeffrey Stanton, Kathryn Stam

Proceedings of the Tenth …, 2004

View PDFchevron_right

An Extended Perspective on Individual Security Behaviors

France Belanger

ACM SIGMIS Database: the DATABASE for Advances in Information Systems, 2014

View PDFchevron_right

Understanding information systems security policy compliance: An integration of the theory of planned behavior and the protection motivation theory

Princely Ifinedo

Computers & Security, 2012

View PDFchevron_right

An Integrative Behavioral Model of Information Security Policy Compliance

Kyung Hoon Yang

The Scientific World Journal, 2014

View PDFchevron_right

Unpacking Security Policy Compliance: The Motivators and Barriers of Employees' Security Behaviors

Lynne Coventry

2015

View PDFchevron_right

(2024) "The antecedents of employees’ proactive information security behavior: The perspective of proactive motivation," ISJ

Tawei (David) Wang, Paul Benjamin Lowry, Feng Xu

Information Systems Journal, 2024

View PDFchevron_right

Understanding online safety behaviors: A protection motivation theory perspective

Robert LaRose

Computers & Security, 2016

View PDFchevron_right

Taxonomy of compliant information security behavior

Keshnee Padayachee

Computers & Security, 2012

View PDFchevron_right

(2015) "What Do Systems Users Have to Fear? Using Fear Appeals to Engender Threats and Fear that Motivate Protective Security Behaviors," MIS Quarterly (MISQ),

Scott R Boss, Dennis Galletta, Greg Moody, Paul Benjamin Lowry

View PDFchevron_right

Self-efficacy in information security: Its influence on end users' information security practice behavior

Cheongtag Kim

Computers & Security, 2009

View PDFchevron_right

What Do Systems Users Have to Fear? Using Fear Appeals to Engender Threats and Fear that Motivate Protective Security Behaviors

Dennis Galletta

MIS Quarterly

View PDFchevron_right

WHAT INFLUENCES INFORMATION SECURITY BEHAVIOR? A STUDY WITH BRAZILIAN USERS

Rodrigo Hickmann Klein

JISTEM - Journal of Information Systems and Technology Management , 2016

View PDFchevron_right

Review of Behavioural Theories in Security Compliance and Research Challenge

Linda Brennan

InSITE Conference, 2017

View PDFchevron_right

(2010). Using Theories of Formal Control, Mandatoriness, and Reactance to Explain Intent to Comply with New It Security …

Paul Benjamin Lowry

Dewald Roode Workshop on IS Security Research 2010, IFIP WG 8.11 / 11.13, Waltham, Massachusetts, USA, October 8–9, 2010

View PDFchevron_right

Information Systems Behavior on System Security in the Perspective of “Theory of Reasoned Action”

Benih Hartanti

2021

View PDFchevron_right

Information Security Policy Compliance: An Empirical Study of Rationality-Based Beliefs and Information Security Awareness

Burcu Bulgurcu

View PDFchevron_right

A Path Way to Successful Management of Individual Intention to Security Compliance: A Role of Organizational Security Climate

Dan J. Kim

SSRN Electronic Journal, 2013

View PDFchevron_right

(2011). Motivating the insider to protect organizational information assets: Evidence from protection motivation theory and rival explanations

Paul Benjamin Lowry

Dewald Roode Workshop in Information Systems Security 2011, Blacksburg, Virginia, USA, September 22–23, pp. 1–51

View PDFchevron_right

A conceptual model of information security compliant behaviour based on the self-determination theory

Marlien Herselman

2019 Conference on Information Communications Technology and Society (ICTAS), 2021

View PDFchevron_right

Control-Related Motivations and Information Security Policy Compliance: The Role of Autonomy and Efficacy

Jeffrey Wall

Journal of Information Privacy and Security, 2013

View PDFchevron_right

Explaining Users Security Behavior with the Security Belief Model

Elena Karahanna

Journal of Organizational Computing and Electronic Commerce, 2014

View PDFchevron_right

ARE WE PREDISPOSED TO BEHAVE SECURELY ? INFLUENCE OF RISK DISPOSITION ON INDIVIDUAL SECURITY BEHAVIORS Research in Progress

Merrill Warkentin

2018

View PDFchevron_right

Assessing Information Security Compliant Behaviour Using the Self Determination Theory

Yotamu Gangire

2021

View PDFchevron_right

Fear Appeals and Information Security Behaviors: An Empirical Study

Merrill Warkentin

MIS Quarterly

View PDFchevron_right

Exploring the Impacts of Individual Styles on Security Compliance Behavior: A Preliminary Analysis

Kweku-Muata Osei-Bryson

2017

View PDFchevron_right

Securing personal information assets: Testing antecedents of behavioral intentions

Gary Templeton

View PDFchevron_right

An Empirical Study of Home User Intentions towards Computer Security

Annette Mills

Proceedings of the 52nd Hawaii International Conference on System Sciences, 2019

View PDFchevron_right