This study examined the impact of security champion and security training on protection behaviour in the context of IT service oriented SMEs in Bangladesh. Drawing upon protection motivation theory, this study examined the influence of security training on threat appraisal and influence of security training on coping appraisal which leads to protection behaviour via protection motivation. Data was collected from six different IT service oriented organizations with a sample size of 147 by survey questionnaire. Data was analysed using partial least squares (PLS) technique and result shows that perceived value of data, security training and threat appraisal are strong predictors of threat appraisal, protection motivation and protection behavio...
The aim of this study was to investigate cyber-crime victimization among Internet users in the Unite...
Today, the Internet can be considered to be a basic commodity, similar to electricity, without which...
We conducted an online experiment (n=2,024) on a representative sample of internet users in Germany,...
This study examines the factors influencing government employees’ cybersecurity behavior in Malaysia...
Protecting digital assets is a growing concern for corporations, as cyberattacks affect business per...
It is a popular belief that humans are the weakest link in cyber-security. However, there has been l...
This research aimed to investigate factors that affect computer crime protection behavior, based on ...
The study investigated the effects of primary threat appraisal, secondary threat appraisal, and copi...
This study aims to understand the IT threat avoidance behaviors of personal computer users. We teste...
This paper identifies opportunities for potential theoretical and practical improvements in employee...
A cross sectional survey examined an extended version of Protection Motivation Theory (PMT) to ident...
Part 3: Security and Privacy IssuesInternational audienceThis paper proposes a model that extends th...
A deficiency exists in the Information Systems Security literature because of the tendency to regard...
The users´ behaviors play an important role in securing information systems. At the same time, the u...
This study tries to evaluate the experimental behavior of graduate students of Ilam University when ...
The aim of this study was to investigate cyber-crime victimization among Internet users in the Unite...
Today, the Internet can be considered to be a basic commodity, similar to electricity, without which...
We conducted an online experiment (n=2,024) on a representative sample of internet users in Germany,...
This study examines the factors influencing government employees’ cybersecurity behavior in Malaysia...
Protecting digital assets is a growing concern for corporations, as cyberattacks affect business per...
It is a popular belief that humans are the weakest link in cyber-security. However, there has been l...
This research aimed to investigate factors that affect computer crime protection behavior, based on ...
The study investigated the effects of primary threat appraisal, secondary threat appraisal, and copi...
This study aims to understand the IT threat avoidance behaviors of personal computer users. We teste...
This paper identifies opportunities for potential theoretical and practical improvements in employee...
A cross sectional survey examined an extended version of Protection Motivation Theory (PMT) to ident...
Part 3: Security and Privacy IssuesInternational audienceThis paper proposes a model that extends th...
A deficiency exists in the Information Systems Security literature because of the tendency to regard...
The users´ behaviors play an important role in securing information systems. At the same time, the u...
This study tries to evaluate the experimental behavior of graduate students of Ilam University when ...
The aim of this study was to investigate cyber-crime victimization among Internet users in the Unite...
Today, the Internet can be considered to be a basic commodity, similar to electricity, without which...
We conducted an online experiment (n=2,024) on a representative sample of internet users in Germany,...