Securing one’s data and protecting important information from various security threats are essential tasks for all end users, whether they be home users or organizational users. The motivation for doing so, however, may be entirely different for these two user populations. In 2017, Menard et al. conducted a study of home end users’ behavioral intentions regarding the installation of password management software using Self-Determination Theory (SDT), Protection Motivation Theory (PMT), and an integrated SDT-PMT model. This methodological replication study replicated those model comparisons to test organizational users’ behavioral intentions. We surveyed more than 300 organizational users who did not have password management software installe...
Many existing literatures focus on the effect of external influence mechanism (e.g. fear appeals) th...
Because violations of information security (ISec) and privacy have become ubiquitous in both persona...
Because violations of information security (ISec) and privacy have become ubiquitous in both persona...
This paper provides data used to analyze the methodological replication of Menard et al. (2017) by Y...
The protection motivation theory (PMT) is widely used in behavioral information security research, w...
Employees’ lack of compliance with password policies increases password susceptibility, which leads ...
Information security is one of the important domains of information systems research today, with pro...
© 2015 Taylor & Francis Group, LLC.Insiders may act to sustain and improve organizational informatio...
Aim: The aim was to introduce new explanatory construct, namely illegitimate tasks from Stress-as-Of...
This paper conducts a partial replication of (Siponen et al. 2014) which developed a multi-theory ba...
The ever rising rates of data generation entail new opportunities for business and society but also ...
Home computer users are solely responsible for implementing security measures on their devices. Alth...
Information security is among the top organizational priorities. Theoretically, information security...
Using the Protection Motivation Theory, the paper tests a model password protection intention of onl...
The purpose of this paper is to investigate the effect of internal motivators (psychological ownersh...
Many existing literatures focus on the effect of external influence mechanism (e.g. fear appeals) th...
Because violations of information security (ISec) and privacy have become ubiquitous in both persona...
Because violations of information security (ISec) and privacy have become ubiquitous in both persona...
This paper provides data used to analyze the methodological replication of Menard et al. (2017) by Y...
The protection motivation theory (PMT) is widely used in behavioral information security research, w...
Employees’ lack of compliance with password policies increases password susceptibility, which leads ...
Information security is one of the important domains of information systems research today, with pro...
© 2015 Taylor & Francis Group, LLC.Insiders may act to sustain and improve organizational informatio...
Aim: The aim was to introduce new explanatory construct, namely illegitimate tasks from Stress-as-Of...
This paper conducts a partial replication of (Siponen et al. 2014) which developed a multi-theory ba...
The ever rising rates of data generation entail new opportunities for business and society but also ...
Home computer users are solely responsible for implementing security measures on their devices. Alth...
Information security is among the top organizational priorities. Theoretically, information security...
Using the Protection Motivation Theory, the paper tests a model password protection intention of onl...
The purpose of this paper is to investigate the effect of internal motivators (psychological ownersh...
Many existing literatures focus on the effect of external influence mechanism (e.g. fear appeals) th...
Because violations of information security (ISec) and privacy have become ubiquitous in both persona...
Because violations of information security (ISec) and privacy have become ubiquitous in both persona...