This study tries to evaluate the experimental behavior of graduate students of Ilam University when using mobile electronic devices (mobile phones, tablets and laptops) based on the protection motivation theory of data breach. This research is of applied-survey type. The statistical population of research includes graduate students of Ilam University. Data collection tool was based on the questionnaires introduced by Boss et al., Woon et al., Claar and Johnson, Johnson and Warkentin, and Posey et al. For data analysis, structural equation modeling was used to fit the model and test the hypotheses of research in AMOS software using partial least squares method. Results indicated that there is a positive relationship between the perceived thr...
Smartphone security is a growing concern. In this study, we use of the Protection Motivation Theory ...
Personal mobile devices form an integral part of business activities today. Mobile devices, neverthe...
[[abstract]]Mobile device applications, or apps, are important products of this digital age. Mobile ...
User information security behavior has been an area of growing demand in information systems (IS) re...
This item is only available electronically.This review provides an initial assessment of the literat...
Smartphones are among the most ubiquitous and indispensable of today’s ICTs, with personal devices b...
© 2017 Elsevier Ltd Personal computing users are vulnerable to information security threats, as they...
The mobile device is one of the fasted growing technologies that is widely used in a diversifying se...
In recent years, the number of mobile device users has increased at a significant rate due to the ra...
Due to the development of mobile communications, some innovation APPs (Applications) provide conveni...
The users´ behaviors play an important role in securing information systems. At the same time, the u...
With regards to new malware, mobile phones are becoming a more delectable prey over the desktop comp...
The use of mobile devices is becoming more popular by the day. With all the different features that ...
Smartphones are powerful handheld computers that allow users to connect in real-time with others aro...
Mobile phone usage is growing at an unprecedented rate. The ability to remain connected, the ease of...
Smartphone security is a growing concern. In this study, we use of the Protection Motivation Theory ...
Personal mobile devices form an integral part of business activities today. Mobile devices, neverthe...
[[abstract]]Mobile device applications, or apps, are important products of this digital age. Mobile ...
User information security behavior has been an area of growing demand in information systems (IS) re...
This item is only available electronically.This review provides an initial assessment of the literat...
Smartphones are among the most ubiquitous and indispensable of today’s ICTs, with personal devices b...
© 2017 Elsevier Ltd Personal computing users are vulnerable to information security threats, as they...
The mobile device is one of the fasted growing technologies that is widely used in a diversifying se...
In recent years, the number of mobile device users has increased at a significant rate due to the ra...
Due to the development of mobile communications, some innovation APPs (Applications) provide conveni...
The users´ behaviors play an important role in securing information systems. At the same time, the u...
With regards to new malware, mobile phones are becoming a more delectable prey over the desktop comp...
The use of mobile devices is becoming more popular by the day. With all the different features that ...
Smartphones are powerful handheld computers that allow users to connect in real-time with others aro...
Mobile phone usage is growing at an unprecedented rate. The ability to remain connected, the ease of...
Smartphone security is a growing concern. In this study, we use of the Protection Motivation Theory ...
Personal mobile devices form an integral part of business activities today. Mobile devices, neverthe...
[[abstract]]Mobile device applications, or apps, are important products of this digital age. Mobile ...