To reduce cyberattack risk, individuals are commonly encouraged to take security behaviors to prevent or detect IT threats. Previous research always generalized their empirical findings from specific security behaviors to all security behaviors, which is problematic because people who adopt different security behaviors may have different mechanisms and antecedents. This study uses the protection motivation theory (PMT) as a general theory and explores how the nature of security behavior (i.e., IT threat-detection behavior versus IT threat-prevention behavior) affects individuals’ security-related outcomes, as well as what factors influence the extent of these relationships. We introduce construal level theory (CLT) to argue that IT threat d...
Information security is one of the important domains of information systems research today, with pro...
It is a popular belief that humans are the weakest link in cyber-security. However, there has been l...
The study of information security behavior has been increasing in information systems (IS) literatur...
To reduce cyberattack risk, individuals are commonly encouraged to take security behaviors to preven...
This study aims to understand the IT threat avoidance behaviors of personal computer users. We teste...
This paper identifies opportunities for potential theoretical and practical improvements in employee...
This study aims to understand the IT threat avoidance behaviors of personal computer users. We teste...
IS users and organizations must take necessary measures to adequately cope with security threats. Co...
Protecting digital assets is a growing concern for corporations, as cyberattacks affect business per...
Understanding individual threat avoidance motivation and behavior is a critical component in designi...
Aim: The aim was to introduce new explanatory construct, namely illegitimate tasks from Stress-as-Of...
Cybersecurity attacks have increased as Internet technology has proliferated. Symantec’s 2013 Intern...
The current study presents a conceptual replication of Liang and Xue’s (2010) test of their proposed...
Protection motivation theory (PMT) is one of the most commonly used theories to examine information ...
This study adopted protection motivation theory, construal-level theory, and regulatory focus theory...
Information security is one of the important domains of information systems research today, with pro...
It is a popular belief that humans are the weakest link in cyber-security. However, there has been l...
The study of information security behavior has been increasing in information systems (IS) literatur...
To reduce cyberattack risk, individuals are commonly encouraged to take security behaviors to preven...
This study aims to understand the IT threat avoidance behaviors of personal computer users. We teste...
This paper identifies opportunities for potential theoretical and practical improvements in employee...
This study aims to understand the IT threat avoidance behaviors of personal computer users. We teste...
IS users and organizations must take necessary measures to adequately cope with security threats. Co...
Protecting digital assets is a growing concern for corporations, as cyberattacks affect business per...
Understanding individual threat avoidance motivation and behavior is a critical component in designi...
Aim: The aim was to introduce new explanatory construct, namely illegitimate tasks from Stress-as-Of...
Cybersecurity attacks have increased as Internet technology has proliferated. Symantec’s 2013 Intern...
The current study presents a conceptual replication of Liang and Xue’s (2010) test of their proposed...
Protection motivation theory (PMT) is one of the most commonly used theories to examine information ...
This study adopted protection motivation theory, construal-level theory, and regulatory focus theory...
Information security is one of the important domains of information systems research today, with pro...
It is a popular belief that humans are the weakest link in cyber-security. However, there has been l...
The study of information security behavior has been increasing in information systems (IS) literatur...