Skip Nav Destination
Close Modal
Update search
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
NARROW
Format
Journal
Type
Date
Availability
1-9 of 9
Keywords: Protection motivation theory
Close
Follow your search
Access your saved searches in your account
Would you like to receive an alert when new items match your search?
Sort by
Journal Articles
Journal:
Information and Computer Security
Information and Computer Security (2025) 33 (3): 287–308.
Published: 31 July 2024
..., this paper aims to examine the motivating factors that drive South African fibre users to protect their home networking devices. Design/methodology/approach Using the protection motivation theory as the primary framework, a measurement instrument comprising 53 questionnaire items was developed to measure...
Journal Articles
Journal:
Information and Computer Security
Information and Computer Security (2024) 32 (4): 459–476.
Published: 26 April 2024
... they interpret questionnaire measurement items operationalizing the variables Perceived Severity from Protection Motivation Theory and Attitude from Theory of Planned Behavior. Findings The authors found that respondents’ interpretations in many cases differ substantially from the theoretical definitions...
Journal Articles
Human-centric cyber security: Applying protection motivation theory to analyse micro business owners’ security behaviours
Available to Purchase
Journal:
Information and Computer Security
Information and Computer Security (2025) 33 (1): 49–76.
Published: 17 April 2024
... to compliance behaviour in response to cyber threats. The study aims to examine the protection motivation theory (PMT)-based model to understand individuals’ tendency to adopt secure behaviours. Design/methodology/approach The study focuses on Australian micro businesses since they are more susceptible...
Journal Articles
Exploring users’ attitude towards privacy-preserving search engines: a protection motivation theory approach
Available to Purchase
Journal:
Information and Computer Security
Information and Computer Security (2024) 32 (3): 322–343.
Published: 01 December 2023
.... Design/methodology/approach This study adopted protection motivation theory (PMT) and associated its constructs with subjective norms to build a comprehensive research model. The authors tested the research model using survey data from 830 search engine users worldwide. Findings The results confirm...
Journal Articles
Response to a phishing attack: persuasion and protection motivation in an organizational context
Available to Purchase
Journal:
Information and Computer Security
Information and Computer Security (2022) 30 (1): 63–78.
Published: 09 August 2021
... 2021 13 04 2021 15 06 2021 © Emerald Publishing Limited 2021 Emerald Publishing Limited Licensed re-use rights only Computer security Protection motivation theory Phishing Social engineering H1. Higher perceived threat severity will result in less click...
Journal Articles
Persuading end users to act cautiously online: a fear appeals study on phishing
Available to Purchase
Journal:
Information and Computer Security
Information and Computer Security (2018) 26 (3): 264–276.
Published: 09 July 2018
...Jurjen Jansen; Paul van Schaik Purpose The purpose of this paper is to test the protection motivation theory (PMT) in the context of fear appeal interventions to reduce the threat of phishing attacks. In addition, it was tested to what extent the model relations are equivalent across fear appeal...
Journal Articles
Comparing three models to explain precautionary online behavioural intentions
Available to Purchase
Journal:
Information and Computer Security
Information and Computer Security (2017) 25 (2): 165–180.
Published: 12 June 2017
...Jurjen Jansen; Paul van Schaik Purpose The purpose of this paper is to compare three social cognitive models in their ability to explain intentions of precautionary online behaviour. The models are: protection motivation theory (PMT), the reasoned action approach (RAA) and an integrated model...
Journal Articles
The sufficiency of the theory of planned behavior for explaining information security policy compliance
Available to Purchase
Journal:
Information and Computer Security
Information and Computer Security (2015) 23 (2): 200–217.
Published: 08 June 2015
.... Extensions in terms of anticipated regret and constructs drawn from the protection motivation theory are tested using hierarchical regression analysis. Findings – Adding anticipated regret and the threat appraisal process results in improvements of the predictions of intentions. The improvements...
Journal Articles
Human aspects of information security: An empirical study of intentional versus actual behavior
Available to Purchase
Journal:
Information and Computer Security
Information Management & Computer Security (2013) 21 (1): 5–15.
Published: 15 March 2013
... conduct in the demonstrative experiment. Originality/value It is original to adopt a model defined by social psychology, especially Protection Motivation Theory and Elaborative Likelihood Model. The authors conducted both questionnaire survey and the psychological experiment. The structure...
