Skip to Main Content
Skip Nav Destination
Keywords: Protection motivation theory
Close
Follow your search
Access your saved searches in your account

Would you like to receive an alert when new items match your search?
Close Modal
Sort by
Journal Articles
Journal Articles
Journal Articles
Journal Articles
Journal Articles
Journal Articles
Information and Computer Security (2018) 26 (3): 264–276.
Published: 09 July 2018
...Jurjen Jansen; Paul van Schaik Purpose The purpose of this paper is to test the protection motivation theory (PMT) in the context of fear appeal interventions to reduce the threat of phishing attacks. In addition, it was tested to what extent the model relations are equivalent across fear appeal...
Journal Articles
Information and Computer Security (2017) 25 (2): 165–180.
Published: 12 June 2017
...Jurjen Jansen; Paul van Schaik Purpose The purpose of this paper is to compare three social cognitive models in their ability to explain intentions of precautionary online behaviour. The models are: protection motivation theory (PMT), the reasoned action approach (RAA) and an integrated model...
Journal Articles
Information and Computer Security (2015) 23 (2): 200–217.
Published: 08 June 2015
.... Extensions in terms of anticipated regret and constructs drawn from the protection motivation theory are tested using hierarchical regression analysis. Findings – Adding anticipated regret and the threat appraisal process results in improvements of the predictions of intentions. The improvements...
Journal Articles
Information Management & Computer Security (2013) 21 (1): 5–15.
Published: 15 March 2013
... conduct in the demonstrative experiment. Originality/value It is original to adopt a model defined by social psychology, especially Protection Motivation Theory and Elaborative Likelihood Model. The authors conducted both questionnaire survey and the psychological experiment. The structure...

or Create an Account

Close Modal
Close Modal