User Motivations in Protecting Information Security: Protection Motivation Theory Versus Self-Determination Theory
Published 2017 View Full Article
- Home
- Publications
- Publication Search
- Publication Details
Title
User Motivations in Protecting Information Security: Protection Motivation Theory Versus Self-Determination Theory
Authors
Keywords
-
Journal
JOURNAL OF MANAGEMENT INFORMATION SYSTEMS
Volume 34, Issue 4, Pages 1203-1230
Publisher
Informa UK Limited
Online
2018-01-02
DOI
10.1080/07421222.2017.1394083
References
Ask authors/readers for more resources
Related references
Note: Only part of the references are listed.- Training to Mitigate Phishing Attacks Using Mindfulness Techniques
- (2017) Matthew L. Jensen et al. JOURNAL OF MANAGEMENT INFORMATION SYSTEMS
- Practicing Safe Computing: A Multimethod Empirical Examination of Home Computer User Security Behavioral Intentions
- (2017) Anderson et al. MIS QUARTERLY
- Fear Appeals and Information Security Behaviors: An Empirical Study
- (2017) Johnston et al. MIS QUARTERLY
- Information Security Policy Compliance: An Empirical Study of Rationality-Based Beliefs and Information Security Awareness
- (2017) Bulgurcu et al. MIS QUARTERLY
- Sharing Knowledge in Social Q&A Sites: The Unintended Consequences of Extrinsic Motivation
- (2016) Li Zhao et al. JOURNAL OF MANAGEMENT INFORMATION SYSTEMS
- Threat Protection and Convenience: Antecedents of Cloud-Based Data Backup
- (2016) Philip Menard et al. JOURNAL OF COMPUTER INFORMATION SYSTEMS
- Employees’ Exploration of Complex Systems: An Integrative View
- (2015) Huigang Liang et al. JOURNAL OF MANAGEMENT INFORMATION SYSTEMS
- The Behavioral Roots of Information Systems Security: Exploring Key Factors Related to Unethical IT Use
- (2015) Sutirtha Chatterjee et al. JOURNAL OF MANAGEMENT INFORMATION SYSTEMS
- The Impact of Organizational Commitment on Insiders’ Motivation to Protect Organizational Information Assets
- (2015) Clay Posey et al. JOURNAL OF MANAGEMENT INFORMATION SYSTEMS
- An Enhanced Fear Appeal Rhetorical Framework: Leveraging Threats to the Human Asset Through Sanctioning Rhetoric
- (2015) Allen C. Johnston et al. MIS QUARTERLY
- What Do Systems Users Have to Fear? Using Fear Appeals to Engender Threats and Fear that Motivate Protective Security Behaviors
- (2015) Scott R. Boss et al. MIS QUARTERLY
- Using Accountability to Reduce Access Policy Violations in Information Systems
- (2013) Anthony Vance et al. JOURNAL OF MANAGEMENT INFORMATION SYSTEMS
- Taxonomy of compliant information security behavior
- (2012) Keshnee Padayachee COMPUTERS & SECURITY
- Delegate the smartphone user? Security awareness in smartphone platforms
- (2012) Alexios Mylonas et al. COMPUTERS & SECURITY
- Future directions for behavioral information security research
- (2012) Robert E. Crossler et al. COMPUTERS & SECURITY
- Understanding information systems security policy compliance: An integration of the theory of planned behavior and the protection motivation theory
- (2011) Princely Ifinedo COMPUTERS & SECURITY
- Threat or coping appraisal: determinants of SMB executives’ decision to adopt anti-malware software
- (2009) Younghwa Lee et al. EUROPEAN JOURNAL OF INFORMATION SYSTEMS
- Protection motivation and deterrence: a framework for security policy compliance in organisations
- (2009) Tejaswini Herath et al. EUROPEAN JOURNAL OF INFORMATION SYSTEMS
- Linking IT implementation and acceptance via the construct of psychological ownership of information technology
- (2008) Henri Barki et al. JOURNAL OF INFORMATION TECHNOLOGY
Publish scientific posters with Peeref
Peeref publishes scientific posters from all research disciplines. Our Diamond Open Access policy means free access to content and no publication fees for authors.
Learn MoreAsk a Question. Answer a Question.
Quickly pose questions to the entire community. Debate answers and get clarity on the most important issues facing researchers.
Get Started