نتایج جستجو برای: protection motivation theory
تعداد نتایج: 1105544 فیلتر نتایج به سال:
This research aimed to investigate factors that affect computer crime protection behavior, based on the protection motivation theory. Personal factors were considered, including: conscientious personality, perceived value of data, prior experience, and environmental factors. In addition, other factors were evaluated, including: subjective norm, security knowledge, and safeguard costs. These fac...
we study the history and recent developments in nonelementarymodel theory focusing on the framework of abstractelementary classes. we discuss the role of syntax and semanticsand the motivation to generalize first order model theory to nonelementaryframeworks and illuminate the study with concrete examplesof classes of models. this first part introduces the main conceps and philosophies anddiscu...
Cloud computing has come to stay and is expanding rapidly. The mode of deployment of services has implications for users who store data in the cloud and risk exposure to potentially severeconsequences. The safe use of cloud computing services is therefore necessitated. Drawing on the principle of self-preservation and the theory of protection motivation, this paper develops a conceptual framewo...
This paper addresses the need to systematically design learning content to promote world heritage site preservation awareness. Based on 212 samples from a local university in Luang Prabang, Lao PDR, impact of learning content designed according to Protection Motivation Theory (PMT) is assessed through a repeated-measure t-test. Findings show that PMT-based learning content influences respondent...
Functional foods are the fastest growing sector of the food market because of consumers’ growing interest in health and well-being. There were two objectives of this study. One was to examine the relationships among concepts in the Modified Protection Motivation Theory (MPMT): severity, vulnerability, response-efficacy, self-efficacy, intention, and behavior in regard to functional foods. The o...
Web Browser is the most common tool used for surfing the Internet. With personal computer users growing by leaps and bounds, the use of browsers is also increasing at a similar rate. Outdated versions of browsers have security flaws and hence represent a significant threat to the cyber infrastructure. Yet many users do not keep their browsers updated. Given the fact that voluntariness of action...
OBJECTIVES This study reports an application of protection motivation theory (PMT) to the prediction of parental adherence to eye patching recommendations for children with amblyopia over a 2-month period. The study also considered the role of past behaviour in PMT. DESIGN AND METHODS A total of 151 parents of children with amblyopia who were attending follow-up appointments for orthoptic tre...
Background: Skin cancer is a serious public health problem in the world. Its prevalence in many countries has been increased in recent years. This study aimed to assess the effects of a theory-based educational intervention to promote skin cancer preventive behaviors (SCPBs) among rural farmers in Chalderan County, Iran. Methods: This was a quasi-randomized controlled field trial study conducte...
Employees’ failure to comply with IS security procedures is a key concern for organizations today. A number of socio-cognitive theories have been used to explain this. However, prior studies have not examined the influence of past and automatic behavior on employee decisions to comply. This is an important omission because past behavior has been assumed to strongly affect decision-making. To ad...
Rates of tobacco use among adolescents in China and other lower and middle-income countries remain high despite notable prevention and intervention programs. One reason for this may be the lack of theory-based research in tobacco use prevention in these countries. In the current study, a culturally appropriate 21-item measurement scale for cigarette smoking was developed based on the core const...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید