Search Results Heading

MBRLSearchResults

mbrl.module.common.modules.added.book.to.shelf
Title added to your shelf!
View what I already have on My Shelf.
Oops! Something went wrong.
Oops! Something went wrong.
While trying to add the title to your shelf something went wrong :( Kindly try again later!
Are you sure you want to remove the book from the shelf?
Oops! Something went wrong.
Oops! Something went wrong.
While trying to remove the title from your shelf something went wrong :( Kindly try again later!
    Done
    Filters
    Reset
  • Discipline
      Discipline
      Clear All
      Discipline
  • Is Peer Reviewed
      Is Peer Reviewed
      Clear All
      Is Peer Reviewed
  • Item Type
      Item Type
      Clear All
      Item Type
  • Subject
      Subject
      Clear All
      Subject
  • Year
      Year
      Clear All
      From:
      -
      To:
  • More Filters
      More Filters
      Clear All
      More Filters
      Source
    • Language
721 result(s) for "Protection motivation theory"
Sort by:
In harm’s way
Non-migration is an adaptive strategy that has received little attention in environmental migration studies. We explore the leveraging factors of non-migration decisions of communities at risk in coastal Bangladesh, where exposure to both rapid- and slow-onset natural disasters is high. We apply the Protection Motivation Theory (PMT) to empirical data and assess how threat perception and coping appraisal influences migration decisions in farming communities suffering from salinization of cropland. This study consists of data collected through quantitative household surveys (n = 200) and semi-structured interviews from four villages in southwest coastal Bangladesh. Results indicate that most respondents are unwilling to migrate, despite better economic conditions and reduced environmental risk in other locations. Land ownership, social connectedness, and household economic strength are the strongest predictors of non-migration decisions. This study is the first to use the PMT to understand migration-related behaviour and the findings are relevant for policy planning in vulnerable regions where exposure to climate-related risks is high but populations are choosing to remain in place.
UNDERSTANDING THE ACCEPTANCE OF MOBILE HEALTH SERVICES: A COMPARISON AND INTEGRATION OF ALTERNATIVE MODELS
The advancement of mobile technology and the increasing importance of health promote the boom in mobile health services (MHS) around the world. Although there have been several studies investigating the health technology acceptance behavior from a variety of theoretical perspectives, they have not provided a unified understanding. To fill this research gap, this paper: (1) reviews the health technology acceptance literature and discusses three prominent models (e.g., the technology acceptance model, the theory of planned behavior or the unified theory of use and acceptance of technology, and the protection motivation theory), (2) empirically compares the three models, and (3) formulates and empirically validates the unified model in the context of mobile health services. In the unified model of health technology acceptance, we propose that users' intention to use mobile health services is determined by five key factors: performance expectancy, effort expectancy, social influence, facilitating conditions, and threat appraisals. The results show that the unified model outperforms the three alternative models by significantly improving the R-squares. Finally, the implications for theory and practice are put forward. [PUBLICATION ABSTRACT]
Fear appeal, coping appeal and mobile health technology persuasion: a two-stage scenario-based survey of the elderly
PurposePrior researches on the adoption of mobile health services (MHS) concentrate on the subjective cognitive appraisals resulting in technology adoption, while ignoring how to shape those cognitive appraisals by the objective message design strategies which are easier to operate in practice. Based on protection motivation theory (PMT), the current research aims to explore the antecedents of cognitive appraisals by focusing on message design strategies of fear appeal and coping appeal.Design/methodology/approachA two-stage scenario-based survey of 204 participants was conducted to collect data. The authors chose SPSS and covariance-based structural equation modeling (CB-SEM) approach with the software LISREL 8.8 to test our model.FindingsThe results show that the relationship between fear appeal and fear arousal is inverted U-shaped such that the degree of fear arousal is the greatest when the fear appeal is at a moderate level. Perceived usefulness for the message with negative framing is higher than that with positive framing. Furthermore, fear appeal and coping appeal have a significant interaction on the adoption of MHS at different stages.Research limitations/implicationsThe sample data of this study come from a special health service of a special group in China, which limits the universality of our research results for other groups or health care services. Therefore, future researchers can validate the model in other research scenarios and sample populations.Originality/valueThis study shows how fear appeal and coping appeal work together to influence individuals' adoption intention. The authors’ findings expand the theoretical depth of PMT and fear theory, enriching the theoretical connotation of framing effect in mobile health technology adoption context, which add new insights to design more persuasive messages through fear appeal and coping appeal for researchers and MHS providers in mobile health communication or propaganda.
Factors Affecting Farmers’ Adoption of Flood Adaptation Strategies Using Structural Equation Modeling
Floods are a frequent disaster in Bangladesh, and farmers are the most at risk. Understanding how to improve the farmers’ flood adaption is important to reduce flood effects. Protection motivation theory (PMT) has been widely used to examine flood adaptation behavior, but there is still debate regarding the quantitative effect of PMT factors on flood adaption behavior, particularly in a geographically vulnerable context. This study integrates psychological aspects based on PMT to assess farmers’ flood adaptability. A cross-sectional survey was conducted to collect data from 359 farmers. We employed structural equation modeling to test a PMT model with mediation analysis. The results showed that farmers who perceive a higher flood risk and feel more fear of floods are more likely to implement flood adaptation measures. Similarly, farmers adopt more adaptive actions if they have higher self-efficacy and response efficacy. However, they are less likely to take adaptive actions if they are subject to maladaptation. Maladaptation plays a significant role as a mediating variable. These findings will act as recommendations for government agencies to design policy measures to strengthen flood risk management. The study supports the theory of protection motivation to understand farmers’ flood adaptation behavior. However, further study is required to enhance and generalize the existing model.
Preventive Behaviors Towards Covid-19 Pandemic Among Healthcare Providers in Saudi Arabia Using the Protection Motivation Theory
The main objectives of the study are firstly to measure the COVID-19 preventive health behaviors related among health care providers (HCPs), then to identify the determinants of such behavior using the protection motivation theory (PMT). An online cross-sectional survey, containing closed-ended questions, was distributed among healthcare professionals including physicians, pharmacists, technicians, and nurses. It consisted of questions assessing socio-demographic and occupational characteristics, in addition to questions from the modified PMT that has been tailored for the COVID-19 pandemic through five sub-constructs: perceived severity and perceived vulnerability, response efficacy, self-efficacy, response costs, and behavioral intention. A total of 385 HCPs have participated in the study with a mean age of 40.08±8.2 years; the majority was Saudi, married, and having children. There was a significant association between intention to comply with COVID-19 preventive behavior and being females, nurses, having training in Infection prevention and control (IPC) measures, and availability of personal protective equipment (PPE) during work time (p≤0.01). Other demographic variables, working experience, the status of being in the workforce during the pandemic COVID-19 in Saudi Arabia did not have a significant effect on the intention of HCPs to comply with COVID-19 preventive behavior. The vast majority 85.7% of HCPs answered \"always\" regarding the behavioral intention of HCPs to comply with COVID-19 preventive behavior. There was a significant positive correlation between COVID-19 behavioral intention and other constructs of PMT model, including perceived severity (r=0.272) perceived vulnerability (r= 0.248), self-efficacy (r=0.218), response-efficacy (r=0.167), and response-cost (r=0.13). Gender, availability of PPE, and self-efficacy had a significant prediction of COVID-19 behavioral intentions (P <0.05) with a predicted increase of 0.56, 0.37, and 0.12, respectively, in the mean of the intention score. Self-efficacy was the highest significant predictor of the behavior (p=0.008). Females' gender, nurses, having training in IPC measures, and availability of PPE during work time have a significant association with intention to comply with COVID-19 preventive behavior. The present study coping appraisal particularly self-efficacy predicted the COVID-19 pandemic protection motivation and preventive behavior more than threat appraisal. Therefore, future training programs must consider the level of self-efficacy of HCPS, and increase their knowledge regarding the effectiveness of recommendation strategies to perform protective measures against the COVID-19.
Organizational information security as a complex adaptive system: insights from three agent-based models
The management of information security can be conceptualized as a complex adaptive system because the actions of both insiders and outsiders co-evolve with the organizational environment, thereby leading to the emergence of overall security of informational assets within an organization. Thus, the interactions among individuals and their environments at the micro-level form the overall security posture at the macro-level. Additionally, in this complex environment, security threats evolve constantly, leaving organizations little choice but to evolve alongside those threats or risk losing everything. In order to protect organizational information systems and associated informational assets, managers are forced to adapt to security threats by training employees and by keeping systems and security procedures updated. This research explains how organizational information security can perhaps best be managed as a complex adaptive system (CAS) and models the complexity of IS security risks and organizational responses using agent-based modeling (ABM). We present agent-based models that illustrate simple probabilistic phishing problems as well as models that simulate the organizational security outcomes of complex theoretical security approaches based on general deterrence theory (GDT) and protection motivation theory (PMT).
Impact of Online Information on Self-Isolation Intention During the COVID-19 Pandemic: Cross-Sectional Study
During the coronavirus disease (COVID-19) pandemic, governments issued movement restrictions and placed areas into quarantine to combat the spread of the disease. In addition, individuals were encouraged to adopt personal health measures such as social isolation. Information regarding the disease and recommended avoidance measures were distributed through a variety of channels including social media, news websites, and emails. Previous research suggests that the vast amount of available information can be confusing, potentially resulting in overconcern and information overload. This study investigates the impact of online information on the individual-level intention to voluntarily self-isolate during the pandemic. Using the protection-motivation theory as a framework, we propose a model outlining the effects of cyberchondria and information overload on individuals' perceptions and motivations. To test the proposed model, we collected data with an online survey (N=225) and analyzed it using partial least square-structural equation modeling. The effects of social media and living situation were tested through multigroup analysis. Cyberchondria and information overload had a significant impact on individuals' threat and coping perceptions, and through them on self-isolation intention. Among the appraisal constructs, perceived severity (P=.002) and self-efficacy (P=.003) positively impacted self-isolation intention, while response cost (P<.001) affected the intention negatively. Cyberchondria (P=.003) and information overload (P=.003) indirectly affected self-isolation intention through the aforementioned perceptions. Using social media as an information source increased both cyberchondria and information overload. No differences in perceptions were found between people living alone and those living with their families. During COVID-19, frequent use of social media contributed to information overload and overconcern among individuals. To boost individuals' motivation to adopt preventive measures such as self-isolation, actions should focus on lowering individuals' perceived response costs in addition to informing them about the severity of the situation.
What Do Systems Users Have to Fear? Using Fear Appeals to Engender Threats and Fear that Motivate Protective Security Behaviors
Because violations of information security (ISec) and privacy have become ubiquitous in both personal and work environments, academic attention to ISec and privacy has taken on paramount importance. Consequently, a key focus of ISec research has been discovering ways to motivate individuals to engage in more secure behaviors. Over time, the protection motivation theory (PMT) has become a leading theoretical foundation used in ISec research to help motivate individuals to change their security-related behaviors to protect themselves and their organizations. Our careful review of the foundation for PMT identified four opportunities for improving ISec PMT research. First, extant ISec studies do not use the full nomology of PMT constructs. Second, only one study uses fear-appeal manipulations, even though these are a core element of PMT. Third, virtually no ISec study models or measures fear. Fourth, whereas these studies have made excellent progress in predicting security intentions, none of them have addressed actual security behaviors. This article describes the theoretical foundation of these four opportunities for improvement. We tested the nomology of PMT, including manipulated fear appeals, in two different ISec contexts that model the modern theoretical treatment of PMT more closely than do extant ISec studies. The first data collection was a longitudinal study in the context of data backups. The second study was a short-term cross-sectional study in the context of anti-malware software. Our new model demonstrated better results and stronger fit than the existing models and confirms the efficacy of the four potential improvements we identified.
Individuals’ Internet Security Perceptions and Behaviors
Little is known about the context sensitivity of users’ online security perceptions and behaviors to national and individual attributes, and there is inadequate research about the spectrum of users’ behaviors in dealing with online security threats. In addressing this gap, this paper draws on two complementary theoretical bases: (1) the contextualization of the protection motivation theory (PMT) to online security behavior and (2) a polycontextual lens for the cross-national comparison of users’ security behaviors in the United States and China. The conceptualized model is tested based on 718 survey observations collected from the United States and China. The results support our model and show the divergence between the United States, an exemplar of modern Western society, and China, an exemplar of traditional Eastern society, in forming threat perceptions and in seeking help and avoidance as coping behaviors. Our results also uncovered the significant moderating impacts of espoused culture on the way perceptions of security threats and coping appraisals influence security behaviors. Our findings underline the importance of context-sensitive theory building in security research and provide insights into the motivators and moderators of individuals’ online security behaviors in the two nations.
User Motivations in Protecting Information Security: Protection Motivation Theory Versus Self-Determination Theory
Managers desiring to protect information systems must understand how to most effectively motivate users to engage in secure behaviors. Information security researchers have frequently studied individuals' performance of secure behaviors in response to threats. Protection motivation theory (PMT) has been used to explain individuals' propensity to engage in voluntary secure behaviors, but the adaptation of this theory has yielded inconsistent results. Motivation as a measurable construct, as derived from self-determination theory (SDT), has never been included in or compared against PMT. In this study, we construct security messages that appeal to individuals' intrinsic motivation, rather than fear, as a way to elicit secure responses. Using three sets of respondents, we integrated the SDT and PMT models and compared the native models in the context of security behaviors. We demonstrate that by using data- and individual-focused appeals and providing choices for users, managers may observe greater intention to engage in secure behavior among employees.