Academic literature on the topic 'Protection motivation theory'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Protection motivation theory.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Protection motivation theory"

1

Plotnikoff, Ronald C., and Linda Trinh. "Protection Motivation Theory." Exercise and Sport Sciences Reviews 38, no. 2 (2010): 91–98. http://dx.doi.org/10.1097/jes.0b013e3181d49612.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Tunner, John F., Ellen Day, and Melvin R. Crask. "Protection motivation theory." Journal of Business Research 19, no. 4 (1989): 267–76. http://dx.doi.org/10.1016/0148-2963(89)90008-8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Menard, Philip, Gregory J. Bott, and Robert E. Crossler. "User Motivations in Protecting Information Security: Protection Motivation Theory Versus Self-Determination Theory." Journal of Management Information Systems 34, no. 4 (2017): 1203–30. http://dx.doi.org/10.1080/07421222.2017.1394083.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Plotnikoff, Ronald C., Ryan E. Rhodes, and Linda Trinh. "Protection Motivation Theory and Physical Activity." Journal of Health Psychology 14, no. 8 (2009): 1119–34. http://dx.doi.org/10.1177/1359105309342301.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Fatimah, Mustika. "Protection Motivation Theory (PMT) Teori dan Aplikasi." Jurnal Ilmiah Universitas Batanghari Jambi 22, no. 2 (2022): 1145. http://dx.doi.org/10.33087/jiubj.v22i2.2341.

Full text
Abstract:
Health is a basic human need as described in Law No. 36 of 2009, which is considered physically, mentally, and socially that enables everyone to live productively. One indicator that reflects health in the community is the health behavior carried out by individuals in the community itself. Protection Motivation Theory (PMT) is an approach model that can be used to predict a person's healthy behavior. This research is a literature study that aims to explain the theory and various forms of PMT applications. The PMT consists of a threat appraisal that is individualized based on disease susceptibi
APA, Harvard, Vancouver, ISO, and other styles
6

Al-Shammari, Eiman Tamah. "Integrating Protection Motivation Theory With Cultural Context." Journal of Cases on Information Technology 27, no. 1 (2025): 1–27. https://doi.org/10.4018/jcit.368146.

Full text
Abstract:
This study integrates Protection Motivation Theory (PMT) with cultural dimensions to design a cybersecurity education framework tailored to Kuwait. The study uses advanced analytical techniques like K-means clustering and Association Rule Mining (ARM) to find important patterns in how age, education level, and cultural norms (like religious adherence and family reputation) affect how people act online safely. The findings highlight key gaps in awareness and coping mechanisms, informing a framework that incorporates gamification, microlearning, and culturally relevant scenarios. We design these
APA, Harvard, Vancouver, ISO, and other styles
7

Calder, Samuel Christian, Graham R. Davidson, and Robert Ho. "Intentions to Consume Omega-3 Fatty Acids: A Comparison of Protection Motivation Theory and Ordered Protection Motivation Theory." Journal of Dietary Supplements 8, no. 2 (2011): 115–34. http://dx.doi.org/10.3109/19390211.2011.558569.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Vance, Anthony, Mikko Siponen, and Seppo Pahnila. "Motivating IS security compliance: Insights from Habit and Protection Motivation Theory." Information & Management 49, no. 3-4 (2012): 190–98. http://dx.doi.org/10.1016/j.im.2012.04.002.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Ana, Atta Hadi Hassan Khan Nadeem Uz Zaman Samia Kousar Sm Nabeel Ulhaq Wahab Ahmed. "Employee Motivations In Protecting Workplace Harassment: Longitudinal Analysis Of Protection Motivation Theory From Fear Appeal Perspective." Multicultural Education 8, no. 3 (2022): 227. https://doi.org/10.5281/zenodo.6370350.

Full text
Abstract:
<em>The use of fear appeals in persuasive messages has long been used to motivate people to act in adaptive ways.Nevertheless, workplace harassment leads to many unintended consequences. The question of identifying and systematically evaluating relevant research findings has never been explored in a comprehensive, interdisciplinary way despite the demonstrated interest from researchers across a range of disciplines.The study examines the effects of a fear appeal message regardingworkplace harassment. While scholars and practitioners recognize that workplace harassment occurs in various forms i
APA, Harvard, Vancouver, ISO, and other styles
10

Haag, Steffi, Mikko Siponen, and Fufan Liu. "Protection Motivation Theory in Information Systems Security Research." ACM SIGMIS Database: the DATABASE for Advances in Information Systems 52, no. 2 (2021): 25–67. http://dx.doi.org/10.1145/3462766.3462770.

Full text
Abstract:
Protection motivation theory (PMT) is one of the most commonly used theories to examine information security behaviors. Our systematic review of the application of PMT in information systems (IS) security and the comparison with its application for decades in psychology identified five categories of important issues that have not yet been examined in IS security research. Discussing these issues in terms of why they are relevant and important for IS security, and to what extent IS research has not considered them, offers new research opportunities associated with the study of PMT and IS securi
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Protection motivation theory"

1

McGinty, Heather L. "Predicting Fear of Recurrence and Protective Health Behaviors Using Protection Motivation Theory." Scholar Commons, 2010. http://scholarcommons.usf.edu/etd/3631.

Full text
Abstract:
Prior research suggests that fear of cancer recurrence is very common among cancer survivors. This study examined the extent to which Protection Motivation Theory variables of threat appraisal and coping appraisal accounted for differences in fear of recurrence and performance of health behaviors in cancer patients who recently completed treatment. It was hypothesized that greater fear of recurrence would be related to a combination of high threat appraisal and low coping appraisal. Also, it was hypothesized that higher rates of health behaviors would be related to higher threat appraisals for
APA, Harvard, Vancouver, ISO, and other styles
2

Clubb, Audrey C. "Protecting the Castle: Applying Protection Motivation Theory to Explain the Use of Home Guardianship." Digital Archive @ GSU, 2012. http://digitalarchive.gsu.edu/cj_theses/4.

Full text
Abstract:
Home guardianship measures provide individuals with a means to enhance and ensure the safety of themselves, their family, and their property inside their homes. However, research regarding the factors considered in the decision to employ home guardianship measures as well as the means by which individuals assess this information regarding potential threats and protective responses is limited and varied in its implementation. This study attempts to provide a theoretical framework for understanding the use of home guardianship measures with the application of a modified version of Ronald Rogers’
APA, Harvard, Vancouver, ISO, and other styles
3

Crossler, Robert E. "Protection Motivation Theory: Understanding the Determinants of Individual Security Behavior." Diss., Virginia Tech, 2009. http://hdl.handle.net/10919/37511.

Full text
Abstract:
Individuals are considered the weakest link when it comes to securing a personal computer system. All the technological solutions can be in place, but if individuals do not make appropriate security protection decisions they introduce holes that technological solutions cannot protect. This study investigates what personal characteristics influence differences in individual security behaviors, defined as behaviors to protect against security threats, by adapting Protection Motivation Theory into an information security context. This study developed and validated an instrument to measure in
APA, Harvard, Vancouver, ISO, and other styles
4

Miller, Kathryn M. "A test of protection-motivation theory for promoting injury control." Thesis, This resource online, 1993. http://scholar.lib.vt.edu/theses/available/etd-07112009-040238/.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Mwagwabi, Florence Mwaka. "A protection motivation theory approach to improving compliance with password guidelines." Thesis, Mwagwabi, Florence Mwaka (2015) A protection motivation theory approach to improving compliance with password guidelines. PhD thesis, Murdoch University, 2015. https://researchrepository.murdoch.edu.au/id/eprint/27070/.

Full text
Abstract:
Usernames and passwords form the most widely used method of user authentication on the Internet. Yet, users still find compliance with password guidelines difficult. The primary objective of this research was to investigate how compliance with password guidelines and password quality can be improved. This study investigated how user perceptions of passwords and security threats affect compliance with password guidelines and explored if altering these perceptions would improve compliance. This research also examined if compliance with password guidelines can be sustained over time. This study f
APA, Harvard, Vancouver, ISO, and other styles
6

Yoon, Eunju. "Food defense management plan implementation intention : an application of protection motivation theory." Diss., Manhattan, Kan. : Kansas State University, 2007. http://hdl.handle.net/2097/439.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Towbin, Ross Stuart. "A Protection Motivation Theory Approach to Healthcare Cybersecurity| A Multiple Case Study." Thesis, Northcentral University, 2019. http://pqdtopen.proquest.com/#viewpdf?dispub=13809084.

Full text
Abstract:
<p> Cyberattacks have occurred for many decades, but some organizations are not implementing measures to reduce the risk of these threats. The healthcare industry has had more than 30 years' worth of cyberattacks, yet many healthcare organizations do not have adequate measures against these risks. The problem addressed by this study was that healthcare organizations are vulnerable to cyberattacks, yet leadership at few healthcare organizations actively implement adequate cybersecurity practices. The purpose of this qualitative multiple case study with in-person interviews was to identify how e
APA, Harvard, Vancouver, ISO, and other styles
8

Haugtvedt, Candace Louise. "Enhancing adherence to antibiotic regimens : a test of protection motivation theory and persuasive communications /." The Ohio State University, 1998. http://rave.ohiolink.edu/etdc/view?acc_num=osu1487950153601017.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Birkholz, Sharon Alice. "The prospect of flooding and the motivation to prepare in contrasting urban communities : a qualitative exploration of Protection Motivation Theory." Thesis, Cranfield University, 2014. http://dspace.lib.cranfield.ac.uk/handle/1826/9329.

Full text
Abstract:
The number of flood related disasters is predicted to increase with the changing climate. How cities mitigate and prepare for the potential flooding influences the scope and extent of damage, and diminishes the risk of an event turning into a disaster. Preparation or preparedness is, therefore, seen as an important component to flood resilience in cities. This research qualitatively explored the social phenomenon of why some prepare and others do not through the application of Protection Motivation Theory (PMT) in two flood-vulnerable areas of the cities of Hamburg and Dhaka: Wilhelmsburg and
APA, Harvard, Vancouver, ISO, and other styles
10

Karmakar, Monita. "Predicting Adherence to Aromatase Inhibitor Therapy in Patients with Breast Cancer Using Protection Motivation Theory." University of Toledo Health Science Campus / OhioLINK, 2013. http://rave.ohiolink.edu/etdc/view?acc_num=mco1365094849.

Full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Books on the topic "Protection motivation theory"

1

Sorace, Domenico, ed. Discipline processuali differenziate nei diritti amministrativi europei. Firenze University Press, 2010. http://dx.doi.org/10.36253/978-88-8453-586-3.

Full text
Abstract:
Discipline processuali differenziate nei diritti amministrativi europei. Anyone in Europe who considers that they have suffered an abuse of power on the part of a public body can apply to a judge for justice. But this role is not restricted to a single judge. Not only is there a plurality of judges corresponding to the plurality of States in which they exercise their functions, but also (in the majority of cases) within each State there is more than one type of judge appointed to impose respect of the law even on public bodies, just as the procedures and manner in which the judicial action may
APA, Harvard, Vancouver, ISO, and other styles
2

Diaz-Kope, Luisa M., and John C. Morris. Organizational Motivation for Collaboration. The Rowman & Littlefield Publishing Group, 2019. https://doi.org/10.5040/9781978724761.

Full text
Abstract:
This book determines that watershed protection and restoration in the 21st century requires adaptive and responsive strategies that incorporate regulatory frameworks in conjunction with community stakeholder engagement. The severity and pervasiveness of watershed pollution require building resource capacity through the formation of multi-sector strategic alliances. Given the complexities of watershed management and the need to leverage resources to achieve better environmental outcomes, understanding the role of motivations in watershed collaboration is vital to the efficacy of watershed prote
APA, Harvard, Vancouver, ISO, and other styles
3

Délano Alonso, Alexandra. Consular Protection and Solidarity across Borders. Oxford University Press, 2018. http://dx.doi.org/10.1093/oso/9780190688578.003.0004.

Full text
Abstract:
This chapter demonstrates how Latin American governments with large populations of migrants with precarious legal status in the United States are working together to promote policies focusing on their well-being and integration. It identifies the context in which these processes of policy diffusion and collaboration have taken place as well as their limitations. Notwithstanding the differences in capacities and motivations based on the domestic political and economic contexts, there is a convergence of practices and policies of diaspora engagement among Latin American countries driven by the c
APA, Harvard, Vancouver, ISO, and other styles
4

Watson, John Scott. Sea of Suburbia. University of Illinois Press, 2017. http://dx.doi.org/10.5406/illinois/9780252039867.003.0003.

Full text
Abstract:
This chapter examines the Prairie Crossing development's primary land conservation practices: wetland and prairie restoration, open-space preservation, and plant and animal biodiversity. It first considers two contrasting models of environmental protection in the United States: land advocacy and land trusts. It then discusses two primary conservation goals sought by George and Vicky Ranney in developing the Prairie Crossing property: “environmental protection and enhancement” and to “change the culture”—to demonstrate not only that urban development can be compatible and complementary with the
APA, Harvard, Vancouver, ISO, and other styles
5

de Bruyn, Theodore. Scribal Features of Scriptural Amulets. Oxford University Press, 2017. http://dx.doi.org/10.1093/oso/9780199687886.003.0006.

Full text
Abstract:
This chapter compares, in groups, the formulation and writing of amulets that draw on Christian scriptures: titles and opening words from the gospels and LXX Psalm 90; a short text from a gospel; Jesus’ correspondence with Abgar; the Lord’s Prayer; LXX Psalm 90; other psalms and biblical passages. Differences in formulation suggest that some of these amulets issued from different types of motivation: whereas opening words or similar short scriptural passages often end in mid-sentence, verses from the Lord’s Prayer or a psalm are typically recited in full. The latter would have been known from
APA, Harvard, Vancouver, ISO, and other styles
6

Brannback, Malin E., and Alan L. Carsrud. Entrepreneurship. Greenwood, 2007. http://dx.doi.org/10.5040/9798400646720.

Full text
Abstract:
Are entrepreneurs born or made? How do they recognize opportunity? How do they address the risks associated with designing, launching, and sustaining a new venture? There are many steps between having an idea and going public—this book explores the entrepreneurial process through all of its stages, a process in which some half a billion people are engaged worldwide every year. Illustrated through numerous real-life examples, the book is a map of the entrepreneurial journey, exploring the wide variety of opportunities open to the entrepreneur and how to build upon them, including an overview of
APA, Harvard, Vancouver, ISO, and other styles
7

Lee, David Johnson. The Ends of Modernization. Cornell University Press, 2021. http://dx.doi.org/10.7591/cornell/9781501756214.001.0001.

Full text
Abstract:
This book studies the relations between Nicaragua and the United States in the crucial years during and after the Cold War. The book charts the transformation of the ideals of modernization, national autonomy, and planned development as they gave way to human rights protection, neoliberalism, and sustainability. The book demonstrates how conflict between the United States and Nicaragua shaped larger international development policy and transformed the Cold War. In Nicaragua, the backlash to modernization took the form of the Sandinista Revolution which ousted President Anastasio Somoza Debayle
APA, Harvard, Vancouver, ISO, and other styles
8

McClain, Linda C. Who's the Bigot? Oxford University Press, 2020. http://dx.doi.org/10.1093/oso/9780190877200.001.0001.

Full text
Abstract:
Charges, denials, and countercharges of bigotry are increasingly frequent in the United States. Bigotry is a fraught and contested term, evident from the rejoinder that calling out bigotry is political correctness. That is so even though renouncing—and denouncing—bigotry seems to be a shared political value with a long history. Identifying, responding to, and preventing bigotry have engaged the efforts of many people. People disagree, however, over who is a bigot and what makes a belief, attitude, or action bigoted. This book argues that bigotry has both a backward- and forward-looking dimensi
APA, Harvard, Vancouver, ISO, and other styles
9

Whitman Cobb, Wendy N. The Politics of Cancer. ABC-CLIO, LLC, 2017. http://dx.doi.org/10.5040/9798400698514.

Full text
Abstract:
This book examines the politics of cancer, explains how our government is intrinsically tied to cancer research efforts, and documents how major political actors make cancer policy and are influenced in their decision making by political, social, scientific, and economic variables. Is whether we contract cancer—and whether we survive the disease, if we get it—largely just a result of good versus bad luck, or are these outcomes regarding cancer tied to the policies and actions of our federal government? Cancer-treating drug development and approval is overseen by the U.S. Food and Drug Administ
APA, Harvard, Vancouver, ISO, and other styles
10

Stefańska, Magdalena, ed. Sustainability and sustainable development. Wydawnictwo Uniwersytetu Ekonomicznego w Poznaniu, 2021. http://dx.doi.org/10.18559/978-83-8211-074-6.

Full text
Abstract:
The aim of this book is to present the most important issues related to sustainable development (SD) and corporate social responsibility (CSR). They are discussed from a macro and micro perspective, both in the form of theoretical foundations of these concepts and practical examples of companies operating in Central and Eastern European countries that have implemented these ideas in their daily operations and translated them into corporate and functional strategies. The book consists of four parts. The first one is theoretical in its assumptions and is devoted to explaining the key concepts of
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Protection motivation theory"

1

Ophoff, Jacques, and Mcguigan Lakay. "Mitigating the Ransomware Threat: A Protection Motivation Theory Approach." In Communications in Computer and Information Science. Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-11407-7_12.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Ganesh, Anirudh, Chinenye Ndulue, and Rita Orji. "Smartphone Security and Privacy – A Gamified Persuasive Approach with Protection Motivation Theory." In Persuasive Technology. Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-98438-0_7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Nguyen Quoc, Trung, Quyen Phan Thi Bao, Binh Nguyen Huu, and An Nguyen Phuoc Bao. "Motivating Accounting Information Systems Security Policy Compliance: Insight from the Protection Motivation Theory and the Theory of Reasoned Action." In Proceedings of the International Conference on Emerging Challenges: Strategic Adaptation in the World of Uncertainties (ICECH 2022). Atlantis Press International BV, 2023. http://dx.doi.org/10.2991/978-94-6463-150-0_23.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Yoshikai, Noriaki, Kana Shimbo, John Stavrakakis, and Toshio Takahashi. "Study on Persuasion Effect of Computer Virus Measures Based on Collective Protection Motivation Theory." In Advances in Network-Based Information Systems. Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-65521-5_45.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Shimbo, Kana, Shun-ichi Kurino, and Noriaki Yoshikai. "Verification of Persuasion Effect to Cope with Virus Infection Based on Collective Protection Motivation Theory." In Advances in Network-Based Information Systems. Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-98530-5_67.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Rustiawan, Asep, Endang Sutisna Sulaeman, Suminah, and Sri Mulyani. "Application of Protection Motivation Theory to Predict the Intention of Food Safety Behavior Among Food Handlers in the Culinary Area of Bantul Beach Tourism, Yogyakarta, Indonesia." In Proceedings of the International Conference On Multidisciplinary Studies (ICOMSI 2022). Atlantis Press SARL, 2023. http://dx.doi.org/10.2991/978-2-38476-072-5_10.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Nguyen, An Thinh, Ha Thi Thu Pham, Quoc Anh Trinh, Thuy Linh Do, Phuong Anh Dang, and Luc Hens. "The Geography of Climate Change Adaptation in the Vietnam Northern Mountains: A Quantitative Analysis for Intentions of Indigenous Ethnic Minorities Using Structural Equation Modeling (SEM) and Protection Motivation Theory (PMT)." In Earth and Environmental Sciences Library. Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-76116-5_17.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Jayathilake, Chathurangani, Pantea Keikhosrokiani, and Minna Isomursu. "The Adoption of MyData-Based Health Applications Among Elderly Citizens in Nordic Countries and the UK." In Communications in Computer and Information Science. Springer Nature Switzerland, 2024. http://dx.doi.org/10.1007/978-3-031-59080-1_11.

Full text
Abstract:
AbstractThis study addresses a crucial gap in current literature by examining the use of MyData-based health apps among individuals aged 50 and above in the UK and Nordic nations. With the advancement of personalized health technologies, understanding the factors influencing adoption among the elderly is essential. The research provides insights tailored to this demographic within the broader framework of digital health adoption. The primary scientific objective was to identify technological and health-related factors influencing the willingness of senior adults (50 and above) to use MyData-ba
APA, Harvard, Vancouver, ISO, and other styles
9

Paravastu, Narasimha, and Murugan Anandarajan. "Fear Appeals, Threat Perceptions, and Protection Motivation in Information Systems Security." In Encyclopedia of Information Science and Technology, Third Edition. IGI Global, 2015. http://dx.doi.org/10.4018/978-1-4666-5888-2.ch423.

Full text
Abstract:
Information security is important for organizations as well as individuals from the perspective of protection from data breaches, identity theft, malware and infections, hacking etc. This article presents the framework of Protection Motivation Theory and its constructs, and then reviews the past IS Literature on information systems security, from a protection motivation perspective. Specifically this article tries to explain how individuals perceive a fear appeal in an information systems security threat, and how the protection motivation framework of fear, threat perceptions of severity and v
APA, Harvard, Vancouver, ISO, and other styles
10

Jiow, Hee Jhee, and Adeline Tay. "Using Protection Motivation Theory to Encourage Healthy Cyber Hygiene Behaviours." In Digital Citizenship and Building a Responsible Online Presence. IGI Global, 2025. https://doi.org/10.4018/979-8-3693-6675-2.ch012.

Full text
Abstract:
In today's connected world, being a responsible digital citizen is extremely important. With our growing dependence on digital platforms for communication, business, and personal use, it is essential to practice healthy cyber hygiene habits to navigate the digital space effectively. This study highlights three key areas for maintaining basic online hygiene: using secure Wi-Fi networks, avoiding unknown links and attachments, and creating strong passwords. Based on a survey of 157 participants, the research emphasises that coping appraisal is vital in encouraging healthy cyber hygiene behaviour
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Protection motivation theory"

1

Sahwahita, Rahma, and Rio Guntur Utomo. "Factors Influencing Gen Z Awareness of Computer Security Using Protection Motivation Theory (PMT)." In 2024 International Conference on Information Technology Systems and Innovation (ICITSI). IEEE, 2024. https://doi.org/10.1109/icitsi65188.2024.10929102.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Patil, Kanchan Pranay, Dhanya Pramod, Sumon Mitra, Suraj Sarma, Pranavi Sodagiri, and Sudhansu Saraswat. "Fighting the Illusion: Exploring Consumer Defense Against Deepfake Technology Using Protection Motivation Theory." In 2025 Fifth International Conference on Advances in Electrical, Computing, Communication and Sustainable Technologies (ICAECT). IEEE, 2025. https://doi.org/10.1109/icaect63952.2025.10958930.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Rani, Audi Shafa, Rio Guntur Utomo, and Muhammad Faris Fathoni. "Online Security Behavior Among Students : Factors Influencing Intention to Adopt Two-Factor Authentication (2FA) With Protection Motivation Theory." In 2024 International Conference on Information Technology Systems and Innovation (ICITSI). IEEE, 2024. https://doi.org/10.1109/icitsi65188.2024.10929141.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Horton, Derek J., Matthew J. Strom, James P. Tagert, and Patrick Cassidy. "Characterization of Sacrificial Protection Efficacy and Longevity of a Thermal Spray Non-skid Coating under Sealants and Topcoats." In CORROSION 2017. NACE International, 2017. https://doi.org/10.5006/c2017-09333.

Full text
Abstract:
Abstract Thermal spray non-skid (TSN) coatings are multifunctional coatings typically used on Navy flight decks to withstand extreme temperatures, provide a non-skid surface profile and serve as a barrier coating to the mild steel substrate. When the corrosion barrier coating is breached, TSN must provide sacrificial corrosion protection to the substrate. TSN coatings can have a high porosity and can be susceptible to micro-cracking under certain loading conditions (i.e., flight deck buckling). As a result, there is a motivation to apply sealants to increase the barrier protection capability a
APA, Harvard, Vancouver, ISO, and other styles
5

Ning, Jing, Brent Sherar, and Yuhchae Yoon. "An Evaluation of the Ripple-Slow Strain Rate (R-SSR) Technique for Environmentally Assisted Cracking (EAC) Qualification of Modified 13Cr-110 Stainless Steel." In CORROSION 2021. AMPP, 2021. https://doi.org/10.5006/c2021-16675.

Full text
Abstract:
Abstract The ripple-slow strain rate (R-SSR) technique is an alternative screening test to the conventional-SSR (C-SSR) method. Both methods assess susceptibility to environmentally assisted cracking (EAC) of corrosion resistant alloys (CRAs) and involve loading a NACE TM0198-compliant tensile specimen to 100% AYS (0.2% proof stress of actual yield strength) at a slowly applied extension rate. While the C-SSR specimen is monotonically strained to failure, a R-SSR tensile specimen is typically loaded to 100% AYS and subsequently cycled between 80% and 100% AYS until failure or for up to 250 cyc
APA, Harvard, Vancouver, ISO, and other styles
6

Sun, Yongqiang, Nan Wang, and Xiao-Liang Shen. "Toward a Configurational Protection Motivation Theory." In Hawaii International Conference on System Sciences. Hawaii International Conference on System Sciences, 2020. http://dx.doi.org/10.24251/hicss.2020.440.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

"Application of Protection Motivation Theory to Adoption of Protective Technologies." In 2009 42nd Hawaii International Conference on System Sciences. IEEE, 2009. http://dx.doi.org/10.1109/hicss.2009.74.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Sutanto, Verrell, Felicia Margaret, Nicholas Octavianus Naftali, Gusnawati Gusnawati, Pratama Ramadhan Davia Putra, and Fransisca Iriani Roesmala Dewi. "Panic Buying Behavior during Pandemic: Protection Motivation Theory Paradigm." In 3rd Tarumanagara International Conference on the Applications of Social Sciences and Humanities (TICASH 2021). Atlantis Press, 2022. http://dx.doi.org/10.2991/assehr.k.220404.325.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Cheng, Hsiu-Hua. "Understanding Protection Motivation for Identity Theft in Information Security: An Extension of The Protection Motivation Theory with Anxiety." In 2023 18th Iberian Conference on Information Systems and Technologies (CISTI). IEEE, 2023. http://dx.doi.org/10.23919/cisti58278.2023.10211980.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Crossler, Robert E. "Protection Motivation Theory: Understanding Determinants to Backing Up Personal Data." In 2010 43rd Hawaii International Conference on System Sciences. IEEE, 2010. http://dx.doi.org/10.1109/hicss.2010.311.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Protection motivation theory"

1

Holzer, Peter, Gaur Abhishek, Edward Arens, et al. International Energy Agency - Resilient Cooling of Buildings - Key Performance Indicators Report (Annex 80). Edited by Philipp Stern and Patryk Czarnecki. Institute of Building Research & Innovation, 2024. http://dx.doi.org/10.52776/rhet5776.

Full text
Abstract:
The world is facing a rapid increase of air conditioning of buildings. It is the motivation of Annex 80 to develop, assess and communicate solutions of resilient cooling and overheating protection. Resilient Cooling is used to denote low energy and low carbon cooling solutions that strengthen the ability of individuals and our community to withstand, and prevent, thermal and other impacts of changes in global and local climates. Within Annex 80, there is a manifold need to use key performance indicators (KPI, i.e. performance metrics). This study employs a structured approach to evaluate Key P
APA, Harvard, Vancouver, ISO, and other styles
2

Pavlyuk, Ihor. MEDIACULTURE AS A NECESSARY FACTOR OF THE CONSERVATION, DEVELOPMENT AND TRANSFORMATION OF ETHNIC AND NATIONAL IDENTITY. Ivan Franko National University of Lviv, 2021. http://dx.doi.org/10.30970/vjo.2021.49.11071.

Full text
Abstract:
The article deals with the mental-existential relationship between ethnoculture, national identity and media culture as a necessary factor for their preservation, transformation, on the example of national original algorithms, matrix models, taking into account global tendencies and Ukrainian archetypal-specific features in Ukraine. the media actively serve the domestic oligarchs in their information-virtual and real wars among themselves and the same expansive alien humanitarian acts by curtailing ethno-cultural programs-projects on national radio, on television, in the press, or offering the
APA, Harvard, Vancouver, ISO, and other styles
3

Walmsley, Terrie, Angel Aguiar, and Badri Narayanan. Introduction to the Global Trade Analysis Project and the GTAP Data Base. GTAP Working Paper, 2012. http://dx.doi.org/10.21642/gtap.wp67.

Full text
Abstract:
The Global Trade Analysis Project (GTAP) is a global network of researchers and policy makers conducting quantitative analysis of international policy issues. The motivation and ultimate success of the Project stems from the fact that collaboration is essential for detailed analysis of the global economy. The importance of collaboration to improve the quality of policy analysis world-wide is most clearly seen in the development of the GTAP Data Base. The GTAP Data Base is the centerpiece of the Global Trade Analysis Project. It records the annual flows of goods and services for the entire worl
APA, Harvard, Vancouver, ISO, and other styles
4

Martin, Lucie, Adam Shier, Ylva Andersson, Shane Timmons, Deirdre Robertson, and Pete Lunn. Perceptions of climate change and policy among farmers and the public in Ireland. ESRI, 2024. https://doi.org/10.26504/rs207.

Full text
Abstract:
This study investigates how farmers, rural residents, and urban residents compare when it comes to perceptions and understanding of climate change, as well as willingness to make changes in their lives to reduce greenhouse gas (GHG) emissions. The study takes place in a context where there is an urgent need to act together to reduce GHG emissions across multiple sectors of the economy, yet any real or perceived divisions in society – between farmers and non-farmers, between rural and urban residents – can threaten collective action to curb climate change. The study has two primary motivations.
APA, Harvard, Vancouver, ISO, and other styles
5

Holzer, Peter, Philipp Stern, and Patryk Czarnecki. EBC ANNEX 80 Resilient Cooling of Buildings Midterm Report. Institute of Building Research & Innovation, 2024. http://dx.doi.org/10.52776/mlgu9719.

Full text
Abstract:
The world is facing a rapid increase of air conditioning of buildings. It is the motivation of Annex 80 to develop, assess and communicate solutions of resilient cooling and overheating protection. Resilient Cooling is used to denote low energy and low carbon cooling solutions that strengthen the ability of individuals and our community to withstand, and prevent, thermal and other impacts of changes in global and local climates. This midterm report sums up the developments of the Annex 80 since its first Expert Meeting in October 2019 in Vienna, Austria until July 2021. During this period seve
APA, Harvard, Vancouver, ISO, and other styles
6

Just, David, and Amir Heiman. Building local brand for fresh fruits and vegetables: A strategic approach aimed at strengthening the local agricultural sector. United States Department of Agriculture, 2016. http://dx.doi.org/10.32747/2016.7600039.bard.

Full text
Abstract:
Abstract The debate about whether to reduce import barriers on fresh produce in order to decrease the cost of living and increase welfare or to continue protecting the local agricultural sector by imposing import duties on fresh vegetables and fruits has been part of the Israeli and the US political dialog. The alternative of building a strong local brand that will direct patriotic feelings to support of the agricultural sector has been previously discussed in the literature as a non-tax barrier to global competition. The motivation of consumers to pay more for local fresh fruits and vegetable
APA, Harvard, Vancouver, ISO, and other styles
7

Lunn, Pete, Marek Bohacek, Jason Somerville, Áine Ní Choisdealbha, and Féidhlim McGowan. PRICE Lab: An Investigation of Consumers’ Capabilities with Complex Products. ESRI, 2016. https://doi.org/10.26504/bkmnext306.

Full text
Abstract:
Executive Summary This report describes a series of experiments carried out by PRICE Lab, a research programme at the Economic and Social Research Institute (ESRI) jointly funded by the Central Bank of Ireland, the Commission for Energy Regulation, the Competition and Consumer Protection Commission and the Commission for Communications Regulation. The experiments were conducted with samples of Irish consumers aged 18-70 years and were designed to answer the following general research question: At what point do products become too complex for consumers to choose accurately between the good ones
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!