Academic literature on the topic 'Protection motivation theory'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Protection motivation theory.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Protection motivation theory"
Plotnikoff, Ronald C., and Linda Trinh. "Protection Motivation Theory." Exercise and Sport Sciences Reviews 38, no. 2 (2010): 91–98. http://dx.doi.org/10.1097/jes.0b013e3181d49612.
Full textTunner, John F., Ellen Day, and Melvin R. Crask. "Protection motivation theory." Journal of Business Research 19, no. 4 (1989): 267–76. http://dx.doi.org/10.1016/0148-2963(89)90008-8.
Full textMenard, Philip, Gregory J. Bott, and Robert E. Crossler. "User Motivations in Protecting Information Security: Protection Motivation Theory Versus Self-Determination Theory." Journal of Management Information Systems 34, no. 4 (2017): 1203–30. http://dx.doi.org/10.1080/07421222.2017.1394083.
Full textPlotnikoff, Ronald C., Ryan E. Rhodes, and Linda Trinh. "Protection Motivation Theory and Physical Activity." Journal of Health Psychology 14, no. 8 (2009): 1119–34. http://dx.doi.org/10.1177/1359105309342301.
Full textFatimah, Mustika. "Protection Motivation Theory (PMT) Teori dan Aplikasi." Jurnal Ilmiah Universitas Batanghari Jambi 22, no. 2 (2022): 1145. http://dx.doi.org/10.33087/jiubj.v22i2.2341.
Full textAl-Shammari, Eiman Tamah. "Integrating Protection Motivation Theory With Cultural Context." Journal of Cases on Information Technology 27, no. 1 (2025): 1–27. https://doi.org/10.4018/jcit.368146.
Full textCalder, Samuel Christian, Graham R. Davidson, and Robert Ho. "Intentions to Consume Omega-3 Fatty Acids: A Comparison of Protection Motivation Theory and Ordered Protection Motivation Theory." Journal of Dietary Supplements 8, no. 2 (2011): 115–34. http://dx.doi.org/10.3109/19390211.2011.558569.
Full textVance, Anthony, Mikko Siponen, and Seppo Pahnila. "Motivating IS security compliance: Insights from Habit and Protection Motivation Theory." Information & Management 49, no. 3-4 (2012): 190–98. http://dx.doi.org/10.1016/j.im.2012.04.002.
Full textAna, Atta Hadi Hassan Khan Nadeem Uz Zaman Samia Kousar Sm Nabeel Ulhaq Wahab Ahmed. "Employee Motivations In Protecting Workplace Harassment: Longitudinal Analysis Of Protection Motivation Theory From Fear Appeal Perspective." Multicultural Education 8, no. 3 (2022): 227. https://doi.org/10.5281/zenodo.6370350.
Full textHaag, Steffi, Mikko Siponen, and Fufan Liu. "Protection Motivation Theory in Information Systems Security Research." ACM SIGMIS Database: the DATABASE for Advances in Information Systems 52, no. 2 (2021): 25–67. http://dx.doi.org/10.1145/3462766.3462770.
Full textDissertations / Theses on the topic "Protection motivation theory"
McGinty, Heather L. "Predicting Fear of Recurrence and Protective Health Behaviors Using Protection Motivation Theory." Scholar Commons, 2010. http://scholarcommons.usf.edu/etd/3631.
Full textClubb, Audrey C. "Protecting the Castle: Applying Protection Motivation Theory to Explain the Use of Home Guardianship." Digital Archive @ GSU, 2012. http://digitalarchive.gsu.edu/cj_theses/4.
Full textCrossler, Robert E. "Protection Motivation Theory: Understanding the Determinants of Individual Security Behavior." Diss., Virginia Tech, 2009. http://hdl.handle.net/10919/37511.
Full textMiller, Kathryn M. "A test of protection-motivation theory for promoting injury control." Thesis, This resource online, 1993. http://scholar.lib.vt.edu/theses/available/etd-07112009-040238/.
Full textMwagwabi, Florence Mwaka. "A protection motivation theory approach to improving compliance with password guidelines." Thesis, Mwagwabi, Florence Mwaka (2015) A protection motivation theory approach to improving compliance with password guidelines. PhD thesis, Murdoch University, 2015. https://researchrepository.murdoch.edu.au/id/eprint/27070/.
Full textYoon, Eunju. "Food defense management plan implementation intention : an application of protection motivation theory." Diss., Manhattan, Kan. : Kansas State University, 2007. http://hdl.handle.net/2097/439.
Full textTowbin, Ross Stuart. "A Protection Motivation Theory Approach to Healthcare Cybersecurity| A Multiple Case Study." Thesis, Northcentral University, 2019. http://pqdtopen.proquest.com/#viewpdf?dispub=13809084.
Full textHaugtvedt, Candace Louise. "Enhancing adherence to antibiotic regimens : a test of protection motivation theory and persuasive communications /." The Ohio State University, 1998. http://rave.ohiolink.edu/etdc/view?acc_num=osu1487950153601017.
Full textBirkholz, Sharon Alice. "The prospect of flooding and the motivation to prepare in contrasting urban communities : a qualitative exploration of Protection Motivation Theory." Thesis, Cranfield University, 2014. http://dspace.lib.cranfield.ac.uk/handle/1826/9329.
Full textKarmakar, Monita. "Predicting Adherence to Aromatase Inhibitor Therapy in Patients with Breast Cancer Using Protection Motivation Theory." University of Toledo Health Science Campus / OhioLINK, 2013. http://rave.ohiolink.edu/etdc/view?acc_num=mco1365094849.
Full textBooks on the topic "Protection motivation theory"
Sorace, Domenico, ed. Discipline processuali differenziate nei diritti amministrativi europei. Firenze University Press, 2010. http://dx.doi.org/10.36253/978-88-8453-586-3.
Full textDiaz-Kope, Luisa M., and John C. Morris. Organizational Motivation for Collaboration. The Rowman & Littlefield Publishing Group, 2019. https://doi.org/10.5040/9781978724761.
Full textDélano Alonso, Alexandra. Consular Protection and Solidarity across Borders. Oxford University Press, 2018. http://dx.doi.org/10.1093/oso/9780190688578.003.0004.
Full textWatson, John Scott. Sea of Suburbia. University of Illinois Press, 2017. http://dx.doi.org/10.5406/illinois/9780252039867.003.0003.
Full textde Bruyn, Theodore. Scribal Features of Scriptural Amulets. Oxford University Press, 2017. http://dx.doi.org/10.1093/oso/9780199687886.003.0006.
Full textBrannback, Malin E., and Alan L. Carsrud. Entrepreneurship. Greenwood, 2007. http://dx.doi.org/10.5040/9798400646720.
Full textLee, David Johnson. The Ends of Modernization. Cornell University Press, 2021. http://dx.doi.org/10.7591/cornell/9781501756214.001.0001.
Full textMcClain, Linda C. Who's the Bigot? Oxford University Press, 2020. http://dx.doi.org/10.1093/oso/9780190877200.001.0001.
Full textWhitman Cobb, Wendy N. The Politics of Cancer. ABC-CLIO, LLC, 2017. http://dx.doi.org/10.5040/9798400698514.
Full textStefańska, Magdalena, ed. Sustainability and sustainable development. Wydawnictwo Uniwersytetu Ekonomicznego w Poznaniu, 2021. http://dx.doi.org/10.18559/978-83-8211-074-6.
Full textBook chapters on the topic "Protection motivation theory"
Ophoff, Jacques, and Mcguigan Lakay. "Mitigating the Ransomware Threat: A Protection Motivation Theory Approach." In Communications in Computer and Information Science. Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-11407-7_12.
Full textGanesh, Anirudh, Chinenye Ndulue, and Rita Orji. "Smartphone Security and Privacy – A Gamified Persuasive Approach with Protection Motivation Theory." In Persuasive Technology. Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-98438-0_7.
Full textNguyen Quoc, Trung, Quyen Phan Thi Bao, Binh Nguyen Huu, and An Nguyen Phuoc Bao. "Motivating Accounting Information Systems Security Policy Compliance: Insight from the Protection Motivation Theory and the Theory of Reasoned Action." In Proceedings of the International Conference on Emerging Challenges: Strategic Adaptation in the World of Uncertainties (ICECH 2022). Atlantis Press International BV, 2023. http://dx.doi.org/10.2991/978-94-6463-150-0_23.
Full textYoshikai, Noriaki, Kana Shimbo, John Stavrakakis, and Toshio Takahashi. "Study on Persuasion Effect of Computer Virus Measures Based on Collective Protection Motivation Theory." In Advances in Network-Based Information Systems. Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-65521-5_45.
Full textShimbo, Kana, Shun-ichi Kurino, and Noriaki Yoshikai. "Verification of Persuasion Effect to Cope with Virus Infection Based on Collective Protection Motivation Theory." In Advances in Network-Based Information Systems. Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-98530-5_67.
Full textRustiawan, Asep, Endang Sutisna Sulaeman, Suminah, and Sri Mulyani. "Application of Protection Motivation Theory to Predict the Intention of Food Safety Behavior Among Food Handlers in the Culinary Area of Bantul Beach Tourism, Yogyakarta, Indonesia." In Proceedings of the International Conference On Multidisciplinary Studies (ICOMSI 2022). Atlantis Press SARL, 2023. http://dx.doi.org/10.2991/978-2-38476-072-5_10.
Full textNguyen, An Thinh, Ha Thi Thu Pham, Quoc Anh Trinh, Thuy Linh Do, Phuong Anh Dang, and Luc Hens. "The Geography of Climate Change Adaptation in the Vietnam Northern Mountains: A Quantitative Analysis for Intentions of Indigenous Ethnic Minorities Using Structural Equation Modeling (SEM) and Protection Motivation Theory (PMT)." In Earth and Environmental Sciences Library. Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-76116-5_17.
Full textJayathilake, Chathurangani, Pantea Keikhosrokiani, and Minna Isomursu. "The Adoption of MyData-Based Health Applications Among Elderly Citizens in Nordic Countries and the UK." In Communications in Computer and Information Science. Springer Nature Switzerland, 2024. http://dx.doi.org/10.1007/978-3-031-59080-1_11.
Full textParavastu, Narasimha, and Murugan Anandarajan. "Fear Appeals, Threat Perceptions, and Protection Motivation in Information Systems Security." In Encyclopedia of Information Science and Technology, Third Edition. IGI Global, 2015. http://dx.doi.org/10.4018/978-1-4666-5888-2.ch423.
Full textJiow, Hee Jhee, and Adeline Tay. "Using Protection Motivation Theory to Encourage Healthy Cyber Hygiene Behaviours." In Digital Citizenship and Building a Responsible Online Presence. IGI Global, 2025. https://doi.org/10.4018/979-8-3693-6675-2.ch012.
Full textConference papers on the topic "Protection motivation theory"
Sahwahita, Rahma, and Rio Guntur Utomo. "Factors Influencing Gen Z Awareness of Computer Security Using Protection Motivation Theory (PMT)." In 2024 International Conference on Information Technology Systems and Innovation (ICITSI). IEEE, 2024. https://doi.org/10.1109/icitsi65188.2024.10929102.
Full textPatil, Kanchan Pranay, Dhanya Pramod, Sumon Mitra, Suraj Sarma, Pranavi Sodagiri, and Sudhansu Saraswat. "Fighting the Illusion: Exploring Consumer Defense Against Deepfake Technology Using Protection Motivation Theory." In 2025 Fifth International Conference on Advances in Electrical, Computing, Communication and Sustainable Technologies (ICAECT). IEEE, 2025. https://doi.org/10.1109/icaect63952.2025.10958930.
Full textRani, Audi Shafa, Rio Guntur Utomo, and Muhammad Faris Fathoni. "Online Security Behavior Among Students : Factors Influencing Intention to Adopt Two-Factor Authentication (2FA) With Protection Motivation Theory." In 2024 International Conference on Information Technology Systems and Innovation (ICITSI). IEEE, 2024. https://doi.org/10.1109/icitsi65188.2024.10929141.
Full textHorton, Derek J., Matthew J. Strom, James P. Tagert, and Patrick Cassidy. "Characterization of Sacrificial Protection Efficacy and Longevity of a Thermal Spray Non-skid Coating under Sealants and Topcoats." In CORROSION 2017. NACE International, 2017. https://doi.org/10.5006/c2017-09333.
Full textNing, Jing, Brent Sherar, and Yuhchae Yoon. "An Evaluation of the Ripple-Slow Strain Rate (R-SSR) Technique for Environmentally Assisted Cracking (EAC) Qualification of Modified 13Cr-110 Stainless Steel." In CORROSION 2021. AMPP, 2021. https://doi.org/10.5006/c2021-16675.
Full textSun, Yongqiang, Nan Wang, and Xiao-Liang Shen. "Toward a Configurational Protection Motivation Theory." In Hawaii International Conference on System Sciences. Hawaii International Conference on System Sciences, 2020. http://dx.doi.org/10.24251/hicss.2020.440.
Full text"Application of Protection Motivation Theory to Adoption of Protective Technologies." In 2009 42nd Hawaii International Conference on System Sciences. IEEE, 2009. http://dx.doi.org/10.1109/hicss.2009.74.
Full textSutanto, Verrell, Felicia Margaret, Nicholas Octavianus Naftali, Gusnawati Gusnawati, Pratama Ramadhan Davia Putra, and Fransisca Iriani Roesmala Dewi. "Panic Buying Behavior during Pandemic: Protection Motivation Theory Paradigm." In 3rd Tarumanagara International Conference on the Applications of Social Sciences and Humanities (TICASH 2021). Atlantis Press, 2022. http://dx.doi.org/10.2991/assehr.k.220404.325.
Full textCheng, Hsiu-Hua. "Understanding Protection Motivation for Identity Theft in Information Security: An Extension of The Protection Motivation Theory with Anxiety." In 2023 18th Iberian Conference on Information Systems and Technologies (CISTI). IEEE, 2023. http://dx.doi.org/10.23919/cisti58278.2023.10211980.
Full textCrossler, Robert E. "Protection Motivation Theory: Understanding Determinants to Backing Up Personal Data." In 2010 43rd Hawaii International Conference on System Sciences. IEEE, 2010. http://dx.doi.org/10.1109/hicss.2010.311.
Full textReports on the topic "Protection motivation theory"
Holzer, Peter, Gaur Abhishek, Edward Arens, et al. International Energy Agency - Resilient Cooling of Buildings - Key Performance Indicators Report (Annex 80). Edited by Philipp Stern and Patryk Czarnecki. Institute of Building Research & Innovation, 2024. http://dx.doi.org/10.52776/rhet5776.
Full textPavlyuk, Ihor. MEDIACULTURE AS A NECESSARY FACTOR OF THE CONSERVATION, DEVELOPMENT AND TRANSFORMATION OF ETHNIC AND NATIONAL IDENTITY. Ivan Franko National University of Lviv, 2021. http://dx.doi.org/10.30970/vjo.2021.49.11071.
Full textWalmsley, Terrie, Angel Aguiar, and Badri Narayanan. Introduction to the Global Trade Analysis Project and the GTAP Data Base. GTAP Working Paper, 2012. http://dx.doi.org/10.21642/gtap.wp67.
Full textMartin, Lucie, Adam Shier, Ylva Andersson, Shane Timmons, Deirdre Robertson, and Pete Lunn. Perceptions of climate change and policy among farmers and the public in Ireland. ESRI, 2024. https://doi.org/10.26504/rs207.
Full textHolzer, Peter, Philipp Stern, and Patryk Czarnecki. EBC ANNEX 80 Resilient Cooling of Buildings Midterm Report. Institute of Building Research & Innovation, 2024. http://dx.doi.org/10.52776/mlgu9719.
Full textJust, David, and Amir Heiman. Building local brand for fresh fruits and vegetables: A strategic approach aimed at strengthening the local agricultural sector. United States Department of Agriculture, 2016. http://dx.doi.org/10.32747/2016.7600039.bard.
Full textLunn, Pete, Marek Bohacek, Jason Somerville, Áine Ní Choisdealbha, and Féidhlim McGowan. PRICE Lab: An Investigation of Consumers’ Capabilities with Complex Products. ESRI, 2016. https://doi.org/10.26504/bkmnext306.
Full text