To see the other types of publications on this topic, follow the link: Protection motivation theory.

Dissertations / Theses on the topic 'Protection motivation theory'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 48 dissertations / theses for your research on the topic 'Protection motivation theory.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.

1

McGinty, Heather L. "Predicting Fear of Recurrence and Protective Health Behaviors Using Protection Motivation Theory." Scholar Commons, 2010. http://scholarcommons.usf.edu/etd/3631.

Full text
Abstract:
Prior research suggests that fear of cancer recurrence is very common among cancer survivors. This study examined the extent to which Protection Motivation Theory variables of threat appraisal and coping appraisal accounted for differences in fear of recurrence and performance of health behaviors in cancer patients who recently completed treatment. It was hypothesized that greater fear of recurrence would be related to a combination of high threat appraisal and low coping appraisal. Also, it was hypothesized that higher rates of health behaviors would be related to higher threat appraisals for
APA, Harvard, Vancouver, ISO, and other styles
2

Clubb, Audrey C. "Protecting the Castle: Applying Protection Motivation Theory to Explain the Use of Home Guardianship." Digital Archive @ GSU, 2012. http://digitalarchive.gsu.edu/cj_theses/4.

Full text
Abstract:
Home guardianship measures provide individuals with a means to enhance and ensure the safety of themselves, their family, and their property inside their homes. However, research regarding the factors considered in the decision to employ home guardianship measures as well as the means by which individuals assess this information regarding potential threats and protective responses is limited and varied in its implementation. This study attempts to provide a theoretical framework for understanding the use of home guardianship measures with the application of a modified version of Ronald Rogers’
APA, Harvard, Vancouver, ISO, and other styles
3

Crossler, Robert E. "Protection Motivation Theory: Understanding the Determinants of Individual Security Behavior." Diss., Virginia Tech, 2009. http://hdl.handle.net/10919/37511.

Full text
Abstract:
Individuals are considered the weakest link when it comes to securing a personal computer system. All the technological solutions can be in place, but if individuals do not make appropriate security protection decisions they introduce holes that technological solutions cannot protect. This study investigates what personal characteristics influence differences in individual security behaviors, defined as behaviors to protect against security threats, by adapting Protection Motivation Theory into an information security context. This study developed and validated an instrument to measure in
APA, Harvard, Vancouver, ISO, and other styles
4

Miller, Kathryn M. "A test of protection-motivation theory for promoting injury control." Thesis, This resource online, 1993. http://scholar.lib.vt.edu/theses/available/etd-07112009-040238/.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Mwagwabi, Florence Mwaka. "A protection motivation theory approach to improving compliance with password guidelines." Thesis, Mwagwabi, Florence Mwaka (2015) A protection motivation theory approach to improving compliance with password guidelines. PhD thesis, Murdoch University, 2015. https://researchrepository.murdoch.edu.au/id/eprint/27070/.

Full text
Abstract:
Usernames and passwords form the most widely used method of user authentication on the Internet. Yet, users still find compliance with password guidelines difficult. The primary objective of this research was to investigate how compliance with password guidelines and password quality can be improved. This study investigated how user perceptions of passwords and security threats affect compliance with password guidelines and explored if altering these perceptions would improve compliance. This research also examined if compliance with password guidelines can be sustained over time. This study f
APA, Harvard, Vancouver, ISO, and other styles
6

Yoon, Eunju. "Food defense management plan implementation intention : an application of protection motivation theory." Diss., Manhattan, Kan. : Kansas State University, 2007. http://hdl.handle.net/2097/439.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Towbin, Ross Stuart. "A Protection Motivation Theory Approach to Healthcare Cybersecurity| A Multiple Case Study." Thesis, Northcentral University, 2019. http://pqdtopen.proquest.com/#viewpdf?dispub=13809084.

Full text
Abstract:
<p> Cyberattacks have occurred for many decades, but some organizations are not implementing measures to reduce the risk of these threats. The healthcare industry has had more than 30 years' worth of cyberattacks, yet many healthcare organizations do not have adequate measures against these risks. The problem addressed by this study was that healthcare organizations are vulnerable to cyberattacks, yet leadership at few healthcare organizations actively implement adequate cybersecurity practices. The purpose of this qualitative multiple case study with in-person interviews was to identify how e
APA, Harvard, Vancouver, ISO, and other styles
8

Haugtvedt, Candace Louise. "Enhancing adherence to antibiotic regimens : a test of protection motivation theory and persuasive communications /." The Ohio State University, 1998. http://rave.ohiolink.edu/etdc/view?acc_num=osu1487950153601017.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Birkholz, Sharon Alice. "The prospect of flooding and the motivation to prepare in contrasting urban communities : a qualitative exploration of Protection Motivation Theory." Thesis, Cranfield University, 2014. http://dspace.lib.cranfield.ac.uk/handle/1826/9329.

Full text
Abstract:
The number of flood related disasters is predicted to increase with the changing climate. How cities mitigate and prepare for the potential flooding influences the scope and extent of damage, and diminishes the risk of an event turning into a disaster. Preparation or preparedness is, therefore, seen as an important component to flood resilience in cities. This research qualitatively explored the social phenomenon of why some prepare and others do not through the application of Protection Motivation Theory (PMT) in two flood-vulnerable areas of the cities of Hamburg and Dhaka: Wilhelmsburg and
APA, Harvard, Vancouver, ISO, and other styles
10

Karmakar, Monita. "Predicting Adherence to Aromatase Inhibitor Therapy in Patients with Breast Cancer Using Protection Motivation Theory." University of Toledo Health Science Campus / OhioLINK, 2013. http://rave.ohiolink.edu/etdc/view?acc_num=mco1365094849.

Full text
APA, Harvard, Vancouver, ISO, and other styles
11

Bennich-Björkman, Oscar, and Anton Nyström. "The Backup-Plan : En kvantitativ studie om säkerhetskopiering bland studenter på Uppsala universitet." Thesis, Uppsala universitet, Institutionen för informatik och media, 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-297582.

Full text
Abstract:
Få personer säkerhetskopierar tillräckligt ofta, trots att de riskerar att förlora viktiga filer. Vad beror det på? Denna uppsats har genom en kvantitativ undersökning försökt klarlägga vilka faktorer som har störst påverkan på detta beteende och om det finns ett samband mellan dessa. Datainsamlingen skedde genom en enkätundersökning, med över 300 svar från olika studenter på Uppsala universitet. Resultaten analyseras med hjälp av det teoretiska ramverket “Protection Motivation Theory” (PMT) och jämförs sedan med liknande forskning. Resultaten visar att lättja och glömska är de två faktorer so
APA, Harvard, Vancouver, ISO, and other styles
12

Giwah, Anthony Duke. "Empirical Assessment of Mobile Device Users’ Information Security Behavior towards Data Breach: Leveraging Protection Motivation Theory." Diss., NSUWorks, 2019. https://nsuworks.nova.edu/gscis_etd/1073.

Full text
Abstract:
User information security behavior has been an area of growing demand in information systems (IS) research. Unfortunately, most of the previous research done in user information security behavior have been in broad contexts, therefore creating a gap in the literature of similar research that focuses on specific emerging technologies and trends. With the growing reliance on mobile devices to increase the flexibility, speed and efficiency in how we work, communicate, shop, seek information and entertain ourselves, it is obvious that these devices have become data warehouses and platform for data
APA, Harvard, Vancouver, ISO, and other styles
13

Slider, Cara L. "Encouraging testicular self-examination behaviors in college males examining the role of fear appeals in protection motivation theory /." Morgantown, W. Va. : [West Virginia University Libraries], 2009. http://hdl.handle.net/10450/10148.

Full text
Abstract:
Thesis (M.S.)--West Virginia University, 2009.<br>Title from document title page. Document formatted into pages; contains iii, 76 p. : ill. Includes abstract. Includes bibliographical references (p. 40-43).
APA, Harvard, Vancouver, ISO, and other styles
14

Thongsukmag, Juthamas. "Fear in the Workplace: The Relationships among Sex, Self-efficacy, and Coping Strategies." Diss., Virginia Tech, 2003. http://hdl.handle.net/10919/28454.

Full text
Abstract:
This study adopts the components of protection motivation theory to examine the differences between coping strategies used by males and females when dealing with four unique work-related fearful situations: fear of separation, fear of punishment, fear of embarrassment and fear of harm. Specifically, the components that are referenced include coping appraisal (self-efficacy) and threat appraisal (severity and vulnerability). Four different vignettes and a series of questions related to each of the fearful situations were presented to individuals willing to participate in the study. A total of
APA, Harvard, Vancouver, ISO, and other styles
15

Johansson, Erica. "Det nya coronaviruset, covid-19, och individuell beredskap : En enkätundersökning om hur riskperception kan påverka den individuella beredskapen hos Karlstads Universitetsstudenter." Thesis, Karlstads universitet, Institutionen för samhälls- och kulturvetenskap (from 2013), 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:kau:diva-77488.

Full text
Abstract:
En pandemisk influensa medför en stor risk för samhället där både sociala och ekonomiska aspekter tar skada. Risker kräver beredskap på såväl internationella som individuella nivåer och kan påverka hur stor konsekvensen av en risk blir. Denna studie syftar till att undersöka den individuella beredskapen kring det nya coronaviruset, covid-19. Med stöd av ramverket Protection Motivation Theory som beskriver människors olika beteenden inför en risk och vad som motiverar individer till att vidta en eller flera skyddande åtgärder. Vilka faktorer som påverkar en individs riskperception och hur detta
APA, Harvard, Vancouver, ISO, and other styles
16

Erlandsson, Fabian. "Motivation att utföra skyddsåtgärder : Innan, under och efter översvämning i privata villahushåll." Thesis, Karlstads universitet, Institutionen för miljö- och livsvetenskaper (from 2013), 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:kau:diva-72716.

Full text
Abstract:
Introduktion och syfte: Årsmedelnederbörd och antalet extrema nederbördstillfällen i Sverige antas öka i framtiden. När antalet extrema nederbördstillfällen ökar så ökar också antalet försäkringskompensationer till privata husägare. Erfarenhet har visat sig göra människor mer medvetna om associerade risker och påverkar en individs motivation att själv utföra översvämningsskyddande åtgärder. Men bara en tredjedel av de som drabbas av översvämning genomför en åtgärd för att minska framtida risk. Tidigare studier har visat att Protection motivation theory (PMT) kan vara användbar för att förklara
APA, Harvard, Vancouver, ISO, and other styles
17

Vance, A. (Anthony). "Why do employees violate is security policies?:insights from multiple theoretical perspectives." Doctoral thesis, University of Oulu, 2010. http://urn.fi/urn:isbn:9789514262876.

Full text
Abstract:
Abstract Employee violations of IS security policies is recognized as a key concern for organizations. Although interest in IS security has risen in recent years, little empirical research has examined this problem. To address this research gap, this dissertation identifies deliberate IS security policy violations as a phenomenon unique from other forms of computer abuse. To better understand this phenomenon, three guidelines for researching deliberate IS security violations are proposed. An analysis of previous behavioral IS security literature shows that no existing study meets more than one
APA, Harvard, Vancouver, ISO, and other styles
18

Gamboa, Sabina, and Kenny Chauca. "Studenters integritet i Big Data-eran : En kvalitativ studie om oro över personlig data och digital integritet." Thesis, Linnéuniversitetet, Institutionen för informatik (IK), 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-104420.

Full text
Abstract:
I den nuvarande Big data-eran där stora mängder information samlas och bearbetas för att användas i kommersiellt syfte har den digitala integritetens betydelse ökat. Oro kring hur information samlas in och används har blivit mer aktuellt de senaste åren. Facebook-Cambridge Analytica-skandalen är ett exempel på hur information har använts utan användares samtycke med allvarliga konsekvenser. Detta har ökat den oro många känner kring sin personliga integritet. I Europa har General Data Protection Regulation haft en viktig roll i att skydda användares digitala integritet. Tidigare studier visar a
APA, Harvard, Vancouver, ISO, and other styles
19

Brown, David A. "Examining the Behavioral Intention of Individuals' Compliance with Information Security Policies." ScholarWorks, 2017. https://scholarworks.waldenu.edu/dissertations/3750.

Full text
Abstract:
Target Corporation experienced an information security breach resulting in compromising customers' financial information. Management is responsible for implementing adequate information security policies that protect corporate data and minimize financial losses. The purpose of this experimental study was to examine the effect of a fear appeal communication on an individual's information security policy behavioral intention. The sample population involved information technology professionals randomly selected from the SurveyMonkey audience. A research model, developed using constructs from dete
APA, Harvard, Vancouver, ISO, and other styles
20

Shen, Han. "Factors Related to Users’ Awareness of Information Security on Social Network Service --The Case of WeChat." Thesis, Linnéuniversitetet, Institutionen för informatik (IK), 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-73717.

Full text
Abstract:
Recent trends in social network services (SNS) have taken the rates of personal information sharing, storage and processing to an unprecedented level, which yield both benefits and undesirable consequences for their users. SNS is being exploited by criminals to fraudulently obtain information from unsuspecting users. User’s awareness of privacy protection has been far left behind by the increasing and popularizing utilization of social network services (SNS), the privacy security problems will become one of the important factors influencing the healthy development of social network service ind
APA, Harvard, Vancouver, ISO, and other styles
21

Persson, Tobias, and Emil Andersson. "Informationssäkerhetsrisker och organisatoriska sanktioner vid användandet av privata smarta enheter i Försvarsmakten : En studie om användning av privata smarta enheter." Thesis, Uppsala universitet, Institutionen för informatik och media, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-413565.

Full text
Abstract:
Denna uppsats undersöker intentionen att använda smarta enheter i tjänst hos personal i Försvarsmakten, som är en organisation med högt behov av verksamhetssäkerhet. Verksamhetens säkerhet är direkt beroende av hur personal inom verksamheten agerar utifrån ett säkerhetsperspektiv. Syftet är att belysa hur Försvarsmakten förmedlar informationssäkerheten kring smarta enheter och hur personalen påverkas utifrån det. Det empiriska materialet har samlats in genom en kvalitativ fallstudie i form av semistrukturerade intervjuer med två olika grupper. Resultatet analyseras med hjälp av ett teoretiskt
APA, Harvard, Vancouver, ISO, and other styles
22

Leigh, Laurasona. "Behavioral and Environmental Attributes of Ebola Epidemic in West Africa and United States Emergency Nurses’ Motivation to Protect Themselves against Ebola Infection." University of Toledo / OhioLINK, 2016. http://rave.ohiolink.edu/etdc/view?acc_num=toledo1470411786.

Full text
APA, Harvard, Vancouver, ISO, and other styles
23

Warrick, Brian. "Examining Employee Motivation, Environmental Systems, and Corporate Social Responsibility in Proenvironmental Behavior." ScholarWorks, 2016. https://scholarworks.waldenu.edu/dissertations/2906.

Full text
Abstract:
The World Health Organization has pointed to climate change as the most significant issue in the 21st century as a result of greenhouse gas emissions and environmental pollution. Organizations are leaning toward corporate social responsibility (CSR) and environmental management systems (EMS) to reverse the current trend; however, these efforts are often ineffective or pooly implemented. The purpose of this quantitative study was to determine the extent to which employees' proenvironmental behavior relates to their protection motivation and organizational identification, as well as their percep
APA, Harvard, Vancouver, ISO, and other styles
24

Leas, Loranie, and mikewood@deakin edu au. "Cardiovascular health behaviours and health needs among people with psychiatric disabilities." Deakin University. School of Psychology, 2004. http://tux.lib.deakin.edu.au./adt-VDU/public/adt-VDU20051208.095530.

Full text
Abstract:
Recent research in Australia has found that people with a mental illness experience higher mortality rates from preventable illnesses, such as cardiovascular disease, respiratory disease and diabetes compared to the general population. Lifestyle and other behavioural factors contribute significantly to these illnesses. Lifestyle behaviours that affect these illnesses include lack of physical activity, consumption of a poor diet and cigarette smoking. Research on the influence of these factors has been mainly directed towards the mainstream population in Australia. Consequently, there remains l
APA, Harvard, Vancouver, ISO, and other styles
25

Folck, Alcinda L. "Trouble in the air: Farmers’ perceptions of risk, self-efficacy, and response efficacy regarding herbicide drift." The Ohio State University, 2017. http://rave.ohiolink.edu/etdc/view?acc_num=osu1512135233700015.

Full text
APA, Harvard, Vancouver, ISO, and other styles
26

Burdsall, Deborah Patterson. "Exploring inappropriate glove use in long term care." Diss., University of Iowa, 2016. https://ir.uiowa.edu/etd/5724.

Full text
Abstract:
Healthcare personnel (HCP) frequently wear gloves when they care for patients in Standard Precautions to prevent contact with potentially infectious blood or body fluids. When HCP use gloves appropriately they reduce the risk of cross-contamination and decrease the risk of healthcare-associated infections (HAI). However, if HCP use gloves inappropriately they may inadvertently spread pathogens to patients and the patients’ environment. This study used a descriptive structured observational design to investigate three aspects of HCP glove use in a United States long-term care facility (LTCF). F
APA, Harvard, Vancouver, ISO, and other styles
27

Swartz, Erik. "Mänskligt beteende - ett ofrånkomligt hot mot informationssäkerhet?" Thesis, Högskolan i Halmstad, Akademin för informationsteknologi, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-44967.

Full text
Abstract:
Information har idag kommit att bli så viktigt att det av många aktörer kallas för den nya digitala oljan, och med anledning av just detta är information idag en av de främsta tillgångar en organisation kan besitta. För att skydda informationen lägger organisationer massiva summor pengar på tekniska och fysiska åtgärder. Tillsammans med dessa åtgärder utfärdas även interna bestämmelser och riktlinjer för hur IT-system och information får eller inte får hanteras. Trots detta sker både intrång och andra säkerhetsrelaterade incidenter som kan härledas till mänskligt felaktigt beteende, eller den
APA, Harvard, Vancouver, ISO, and other styles
28

Van, Huyssteen Lucea. "Fear-based advertising appeals : assessing execution styles of social marketing campaigns." Thesis, Stellenbosch : University of Stellenbosch, 2010. http://hdl.handle.net/10019.1/5445.

Full text
Abstract:
Thesis (MComm (Economics)--University of Stellenbosch, 2010.<br>ENGLISH ABSTRACT: South Africa faces an epidemic, namely, HIV/Aids, which has grown substantially over the last ten years. It can be regarded as the country with the most alarming statistical figures concerning HIV infection rates. Even though South Africa is a country under scrutiny, given the high prevalence of HIV/Aids, this epidemic also constitutes as a global problem, given that an approximate number of 7400 individuals are infected with HIV every day. The number of Aids related deaths has risen from 100 000 in 1999 to
APA, Harvard, Vancouver, ISO, and other styles
29

Alhussein, Nawras. "Investigation of the variables that govern user behaviors related to e-crime attacks." Thesis, Luleå tekniska universitet, Institutionen för system- och rymdteknik, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:ltu:diva-79293.

Full text
Abstract:
The users´ behaviors play an important role in securing information systems. At the same time, the users´ bad behaviors end-up in making them victims to e-crime attacks. To emphasize the positive side of users´ behaviors, the reasons for the bad behaviors must be investigated. In this research, e-crimes on users in Sweden were studied using the protection motivation theory and the theory of planned behavior in order to understand what variables govern the user behaviors. The information retrieved from the literature review and the web survey were used to answer the research question about whic
APA, Harvard, Vancouver, ISO, and other styles
30

DiGiusto, Dennis Michael. "A protection motivation theory approach to home wireless network security in New Zealand establishing if groups of concerned wireless network users exist and exploring characteristics of behavioral intention : submitted to the School of Information Management, Victoria University of Wellington in partial fulfilment of the requirements for the degree of Master of Information Management /." ResearchArchive@Victoria e-Thesis, 2008. http://hdl.handle.net/10063/1148.

Full text
APA, Harvard, Vancouver, ISO, and other styles
31

Eriksson, Beatrice, and Maria Grönte. "ON DIFFERENT TERMS - Social work among vulnerable children in a developing country." Thesis, Malmö högskola, Fakulteten för hälsa och samhälle (HS), 2011. http://urn.kb.se/resolve?urn=urn:nbn:se:mau:diva-25000.

Full text
Abstract:
The aim of this study is to get a deeper understanding, from a Swedish context, of how you can do social work with vulnerable and orphaned children in a developing country such as Uganda. We have investigated this through the example WEBALE, an NGO working in a context where among other things HIV/AIDS, poverty and a defective social safety net have led to social problems affecting children. Further, we have also aimed at acquiring a deeper understanding of what it is that motivates the volunteers and the director to work with vulnerable children at WEBALE. In order to fulfil this aim, the res
APA, Harvard, Vancouver, ISO, and other styles
32

Mousavizadeh, Kashipaz Seyed Mohammadreza. "Three Research Essays on Online Users' Concerns and Web Assurance Mechanisms." Thesis, University of North Texas, 2016. https://digital.library.unt.edu/ark:/67531/metadc862772/.

Full text
Abstract:
Online users struggle with different concerns whenever they use information systems. According to Miyazaki and Fernandez (2001), there are three important categories of concerns for online users: privacy concern, third party fraudulent behavior concern ("system security"), and online website fraudulent behavior concern ("security"). Kim, Sivasailam, and Rao (2004) proposed a similar categorization for web assurance dimensions. They argue that online websites are supposed to address users' privacy, security, and business integrity concerns to decrease user concerns. Although several researche
APA, Harvard, Vancouver, ISO, and other styles
33

Araujo, Brandon. "Agricultural Adaptation to Climate Change: How Risk Influences Decision-Making." UNF Digital Commons, 2017. http://digitalcommons.unf.edu/etd/744.

Full text
Abstract:
Climate change is currently threatening the livelihoods of farmers in developing countries. Psychological models have been developed to identify factors associated with adapting to climate change; however, little work has investigated the role of farmers’ risk attitudes in these models. We assessed perceptions of adaptation cost and adaptation intentions for five drought- specific adaptive behaviors among 550 farmers from 12 villages in the dry zone of Sri Lanka, as well as their attitudes toward risk. Results suggest that perceived adaptation cost and risk attitude are negatively associated w
APA, Harvard, Vancouver, ISO, and other styles
34

Hillhouse, Joel J., and Rob Turrisi. "Motivations for Indoor Tanning: Theoretical Models." Digital Commons @ East Tennessee State University, 2016. https://dc.etsu.edu/etsu-works/63.

Full text
Abstract:
This chapter reviews the literature applying health behavior theories to indoor tanning. Few studies have tried to fit full versions of health behavior models to indoor tanning. Theoretical models from the family of theories referred to as the reasoned action approach (e.g., theory of planned behavior, behavioral alternative model, prototype willingness model, etc.) have been most commonly used to study indoor tanning. Results indicate that these models fit indoor tanning data moderately to extremely well. Two lesser known models, problem behavior theory and the terror management health model,
APA, Harvard, Vancouver, ISO, and other styles
35

Mason, Holly. "Protection Motivation Theory and Smartphone Security Behaviour: A qualitative investigation." Thesis, 2019. http://hdl.handle.net/2440/131442.

Full text
Abstract:
This item is only available electronically.<br>This review provides an initial assessment of the literature on smartphone reliance and the lack of good security behaviours displayed on smartphones within the general population. Protection Motivation Theory (PMT) is commonly used within information security contexts to investigate why someone might chose to engage in risky smartphone behaviour. There is theoretical support for PMT within both organisational and home settings. However, there is a lack of research within the PMT and smartphone context; therefore, an empirical investigation is war
APA, Harvard, Vancouver, ISO, and other styles
36

Pinho, Luís Filipe Antunes. "”Planned” or “protected” tourism? towards a planned protection motivation approach." Master's thesis, 2021. http://hdl.handle.net/10362/123753.

Full text
Abstract:
Dissertation presented as the partial requirement for obtaining a Master's degree in Data Science and Advanced Analytics, specialization in Business Analytics<br>This research aims to develop a new Planned-Protection-Motivation (PPM) approach on tourism research. Drawing on Protection Motivation and Planned Behavior theories, the proposed model combines the beliefs on travel intentions as well as the perceived level of threat and familiarity with the pandemic. Using PLS-SEM multi-group analysis, and a sample of 381 European travelers, this study aims to understand consumers’ demand for travel
APA, Harvard, Vancouver, ISO, and other styles
37

Hou-dian-Lung and 侯殿龍. "Combining the Interventions of Protection Motivation Theory and Implementation Intentions to Promote Exercise Participation." Thesis, 2007. http://ndltd.ncl.edu.tw/handle/51573432883514450838.

Full text
Abstract:
碩士<br>國立臺北教育大學<br>體育學系碩士班<br>95<br>The main purpose of this study was to make comparison the significance of three groups in exercise participation based on interventions of Coronary Atherosclerotic Heart Disease (CAD) health information and implementation intentions. The study collected two waves of data collection over a 2-week period. Participants (N =357) were randomly allocated to a control group or one of two intervention groups. The dates were analyzed with Descriptive Statistics, t-test, One-way ANOVA, Two Factors Mixed Design, Variants Analysis, One-way ANCOVA and Stepwise Regression
APA, Harvard, Vancouver, ISO, and other styles
38

LI, YU-LING, and 李郁苓. "A Study of Factors Influencing Users’ Prevention and Action toward WannaCry: Protection Motivation Theory." Thesis, 2018. http://ndltd.ncl.edu.tw/handle/su5u7u.

Full text
Abstract:
碩士<br>銘傳大學<br>企業管理學系<br>106<br>The development of Information Computer Technologies is more and more importance since the end of the 19th century. Although technological progress brings about great benefits for human, the threat of cybercrime has become an omnipresent and important issue. With the rapid development of Information Computer Technologies, Computer Virus are Continuous changing. WannaCry is a new type of Computer Virus that is not only extorting high bitcoin bitcoins through locked files, but also doubling the ransom and destroy files if it is not paid within the time limit. Wanna
APA, Harvard, Vancouver, ISO, and other styles
39

Chang, Shih-hsien, and 張師獻. "The Influence of Information Security Stress on Security Policy Compliance: A Protection Motivation Theory Perspective." Thesis, 2017. http://ndltd.ncl.edu.tw/handle/nqrx94.

Full text
Abstract:
碩士<br>國立中山大學<br>資訊管理學系研究所<br>105<br>The occurrence of security incidents will not only cause substantial loss to the enterprise but also serious damage to goodwill. In order to reduce the occurrence of security incidents, it is a fundamental practice to formulate effective security policies and implement them. However, the process of promoting the security policy will put stress on employees. The focus of this paper is whether these pressures will affect staff&apos;&apos;s compliance with the security policies. Based on the protection motivation theory, this study considers that information s
APA, Harvard, Vancouver, ISO, and other styles
40

Peng, Shih Yao, and 彭詩窈. "Investigating determinants of privacy setting behavior in social network sites from perspective of Protection Motivation Theory." Thesis, 2015. http://ndltd.ncl.edu.tw/handle/j626jp.

Full text
APA, Harvard, Vancouver, ISO, and other styles
41

Blunt, Emily Ann. "Protection Motivation Theory and Consumer Willingness-to-Pay, in the Case of Post-Harvest Processed Gulf Oysters." Thesis, 2012. http://hdl.handle.net/1969.1/ETD-TAMU-2012-08-11864.

Full text
Abstract:
Gulf oysters are harvested and consumed year-round, with more than 90% consumed in a raw, unprocessed state. A chief concern of policymakers in recent years is the incidence of Vibrio vulnificus infection following raw seafood consumption. V.vulnificus refers to a halophilic bacterium naturally occurring in brackish coastal waters, which concentrates in filter-feeding oysters. Proposed FDA legislation requiring processing of all raw Gulf oysters sold during warmer summer months threatens the Gulf oyster industry, as little to no research regarding demand for post-harvest processing (PHP) ha
APA, Harvard, Vancouver, ISO, and other styles
42

Westcott, Rachel. "Advancing public health in the context of natural hazards : normalising preparedness within a framework of adapted protection motivation theory." Thesis, 2018. http://hdl.handle.net/1959.7/uws:49051.

Full text
Abstract:
This research sought to discover and recommend proactive strategies to strengthen and improve human safety and well-being in a changing climate of natural hazards. This thesis documents the rationale, process and outcomes of that research. People’s ability to navigate their daily lives within an environment of worsening natural hazards is an adaptive public health and safety priority - given the predicted global increase in frequency and severity of extreme weather events. There is an urgent need to strengthen and normalise people’s preparedness behaviour, and to connect it with an uneq
APA, Harvard, Vancouver, ISO, and other styles
43

Chou, Hui-lien, and 周慧蓮. "Taiwan Teenagers’ Privacy Practices on Social Networking Sites: An Analysis of Multiple Factors Based on the Protection Motivation Theory." Thesis, 2018. http://ndltd.ncl.edu.tw/handle/sa5v23.

Full text
Abstract:
博士<br>國立交通大學<br>教育研究所<br>106<br>The advent of the Internet has changed people’s life revolutionarily. Second thoughts about the technology use, however, always have to run in response to the fears expressed in the context of online privacy. Among all the Internet activities, social networking sites (SNSs) offer many mechanisms for users to share personal data as well as to restrict the access to the disclosure. However, underage students (in the current study, aged 18 or below) are often not mature enough to be aware of online risks as well as safeguards. Facebook, being prominent SNS for the
APA, Harvard, Vancouver, ISO, and other styles
44

Plotnikoff, Ronald C. "An application of protection motivation theory to coronary heart disease risk factor behaviour in three Australian samples: community adults, cardiac patients, and school children." Thesis, 1994. http://hdl.handle.net/1959.13/1415858.

Full text
Abstract:
Research Doctorate - Doctor of Philosophy (PhD)<br>The Hunter Region of New South Wales has high levels of heart disease risk factors; its population has one of the highest rates of coronary heart disease (CHD) in Australia. This thesis sought to gain an understanding of the thought process involved in achieving desired change in risk factor behaviour among samples of this regions' residents. The research had two main aims: 1. To develop valid and reliable instruments to measure people's motivation to take protection against CHD; and, 2. To test the Protection Motivation Theoretical Model with
APA, Harvard, Vancouver, ISO, and other styles
45

Tasantab, Jerry Chati. "Beyond coping in informal settlements: the factors influencing flood risk adaptation intentions." Thesis, 2021. http://hdl.handle.net/1959.13/1432279.

Full text
Abstract:
Research Doctorate - Doctor of Philosophy (PhD)<br>Flooding is a nightmare in many parts of the world, with the poor and vulnerable usually the worst affected. Extensive flood risks are a significant concern in many countries, including Ghana, where localised annual flooding is common in urban areas. There is concern that climate change will increase the intensity of precipitation, with resultant flooding affecting vulnerable populations, especially those in informal settlements in developing countries. Households in the informal settlements have habitually adopted coping measures to deal with
APA, Harvard, Vancouver, ISO, and other styles
46

Richards, Jay. "The case for health behaviour model comparison and theoretical integration: comparing and combining predictions of models in order to optimise the prediction of health behaviours." Thesis, 2015. http://hdl.handle.net/1959.13/1308165.

Full text
Abstract:
Research Doctorate - Doctor of Philosophy (PhD)<br>The health behaviour literature is currently littered with theoretical models offering competing accounts of the determinants of health behaviour. However, despite the large amount of research there is still no consensus regarding which model/s are the most useful and accurate. A reason for this is that there are few studies comparing these models for their effectiveness in explaining health behaviour. One method of determining which health behaviour models are superior is directly comparing models for accuracy. Another method of improving the
APA, Harvard, Vancouver, ISO, and other styles
47

Gangire, Yotamu. "Assessing information security compliant behaviour using the self-determination theory." Diss., 2021. http://hdl.handle.net/10500/27798.

Full text
Abstract:
Information security research shows that employees are a source of some of the security incidents in the organisation. This often results from failure to comply with the Information Security Policies (ISPs). The question is, therefore, how to improve information security behaviour of employees so that it complies with the ISPs. This study aims to contribute to the understanding of information security behaviour, especially how it can be improved, from an intrinsic motivation perspective. A review of the literature suggested that research in information security behaviour is still predominantl
APA, Harvard, Vancouver, ISO, and other styles
48

Negash, Wossen Assefa. "Development of an integrated framework for delivery care seeking behaviour among pregnant women in rural Ethiopia." Thesis, 2020. http://hdl.handle.net/10500/26943.

Full text
Abstract:
The aim of this study was to identify factors affecting facility-based delivery with the purpose of developing a framework for the promotion of facility-based delivery among women living in rural Ethiopia. Explanatory mixed methods design, comprising of four phases-the descriptive (quantitative), explorative (qualitative), meta-inference and development phases was employed. The quantitative phase was conducted first using a structured questionnaire to identify the variables influencing facility-based delivery care seeking behaviour. A sample of 389 responses were used for data analysis using S
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!