Search results

21 – 30 of over 23000
Article
Publication date: 15 February 2018

Hafedh Ibrahim and Mahmoud Mohammad Q. Al-Ajlouni

While there has been a great deal of research to distinguish the factors that promote the adoption of sustainable consumption, however there has been a very little attention given…

3763

Abstract

Purpose

While there has been a great deal of research to distinguish the factors that promote the adoption of sustainable consumption, however there has been a very little attention given to the contribution of justice, coping appraisal, and psychological distance. The purpose of this paper is to explore the potential role of deontic justice, protection motivation, and construal level theories to elucidate the green purchase intention.

Design/methodology/approach

Data were collected from 471 participants in a laboratory experiment. Then, structural equation modeling was carried out to analyze the data.

Findings

Protection motivation theory is valuable to apply specifically since it introduces the concept of coping appraisal. The findings demonstrate that deontic justice theory (DJT) is a suitable framework that can be employed to shed more light on sustainable consumption. The study shows that consumer can conceptualize a green product at different levels of concreteness or abstraction.

Originality/value

This study is a pioneering effort to look at sustainable consumption within the context of DJT. It departs from the more traditional research by repositioning moral obligation as the primary driver of green purchase intention and by elucidating when green purchase intention is elevated in investigating the moderating role of mindset.

Details

Management Decision, vol. 56 no. 3
Type: Research Article
ISSN: 0025-1747

Keywords

Article
Publication date: 27 June 2020

Esther Dzidzah, Kwame Owusu Kwateng and Benjamin Kofi Asante

The inception of mobile financial services (MFSs) has positively provoked economic growth and productivity, nonetheless, it has pessimistically caused an upward surge in…

Abstract

Purpose

The inception of mobile financial services (MFSs) has positively provoked economic growth and productivity, nonetheless, it has pessimistically caused an upward surge in cybersecurity threat. Customers are progressively becoming conscious of some of the threat and several of them now shun away from some suspicious activities over the internet as a form of protection. This study aims to explore the factors that influence users’ to adopt security behaviour.

Design/methodology/approach

A synthesis of theories – Self-efficacy and technology threat avoidance theories – was used to examine the security behaviour of users of MFSs. Data was gathered from 530 students in Ghana using convenience sampling technique. Data analysis was carried out using descriptive statistics, inferential statistics and structural equation model.

Findings

Outcome of the investigation indicate that both mastery experience and verbal persuasion have substantial effect on the avoidance motivation of MFSs users. It was, however, found that emotional state and vicarious experience of users do not influence their avoidance motivation. Also, it was established that avoidance motivation is a positive prognosticator of avoidance behaviour.

Practical implications

Understanding the security behaviour of MFS users will help the operators to outline strategies to sustain the successes achieved.

Originality/value

Studies on user security behaviour are rare, especially in sub Saharan Africa, thus, this study will contribute to extant literature by adding a new dimension of user security behaviour.

Article
Publication date: 18 February 2021

Hao Chen, Ofir Turel and Yufei Yuan

Electronic waste (e-waste) such as discarded computers and smartphones may contain large amounts of confidential data. Improper handling of remaining information in e-waste can…

Abstract

Purpose

Electronic waste (e-waste) such as discarded computers and smartphones may contain large amounts of confidential data. Improper handling of remaining information in e-waste can, therefore, drive information security risk. This risk, however, is not always properly assessed and managed. The authors take the protection motivation theory (PMT) lens of analysis to understand intentions to protect one's discarded electronic assets.

Design/methodology/approach

By applying structural equation modeling, the authors empirically tested the proposed model with survey data from 348 e-waste handling users.

Findings

Results highlight that (1) protection intention is influenced by the perceived threat of discarding untreated e-waste (a threat appraisal) and self-efficacy to treat the discarded e-waste (a coping appraisal) and (2) optimism bias plays a dual-role in a direct and moderating way to reduce the perceived threat of untreated e-waste and its effect on protection intentions.

Originality/value

Results support the assertions and portray a unique theoretical account of the processes that underline people's motivation to protect their data when discarding e-waste. As such, this study explains a relatively understudied information security risk behavior in the e-waste context, points to the role of optimism bias in such decisions and highlights potential interventions that can help to alleviate this information security risk behavior.

Details

Information Technology & People, vol. 35 no. 2
Type: Research Article
ISSN: 0959-3845

Keywords

Open Access
Article
Publication date: 31 July 2024

Luzuko Tekeni and Reinhardt A. Botha

As home users are increasingly responsible for securing their computing devices and home networks, there is a growing need to develop interventions to assist them in protecting…

Abstract

Purpose

As home users are increasingly responsible for securing their computing devices and home networks, there is a growing need to develop interventions to assist them in protecting their home networking devices, which are vulnerable to attack. To this end, this paper aims to examine the motivating factors that drive South African fibre users to protect their home networking devices.

Design/methodology/approach

Using the protection motivation theory as the primary framework, a measurement instrument comprising 53 questionnaire items was developed to measure 13 constructs. The study collected empirical data from a sample of 392 South African home fibre users and evaluated the research model using structural equation modelling.

Findings

The evaluation showed a good fit, with 12 out of 15 predicted hypotheses being accepted for the final research model, contributing to the understanding of the factors that motivate home users to protect their home networking devices.

Originality/value

To the best of the authors’ knowledge, this study is the first to model the factors that drive South African home fibre users to protect their home networking devices. Knowing these factors could help home internet service providers and security software vendors of home products to develop security interventions that could assist home fibre users to secure their home networking devices.

Details

Information & Computer Security, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2056-4961

Keywords

Article
Publication date: 18 June 2021

Ai Na Seow, Yuen Onn Choong, Chee Keong Choong and Krishna Moorthy

Health tourism is recognised as a recent new pattern of taking a break while accessing health-care services overseas. Past studies have explored this research area, but few have…

1548

Abstract

Purpose

Health tourism is recognised as a recent new pattern of taking a break while accessing health-care services overseas. Past studies have explored this research area, but few have focussed on the theoretical perspective. Applying an appropriate theoretical model to guide interventions in planning and programme development is crucial, particularly when the focus of the study is on the cognitive mediation processes of change in individual behaviour. This study aims to examine the effectiveness of the protection motivation theory with the influence of threat appraisal and coping appraisal. The purpose is to trigger the behavioural intention to engage in international health tourism.

Design/methodology/approach

A total of 299 international tourists participated in the survey. The partial least squares structural equation modelling technique was used to test the research framework. Both the measurement model and the structural model were assessed as adequate.

Findings

The empirical results demonstrate that tourists’ high risk perception must be complemented by coping ability to produce a motivational response. Further, the adaptive behaviours of international tourists are focussed more on perceived efficacy than on the perception of threats related to behavioural intentions towards health tourism.

Originality/value

The study presents an effective theoretical model intervention applicable to health tourism. Future studies should conduct a more comprehensive assessment to generate strong decision-making effectiveness from the theoretical model.

健康旅游:行为意图与保护动机理论

摘要

设计/方法/路径

共有299名国际游客参加了此次调查。使用偏最小二乘结构方程建模技术来测试研究框架。测量模型和结构模型均被评估为足够。

目的

健康旅游业被公认为是最近在海外获得医疗服务时休息的新模式。过去的研究已经探索了这个研究领域, 但是很少有人关注理论观点。应用适当的理论模型来指导计划和程序开发的干预措施至关重要, 特别是当研究的重点是个人行为改变的认知中介过程时。本研究在威胁评估和应对评估的影响下检验了保护动机理论(PMT)的有效性。目的是激发从事国际健康旅游的行为意图。

结果

实证结果表明, 游客的高风险感知必须通过应对能力来补充, 以产生激励反应。此外, 国际游客的适应行为更多地集中在感知的效能上, 而不是感知与针对健康旅游的行为意图有关的威胁。

原创性/价值

该研究提出了一种适用于健康旅游的有效理论模型干预措施。未来的研究应进行更全面的评估, 以从理论模型中产生强大的决策效力。

关键词 健康旅游, 行为意图, 保护动机理论, 国际游客, 马来西亚

文章类型: 研究型论文

Título: Turismo de salud: Intención de comportamiento y teoría de la motivación de la protección

Resumen

Diseño/metodología/enfoque (límite 100 palabras)

Un total de 299 turistas internacionales participaron en la encuesta. Se utilizó la técnica de modelización de ecuaciones estructurales por mínimos cuadrados parciales para probar el marco de investigación. Tanto el modelo de medición como el modelo estructural se consideraron adecuados.

Objetivo (límite 100 palabras)

El turismo de salud se reconoce como un nuevo modelo reciente de descanso para acceder a los servicios sanitarios en el extranjero. Estudios anteriores han explorado esta área de investigación, pero pocos se han centrado en la perspectiva teórica. La aplicación de un modelo teórico adecuado para guiar las intervenciones en la planificación y el desarrollo de programas es crucial, especialmente cuando el estudio se centra en los procesos de mediación cognitiva del cambio en el comportamiento individual. Este estudio examina la eficacia de la teoría de la motivación de la protección (PMT) con la influencia de la valoración de la amenaza y la valoración del afrontamiento. El objetivo es activar la intención conductual de realizar turismo sanitario internacional.

Conclusiones (límite 100 palabras)

Los resultados empíricos demuestran que la percepción de alto riesgo de los turistas debe complementarse con la capacidad de afrontamiento para producir una respuesta motivacional. Además, los comportamientos adaptativos de los turistas internacionales se centran más en la eficacia percibida, que en la percepción de las amenazas relacionadas con las intenciones de comportamiento hacia el turismo de salud.

Originalidad/valor (límite 100 palabras)

El estudio presenta un modelo teórico de intervención eficaz aplicable al turismo de salud. Futuros estudios deberían realizar una evaluación más exhaustiva para generar mayor eficacia en la toma de decisiones a partir del modelo teórico.

Palabras clave

Turismo de salud; Intención de comportamiento; Teoría de la motivación de la protección; Turistas internacionales; Malasia

Tipo de papel

Trabajo de investigación

Details

Tourism Review, vol. 77 no. 2
Type: Research Article
ISSN: 1660-5373

Keywords

Article
Publication date: 17 July 2009

Anil Gurung, Xin Luo and Qinyu Liao

The purpose of this paper is to develop a research framework and empirically analyze the factors that motivate the consumers to adopt and use anti‐spyware tools when they are…

1403

Abstract

Purpose

The purpose of this paper is to develop a research framework and empirically analyze the factors that motivate the consumers to adopt and use anti‐spyware tools when they are faced with security threats.

Design/methodology/approach

The research model was tested with data obtained through online survey questionnaires. A pre‐ and a pilot‐test of the survey instrument are conducted. Then, a final five‐point Likert scale instrument is created. The solicitation for participants is done through e‐mail invitations. Survey results are analyzed using factor analysis and logistic regression.

Findings

The results do not find statistically significant relationships for hypotheses related to perceived vulnerability and response cost with the dependent variable. Perceived severity, self‐efficacy, and response efficacy are significantly related to use of anti‐spyware tools.

Research limitations/implications

The empirical findings suggest that protection motivation theory (PMT) may possibly provide a new avenue in the domain of IS adoption. In addition to the usefulness and ease of use in the classical IT adoption models, the threat appeal factors are added in this study to provide a different perspective in understanding technology adoption behavior.

Practical implications

The findings provide insights for business managers and information security professionals attempting to deliver to and implement security mechanisms like anti‐spyware among end‐users who are faced with security threats.

Originality/value

While theories such as technology acceptance model, theory of planned behavior and theory of reasoned action are insufficient to gauge consumers' attitude and behavioral change toward the adoption of anti‐spyware tools when consumers are confronted with threats, this paper provides theoretical support and contributions to the research based on applying PMT in the arena of information systems.

Details

Information Management & Computer Security, vol. 17 no. 3
Type: Research Article
ISSN: 0968-5227

Keywords

Article
Publication date: 21 November 2008

Magdalena Cismaru, Anne M. Lavack and Evan Markewich

This paper aims to examine social marketing programs aimed at preventing or moderating alcohol consumption among young consumers. It seeks to show how protection motivation theory

4229

Abstract

Purpose

This paper aims to examine social marketing programs aimed at preventing or moderating alcohol consumption among young consumers. It seeks to show how protection motivation theory can be used as a theoretical framework to create effective communications targeting young people.

Design/methodology/approach

Communication materials aimed at preventing or moderating alcohol consumption among young people were identified and gathered from web sites in five English‐speaking countries (USA, Canada, Australia, New Zealand, and the UK). A qualitative review of these materials was conducted.

Findings

A majority of the alcohol moderation/prevention campaigns targeting young consumers followed the tenets of protection motivation theory by focusing on the threat variables of severity and vulnerability. Some campaigns also focused on costs, as well as self‐efficacy and response efficacy.

Research limitations/implications

Only English‐language materials and materials targeting young consumers have been considered, so findings cannot necessarily be generalized to other languages or countries.

Practical implications

Future youth alcohol moderation/prevention initiatives should include self‐efficacy messages, to increase confidence among young people that they are able to carry out the recommended actions.

Originality/value

The review presents a comprehensive examination of initiatives aimed at preventing/reducing alcohol consumption among young consumers, and shows how protection motivation theory can be successfully used in this context.

Details

Young Consumers, vol. 9 no. 4
Type: Research Article
ISSN: 1747-3616

Keywords

Article
Publication date: 28 March 2023

Arif Mahmud, Mohd Najwadi Yusoff and Mohd Heikal Husin

The factors that motivate Generation Z individuals to use the Internet of Things for security purposes have yet to be explored. Therefore, the purpose of this paper is to close a…

Abstract

Purpose

The factors that motivate Generation Z individuals to use the Internet of Things for security purposes have yet to be explored. Therefore, the purpose of this paper is to close a research gap by verifying the protection motivation theory using gender as a moderator.

Design/methodology/approach

The authors used a purposive sampling approach to collect data from Dhaka city, in which 370 valid responses were selected. Additionally, the quantitative and cross-sectional survey used a seven-point Likert scale. Afterward, the evaluation approach included three phases: a measurement model, a structural model and multi-group analysis.

Findings

Vulnerability, self-efficacy and response-efficacy were discovered to be critical predictors with a variance of 60.4%. Moreover, there was a significant disparity between males and females in two relationships, response efficacy and intention as well as response cost and intention.

Practical implications

This research expands our understanding of Generation Z consumers' behavioral intentions to take measures against household threats, allowing preventative programs to be improved. Further, in the case of applying coping strategies, a practical difference between males and females has been found that must be bridged through awareness campaigns.

Originality/value

This study has made a unique contribution to the information system literature. First, the role of protection motivation theory factors in addressing security concerns in homes has been assessed. Second, the coping evaluation process has a greater impact on users' intentions than the threat appraisal process. However, males and females use slightly different approaches to defending themselves against the threat.

Details

Journal of Systems and Information Technology, vol. 25 no. 2
Type: Research Article
ISSN: 1328-7265

Keywords

Open Access
Article
Publication date: 24 October 2022

Yumei Luo and Jian Mou

This paper aims that mobile health (mHealth) applications have emerged as a key tool to support public health. However, there are only a few studies examining the influences of…

1618

Abstract

Purpose

This paper aims that mobile health (mHealth) applications have emerged as a key tool to support public health. However, there are only a few studies examining the influences of health-related ascribes on continuance intention to use mHealth apps and how these influences are contingent on gender in the mHealth app using context.

Design/methodology/approach

This study takes the protection motivation theory as a theoretical framework to examine the ordered relationship between threat and coping appraisals and their impacts on continuance intention to use mHealth apps. In addition, this study further extends the literature on gender differences into the mHealth app's context to investigate the moderating role of gender. The suggested hypotheses are confirmed by a structural equation modeling approach and multigroup investigation employing survey data of 345 users of Spring Rain Doctor in China, a typical mHealth app.

Findings

The findings suggest that the impact of perceived disease threat on user's continuance intention is mediated entirely by coping appraisals. Furthermore, the three coping appraisals' impacts are contingent upon gender. Specifically, response efficacy is more crucial for male users in forecasting continuance intention, whereas self-efficacy and response cost have a more salient influence on continuance intention for female users.

Originality/value

This study examines the ordered influences of threat and coping appraisal, moderated by gender, on continuance intention on use mHealth apps. These findings could contribute to relevant theoretical and practical implications.

Details

Journal of Electronic Business & Digital Economics, vol. 1 no. 1/2
Type: Research Article
ISSN: 2754-4214

Keywords

Article
Publication date: 18 June 2021

Deusdedit Augustine Rwehumbiza and Tumpale Sakijege

While existing research confirms that hazardous locations increase fear and decrease entrepreneurial intentions, there is only limited knowledge on why and how business managers…

Abstract

Purpose

While existing research confirms that hazardous locations increase fear and decrease entrepreneurial intentions, there is only limited knowledge on why and how business managers decide to invest in flood-prone areas to create economic benefits. The purpose of this paper is to employ location and protection motivation theories as complementary lenses for this investigation.

Design/methodology/approach

Data were purposively collected from ten businesses. Then, using MAXQDA 2018 software programme for qualitative data, a systematic content analysis was carried out to draw empirical insights from the selected cases.

Findings

Consistent with both location and protection motivation theories, research findings show that strategic location, proximity to supporting and related businesses, availability of public goods, lack of alternative locations and proximity to social services are the key drivers related to location decisions. Furthermore, the economic benefits gained from flood-prone areas overshadow the adverse impact of floods, compelling business managers to apply structural and non-structural strategies to overcome flood risks.

Originality/value

This is a pioneering phenomenon-based research contributing to the understanding of the geographic aspect of business behaviour by explaining why and how business managers decide to invest in flood-prone instead of safer areas. It differs from previous studies by building on the overlooked complementarities between location theory and protection motivation theory in explaining the economic benefits accruing from flood-prone areas. Finally, the study calls for business managers and policy advisers to safely align the use of flood-prone areas with income-generating activities.

Details

Management Decision, vol. 60 no. 1
Type: Research Article
ISSN: 0025-1747

Keywords

21 – 30 of over 23000