Mar 3, 2009 | Research library
This paper describes the development of the technology threat avoidance theory (TTAT), which explains individual IT users’ behavior of avoiding the threat of malicious information technologies. We articulate that avoidance and adoption are two qualitatively different...
Mar 3, 2009 | Research library
This study presents an empirical investigation of factors affecting small- and medium-sized business (SMB) executives’ decision to adopt anti-malware software for their organizations. A research model was developed by adopting and expanding the protection motivation...
Feb 26, 2009 | Journal article, Research library
This article examines the levels of security acceptance that can exist amongst employees within an organisation, and how these levels relate to three recognised levels of corporate culture. It then proceeds to identify several factors that could be relevant to the...
Jan 28, 2009 | Research library
While most technology adoption models have focused on beneficial technologies, Protection Motivation Theory (PMT) is a potentially valuable model for predicting adoption of protective technologies, which help users avoid harm from a growing number of negative...
Jan 26, 2009 | Research library
Authors discuss literature relating to self-disclosure on the internet, with a particular focus on disclosure via computer mediated communication and web-based forms. The authors posit further research questions.
Jan 26, 2009 | Research library
This paper investigates relationships between several courtroom variables, including expert witness confidence, juror personality, expert witness credibilty and juror sentencing. It finds expert witness confidence to have a significant effect on ratings of...