• Reference Citation Analysis
  • v
  • v
  • Find an Article
Find an Article PDF (4719281)   Today's Articles (1036)
For: Tsai HYS, Jiang M, Alhabash S, LaRose R, Rifon NJ, Cotten SR. Understanding online safety behaviors: A protection motivation theory perspective. Comput Secur 2016. [DOI: 10.1016/j.cose.2016.02.009] [Citation(s) in RCA: 140] [Impact Index Per Article: 15.6] [Reference Citation Analysis] [What about the content of this article? (0)] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/28/2022]
Number Cited by Other Article(s)
1
Cao J, Zhong L, Liu D, Zhang G, Shang M. Offense and defense between streamers and customers in live commerce marketing: Protection motivation and information overload. PLoS One 2024;19:e0305585. [PMID: 39240886 PMCID: PMC11379157 DOI: 10.1371/journal.pone.0305585] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [MESH Headings] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Received: 10/18/2023] [Accepted: 06/01/2024] [Indexed: 09/08/2024]  Open
2
Xu X, Su Y, Zhang Y, Wu Y, Xu X. Understanding learners' perceptions of ChatGPT: A thematic analysis of peer interviews among undergraduates and postgraduates in China. Heliyon 2024;10:e26239. [PMID: 38420484 PMCID: PMC10900412 DOI: 10.1016/j.heliyon.2024.e26239] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 07/28/2023] [Revised: 02/02/2024] [Accepted: 02/08/2024] [Indexed: 03/02/2024]  Open
3
Lei W, Hu S, Hsu C. Unveiling The Process Of Phishing Precautions Taking: The Moderating Role Of Optimism Bias. Comput Secur 2023. [DOI: 10.1016/j.cose.2023.103249] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 04/05/2023]
4
Trim PRJ, Lee YI, Vu A. Insights into How Vietnamese Retailers Utilize Social Media to Facilitate Knowledge Creation through the Process of Value Co-Creation. FUTURE INTERNET 2023. [DOI: 10.3390/fi15040123] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 03/28/2023]  Open
5
Alraja MN, Butt UJ, Abbod M. Information security policies compliance in a global setting: An employee's perspective. Comput Secur 2023. [DOI: 10.1016/j.cose.2023.103208] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 03/31/2023]
6
Pang H, Liu Y. Untangling the effect of cognitive trust and perceived value on health-related information seeking, sharing and psychological well-being:Motivations sought perspective. TELEMATICS AND INFORMATICS 2023. [DOI: 10.1016/j.tele.2023.101964] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 03/08/2023]
7
There's No place like home: Understanding users' intentions toward securing internet-of-things (IoT) smart home networks. COMPUTERS IN HUMAN BEHAVIOR 2023. [DOI: 10.1016/j.chb.2022.107551] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/11/2022]
8
Evaluating protection motivation based cybersecurity awareness training on Kirkpatrick's Model. Comput Secur 2023. [DOI: 10.1016/j.cose.2022.103049] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 12/12/2022]
9
Protecting Your Business against Ransomware Attacks? Explaining the Motivations of Entrepreneurs to Take Future Protective Measures against Cybercrimes Using an Extended Protection Motivation Theory Model. Comput Secur 2023. [DOI: 10.1016/j.cose.2023.103099] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 01/15/2023]
10
Alam SS, Masukujjaman M, Al-Shaikh ME, Ali MH, Makhbul ZKM, Othman AS. Desire to stay shorter time at the shopping mall: insight from protection motivation (PMT), behavioral inhibition system (BIS), reactance, and expectancy theories. CURRENT PSYCHOLOGY 2022;42:1-20. [PMID: 36570056 PMCID: PMC9759057 DOI: 10.1007/s12144-022-04117-4] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Accepted: 12/01/2022] [Indexed: 12/23/2022]
11
Indonesian Scientists’ Behavior Relative to Research Data Governance in Preventing WMD-Applicable Technology Transfer. PUBLICATIONS 2022. [DOI: 10.3390/publications10040050] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 12/13/2022]  Open
12
Dey S, Singh PK. Estimating farmers' intention towards institutional credit adoption by using extended theory of planned behavior. JOURNAL OF APPLIED SOCIAL PSYCHOLOGY 2022. [DOI: 10.1111/jasp.12952] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 12/05/2022]
13
Li W, Liu R, Sun L, Guo Z, Gao J. An Investigation of Employees' Intention to Comply with Information Security System-A Mixed Approach Based on Regression Analysis and fsQCA. INTERNATIONAL JOURNAL OF ENVIRONMENTAL RESEARCH AND PUBLIC HEALTH 2022;19:16038. [PMID: 36498115 PMCID: PMC9737675 DOI: 10.3390/ijerph192316038] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [MESH Headings] [Track Full Text] [Figures] [Subscribe] [Scholar Register] [Received: 10/17/2022] [Revised: 11/22/2022] [Accepted: 11/28/2022] [Indexed: 06/17/2023]
14
Alanazi M, Freeman M, Tootell H. Exploring the factors that influence the cybersecurity behaviors of young adults. COMPUTERS IN HUMAN BEHAVIOR 2022. [DOI: 10.1016/j.chb.2022.107376] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/26/2022]
15
Bai S, Yu D, Yang M, Tang R, He H, Zhao J, Huang P. Is negative e-WOM more powerful? Multimodal data analysis on air passengers’ perception of COVID-19 safety measures. Front Psychol 2022;13:983987. [PMID: 36329743 PMCID: PMC9624191 DOI: 10.3389/fpsyg.2022.983987] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Grants] [Track Full Text] [Download PDF] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 07/04/2022] [Accepted: 09/12/2022] [Indexed: 11/22/2022]  Open
16
Goel L, Zhang JZ, Williamson S. Work-to-Home Cybersecurity Spillover: Construct Development and Validation. INFORMATION SYSTEMS MANAGEMENT 2022. [DOI: 10.1080/10580530.2022.2128116] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 11/05/2022]
17
Cybersecurity Behavior among Government Employees: The Role of Protection Motivation Theory and Responsibility in Mitigating Cyberattacks. INFORMATION 2022. [DOI: 10.3390/info13090413] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/16/2022]  Open
18
Acar D, Kıcali ÜÖ. An Integrated Approach to COVID-19 Preventive Behaviour Intentions: Protection Motivation Theory, Information Acquisition, and Trust. SOCIAL WORK IN PUBLIC HEALTH 2022;37:419-434. [PMID: 34962187 DOI: 10.1080/19371918.2021.2018082] [Citation(s) in RCA: 10] [Impact Index Per Article: 3.3] [Reference Citation Analysis] [Abstract] [Key Words] [MESH Headings] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 06/14/2023]
19
Blockchain adoption: A study of cognitive factors underpinning decision making. COMPUTERS IN HUMAN BEHAVIOR 2022. [DOI: 10.1016/j.chb.2022.107207] [Citation(s) in RCA: 4] [Impact Index Per Article: 1.3] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/17/2022]
20
Shore A, Prena K, Cummings JJ. To share or not to share: Extending Protection Motivation Theory to understand data sharing with the police. COMPUTERS IN HUMAN BEHAVIOR 2022. [DOI: 10.1016/j.chb.2022.107188] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/16/2022]
21
Makeswaran P, Shah SA, Safian N, Muhamad NA, Harith AA. Determinants of delayed tuberculosis treatment among patients in Selangor: A study protocol. PLoS One 2022;17:e0266746. [PMID: 35468167 PMCID: PMC9037902 DOI: 10.1371/journal.pone.0266746] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [MESH Headings] [Track Full Text] [Download PDF] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 07/08/2021] [Accepted: 03/27/2022] [Indexed: 11/19/2022]  Open
22
Amankwa E, Loock M, Kritzinger E. The determinants of an information security policy compliance culture in organisations: the combined effects of organisational and behavioural factors. INFORMATION AND COMPUTER SECURITY 2022. [DOI: 10.1108/ics-10-2021-0169] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/17/2022]
23
Sun Y, Chia SC, Lu F, Oktavianus J. The Battle is On: Factors that Motivate People to Combat Anti-Vaccine Misinformation. HEALTH COMMUNICATION 2022;37:327-336. [PMID: 33095088 DOI: 10.1080/10410236.2020.1838108] [Citation(s) in RCA: 2] [Impact Index Per Article: 0.7] [Reference Citation Analysis] [Abstract] [MESH Headings] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 06/11/2023]
24
Chen Y, Luo X(R, Li H. Beyond adaptive security coping behaviors: Theory and empirical evidence. INFORMATION & MANAGEMENT 2022. [DOI: 10.1016/j.im.2021.103575] [Citation(s) in RCA: 3] [Impact Index Per Article: 1.0] [Reference Citation Analysis] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 11/24/2022]
25
Response Efficacy and Self-Efficacy Mediated the Relationship between Perceived Threat and Psychic Anxiety among College Students in the Early Stage of the COVID-19 Pandemic. INTERNATIONAL JOURNAL OF ENVIRONMENTAL RESEARCH AND PUBLIC HEALTH 2022;19:ijerph19052832. [PMID: 35270528 PMCID: PMC8910033 DOI: 10.3390/ijerph19052832] [Citation(s) in RCA: 8] [Impact Index Per Article: 2.7] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 01/24/2022] [Revised: 02/25/2022] [Accepted: 02/25/2022] [Indexed: 01/08/2023]
26
Zhang H, Zhuang M, Cao Y, Pan J, Zhang X, Zhang J, Zhang H. Social Distancing in Tourism Destination Management during the COVID-19 Pandemic in China: A Moderated Mediation Model. INTERNATIONAL JOURNAL OF ENVIRONMENTAL RESEARCH AND PUBLIC HEALTH 2021;18:ijerph182111223. [PMID: 34769741 PMCID: PMC8583034 DOI: 10.3390/ijerph182111223] [Citation(s) in RCA: 7] [Impact Index Per Article: 1.8] [Reference Citation Analysis] [Abstract] [Key Words] [MESH Headings] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 09/09/2021] [Revised: 10/18/2021] [Accepted: 10/23/2021] [Indexed: 01/02/2023]
27
Alwreikat A, Shehata A, Edakar MAM. Arab women feelings while seeking information during COVID-19 pandemic: applying PMT constructs. ONLINE INFORMATION REVIEW 2021. [DOI: 10.1108/oir-09-2020-0419] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.3] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 11/17/2022]
28
Developing and Validating a Behavioural Model of Cyberinsurance Adoption. SUSTAINABILITY 2021. [DOI: 10.3390/su13179528] [Citation(s) in RCA: 2] [Impact Index Per Article: 0.5] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 11/16/2022]
29
Gillam AR, Waite AM. Gender differences in predictors of technology threat avoidance. INFORMATION AND COMPUTER SECURITY 2021. [DOI: 10.1108/ics-01-2020-0008] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.3] [Reference Citation Analysis] [Abstract] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/17/2022]
30
Response to a phishing attack: persuasion and protection motivation in an organizational context. INFORMATION AND COMPUTER SECURITY 2021. [DOI: 10.1108/ics-02-2021-0021] [Citation(s) in RCA: 2] [Impact Index Per Article: 0.5] [Reference Citation Analysis] [Abstract] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/17/2022]
31
Bodford JE, Bunker CJ, Kwan VS. Does perceived social networking site security arise from actual and perceived physical safety? COMPUTERS IN HUMAN BEHAVIOR 2021. [DOI: 10.1016/j.chb.2021.106779] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.3] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 10/21/2022]
32
Yaprak Ü, Kılıç F, Okumuş A. Is the Covid-19 pandemic strong enough to change the online order delivery methods? Changes in the relationship between attitude and behavior towards order delivery by drone. TECHNOLOGICAL FORECASTING AND SOCIAL CHANGE 2021;169:120829. [PMID: 36540546 PMCID: PMC9755559 DOI: 10.1016/j.techfore.2021.120829] [Citation(s) in RCA: 11] [Impact Index Per Article: 2.8] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Figures] [Subscribe] [Scholar Register] [Received: 10/30/2020] [Revised: 04/10/2021] [Accepted: 04/18/2021] [Indexed: 06/17/2023]
33
McGill T, Thompson N. Exploring potential gender differences in information security and privacy. INFORMATION AND COMPUTER SECURITY 2021. [DOI: 10.1108/ics-07-2020-0125] [Citation(s) in RCA: 2] [Impact Index Per Article: 0.5] [Reference Citation Analysis] [Abstract] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/17/2022]
34
van der Schyff K, Flowerday S. Mediating effects of information security awareness. Comput Secur 2021. [DOI: 10.1016/j.cose.2021.102313] [Citation(s) in RCA: 3] [Impact Index Per Article: 0.8] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/25/2022]
35
Vrhovec S, Mihelič A. Redefining threat appraisals of organizational insiders and exploring the moderating role of fear in cyberattack protection motivation. Comput Secur 2021. [DOI: 10.1016/j.cose.2021.102309] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.3] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 02/02/2023]
36
Knapova L, Kruzikova A, Dedkova L, Smahel D. Who Is Smart with Their Smartphones? Determinants of Smartphone Security Behavior. CYBERPSYCHOLOGY BEHAVIOR AND SOCIAL NETWORKING 2021;24:584-592. [PMID: 34152852 DOI: 10.1089/cyber.2020.0599] [Citation(s) in RCA: 2] [Impact Index Per Article: 0.5] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 11/13/2022]
37
Understanding older adults’ use of social technology and the factors influencing use. AGEING & SOCIETY 2021. [DOI: 10.1017/s0144686x21000490] [Citation(s) in RCA: 5] [Impact Index Per Article: 1.3] [Reference Citation Analysis] [Abstract] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/05/2022]
38
Tchetchik A, Kaplan S, Blass V. Recycling and consumption reduction following the COVID-19 lockdown: The effect of threat and coping appraisal, past behavior and information. RESOURCES, CONSERVATION, AND RECYCLING 2021;167:105370. [PMID: 36570977 PMCID: PMC9759599 DOI: 10.1016/j.resconrec.2020.105370] [Citation(s) in RCA: 13] [Impact Index Per Article: 3.3] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Subscribe] [Scholar Register] [Received: 06/08/2020] [Revised: 12/18/2020] [Accepted: 12/18/2020] [Indexed: 05/17/2023]
39
Understanding cybersecurity behavioral habits: Insights from situational support. JOURNAL OF INFORMATION SECURITY AND APPLICATIONS 2021. [DOI: 10.1016/j.jisa.2020.102710] [Citation(s) in RCA: 10] [Impact Index Per Article: 2.5] [Reference Citation Analysis] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 11/19/2022]
40
Ameen N, Tarhini A, Shah MH, Madichie N, Paul J, Choudrie J. Keeping customers' data secure: A cross-cultural study of cybersecurity compliance among the Gen-Mobile workforce. COMPUTERS IN HUMAN BEHAVIOR 2021. [DOI: 10.1016/j.chb.2020.106531] [Citation(s) in RCA: 25] [Impact Index Per Article: 6.3] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/15/2022]
41
Cummings CL, Rosenthal S, Kong WY. Secondary Risk Theory: Validation of a Novel Model of Protection Motivation. RISK ANALYSIS : AN OFFICIAL PUBLICATION OF THE SOCIETY FOR RISK ANALYSIS 2021;41:204-220. [PMID: 32790201 DOI: 10.1111/risa.13573] [Citation(s) in RCA: 16] [Impact Index Per Article: 4.0] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Subscribe] [Scholar Register] [Received: 02/06/2020] [Revised: 06/29/2020] [Accepted: 07/16/2020] [Indexed: 06/11/2023]
42
Rodríguez-Priego N, van Bavel R, Vila J, Briggs P. Framing Effects on Online Security Behavior. Front Psychol 2020;11:527886. [PMID: 33192769 PMCID: PMC7609889 DOI: 10.3389/fpsyg.2020.527886] [Citation(s) in RCA: 5] [Impact Index Per Article: 1.0] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 01/17/2020] [Accepted: 09/28/2020] [Indexed: 11/13/2022]  Open
43
Al-Emran M, Granić A, Al-Sharafi MA, Ameen N, Sarrab M. Examining the roles of students' beliefs and security concerns for using smartwatches in higher education. JOURNAL OF ENTERPRISE INFORMATION MANAGEMENT 2020. [DOI: 10.1108/jeim-02-2020-0052] [Citation(s) in RCA: 15] [Impact Index Per Article: 3.0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 11/17/2022]
44
Kaspar K. Motivations for Social Distancing and App Use as Complementary Measures to Combat the COVID-19 Pandemic: Quantitative Survey Study. J Med Internet Res 2020;22:e21613. [PMID: 32759100 PMCID: PMC7458661 DOI: 10.2196/21613] [Citation(s) in RCA: 68] [Impact Index Per Article: 13.6] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 06/18/2020] [Accepted: 07/24/2020] [Indexed: 11/28/2022]  Open
45
van der Schyff K, Flowerday S, Lowry PB. Information privacy behavior in the use of Facebook apps: A personality-based vulnerability assessment. Heliyon 2020;6:e04714. [PMID: 32904276 PMCID: PMC7452521 DOI: 10.1016/j.heliyon.2020.e04714] [Citation(s) in RCA: 8] [Impact Index Per Article: 1.6] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 07/13/2020] [Revised: 08/06/2020] [Accepted: 08/10/2020] [Indexed: 12/03/2022]  Open
46
De Kimpe L, Ponnet K, Walrave M, Snaphaan T, Pauwels L, Hardyns W. Help, I need somebody: Examining the antecedents of social support seeking among cybercrime victims. COMPUTERS IN HUMAN BEHAVIOR 2020. [DOI: 10.1016/j.chb.2020.106310] [Citation(s) in RCA: 10] [Impact Index Per Article: 2.0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/30/2022]
47
Gillam AR, Foster WT. Factors affecting risky cybersecurity behaviors by U.S. workers: An exploratory study. COMPUTERS IN HUMAN BEHAVIOR 2020. [DOI: 10.1016/j.chb.2020.106319] [Citation(s) in RCA: 6] [Impact Index Per Article: 1.2] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 10/24/2022]
48
Wiafe I, Koranteng FN, Wiafe A, Obeng EN, Yaokumah W. The role of norms in information security policy compliance. INFORMATION AND COMPUTER SECURITY 2020. [DOI: 10.1108/ics-08-2019-0095] [Citation(s) in RCA: 4] [Impact Index Per Article: 0.8] [Reference Citation Analysis] [Abstract] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/17/2022]
49
Wang J, Kim J, Moon J, Song H. The Effect of Smog-Related Factors on Korean Domestic Tourists' Decision-Making Process. INTERNATIONAL JOURNAL OF ENVIRONMENTAL RESEARCH AND PUBLIC HEALTH 2020;17:ijerph17103706. [PMID: 32466084 PMCID: PMC7277908 DOI: 10.3390/ijerph17103706] [Citation(s) in RCA: 10] [Impact Index Per Article: 2.0] [Reference Citation Analysis] [Abstract] [Key Words] [MESH Headings] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 04/29/2020] [Revised: 05/19/2020] [Accepted: 05/21/2020] [Indexed: 11/22/2022]
50
Dang VT, Wang J, Vu TT. An integrated model of the younger generation's online shopping behavior based on empirical evidence gathered from an emerging economy. PLoS One 2020;15:e0232213. [PMID: 32374783 PMCID: PMC7202652 DOI: 10.1371/journal.pone.0232213] [Citation(s) in RCA: 5] [Impact Index Per Article: 1.0] [Reference Citation Analysis] [Abstract] [MESH Headings] [Grants] [Track Full Text] [Download PDF] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 11/11/2019] [Accepted: 04/09/2020] [Indexed: 11/18/2022]  Open
PrevPage 1 of 2 12Next
© 2004-2025 Baishideng Publishing Group Inc. All rights reserved. 7041 Koll Center Parkway, Suite 160, Pleasanton, CA 94566, USA