Shah, Pintu; Agarwal, Anuja - In: Information & Computer Security 31 (2023) 5, pp. 576-600
between-subjects design. Design/methodology/approach The researchers have used constructive learning theory and the Fogg … faced by smartphone users based on FBM and constructive learning theory. This research used hope along with a fear appeal to …