Showing 1 - 10 of 11
Most of the information security management research involving fear appeals is guided by either protection motivation theory or the extended parallel processing model. Over time, extant research has extended these theories, as well as their derivative theories, in a variety of ways, leading to...
Persistent link: https://www.econbiz.de/10014360878
Persistent link: https://www.econbiz.de/10010224996
Persistent link: https://www.econbiz.de/10010396132
Persistent link: https://www.econbiz.de/10011435877
Persistent link: https://www.econbiz.de/10014582250
Persistent link: https://www.econbiz.de/10012286388
Persistent link: https://www.econbiz.de/10012670537
Researchers and practitioners have long believed that information technology (IT) is a key tool for fostering innovation. However, there is a certain inconsistency in the literature, which makes it challenging for researchers to figure out exactly how and why IT plays such a pivotal, strategic...
Persistent link: https://www.econbiz.de/10014032507
Persistent link: https://www.econbiz.de/10010218726
Although there has been a growing understanding of theory in the Information Systems (IS) field in recent years, the process of theorizing is rarely addressed with contributions originating from other disciplines and little effort to coherently synthesize them. Moreover, the field’s view of...
Persistent link: https://www.econbiz.de/10014108783