Construct: behavioral intent
Also quoted in literature as:
- behavioral intent the self
- Behavioural intention
This construct belongs to the following categories:
This construct is used by:
Papers using this construct cite the following papers for the source of this construct:
The following constructs were (potentially) derived from this construct:
- Attitude toward ISSP compliance by Ifinedo, 2014: Information Systems Security Policy Compliance: An Empirical Study of the Effects of Socialisation, Influence, and Cognition
- Self-efficacy by Ifinedo, 2014: Information Systems Security Policy Compliance: An Empirical Study of the Effects of Socialisation, Influence, and Cognition
- ISSP compliance behavioral intentions by Ifinedo, 2014: Information Systems Security Policy Compliance: An Empirical Study of the Effects of Socialisation, Influence, and Cognition
- Information security threats by Joo, 2016: The Influence of Information Security on the Adoption of Web-Based Integrated Information Systems: An e-Government Study in Peru
- Social influence by Tu et al., 2015: Learning to Cope with Information Security Risks Regarding Mobile Device Loss or Theft: An Empirical Examination
- Threat susceptibility by Vance et al., 2014: Using Measures of Risk Perception to Predict Information Security Behavior: Insights from Electroencephalography (EEG)
- Threat severity by Vance et al., 2014: Using Measures of Risk Perception to Predict Information Security Behavior: Insights from Electroencephalography (EEG)
- Attitude toward ISSP compliance by Ifinedo, 2012: Understanding Information Systems Security Policy Compliance: An Integration of the Theory of Planned Behavior and the Protection Motivation Theory
- Subjective norms by Ifinedo, 2012: Understanding Information Systems Security Policy Compliance: An Integration of the Theory of Planned Behavior and the Protection Motivation Theory
- Self-efficacy by Ifinedo, 2012: Understanding Information Systems Security Policy Compliance: An Integration of the Theory of Planned Behavior and the Protection Motivation Theory
- ISSP compliance behavioral intentions by Ifinedo, 2012: Understanding Information Systems Security Policy Compliance: An Integration of the Theory of Planned Behavior and the Protection Motivation Theory