Construct: Facilitating conditions
Also quoted in literature as:
This construct belongs to the following categories:
This construct is used by:
Papers using this construct cite the following papers for the source of this construct:
- Jeon et al., 2011: Individual, Social, and Organizational Contexts for Active Knowledge Sharing in Communities of Practice
- Pedersen, 2001: Adoption of Mobile Commerce: An Exploratory Analysis
- Bhattacherjee, 2000: Acceptance of E-Commerce Services: The Case of Electronic Brokerages
- Thompson et al., 1991: Personal Computing: Toward a Conceptual Model of Utilization
- Venkatesh, 2000: Determinants of Perceived Ease of Use: Integrating Control, Intrinsic Motivation, and Emotion into the Technology Acceptance Model
- Mathieson, 1991: Predicting User Intentions: Comparing the Technology Acceptance Model with the Theory of Planned Behavior
- Thompson et al., 1994: Influence of Experience on Personal Computer Utilization: Testing a Conceptual Model
- Bergeron, 1988: The Management of the End-User Environment: An Empirical Investigation
- Pahnila et al., 2007: Employees' Behavior towards IS Security Policy Compliance
The following constructs were (potentially) derived from this construct:
- Information security knowledge sharing by Sohrabi Safa et al., 2016: Information Security Policy Compliance Model in Organizations
- Information security collaboration by Sohrabi Safa et al., 2016: Information Security Policy Compliance Model in Organizations
- Information security intervention by Sohrabi Safa et al., 2016: Information Security Policy Compliance Model in Organizations
- Information security experience by Sohrabi Safa et al., 2016: Information Security Policy Compliance Model in Organizations
- Attachment by Sohrabi Safa et al., 2016: Information Security Policy Compliance Model in Organizations
- Commitment by Sohrabi Safa et al., 2016: Information Security Policy Compliance Model in Organizations
- Personal norms by Sohrabi Safa et al., 2016: Information Security Policy Compliance Model in Organizations
- Attitude towards compliance with ISOP by Sohrabi Safa et al., 2016: Information Security Policy Compliance Model in Organizations
- ISOP compliance behavioural intentions by Sohrabi Safa et al., 2016: Information Security Policy Compliance Model in Organizations
- Attitude toward ISSP compliance by Ifinedo, 2014: Information Systems Security Policy Compliance: An Empirical Study of the Effects of Socialisation, Influence, and Cognition
- Self-efficacy by Ifinedo, 2014: Information Systems Security Policy Compliance: An Empirical Study of the Effects of Socialisation, Influence, and Cognition
- ISSP compliance behavioral intentions by Ifinedo, 2014: Information Systems Security Policy Compliance: An Empirical Study of the Effects of Socialisation, Influence, and Cognition
- Usefulness by Tamjidyamcholo et al., 2014: Evaluation Model for Knowledge Sharing in Information Security Professional Virtual Community
- Usefulness by Tamjidyamcholo et al., 2014: Evaluation Model for Knowledge Sharing in Information Security Professional Virtual Community
- Affect by Tamjidyamcholo et al., 2014: Evaluation Model for Knowledge Sharing in Information Security Professional Virtual Community
- Social factor by Tamjidyamcholo et al., 2014: Evaluation Model for Knowledge Sharing in Information Security Professional Virtual Community
- Facilitating conditions by Tamjidyamcholo et al., 2014: Evaluation Model for Knowledge Sharing in Information Security Professional Virtual Community
- Attitude toward ISSP compliance by Ifinedo, 2012: Understanding Information Systems Security Policy Compliance: An Integration of the Theory of Planned Behavior and the Protection Motivation Theory
- Subjective norms by Ifinedo, 2012: Understanding Information Systems Security Policy Compliance: An Integration of the Theory of Planned Behavior and the Protection Motivation Theory
- Self-efficacy by Ifinedo, 2012: Understanding Information Systems Security Policy Compliance: An Integration of the Theory of Planned Behavior and the Protection Motivation Theory
- ISSP compliance behavioral intentions by Ifinedo, 2012: Understanding Information Systems Security Policy Compliance: An Integration of the Theory of Planned Behavior and the Protection Motivation Theory