Construct: Response cost
Also quoted in literature as:
- cost
- relative advantage of job performance
- perceived cost of compliance
- perceived cost of compliance
This construct belongs to the following categories:
This construct is used by:
Papers using this construct cite the following papers for the source of this construct:
The following constructs were (potentially) derived from this construct:
- Locus of control by Ifinedo, 2014: Information Systems Security Policy Compliance: An Empirical Study of the Effects of Socialisation, Influence, and Cognition
- Self-efficacy by Ifinedo, 2014: Information Systems Security Policy Compliance: An Empirical Study of the Effects of Socialisation, Influence, and Cognition
- Attitude towards compliance by Sommestad et al., 2014: Variables Influencing Information Security Policy Compliance: A Systematic Review of Quantitative Studies
- Intention to comply by Sommestad et al., 2014: Variables Influencing Information Security Policy Compliance: A Systematic Review of Quantitative Studies
- Intention to comply by Sommestad et al., 2014: Variables Influencing Information Security Policy Compliance: A Systematic Review of Quantitative Studies
- Normative beliefs by Sommestad et al., 2014: Variables Influencing Information Security Policy Compliance: A Systematic Review of Quantitative Studies
- Perceived severity of incident by Sommestad et al., 2014: Variables Influencing Information Security Policy Compliance: A Systematic Review of Quantitative Studies
- Perceived vulnerability by Sommestad et al., 2014: Variables Influencing Information Security Policy Compliance: A Systematic Review of Quantitative Studies
- Response cost by Sommestad et al., 2014: Variables Influencing Information Security Policy Compliance: A Systematic Review of Quantitative Studies
- Response efficacy by Sommestad et al., 2014: Variables Influencing Information Security Policy Compliance: A Systematic Review of Quantitative Studies
- Self-efficacy by Sommestad et al., 2014: Variables Influencing Information Security Policy Compliance: A Systematic Review of Quantitative Studies
- Self-efficacy by Tu et al., 2015: Learning to Cope with Information Security Risks Regarding Mobile Device Loss or Theft: An Empirical Examination
- Response efficacy by Tu et al., 2015: Learning to Cope with Information Security Risks Regarding Mobile Device Loss or Theft: An Empirical Examination
- Perceived threat by Tu et al., 2015: Learning to Cope with Information Security Risks Regarding Mobile Device Loss or Theft: An Empirical Examination
- Perceived severity by Ifinedo, 2012: Understanding Information Systems Security Policy Compliance: An Integration of the Theory of Planned Behavior and the Protection Motivation Theory
- Perceived vulnerability by Ifinedo, 2012: Understanding Information Systems Security Policy Compliance: An Integration of the Theory of Planned Behavior and the Protection Motivation Theory
- Response cost by Ifinedo, 2012: Understanding Information Systems Security Policy Compliance: An Integration of the Theory of Planned Behavior and the Protection Motivation Theory
- Response efficacy by Ifinedo, 2012: Understanding Information Systems Security Policy Compliance: An Integration of the Theory of Planned Behavior and the Protection Motivation Theory
- Self-efficacy by Ifinedo, 2012: Understanding Information Systems Security Policy Compliance: An Integration of the Theory of Planned Behavior and the Protection Motivation Theory