Construct: Response efficacy
Also quoted in literature as:
- perceived security protection mechanisms
This construct belongs to the following categories:
This construct is used by:
Papers using this construct cite the following papers for the source of this construct:
- Ellen et al., 1991: The Role of Perceived Consumer Effectiveness in Motivating Environmentally Conscious Behaviors
- Anderson, 2005: Creating Conscientious Cybercitizen: An Examination of Home Computer User Attitudes and Intentions towards Security
- Rippetoe, 1987: Effects of Components of Protection-Motivation Theory on Adaptive and Maladaptive Coping with a Health Threat.
- Milne et al., 2000: Prediction and Intervention in Health-Related Behavior: A Meta-Analytic Review of Protection Motivation Theory
- Herath, 2009: Protection Motivation and Deterrence: A Framework for Security Policy Compliance in Organisations
- Siponen et al., 2010: Compliance with Information Security Policies: An Empirical Investigation
- Ifinedo, 2012: Understanding Information Systems Security Policy Compliance: An Integration of the Theory of Planned Behavior and the Protection Motivation Theory
- Zhang et al., 2009: Impact of Perceived Technical Protection on Security Behaviors
- Vance et al., 2012: Motivating IS Security Compliance: Insights from Habit and Protection Motivation Theory
- Lee, 2009: Threat or Coping Appraisal: Determinants of SMB Executives' Decision to Adopt Anti-Malware Software
- Workman et al., 2008: Security Lapses and the Omission of Information Security Measures: A Threat Control Model and Empirical Test
- Woon et al., 2005: A Protection Motivation Theory Approach to Home Wireless Security
The following constructs were (potentially) derived from this construct:
- Commitment by Ifinedo, 2014: Information Systems Security Policy Compliance: An Empirical Study of the Effects of Socialisation, Influence, and Cognition
- Attitude toward ISSP compliance by Ifinedo, 2014: Information Systems Security Policy Compliance: An Empirical Study of the Effects of Socialisation, Influence, and Cognition
- Locus of control by Ifinedo, 2014: Information Systems Security Policy Compliance: An Empirical Study of the Effects of Socialisation, Influence, and Cognition
- Self-efficacy by Ifinedo, 2014: Information Systems Security Policy Compliance: An Empirical Study of the Effects of Socialisation, Influence, and Cognition
- ISSP compliance behavioral intentions by Ifinedo, 2014: Information Systems Security Policy Compliance: An Empirical Study of the Effects of Socialisation, Influence, and Cognition
- Detection probability by Ifinedo, 2014: Information Systems Security Policy Compliance: An Empirical Study of the Effects of Socialisation, Influence, and Cognition
- Sanction severity by Ifinedo, 2014: Information Systems Security Policy Compliance: An Empirical Study of the Effects of Socialisation, Influence, and Cognition
- Intention to Comply by Al-Omari et al., 2013: Information Security Policy Compliance: An Empirical Study of Ethical Ideology
- Self-Efficacy by Al-Omari et al., 2013: Information Security Policy Compliance: An Empirical Study of Ethical Ideology
- Subjective Norm by Al-Omari et al., 2013: Information Security Policy Compliance: An Empirical Study of Ethical Ideology
- Moral Obligation by Al-Omari et al., 2013: Information Security Policy Compliance: An Empirical Study of Ethical Ideology
- Utilitarianism by Al-Omari et al., 2013: Information Security Policy Compliance: An Empirical Study of Ethical Ideology
- Formalism by Al-Omari et al., 2013: Information Security Policy Compliance: An Empirical Study of Ethical Ideology
- Ethical Egoism by Al-Omari et al., 2013: Information Security Policy Compliance: An Empirical Study of Ethical Ideology
- Attitude by Al-Omari et al., 2013: Information Security Policy Compliance: An Empirical Study of Ethical Ideology
- Attitude towards compliance by Sommestad et al., 2014: Variables Influencing Information Security Policy Compliance: A Systematic Review of Quantitative Studies
- Attitude towards compliance by Sommestad et al., 2014: Variables Influencing Information Security Policy Compliance: A Systematic Review of Quantitative Studies
- Descriptive norm by Sommestad et al., 2014: Variables Influencing Information Security Policy Compliance: A Systematic Review of Quantitative Studies
- Intention to comply by Sommestad et al., 2014: Variables Influencing Information Security Policy Compliance: A Systematic Review of Quantitative Studies
- Intention to comply by Sommestad et al., 2014: Variables Influencing Information Security Policy Compliance: A Systematic Review of Quantitative Studies
- Intention to comply by Sommestad et al., 2014: Variables Influencing Information Security Policy Compliance: A Systematic Review of Quantitative Studies
- Normative beliefs by Sommestad et al., 2014: Variables Influencing Information Security Policy Compliance: A Systematic Review of Quantitative Studies
- Normative beliefs by Sommestad et al., 2014: Variables Influencing Information Security Policy Compliance: A Systematic Review of Quantitative Studies
- Organizational commitment by Sommestad et al., 2014: Variables Influencing Information Security Policy Compliance: A Systematic Review of Quantitative Studies
- Perceived severity of incident by Sommestad et al., 2014: Variables Influencing Information Security Policy Compliance: A Systematic Review of Quantitative Studies
- Perceived severity of sanctions by Sommestad et al., 2014: Variables Influencing Information Security Policy Compliance: A Systematic Review of Quantitative Studies
- Perceived Certainty of Sanctions by Sommestad et al., 2014: Variables Influencing Information Security Policy Compliance: A Systematic Review of Quantitative Studies
- Perceived vulnerability by Sommestad et al., 2014: Variables Influencing Information Security Policy Compliance: A Systematic Review of Quantitative Studies
- Response cost by Sommestad et al., 2014: Variables Influencing Information Security Policy Compliance: A Systematic Review of Quantitative Studies
- Response cost by Sommestad et al., 2014: Variables Influencing Information Security Policy Compliance: A Systematic Review of Quantitative Studies
- Response efficacy by Sommestad et al., 2014: Variables Influencing Information Security Policy Compliance: A Systematic Review of Quantitative Studies
- Response efficacy by Sommestad et al., 2014: Variables Influencing Information Security Policy Compliance: A Systematic Review of Quantitative Studies
- Self-efficacy by Sommestad et al., 2014: Variables Influencing Information Security Policy Compliance: A Systematic Review of Quantitative Studies
- Self-efficacy by Sommestad et al., 2014: Variables Influencing Information Security Policy Compliance: A Systematic Review of Quantitative Studies
- Self-efficacy by Sommestad et al., 2014: Variables Influencing Information Security Policy Compliance: A Systematic Review of Quantitative Studies
- Threat appraisal by Sommestad et al., 2014: Variables Influencing Information Security Policy Compliance: A Systematic Review of Quantitative Studies
- Self-efficacy by Tu et al., 2015: Learning to Cope with Information Security Risks Regarding Mobile Device Loss or Theft: An Empirical Examination
- Response efficacy by Tu et al., 2015: Learning to Cope with Information Security Risks Regarding Mobile Device Loss or Theft: An Empirical Examination
- Perceived threat by Tu et al., 2015: Learning to Cope with Information Security Risks Regarding Mobile Device Loss or Theft: An Empirical Examination
- Information Security Policy Provision by Haeussinger, 2013: Information Security Awareness: Its Antecedents and Mediating Effects on Security Compliant Behavior
- Perceived severity by Ifinedo, 2012: Understanding Information Systems Security Policy Compliance: An Integration of the Theory of Planned Behavior and the Protection Motivation Theory
- Perceived vulnerability by Ifinedo, 2012: Understanding Information Systems Security Policy Compliance: An Integration of the Theory of Planned Behavior and the Protection Motivation Theory
- Response cost by Ifinedo, 2012: Understanding Information Systems Security Policy Compliance: An Integration of the Theory of Planned Behavior and the Protection Motivation Theory
- Response efficacy by Ifinedo, 2012: Understanding Information Systems Security Policy Compliance: An Integration of the Theory of Planned Behavior and the Protection Motivation Theory
- Attitude toward ISSP compliance by Ifinedo, 2012: Understanding Information Systems Security Policy Compliance: An Integration of the Theory of Planned Behavior and the Protection Motivation Theory
- Subjective norms by Ifinedo, 2012: Understanding Information Systems Security Policy Compliance: An Integration of the Theory of Planned Behavior and the Protection Motivation Theory
- Self-efficacy by Ifinedo, 2012: Understanding Information Systems Security Policy Compliance: An Integration of the Theory of Planned Behavior and the Protection Motivation Theory
- ISSP compliance behavioral intentions by Ifinedo, 2012: Understanding Information Systems Security Policy Compliance: An Integration of the Theory of Planned Behavior and the Protection Motivation Theory