Security Constructs
Home
Categories
Constructs
Publications
Construct:
Social influence
This construct belongs to the following categories:
Uncategorised
This construct is used by:
Tu et al., 2015:
Learning to Cope with Information Security Risks Regarding Mobile Device Loss or Theft: An Empirical Examination
Questions given: yes
Papers using this construct cite the following papers for the source of this construct:
Johnston, 2010:
Fear Appeals and Information Security Behaviors: An Empirical Study