Construct: Support
This construct belongs to the following categories:
This construct is used by:
Papers using this construct cite the following papers for the source of this construct:
The following constructs were (potentially) derived from this construct:
- Self-efficacy by Ifinedo, 2014: Information Systems Security Policy Compliance: An Empirical Study of the Effects of Socialisation, Influence, and Cognition
- Subjective Norm by Lin et al., 1999: An Intention Model-Based Study of Software Piracy
- Computer self-efficacy by Lin et al., 1999: An Intention Model-Based Study of Software Piracy
- Personal outcome expectations by Hsu et al., 2007: Knowledge Sharing Behavior in Virtual Communities: The Relationship between Trust, Self-Efficacy, and Outcome Expectations
- Community-related outcome expectations by Hsu et al., 2007: Knowledge Sharing Behavior in Virtual Communities: The Relationship between Trust, Self-Efficacy, and Outcome Expectations
- computer self-efficacy by Boss et al., 2009: If Someone Is Watching, I'll Do What I'm Asked: Mandatoriness, Control, and Information Security
- Security Self-Efficacy by Crossler, 2010: Protection Motivation Theory: Understanding Determinants to Backing Up Personal Data
- Self-efficacy by Ifinedo, 2012: Understanding Information Systems Security Policy Compliance: An Integration of the Theory of Planned Behavior and the Protection Motivation Theory