Computer self-efficacy and response efficacy both positively affect the backing up of data, while perceived security vulnerability and perceived security threat both negatively affect the backing up of data.
Construct | Cites | Category | Questions given? | Content validity | Pretests | Response type | Notes |
---|---|---|---|---|---|---|---|
Perceived Security Vulnerabilities | Witte, 1996 | yes | review by four Ph.D. students | pilot with 24 participants | unclear | ||
Perceived Security Threats | Witte, 1996 | yes | review by four Ph.D. students | pilot with 24 participants | unclear | ||
Security Self-Efficacy | Marakas et al., 2007, Compeau, 1995, Witte, 1996 | yes | review by four Ph.D. students | pilot with 24 participants | unclear | ||
Response Efficacy | Witte, 1996 | yes | review by four Ph.D. students | pilot with 24 participants | unclear | ||
Prevention Cost | Neuwirth et al., 2000, Sheeran, 1996 | yes | review by four Ph.D. students | pilot with 24 participants | unclear |
Robert E. Crossler. Protection Motivation Theory: Understanding Determinants to Backing Up Personal Data. In Proceedings of the 43rd Hawaii International Conference on System Sciences, 1–10. IEEE, 2010. doi:10.1109/HICSS.2010.311.
@inproceedings{crossler_protection_2010,
author = {Crossler, Robert E.},
booktitle = {Proceedings of the 43rd {{Hawaii International Conference}} on {{System Sciences}}},
doi = {10.1109/HICSS.2010.311},
isbn = {978-1-4244-5509-6},
pages = {1-10},
publisher = {{IEEE}},
shorttitle = {Protection {{Motivation Theory}}},
title = {Protection {{Motivation Theory}}: {{Understanding Determinants}} to {{Backing Up Personal Data}}},
year = {2010}
}