Academic literature on the topic 'Protection motivation theory'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Protection motivation theory.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Protection motivation theory"

1

Plotnikoff, Ronald C., and Linda Trinh. "Protection Motivation Theory." Exercise and Sport Sciences Reviews 38, no. 2 (April 2010): 91–98. http://dx.doi.org/10.1097/jes.0b013e3181d49612.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Tunner, John F., Ellen Day, and Melvin R. Crask. "Protection motivation theory." Journal of Business Research 19, no. 4 (December 1989): 267–76. http://dx.doi.org/10.1016/0148-2963(89)90008-8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Menard, Philip, Gregory J. Bott, and Robert E. Crossler. "User Motivations in Protecting Information Security: Protection Motivation Theory Versus Self-Determination Theory." Journal of Management Information Systems 34, no. 4 (October 2, 2017): 1203–30. http://dx.doi.org/10.1080/07421222.2017.1394083.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Plotnikoff, Ronald C., Ryan E. Rhodes, and Linda Trinh. "Protection Motivation Theory and Physical Activity." Journal of Health Psychology 14, no. 8 (October 26, 2009): 1119–34. http://dx.doi.org/10.1177/1359105309342301.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Fatimah, Mustika. "Protection Motivation Theory (PMT) Teori dan Aplikasi." Jurnal Ilmiah Universitas Batanghari Jambi 22, no. 2 (July 26, 2022): 1145. http://dx.doi.org/10.33087/jiubj.v22i2.2341.

Full text
Abstract:
Health is a basic human need as described in Law No. 36 of 2009, which is considered physically, mentally, and socially that enables everyone to live productively. One indicator that reflects health in the community is the health behavior carried out by individuals in the community itself. Protection Motivation Theory (PMT) is an approach model that can be used to predict a person's healthy behavior. This research is a literature study that aims to explain the theory and various forms of PMT applications. The PMT consists of a threat appraisal that is individualized based on disease susceptibility and perceived severity. The way an individual chooses to respond to a threatening situation is based on two beliefs, namely 1) implementing a behavior that will resolve the threat (response efficacy) and 2) the individual's belief about his or her ability to perform the behavior effectively (self-efficacy). Fear will elicit an adaptive response (intention to perform a behavior) or a maladaptive response (avoidance or rejection). The PMT framework is used to explain healthy human behavior where it is fear that is used to control or change a person's behavior. PMT applications can be used not only in the health sector but also in other fields. PMT application is not only used to identify behavior but also for maladaptive behavior intervention.
APA, Harvard, Vancouver, ISO, and other styles
6

Calder, Samuel Christian, Graham R. Davidson, and Robert Ho. "Intentions to Consume Omega-3 Fatty Acids: A Comparison of Protection Motivation Theory and Ordered Protection Motivation Theory." Journal of Dietary Supplements 8, no. 2 (March 8, 2011): 115–34. http://dx.doi.org/10.3109/19390211.2011.558569.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Vance, Anthony, Mikko Siponen, and Seppo Pahnila. "Motivating IS security compliance: Insights from Habit and Protection Motivation Theory." Information & Management 49, no. 3-4 (May 2012): 190–98. http://dx.doi.org/10.1016/j.im.2012.04.002.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Haag, Steffi, Mikko Siponen, and Fufan Liu. "Protection Motivation Theory in Information Systems Security Research." ACM SIGMIS Database: the DATABASE for Advances in Information Systems 52, no. 2 (April 26, 2021): 25–67. http://dx.doi.org/10.1145/3462766.3462770.

Full text
Abstract:
Protection motivation theory (PMT) is one of the most commonly used theories to examine information security behaviors. Our systematic review of the application of PMT in information systems (IS) security and the comparison with its application for decades in psychology identified five categories of important issues that have not yet been examined in IS security research. Discussing these issues in terms of why they are relevant and important for IS security, and to what extent IS research has not considered them, offers new research opportunities associated with the study of PMT and IS security threats. We suggest how future studies can approach each of the open issues to provide a new road map for quantitative and qualitative IS scholars.
APA, Harvard, Vancouver, ISO, and other styles
9

Seow, Ai Na, Yuen Onn Choong, Chee Keong Choong, and Krishna Moorthy. "Health tourism: behavioural intention and protection motivation theory." Tourism Review 77, no. 2 (June 18, 2021): 376–93. http://dx.doi.org/10.1108/tr-11-2020-0546.

Full text
Abstract:
Purpose Health tourism is recognised as a recent new pattern of taking a break while accessing health-care services overseas. Past studies have explored this research area, but few have focussed on the theoretical perspective. Applying an appropriate theoretical model to guide interventions in planning and programme development is crucial, particularly when the focus of the study is on the cognitive mediation processes of change in individual behaviour. This study aims to examine the effectiveness of the protection motivation theory with the influence of threat appraisal and coping appraisal. The purpose is to trigger the behavioural intention to engage in international health tourism. Design/methodology/approach A total of 299 international tourists participated in the survey. The partial least squares structural equation modelling technique was used to test the research framework. Both the measurement model and the structural model were assessed as adequate. Findings The empirical results demonstrate that tourists’ high risk perception must be complemented by coping ability to produce a motivational response. Further, the adaptive behaviours of international tourists are focussed more on perceived efficacy than on the perception of threats related to behavioural intentions towards health tourism. Originality/value The study presents an effective theoretical model intervention applicable to health tourism. Future studies should conduct a more comprehensive assessment to generate strong decision-making effectiveness from the theoretical model.
APA, Harvard, Vancouver, ISO, and other styles
10

Good, Megan C., and Michael R. Hyman. "Protection motivation theory and brick-and-mortar salespeople." International Journal of Retail & Distribution Management 48, no. 8 (June 7, 2020): 865–79. http://dx.doi.org/10.1108/ijrdm-05-2019-0155.

Full text
Abstract:
PurposeThe purpose of this paper is to apply protection motivation theory (PMT) to brick-and-mortar salespeople's responses to customers' fear appeals.Design/methodology/approachThe approach is to develop a conceptual model for the effect of customers' fear appeals on brick-and-mortar salespeople.FindingsPMT relates to the influence of customers' fear appeals on brick-and-mortar salespeople's behaviours. The salesperson's decision whether to follow a retail manager's suggestion about ways to mitigate a customer's fear appeal depends on believed threat severity, believed threat susceptibility, response efficacy, self-efficacy and response costs.Research limitations/implicationsPMT is applied to a new domain: brick-and-mortar salespeople. Although a powerful yet universal emotion, only limited research has examined fear within this group.Practical implicationsUnderstanding salespeople's fears will help retail managers identify strategies for encouraging adaptive behaviours and deterring maladaptive behaviours by salespeople.Originality/valueA model relating customers' fear appeals to salespeople's behaviours is introduced.
APA, Harvard, Vancouver, ISO, and other styles

Dissertations / Theses on the topic "Protection motivation theory"

1

McGinty, Heather L. "Predicting Fear of Recurrence and Protective Health Behaviors Using Protection Motivation Theory." Scholar Commons, 2010. http://scholarcommons.usf.edu/etd/3631.

Full text
Abstract:
Prior research suggests that fear of cancer recurrence is very common among cancer survivors. This study examined the extent to which Protection Motivation Theory variables of threat appraisal and coping appraisal accounted for differences in fear of recurrence and performance of health behaviors in cancer patients who recently completed treatment. It was hypothesized that greater fear of recurrence would be related to a combination of high threat appraisal and low coping appraisal. Also, it was hypothesized that higher rates of health behaviors would be related to higher threat appraisals for cancer recurrence and higher coping appraisals for reducing risk of recurrence by improving diet or exercising. A sample of 155 early-stage breast cancer patients (mean age = 59 years) who completed surgery, chemotherapy, and/or radiotherapy between 6-24 months previously (mean = 12 months) completed measures of fear of recurrence, threat appraisal (perceived risk and severity of a potential cancer recurrence), fruit and vegetable intake in the past month, exercise for the past week, and coping appraisal (perceived response efficacy and self-efficacy to perform diet and exercise recommendations to reduce recurrence risk). Basic demographic and clinical information was also collected. The study findings supported the hypothesis that the combination of threat and coping appraisal beliefs explain which breast cancer survivors report higher fear of recurrence. However, the observed results did not support the hypothesized interaction between threat and coping appraisal for predicting either diet or exercise habits. Instead, coping appraisal alone predicted both fruit and vegetable consumption and exercise habits. Future research should focus on examining these relationships longitudinally and further assess coping appraisal and how it impacts fear of recurrence.
APA, Harvard, Vancouver, ISO, and other styles
2

Clubb, Audrey C. "Protecting the Castle: Applying Protection Motivation Theory to Explain the Use of Home Guardianship." Digital Archive @ GSU, 2012. http://digitalarchive.gsu.edu/cj_theses/4.

Full text
Abstract:
Home guardianship measures provide individuals with a means to enhance and ensure the safety of themselves, their family, and their property inside their homes. However, research regarding the factors considered in the decision to employ home guardianship measures as well as the means by which individuals assess this information regarding potential threats and protective responses is limited and varied in its implementation. This study attempts to provide a theoretical framework for understanding the use of home guardianship measures with the application of a modified version of Ronald Rogers’ (1983) Protection Motivation Theory (PMT) model. This model assesses factors that directly contribute to the motivation to engage in protective measures as well as cognitive processes through which an individual assesses these factors. This study finds support both for the direct relationships between sources of information about potential threats or protective responses and the use of home guardianship measures, as well as support for mediating effects of these relationships. In conclusion, this study provides suggestions for future research to further examine the application of PMT to understand the use of guardianship measures.
APA, Harvard, Vancouver, ISO, and other styles
3

Crossler, Robert E. "Protection Motivation Theory: Understanding the Determinants of Individual Security Behavior." Diss., Virginia Tech, 2009. http://hdl.handle.net/10919/37511.

Full text
Abstract:
Individuals are considered the weakest link when it comes to securing a personal computer system. All the technological solutions can be in place, but if individuals do not make appropriate security protection decisions they introduce holes that technological solutions cannot protect. This study investigates what personal characteristics influence differences in individual security behaviors, defined as behaviors to protect against security threats, by adapting Protection Motivation Theory into an information security context. This study developed and validated an instrument to measure individual security behaviors. It then tested the differences in these behaviors using the security research model, which built from Protection Motivation Theory, and consisted of perceived security vulnerability, perceived security threat, security self-efficacy, response efficacy, and protection cost. Participants, representing a sample population of home computer users with ages ranging from 20 to 83, provided 279 valid responses to surveys. The behaviors studied include using anti-virus software, utilizing access controls, backing up data, changing passwords frequently, securing access to personal computers, running software updates, securing wireless networks, using care when storing credit card information, educating others in one's house about security behaviors, using caution when following links in emails, running spyware software, updating a computer's operating system, using firewalls, and using pop-up blocking software. Testing the security research model found different characteristics had different impacts depending on the behavior studied. Implications for information security researchers and practitioners are provided, along with ideas for future research.
Ph. D.
APA, Harvard, Vancouver, ISO, and other styles
4

Miller, Kathryn M. "A test of protection-motivation theory for promoting injury control." Thesis, This resource online, 1993. http://scholar.lib.vt.edu/theses/available/etd-07112009-040238/.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Mwagwabi, Florence Mwaka. "A protection motivation theory approach to improving compliance with password guidelines." Thesis, Mwagwabi, Florence Mwaka (2015) A protection motivation theory approach to improving compliance with password guidelines. PhD thesis, Murdoch University, 2015. https://researchrepository.murdoch.edu.au/id/eprint/27070/.

Full text
Abstract:
Usernames and passwords form the most widely used method of user authentication on the Internet. Yet, users still find compliance with password guidelines difficult. The primary objective of this research was to investigate how compliance with password guidelines and password quality can be improved. This study investigated how user perceptions of passwords and security threats affect compliance with password guidelines and explored if altering these perceptions would improve compliance. This research also examined if compliance with password guidelines can be sustained over time. This study focuses on personal security, particularly factors that influence compliance when using personal online accounts. The proposed research model is based on the Protection Motivation Theory (PMT) (Rogers, 1975, 1983), a model widely used in information systems security research. As studies have failed to consistently confirm the association between perceived vulnerability and information security practices, the model was extended to include exposure to hacking as a predictor of perceived vulnerability. Experimental research was used to test the model from two groups of Internet users, one of which received PMT based fear appeals in the form of a password security information and training exercise. To examine if password strength was improved by the fear appeals, passwords were collected. A password strength analysis tool was developed using Shannon’s (2001) formula for calculating entropy and coded in Visual Basic. Structural equation modeling was used to test the model. The proposed model explains compliance intentions moderately well, with 54% of the variance explained by the treatment model and 43% explained by the control group model. Overall, the results indicate that efficacy perceptions are a stronger predictor of compliance intentions than threat perceptions. This study identifies three variables that predict user intentions to comply with password guidelines as particularly important. These are perceived threat, perceived password effectiveness and password self-efficacy. The results show no association between perceived vulnerability to a security attack and a user’s decision to comply. The results also showed that those who are provided with password information and training are significantly more likely to comply, and create significantly stronger passwords. However, the fear appeals used in this study had no long-term effects on compliance intentions. The results on the long-term effects of password training on the participants’ ability to remember passwords were however promising. The group that received password training with a mnemonic training component was twice as likely to remember their passwords over time. The results of this research have practical implications for organizations. They highlight the need to raise the levels of concern for information systems security threats through training in order to improve compliance with security guidelines. Communicating to users what security responses are available is important; however, whether they implement them is dependent on how effective they feel the security responses are in preventing an attack. Regarding passwords, the single most important consideration by a user is whether they have the ability to create strong, memorable passwords. At the very least, users should be trained on how to create strong passwords, with emphasis on memorization strategies. This research found mnemonic password training to have some long-term effects on users’ ability to remember passwords, which is arguably one of the most vexing challenges associated with passwords. Future research should explore the extent to which the effects of PMT based information systems security communication can be maintained over time.
APA, Harvard, Vancouver, ISO, and other styles
6

Yoon, Eunju. "Food defense management plan implementation intention : an application of protection motivation theory." Diss., Manhattan, Kan. : Kansas State University, 2007. http://hdl.handle.net/2097/439.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Towbin, Ross Stuart. "A Protection Motivation Theory Approach to Healthcare Cybersecurity| A Multiple Case Study." Thesis, Northcentral University, 2019. http://pqdtopen.proquest.com/#viewpdf?dispub=13809084.

Full text
Abstract:

Cyberattacks have occurred for many decades, but some organizations are not implementing measures to reduce the risk of these threats. The healthcare industry has had more than 30 years' worth of cyberattacks, yet many healthcare organizations do not have adequate measures against these risks. The problem addressed by this study was that healthcare organizations are vulnerable to cyberattacks, yet leadership at few healthcare organizations actively implement adequate cybersecurity practices. The purpose of this qualitative multiple case study with in-person interviews was to identify how employee motivation affects cybersecurity implementation in healthcare facilities in Southeast Michigan and Mid-Michigan areas. The researcher used protection motivation theory to explore how employee motivation affects cybersecurity implementation in healthcare facilities. A qualitative multiple case study with in-person interviews was used to collect the data. The study population was employees at healthcare facilities. The study sample was five employees from each of two healthcare facilities in Southeast Michigan and Mid-Michigan areas. Participants expressed knowledge regarding the seriousness of the threats and implemented some safeguards, but they do not believe the threat likelihood is severe enough to motivate any additional action or interest. Most participants believed current preventative measures were effective, however since the threats were unlikely there was no motivation for additional preventative measures. The literature review indicated that most companies had experienced cyberthreats, creating a potential disconnect with these participants' perceptions.

APA, Harvard, Vancouver, ISO, and other styles
8

Haugtvedt, Candace Louise. "Enhancing adherence to antibiotic regimens : a test of protection motivation theory and persuasive communications /." The Ohio State University, 1998. http://rave.ohiolink.edu/etdc/view?acc_num=osu1487950153601017.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Birkholz, Sharon Alice. "The prospect of flooding and the motivation to prepare in contrasting urban communities : a qualitative exploration of Protection Motivation Theory." Thesis, Cranfield University, 2014. http://dspace.lib.cranfield.ac.uk/handle/1826/9329.

Full text
Abstract:
The number of flood related disasters is predicted to increase with the changing climate. How cities mitigate and prepare for the potential flooding influences the scope and extent of damage, and diminishes the risk of an event turning into a disaster. Preparation or preparedness is, therefore, seen as an important component to flood resilience in cities. This research qualitatively explored the social phenomenon of why some prepare and others do not through the application of Protection Motivation Theory (PMT) in two flood-vulnerable areas of the cities of Hamburg and Dhaka: Wilhelmsburg and Badda (respectively). This exploration utilised semi-structured interviews to collect information on local communities’ flood risk perceptions and flood preparedness. The findings showed that the motivation that the informants had was highly influenced by the amount of prior experience they had had with floods. Where this was high, informants demonstrated a protection motivation that was culturally innate. Theoretical findings provided in depth detail of the components of PMT, and its applicability within flood risk contexts. Although, still further exploration of PMT as an assessment tool of preparedness behaviour in urban-flood-vulnerable communities is recommended, this study has found that it does explain the differences in flood preparedness behaviours in urban communities. In addition its links with both the social system and individual cognitive processes provides insight into the different factors and reasons that influence the preparedness behaviour of urban communities.
APA, Harvard, Vancouver, ISO, and other styles
10

Karmakar, Monita. "Predicting Adherence to Aromatase Inhibitor Therapy in Patients with Breast Cancer Using Protection Motivation Theory." University of Toledo Health Science Campus / OhioLINK, 2013. http://rave.ohiolink.edu/etdc/view?acc_num=mco1365094849.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "Protection motivation theory"

1

Sorace, Domenico, ed. Discipline processuali differenziate nei diritti amministrativi europei. Florence: Firenze University Press, 2010. http://dx.doi.org/10.36253/978-88-8453-586-3.

Full text
Abstract:
Discipline processuali differenziate nei diritti amministrativi europei. Anyone in Europe who considers that they have suffered an abuse of power on the part of a public body can apply to a judge for justice. But this role is not restricted to a single judge. Not only is there a plurality of judges corresponding to the plurality of States in which they exercise their functions, but also (in the majority of cases) within each State there is more than one type of judge appointed to impose respect of the law even on public bodies, just as the procedures and manner in which the judicial action may materialise are also different. The protection of the citizens is differentiated, and this can be explained by the varying requirements or the different motivations which cannot always justify the deriving complications. The book explores this phenomenon, considering some of the principal European State systems, as well as the system of the European Union itself.
APA, Harvard, Vancouver, ISO, and other styles
2

Délano Alonso, Alexandra. Consular Protection and Solidarity across Borders. Oxford University Press, 2018. http://dx.doi.org/10.1093/oso/9780190688578.003.0004.

Full text
Abstract:
This chapter demonstrates how Latin American governments with large populations of migrants with precarious legal status in the United States are working together to promote policies focusing on their well-being and integration. It identifies the context in which these processes of policy diffusion and collaboration have taken place as well as their limitations. Notwithstanding the differences in capacities and motivations based on the domestic political and economic contexts, there is a convergence of practices and policies of diaspora engagement among Latin American countries driven by the common challenges faced by their migrant populations in the United States and by the Latino population more generally. These policies, framed as an issue of rights protection and the promotion of migrants’ well-being, are presented as a form of regional solidarity and unity, and are also mobilized by the Mexican government as a political instrument serving its foreign policy goals.
APA, Harvard, Vancouver, ISO, and other styles
3

Watson, John Scott. Sea of Suburbia. University of Illinois Press, 2017. http://dx.doi.org/10.5406/illinois/9780252039867.003.0003.

Full text
Abstract:
This chapter examines the Prairie Crossing development's primary land conservation practices: wetland and prairie restoration, open-space preservation, and plant and animal biodiversity. It first considers two contrasting models of environmental protection in the United States: land advocacy and land trusts. It then discusses two primary conservation goals sought by George and Vicky Ranney in developing the Prairie Crossing property: “environmental protection and enhancement” and to “change the culture”—to demonstrate not only that urban development can be compatible and complementary with the environment, but that whole communities would come to view themselves as part of the natural environment, with roles and responsibilities to act responsibly as stewards of the world in which they live. The chapter also describes water quality as a motivation for the Prairie Crossing project, along with the area's biodiversity and biotic corridors.
APA, Harvard, Vancouver, ISO, and other styles
4

de Bruyn, Theodore. Scribal Features of Scriptural Amulets. Oxford University Press, 2017. http://dx.doi.org/10.1093/oso/9780199687886.003.0006.

Full text
Abstract:
This chapter compares, in groups, the formulation and writing of amulets that draw on Christian scriptures: titles and opening words from the gospels and LXX Psalm 90; a short text from a gospel; Jesus’ correspondence with Abgar; the Lord’s Prayer; LXX Psalm 90; other psalms and biblical passages. Differences in formulation suggest that some of these amulets issued from different types of motivation: whereas opening words or similar short scriptural passages often end in mid-sentence, verses from the Lord’s Prayer or a psalm are typically recited in full. The latter would have been known from their use in communal worship and private prayer. Amulets citing the Lord’s Prayer or LXX Psalm 90 display a fairly wide range of hands, a reflection of how accessible these protective texts were. They are the products of an oral-scribal culture.
APA, Harvard, Vancouver, ISO, and other styles
5

Lee, David Johnson. The Ends of Modernization. Cornell University Press, 2021. http://dx.doi.org/10.7591/cornell/9781501756214.001.0001.

Full text
Abstract:
This book studies the relations between Nicaragua and the United States in the crucial years during and after the Cold War. The book charts the transformation of the ideals of modernization, national autonomy, and planned development as they gave way to human rights protection, neoliberalism, and sustainability. The book demonstrates how conflict between the United States and Nicaragua shaped larger international development policy and transformed the Cold War. In Nicaragua, the backlash to modernization took the form of the Sandinista Revolution which ousted President Anastasio Somoza Debayle in July 1979. In the wake of the earlier reconstruction of Managua after the devastating 1972 earthquake and instigated by the revolutionary shift of power in the city, the Sandinista Revolution incited radical changes that challenged the frankly ideological and economic motivations of modernization. In response to threats to its ideological dominance regionally and globally, the United States began to promote new paradigms of development built around human rights, entrepreneurial internationalism, indigenous rights, and sustainable development. The book traces the ways Nicaraguans made their country central to the contest over development ideals beginning in the 1960s, transforming how political and economic development were imagined worldwide. By illustrating how ideas about ecology and sustainable development became linked to geopolitical conflict during and after the Cold War, the book provides a history of the late Cold War that connects the contest between the two then-prevailing superpowers to trends that shape our present, globalized, multipolar world.
APA, Harvard, Vancouver, ISO, and other styles
6

McClain, Linda C. Who's the Bigot? Oxford University Press, 2020. http://dx.doi.org/10.1093/oso/9780190877200.001.0001.

Full text
Abstract:
Charges, denials, and countercharges of bigotry are increasingly frequent in the United States. Bigotry is a fraught and contested term, evident from the rejoinder that calling out bigotry is political correctness. That is so even though renouncing—and denouncing—bigotry seems to be a shared political value with a long history. Identifying, responding to, and preventing bigotry have engaged the efforts of many people. People disagree, however, over who is a bigot and what makes a belief, attitude, or action bigoted. This book argues that bigotry has both a backward- and forward-looking dimension. We learn bigotry’s meaning by looking to the past, but bigotry also has an important forward-looking dimension. Past examples of bigotry on which there is consensus become the basis for prospective judgments about analogous forms of bigotry. The rhetoric of bigotry—how people use such words as “bigot,” “bigoted,” and “bigotry”—poses puzzles that urgently demand attention. Those include whether bigotry concerns the motivation for or the content of a belief or action; whether reasonableness is a defense to charges of bigotry; whether the bigot is a distinct type, or whether we are all a bit bigoted; and whether “bigotry” is the term society gives to beliefs that now are beyond the pale. This book addresses those puzzles by examining prior controversies over interfaith and interracial marriage and the recent controversy over same-sex marriage, as well as controversies over landmark civil rights law and more recent conflicts between religious liberty and state anti-discrimination laws protecting LGBTQ persons.
APA, Harvard, Vancouver, ISO, and other styles
7

Stefańska, Magdalena, ed. Sustainability and sustainable development. Wydawnictwo Uniwersytetu Ekonomicznego w Poznaniu, 2021. http://dx.doi.org/10.18559/978-83-8211-074-6.

Full text
Abstract:
The aim of this book is to present the most important issues related to sustainable development (SD) and corporate social responsibility (CSR). They are discussed from a macro and micro perspective, both in the form of theoretical foundations of these concepts and practical examples of companies operating in Central and Eastern European countries that have implemented these ideas in their daily operations and translated them into corporate and functional strategies. The book consists of four parts. The first one is theoretical in its assumptions and is devoted to explaining the key concepts of sustainable development (SD) and corporate social responsibility (CSR). The authors describe the determinants of sustainable development in the contemporary world, including the most important ones, such as globalization, climate change, poverty, unlimited consumption, as well as limited access to natural resources - all in relation to the goals of sustainable development. The chapter also discusses the concept of corporate social responsibility (CSR), which is now recognized as the process by which business contributes to the implementation of sustainable development. How sustainable development (SD) and corporate social responsibility (CSR) are incorporated into the organization's strategies and influence the corporate strategy on the corporate and functional areas of the organization is presented in the last chapter of the first part of the e-book. The next part of the e-book helps readers understand the concepts of SD and CSR in the field of organizational strategy - in strategic management, and at the level of functional strategies—marketing, human resources, marketing research, accounting and operational management. The authors explain the reasons why companies need to consider the local and global perspective when setting SDGs, and the existence of potential conflicts within them. Taking into account the area of ​​marketing, the authors point to the increase in environmental and social awareness of all stakeholders, which translates into changes in the criteria for decision-making by managers and risk assessment. The issue of sustainability is also the subject of market research. Companies producing products and services, institutions dealing with environmental or consumer protection, scientists and students conduct many research projects related to, inter alia, much more. How to use secondary data for analysis and how to prepare, conduct, analyze and interpret the results of primary research in that area are discussed in detail in the next chapter of this section. The concept of SD also refers to the basic functions of human resource management (HRM)—recruitment, motivation, evaluation and control. They should take into account SD not only for the efficiency of the organization and long-term economic benefits, but also for ethical reasons. Thanks to the SHRM, the awareness and behavior of the entire organization can strongly express sustainable goals in the planning and implementation of the overall corporate strategy. The growing importance of the idea of ​​SD and the concept of CSR also resulted in the need for accounting and finance to develop solutions enabling the provision of information on the methods and results of implementing these concepts in entities operating on the market. This part of the book also examines manufacturing activities in the context of sustainability. As a result, many problems arise: waste of resources, mismanagement, excessive energy consumption, environmental pollution, use of human potential, etc. The chapter presents such concepts as: zero-waste, lean-manufacturing, six-sigma, circular production, design and recycling products in the life cycle as well as ecological and environmentally friendly production. The next two parts of the e-book contain examples of companies from Central and Eastern Europe that used SD goals in their strategies, questions and tasks for readers.
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Protection motivation theory"

1

Ophoff, Jacques, and Mcguigan Lakay. "Mitigating the Ransomware Threat: A Protection Motivation Theory Approach." In Communications in Computer and Information Science, 163–75. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-11407-7_12.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Ganesh, Anirudh, Chinenye Ndulue, and Rita Orji. "Smartphone Security and Privacy – A Gamified Persuasive Approach with Protection Motivation Theory." In Persuasive Technology, 89–100. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-98438-0_7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Yoshikai, Noriaki, Kana Shimbo, John Stavrakakis, and Toshio Takahashi. "Study on Persuasion Effect of Computer Virus Measures Based on Collective Protection Motivation Theory." In Advances in Network-Based Information Systems, 518–28. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-65521-5_45.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Shimbo, Kana, Shun-ichi Kurino, and Noriaki Yoshikai. "Verification of Persuasion Effect to Cope with Virus Infection Based on Collective Protection Motivation Theory." In Advances in Network-Based Information Systems, 763–71. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-98530-5_67.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Nguyen, An Thinh, Ha Thi Thu Pham, Quoc Anh Trinh, Thuy Linh Do, Phuong Anh Dang, and Luc Hens. "The Geography of Climate Change Adaptation in the Vietnam Northern Mountains: A Quantitative Analysis for Intentions of Indigenous Ethnic Minorities Using Structural Equation Modeling (SEM) and Protection Motivation Theory (PMT)." In Earth and Environmental Sciences Library, 275–91. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-76116-5_17.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Brzostek, Agnieszka. "The Authorities Competent for Cybersecurity." In Cybersecurity in Poland, 209–21. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-78551-2_14.

Full text
Abstract:
AbstractAuthorities competent for cybersecurity matters are indicated in Article 41 of the NCSA. The legislator created a catalogue of organs, at the same time specifying the scope of their properties. The legislator, while creating the catalogue of competent authorities, indicated among them ministers managing government administration departments. The Polish Financial Supervision Authority is an exception.Various legal doubts arise in analysing the legal status of authorities and the scope of their tasks. First of all, the authorities competent for cybersecurity were explicitly indicated as an element of the National Cybersecurity System, but their exact indication as public entities was missing.Secondly, attention should be paid to the overlapping of competences of authorities competent for cybersecurity with the competent authorities in the field of crisis management.The specified catalogue of the scope of tasks of the organs was limited to listing their individual tasks. In the implementation of tasks, public administration bodies use their imperious forms of activity.It is also worth noting that the competent authorities consult and cooperate with relevant national law enforcement and national data protection authorities. The presence of various legal problems and issues was the motivation behind this article.
APA, Harvard, Vancouver, ISO, and other styles
7

Spencer, Ruth Viola. "Improvement of Human and Environmental Health Through Waste Management in Antigua and Barbuda." In Fostering Transformative Change for Sustainability in the Context of Socio-Ecological Production Landscapes and Seascapes (SEPLS), 215–28. Singapore: Springer Singapore, 2021. http://dx.doi.org/10.1007/978-981-33-6761-6_12.

Full text
Abstract:
AbstractAntigua and Barbuda is currently experiencing an expansion in integrated waste management driven by local community groups. These events are catalytic and transformational, fit well into SEPLS methodologies, and contribute to many of the biodiversity targets and Sustainable Development Goals (SDGs). With waste being a direct driver of and major challenge for biodiversity, climate change and land degradation, many positive multi-dimensional impacts are being seen, realised and manifested that contribute positively to reducing land-based sources of pollution through community stewardship. Such local actions positively impact the sustainable management of natural resources and the protection of habitats. Likewise, they support land degradation neutrality, protection and safeguarding of the ecosystems that provide our soil, air and water resources, sustain livelihoods, and facilitate transfer of knowledge to children and youth.This attempt to pilot a circular economy approach is providing vocational and life skills training, as well as income generation for the local community, including new forms of capacity building and development, while reducing soil, water and air pollution. Public-private partnerships built through this project are motivating other groups to follow a similar path to biodiversity transformation. Changes in attitudes and behaviours, and the building of knowledge and capacities in the next generation, is taking place through school and community outreach programmes.The project has led to community empowerment in understanding that everyone has a role to play in sustainable development and that through collective actions, changes to improve public health can be made.
APA, Harvard, Vancouver, ISO, and other styles
8

Reinhardt, Ilka, Felix Knauer, Micha Herdtfelder, Gesa Kluth, and Petra Kaczensky. "Wie lassen sich Nutztierübergriffe durch Wölfe nachhaltig minimieren? – Eine Literaturübersicht mit Empfehlungen für Deutschland." In Evidenzbasiertes Wildtiermanagement, 231–56. Berlin, Heidelberg: Springer Berlin Heidelberg, 2023. http://dx.doi.org/10.1007/978-3-662-65745-4_9.

Full text
Abstract:
ZusammenfassungMit dem anwachsenden Wolfsbestand nehmen auch die Übergriffe auf Nutztiere in Deutschland von Jahr zu Jahr zu. In einem Punkt sind sich Landwirtschaft, Naturschutz und Politik einig: Wolfsübergriffe auf Nutztiere sollen nachhaltig minimiert werden. Darüber, wie dieses Ziel am besten erreicht werden kann, gibt es jedoch unterschiedliche Ansichten. In der öffentlichen Debatte werden Forderungen nach einem vereinfachten Abschuss von Wölfen oder einer generellen Bejagung immer lauter. Dabei wird davon ausgegangen, dass durch solche Maßnahmen Nutztierschäden durch Wölfe nachhaltig minimiert werden könnten.Bevor Maßnahmen des Wildtiermanagements angewandt werden, braucht es klare Zielvorgaben. Die erste Frage muss daher lauten: Was ist das primäre Ziel der Managementmaßnahme? Auf Basis wissenschaftlicher Evidenz muss dann vorab evaluiert werden, ob die in Frage kommenden Maßnahmen geeignet sind, das Ziel zu erreichen. Dies ist zwingend, wenn die Maßnahmen auch das Töten von empfindungsfähigen und noch dazu streng geschützten Tieren beinhalten. Um überprüfen zu können, wie wirksam die gewählten Managementmaßnahmen im konkreten Einsatz sind, werden Kriterien zur Bewertung des Erfolgs benötigt.In diesem Kapitel gehen wir der Frage nach, welche Managementmaßnahmen nach aktuellem Wissensstand geeignet sind, das Ziel, Wolfsübergriffe auf Nutztiere nachhaltig zu minimieren, zu erreichen. Wir erläutern zunächst, warum Wölfe Nutztiere töten und ob es einen Zusammenhang zwischen der Anzahl der Wölfe und der Höhe der Nutztierschäden gibt. Dafür untersuchen wir unter anderem die Daten von Wolfsübergriffen auf Nutztiere in Deutschland. Anhand einer umfangreichen Literaturübersicht analysieren wir, ob die folgenden Managementmaßnahmen geeignet sind, Wolfsübergriffe auf Nutztiere nachhaltig zu minimieren: 1) eine generelle Bejagung von Wölfen, 2) die selektive Entnahme von einzelnen schadensverursachenden Wölfen und 3) nicht-letale Herdenschutzmethoden. Abschließend legen wir Empfehlungen zu einem evidenzbasierten und lösungsorientierten Wolfsmanagement in Bezug auf den Wolf-Nutztierkonflikt vor.In Deutschland steigen mit der Zunahme der Wolfsterritorien auch die Übergriffe auf Schafe und Ziegen. Allerdings unterscheidet sich die Stärke des Anstiegs zwischen den Bundesländern erheblich. Einzelne Bundesländer erreichen bei der gleichen Anzahl an Wolfsterritorien sehr unterschiedliche Schadensniveaus. Dies deutet darauf hin, dass das Ausmaß der Schäden nicht allein durch die Anzahl der Wölfe bestimmt wird. Wir vermuten, dass die Unterschiede im Schadensniveau vor allem in der unterschiedlichen Umsetzung von Herdenschutzmaßnahmen in den einzelnen Bundesländern begründet sind.Die Ergebnisse der Literaturrecherche bezüglich der Wirksamkeit von letalen und nicht-letalen Managementmaßnahmen zum Schutz von Nutztieren zeigen klar: Eine generelle Bejagung von Wölfen führt nicht zu einer Reduktion von Nutztierschäden. Es gibt keine wissenschaftlichen Belege dafür, dass durch eine Bejagung die Schäden deutlich und nachhaltig verringert werden, es sein denn, der Bestand wird drastisch reduziert oder ganz ausgelöscht. Das ist in Deutschland und in der Europäischen Union bei aktueller Rechtslage nicht möglich. Im Gegensatz zu einer undifferenzierten Bejagung des Wolfs kann der gezielte Abschuss von Einzeltieren wirksam sein, wenn es sich tatsächlich um Individuen handelt, die gelernt haben, empfohlene funktionstüchtige Schutzmaßnahmen zu überwinden. Allerdings sind solche Fälle selten, und es ist schwierig in der freien Natur, ein bestimmtes Individuum sicher zu identifizieren und zu töten. Nicht-letale Herdenschutzmaßnahmen sind im Vergleich zu letalen Maßnahmen deutlich besser geeignet, eine nachhaltige Reduktion der Schäden zu erreichen. Der einzige Weg, um in Koexistenz mit Wölfen eine dauerhafte Reduktion von Schäden an Nutztieren zu erreichen, ist die fachgerechte Umsetzung von Herdenschutzmaßnahmen in breiter Fläche. Übergriffe auf Nutztiere lassen sich zwar auch dadurch nicht vollständig verhindern, sie können jedoch durch korrekt angewandte Herdenschutzmaßnahmen deutlich reduziert werden.Das Wissen, wie Schäden an Weidetieren durch Herdenschutzmaßnahmen verringert werden können, ist auch in Deutschland vorhanden. Viele Tierhaltende haben hier inzwischen ein hohes Maß an Fachkompetenz entwickelt. Die Erfahrung aus den vergangenen 20 Jahren zeigt allerdings auch, dass die Auszahlung von Fördergeldern für Herdenschutzmittel allein nicht ausreicht, um die Anzahl der Übergriffe deutlich zu senken. Es muss auch gewährleistet werden, dass die fachliche Expertise für die korrekte Anwendung und Wartung zur Verfügung steht. Vor allem in Gebieten mit Prädations-Hotspots sollte aktiv auf die Tierhaltenden zugegangen werden und sollten die Gründe für die vermehrten Übergriffe analysiert und abgestellt werden.Bisher fehlen aus Deutschland Daten zur Funktionstüchtigkeit der geförderten und im Einsatz befindlichen Schutzmaßnahmen. Solche Daten sind notwendig, um zu verstehen, warum trotz steigender Präventionsausgaben die Nutztierschäden teilweise auch in Gebieten mit jahrelanger Wolfspräsenz nicht zurückgehen. Sie sind zudem die Grundlage für wissenschaftliche Studien zu möglichen Unterschieden in der Wirksamkeit verschiedener Herdenschutzmethoden. Daten zur Funktionstüchtigkeit von geförderten Herdenschutzmaßnahmen sollten zumindest stichprobenartig gesammelt werden, unabhängig davon, ob es in dem jeweiligen Gebiet Wolfsübergriffe gibt. Neben der Untersuchung der rein technischen Aspekte des Herdenschutzes ist es ebenso wichtig herauszufinden, wie die Akzeptanz gegenüber Herdenschutzmaßnahmen bei den Tierhaltenden verbessert und deren Eigenmotivation erhöht werden kann. Hierfür sind Daten zur Umsetzbarkeit und Akzeptanz der eingesetzten Herdenschutzmaßnahmen erforderlich. Nutztierhaltende sollten schon in die Konzeption entsprechender Studien mit eingebunden werden, um sicherzustellen, dass die Fragen untersucht werden, deren Beantwortung für sie am dringendsten ist.Der Weg von einem emotionsbasierten zu einem evidenzbasierten Wolfsmanagement führt über wissenschaftlich robuste Daten und Analysen. Entsprechende Untersuchungen sind nur in enger Zusammenarbeit zwischen Weidetierhaltung und Wissenschaft möglich. Basierend auf der Fachkompetenz und den praktischen Erfahrungen der Weidetierhaltenden kann die Wissenschaft helfen, die Herdenschutzmaßnahmen zu identifizieren und weiterzuentwickeln, die Nutztierübergriffe am effektivsten reduzieren.SummaryAs the wolf population grows, the number of attacks on livestock in Germany also increases from year to year. Agriculture, nature conservation and politics agree on one point: that wolf attacks on livestock should be reduced sustainably. However, there are differing views on how this goal can best be achieved. In the public debate, calls for simplified shooting of wolves or general hunting are becoming louder and louder. The assumption is that such measures could sustainably reduce livestock damage caused by wolves.Before wildlife management measures are applied, clear objectives are needed. The first question, therefore, must be: What is the primary objective of the management measure? Based on scientific evidence, it must be evaluated in advance whether the measures under consideration are suitable for achieving the objective. This is mandatory if the measures include the killing of sentient animals, particularly if they are strictly protected. Criteria for evaluating if the objective was reached are needed in order to be able to verify how effective the selected management measures are when applied.In this chapter, we address the question of which management measures are suitable, based on current knowledge, to achieve the goal of sustainably reducing wolf attacks on livestock. We first explain why wolves kill livestock and whether there is a relationship between the number of wolves and the amount of livestock damage. To do this, we examine, among other things, data on wolf attacks on livestock in Germany. Based on an extensive literature review, we analyse whether the following management measures are suitable to sustainably reduce wolf attacks on livestock: 1) a general hunting of wolves, 2) the selective removal of individual wolves causing damage, and 3) non-lethal livestock protection methods. Finally, we present recommendations for evidence-based and solution-oriented wolf management with respect to wolf-livestock conflict.In Germany, as wolf territories increase, attacks on sheep and goats also increase. However, the magnitude of the increase differs considerably among the federal states. Individual federal states achieve very different levels of damage with the same number of wolf territories. This suggests that the extent of damage is not solely determined by the number of wolves. We suspect that the differences in damage levels are mainly due to the different implementation of livestock protection measures in the individual federal states.The results of the literature review regarding the effectiveness of lethal and non-lethal management measures to protect livestock clearly show that general hunting of wolves does not reduce livestock damage. There is no scientific evidence that hunting significantly and sustainably reduces damage, unless the wolf population is drastically reduced or completely eradicated. This is not possible in Germany and in the European Union under the current legal situation. In contrast to an undifferentiated hunting of the wolf, the targeted shooting of individual animals can be effective if they are actually individuals that have learned to overcome recommended functional livestock protection measures. However, such cases are rare and it is difficult in the field to safely identify and kill a specific individual. Non-lethal livestock protection measures are much better at achieving sustained reductions in damage compared to lethal measures. The only way to achieve a lasting reduction of damage to livestock in coexistence with wolves is the professional implementation of livestock protection measures on a broad scale. Non-lethal livestock protection measures do not completely prevent attacks on livestock. However, if correctly applied they can significantly reduce wolf caused damages on livestock.The knowledge of how to reduce livestock depredation by wolves through herd protection measures is also available in Germany. Many livestock farmers have developed a high level of expertise in this field. However, experience from the past 20 years also shows that the funding of livestock protection measures alone is not enough to significantly reduce the number of wolf attacks. It is also necessary to ensure that technical expertise is available for proper application and maintenance of the measures. Especially in areas with predation hotspots, livestock owners should be actively approached and the reasons for increased attacks analysed and remedied.To date, there is a lack of data from Germany on the functionality of funded and applied protection measures. Such data are necessary to understand why, despite increasing prevention expenditures, livestock damage has not decreased in some cases, even in areas where wolves have been present for years. Moreover, such data are the basis for scientific studies on possible differences in the effectiveness of different livestock protection methods. Data on the functionality of funded protection measures should be collected at least on a random basis, regardless of whether there are wolf attacks in the respective area. In addition to investigating the purely technical aspects of herd protection, it is equally important to find out how the acceptance towards livestock protection measures can be improved among livestock owners and how their self-motivation can be increased. This requires data on the feasibility and acceptance of the applied protection measures. Livestock keepers should be involved already in the conception of appropriate studies to ensure that the investigations will answer the most urgent questions for them.The path from emotion-based to evidence-based wolf management is through scientifically robust data and analysis. Appropriate research is only possible through close collaboration between livestock owners and science. Based on the expertise and practical experience of farmers, science can help identify and improve the livestock protection measures that most effectively reduce wolf attacks on livestock.
APA, Harvard, Vancouver, ISO, and other styles
9

Orbell, Sheina, Hina Zahid, and Caroline J. Henderson. "Changing Behavior Using the Health Belief Model and Protection Motivation Theory." In The Handbook of Behavior Change, 46–59. Cambridge University Press, 2020. http://dx.doi.org/10.1017/9781108677318.004.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Paravastu, Narasimha, Claire A. Simmers, and Murugan Anandarajan. "Non-Compliant Mobile Device Usage and Information Systems Security: A Bystander Theory Perspective." In Research Anthology on Artificial Intelligence Applications in Security, 1689–714. IGI Global, 2021. http://dx.doi.org/10.4018/978-1-7998-7705-9.ch074.

Full text
Abstract:
This study tested the context of employees using their devices for both work and personal use, and non-compliant device usage of a person potentially resulting in Information Systems (IS) security threat to personal as well as work data and/or the devices. Integrating bystander and protection motivation theory (PMT) perspectives this paper studies bystanders' responses to IS security threats and the extent to which a perceived security threat motivates individual intention to act, in the context of non-compliant mobile device usage behaviors. It tests the role of an individual's threat perceptions to protect their own IS security, and as a bystander, protecting their peers or the IS security of their organization. Data collected from 431 individuals support the hypotheses that security awareness predicts perceived severity and protection motivation. Evaluation apprehension and diffusion of responsibility inhibit bystander's intentions to act against non-compliant mobile device usage behaviors, while awareness facilitates it. Theoretical contributions and practical implications of the research are discussed.
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Protection motivation theory"

1

Sun, Yongqiang, Nan Wang, and Xiao-Liang Shen. "Toward a Configurational Protection Motivation Theory." In Hawaii International Conference on System Sciences. Hawaii International Conference on System Sciences, 2020. http://dx.doi.org/10.24251/hicss.2020.440.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

"Application of Protection Motivation Theory to Adoption of Protective Technologies." In 2009 42nd Hawaii International Conference on System Sciences. IEEE, 2009. http://dx.doi.org/10.1109/hicss.2009.74.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Sutanto, Verrell, Felicia Margaret, Nicholas Octavianus Naftali, Gusnawati Gusnawati, Pratama Ramadhan Davia Putra, and Fransisca Iriani Roesmala Dewi. "Panic Buying Behavior during Pandemic: Protection Motivation Theory Paradigm." In 3rd Tarumanagara International Conference on the Applications of Social Sciences and Humanities (TICASH 2021). Paris, France: Atlantis Press, 2022. http://dx.doi.org/10.2991/assehr.k.220404.325.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Crossler, Robert E. "Protection Motivation Theory: Understanding Determinants to Backing Up Personal Data." In 2010 43rd Hawaii International Conference on System Sciences. IEEE, 2010. http://dx.doi.org/10.1109/hicss.2010.311.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Schneider, Marvin, and Shawon Rahman. "Identifying Protection Motivation Theory Factors that Influence Smartphone Security Measures." In 2021 IEEE International Conference on Big Data (Big Data). IEEE, 2021. http://dx.doi.org/10.1109/bigdata52589.2021.9671882.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Horng, Jeou-Shyan, Chih-Ching Chris Teng, Chang-Yen Tsai, Meng-Lei Monica Hu, and Lin Lin. "Promoting Tourism Energy Saving and Carbon Reduction Behavior through Protection Motivation Theory." In Annual International Conference on Tourism and Hospitality Research. Global Science & Technology Forum (GSTF), 2012. http://dx.doi.org/10.5176/2251-3426_thor1245.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Meier, Yannic, Johanna Schäwel, Elias Kyewski, and Nicole C. Krämer. "Applying Protection Motivation Theory to Predict Facebook Users’ Withdrawal and Disclosure Intentions." In SMSociety'20: International Conference on Social Media and Society. New York, NY, USA: ACM, 2020. http://dx.doi.org/10.1145/3400806.3400810.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Choi, Heeyoung, and Kang Ju Young. "Practical Approach of Security Enhancement Method based on the Protection Motivation Theory." In 2021 21st ACIS International Winter Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD-Winter). IEEE, 2021. http://dx.doi.org/10.1109/snpdwinter52325.2021.00028.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Farooq, Ali, Joshua Rumo A. Ndiege, and Jouni Isoaho. "Factors Affecting Security Behavior of Kenyan Students: An Integration of Protection Motivation Theory and Theory of Planned Behavior." In 2019 IEEE AFRICON. IEEE, 2019. http://dx.doi.org/10.1109/africon46755.2019.9133764.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Fu, Jingxuan. "Research on Information Security Behavior of Smart Agriculture Internet of Things Based on Protection Motivation Theory." In EBIMCS 2021: 2021 4th International Conference on E-Business, Information Management and Computer Science. New York, NY, USA: ACM, 2021. http://dx.doi.org/10.1145/3511716.3511724.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Protection motivation theory"

1

Pavlyuk, Ihor. MEDIACULTURE AS A NECESSARY FACTOR OF THE CONSERVATION, DEVELOPMENT AND TRANSFORMATION OF ETHNIC AND NATIONAL IDENTITY. Ivan Franko National University of Lviv, February 2021. http://dx.doi.org/10.30970/vjo.2021.49.11071.

Full text
Abstract:
The article deals with the mental-existential relationship between ethnoculture, national identity and media culture as a necessary factor for their preservation, transformation, on the example of national original algorithms, matrix models, taking into account global tendencies and Ukrainian archetypal-specific features in Ukraine. the media actively serve the domestic oligarchs in their information-virtual and real wars among themselves and the same expansive alien humanitarian acts by curtailing ethno-cultural programs-projects on national radio, on television, in the press, or offering the recipient instead of a pop pointer, without even communicating to the audience the information stipulated in the media laws − information support-protection-development of ethno-culture national product in the domestic and foreign/diaspora mass media, the support of ethnoculture by NGOs and the state institutions themselves. In the context of the study of the cultural national socio-humanitarian space, the article diagnoses and predicts the model of creating and preserving in it the dynamic equilibrium of the ethno-cultural space, in which the nation must remember the struggle for access to information and its primary sources both as an individual and the state as a whole, culture the transfer of information, which in the process of globalization is becoming a paramount commodity, an egregore, and in the post-traumatic, interrupted-compensatory cultural-information space close rehabilitation mechanisms for national identity to become a real factor in strengthening the state − and vice versa in the context of adequate laws («Law about press and other mass media», Law «About printed media (press) in Ukraine», Law «About Information», «Law about Languages», etc.) and their actual effect in creating motivational mechanisms for preserving/protecting the Ukrainian language, as one of the main identifiers of national identity, information support for its expansion as labels cultural and geostrategic areas.
APA, Harvard, Vancouver, ISO, and other styles
2

Just, David, and Amir Heiman. Building local brand for fresh fruits and vegetables: A strategic approach aimed at strengthening the local agricultural sector. United States Department of Agriculture, January 2016. http://dx.doi.org/10.32747/2016.7600039.bard.

Full text
Abstract:
Abstract The debate about whether to reduce import barriers on fresh produce in order to decrease the cost of living and increase welfare or to continue protecting the local agricultural sector by imposing import duties on fresh vegetables and fruits has been part of the Israeli and the US political dialog. The alternative of building a strong local brand that will direct patriotic feelings to support of the agricultural sector has been previously discussed in the literature as a non-tax barrier to global competition. The motivation of consumers to pay more for local fresh fruits and vegetables are better quality, environmental concerns, altruism, and ethnocentrism. Local patriotic feelings are expected to be stronger among national-religious consumers and weaker among secular left wing voters. This project empirically analyzes consumers’ attitude toward local agricultural production, perceptions of the contribution of the agricultural sector to society and how these perceptions interact with patriotic beliefs and socio-political variables perhaps producing an ethnocentric preference for fruits and vegetables. This patriotic feeling may be contrasted with feelings toward rival (or even politically opposing) countries competing in the same markets. Thus geo-political landscape may help shape the consumer’s preferences and willingness to purchase particular products. Our empirical analysis is based on two surveys, one conducted among Israeli shoppers and one conducted among US households. We find strong influences of nationalism, patriotism and ethnocentrism on demand for produce in both samples. In the case of Israel this manifests itself as a significant discount demanded for countries in conflict with Israel (e.g., Syria or Palestine), with the discount demanded being related to the strength of the conflict. Moreover, the effect is larger for those who are either more religious, or those who identify with right leaning political parties. The results from the US are strikingly similar. For some countries the perception of conflict is dependent on political views (e.g., Mexico), while for others there is a more agreement (e.g., Russia). Despite a substantially different religious and political landscape, both right leaning political views and religiosity play strong roles in demand for foreign produce.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography