To see the other types of publications on this topic, follow the link: Protection motivation theory.

Dissertations / Theses on the topic 'Protection motivation theory'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 47 dissertations / theses for your research on the topic 'Protection motivation theory.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.

1

McGinty, Heather L. "Predicting Fear of Recurrence and Protective Health Behaviors Using Protection Motivation Theory." Scholar Commons, 2010. http://scholarcommons.usf.edu/etd/3631.

Full text
Abstract:
Prior research suggests that fear of cancer recurrence is very common among cancer survivors. This study examined the extent to which Protection Motivation Theory variables of threat appraisal and coping appraisal accounted for differences in fear of recurrence and performance of health behaviors in cancer patients who recently completed treatment. It was hypothesized that greater fear of recurrence would be related to a combination of high threat appraisal and low coping appraisal. Also, it was hypothesized that higher rates of health behaviors would be related to higher threat appraisals for cancer recurrence and higher coping appraisals for reducing risk of recurrence by improving diet or exercising. A sample of 155 early-stage breast cancer patients (mean age = 59 years) who completed surgery, chemotherapy, and/or radiotherapy between 6-24 months previously (mean = 12 months) completed measures of fear of recurrence, threat appraisal (perceived risk and severity of a potential cancer recurrence), fruit and vegetable intake in the past month, exercise for the past week, and coping appraisal (perceived response efficacy and self-efficacy to perform diet and exercise recommendations to reduce recurrence risk). Basic demographic and clinical information was also collected. The study findings supported the hypothesis that the combination of threat and coping appraisal beliefs explain which breast cancer survivors report higher fear of recurrence. However, the observed results did not support the hypothesized interaction between threat and coping appraisal for predicting either diet or exercise habits. Instead, coping appraisal alone predicted both fruit and vegetable consumption and exercise habits. Future research should focus on examining these relationships longitudinally and further assess coping appraisal and how it impacts fear of recurrence.
APA, Harvard, Vancouver, ISO, and other styles
2

Clubb, Audrey C. "Protecting the Castle: Applying Protection Motivation Theory to Explain the Use of Home Guardianship." Digital Archive @ GSU, 2012. http://digitalarchive.gsu.edu/cj_theses/4.

Full text
Abstract:
Home guardianship measures provide individuals with a means to enhance and ensure the safety of themselves, their family, and their property inside their homes. However, research regarding the factors considered in the decision to employ home guardianship measures as well as the means by which individuals assess this information regarding potential threats and protective responses is limited and varied in its implementation. This study attempts to provide a theoretical framework for understanding the use of home guardianship measures with the application of a modified version of Ronald Rogers’ (1983) Protection Motivation Theory (PMT) model. This model assesses factors that directly contribute to the motivation to engage in protective measures as well as cognitive processes through which an individual assesses these factors. This study finds support both for the direct relationships between sources of information about potential threats or protective responses and the use of home guardianship measures, as well as support for mediating effects of these relationships. In conclusion, this study provides suggestions for future research to further examine the application of PMT to understand the use of guardianship measures.
APA, Harvard, Vancouver, ISO, and other styles
3

Crossler, Robert E. "Protection Motivation Theory: Understanding the Determinants of Individual Security Behavior." Diss., Virginia Tech, 2009. http://hdl.handle.net/10919/37511.

Full text
Abstract:
Individuals are considered the weakest link when it comes to securing a personal computer system. All the technological solutions can be in place, but if individuals do not make appropriate security protection decisions they introduce holes that technological solutions cannot protect. This study investigates what personal characteristics influence differences in individual security behaviors, defined as behaviors to protect against security threats, by adapting Protection Motivation Theory into an information security context. This study developed and validated an instrument to measure individual security behaviors. It then tested the differences in these behaviors using the security research model, which built from Protection Motivation Theory, and consisted of perceived security vulnerability, perceived security threat, security self-efficacy, response efficacy, and protection cost. Participants, representing a sample population of home computer users with ages ranging from 20 to 83, provided 279 valid responses to surveys. The behaviors studied include using anti-virus software, utilizing access controls, backing up data, changing passwords frequently, securing access to personal computers, running software updates, securing wireless networks, using care when storing credit card information, educating others in one's house about security behaviors, using caution when following links in emails, running spyware software, updating a computer's operating system, using firewalls, and using pop-up blocking software. Testing the security research model found different characteristics had different impacts depending on the behavior studied. Implications for information security researchers and practitioners are provided, along with ideas for future research.
Ph. D.
APA, Harvard, Vancouver, ISO, and other styles
4

Miller, Kathryn M. "A test of protection-motivation theory for promoting injury control." Thesis, This resource online, 1993. http://scholar.lib.vt.edu/theses/available/etd-07112009-040238/.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Mwagwabi, Florence Mwaka. "A protection motivation theory approach to improving compliance with password guidelines." Thesis, Mwagwabi, Florence Mwaka (2015) A protection motivation theory approach to improving compliance with password guidelines. PhD thesis, Murdoch University, 2015. https://researchrepository.murdoch.edu.au/id/eprint/27070/.

Full text
Abstract:
Usernames and passwords form the most widely used method of user authentication on the Internet. Yet, users still find compliance with password guidelines difficult. The primary objective of this research was to investigate how compliance with password guidelines and password quality can be improved. This study investigated how user perceptions of passwords and security threats affect compliance with password guidelines and explored if altering these perceptions would improve compliance. This research also examined if compliance with password guidelines can be sustained over time. This study focuses on personal security, particularly factors that influence compliance when using personal online accounts. The proposed research model is based on the Protection Motivation Theory (PMT) (Rogers, 1975, 1983), a model widely used in information systems security research. As studies have failed to consistently confirm the association between perceived vulnerability and information security practices, the model was extended to include exposure to hacking as a predictor of perceived vulnerability. Experimental research was used to test the model from two groups of Internet users, one of which received PMT based fear appeals in the form of a password security information and training exercise. To examine if password strength was improved by the fear appeals, passwords were collected. A password strength analysis tool was developed using Shannon’s (2001) formula for calculating entropy and coded in Visual Basic. Structural equation modeling was used to test the model. The proposed model explains compliance intentions moderately well, with 54% of the variance explained by the treatment model and 43% explained by the control group model. Overall, the results indicate that efficacy perceptions are a stronger predictor of compliance intentions than threat perceptions. This study identifies three variables that predict user intentions to comply with password guidelines as particularly important. These are perceived threat, perceived password effectiveness and password self-efficacy. The results show no association between perceived vulnerability to a security attack and a user’s decision to comply. The results also showed that those who are provided with password information and training are significantly more likely to comply, and create significantly stronger passwords. However, the fear appeals used in this study had no long-term effects on compliance intentions. The results on the long-term effects of password training on the participants’ ability to remember passwords were however promising. The group that received password training with a mnemonic training component was twice as likely to remember their passwords over time. The results of this research have practical implications for organizations. They highlight the need to raise the levels of concern for information systems security threats through training in order to improve compliance with security guidelines. Communicating to users what security responses are available is important; however, whether they implement them is dependent on how effective they feel the security responses are in preventing an attack. Regarding passwords, the single most important consideration by a user is whether they have the ability to create strong, memorable passwords. At the very least, users should be trained on how to create strong passwords, with emphasis on memorization strategies. This research found mnemonic password training to have some long-term effects on users’ ability to remember passwords, which is arguably one of the most vexing challenges associated with passwords. Future research should explore the extent to which the effects of PMT based information systems security communication can be maintained over time.
APA, Harvard, Vancouver, ISO, and other styles
6

Yoon, Eunju. "Food defense management plan implementation intention : an application of protection motivation theory." Diss., Manhattan, Kan. : Kansas State University, 2007. http://hdl.handle.net/2097/439.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Towbin, Ross Stuart. "A Protection Motivation Theory Approach to Healthcare Cybersecurity| A Multiple Case Study." Thesis, Northcentral University, 2019. http://pqdtopen.proquest.com/#viewpdf?dispub=13809084.

Full text
Abstract:

Cyberattacks have occurred for many decades, but some organizations are not implementing measures to reduce the risk of these threats. The healthcare industry has had more than 30 years' worth of cyberattacks, yet many healthcare organizations do not have adequate measures against these risks. The problem addressed by this study was that healthcare organizations are vulnerable to cyberattacks, yet leadership at few healthcare organizations actively implement adequate cybersecurity practices. The purpose of this qualitative multiple case study with in-person interviews was to identify how employee motivation affects cybersecurity implementation in healthcare facilities in Southeast Michigan and Mid-Michigan areas. The researcher used protection motivation theory to explore how employee motivation affects cybersecurity implementation in healthcare facilities. A qualitative multiple case study with in-person interviews was used to collect the data. The study population was employees at healthcare facilities. The study sample was five employees from each of two healthcare facilities in Southeast Michigan and Mid-Michigan areas. Participants expressed knowledge regarding the seriousness of the threats and implemented some safeguards, but they do not believe the threat likelihood is severe enough to motivate any additional action or interest. Most participants believed current preventative measures were effective, however since the threats were unlikely there was no motivation for additional preventative measures. The literature review indicated that most companies had experienced cyberthreats, creating a potential disconnect with these participants' perceptions.

APA, Harvard, Vancouver, ISO, and other styles
8

Haugtvedt, Candace Louise. "Enhancing adherence to antibiotic regimens : a test of protection motivation theory and persuasive communications /." The Ohio State University, 1998. http://rave.ohiolink.edu/etdc/view?acc_num=osu1487950153601017.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Birkholz, Sharon Alice. "The prospect of flooding and the motivation to prepare in contrasting urban communities : a qualitative exploration of Protection Motivation Theory." Thesis, Cranfield University, 2014. http://dspace.lib.cranfield.ac.uk/handle/1826/9329.

Full text
Abstract:
The number of flood related disasters is predicted to increase with the changing climate. How cities mitigate and prepare for the potential flooding influences the scope and extent of damage, and diminishes the risk of an event turning into a disaster. Preparation or preparedness is, therefore, seen as an important component to flood resilience in cities. This research qualitatively explored the social phenomenon of why some prepare and others do not through the application of Protection Motivation Theory (PMT) in two flood-vulnerable areas of the cities of Hamburg and Dhaka: Wilhelmsburg and Badda (respectively). This exploration utilised semi-structured interviews to collect information on local communities’ flood risk perceptions and flood preparedness. The findings showed that the motivation that the informants had was highly influenced by the amount of prior experience they had had with floods. Where this was high, informants demonstrated a protection motivation that was culturally innate. Theoretical findings provided in depth detail of the components of PMT, and its applicability within flood risk contexts. Although, still further exploration of PMT as an assessment tool of preparedness behaviour in urban-flood-vulnerable communities is recommended, this study has found that it does explain the differences in flood preparedness behaviours in urban communities. In addition its links with both the social system and individual cognitive processes provides insight into the different factors and reasons that influence the preparedness behaviour of urban communities.
APA, Harvard, Vancouver, ISO, and other styles
10

Karmakar, Monita. "Predicting Adherence to Aromatase Inhibitor Therapy in Patients with Breast Cancer Using Protection Motivation Theory." University of Toledo Health Science Campus / OhioLINK, 2013. http://rave.ohiolink.edu/etdc/view?acc_num=mco1365094849.

Full text
APA, Harvard, Vancouver, ISO, and other styles
11

Giwah, Anthony Duke. "Empirical Assessment of Mobile Device Users’ Information Security Behavior towards Data Breach: Leveraging Protection Motivation Theory." Diss., NSUWorks, 2019. https://nsuworks.nova.edu/gscis_etd/1073.

Full text
Abstract:
User information security behavior has been an area of growing demand in information systems (IS) research. Unfortunately, most of the previous research done in user information security behavior have been in broad contexts, therefore creating a gap in the literature of similar research that focuses on specific emerging technologies and trends. With the growing reliance on mobile devices to increase the flexibility, speed and efficiency in how we work, communicate, shop, seek information and entertain ourselves, it is obvious that these devices have become data warehouses and platform for data in transit. This study was an empirical and quantitative study that gathered data leveraging a web-survey. Prior to conducting the survey for the main data collection, a Delphi study and pilot study were conducted. Convenience sampling was the category of nonprobability sampling design used to gather data. The 7-Point Likert Scale was used on all survey items. Pre-analysis data screening was conducted prior to data analysis. The Partial Least Square Structural Equation Modeling (PLS-SEM) was used to analyze the data gathered from a total of 390 responses received. The results of this study showed that perceived threat severity has a negative effect on protection motivation, while perceived threat susceptibility has a positive effect on protection motivation. Contrarily, the results from this study did not show that perceived response cost influences protection motivation. Response efficacy and mobile self-efficacy had a significant positive influence on protection motivation. Mobile device security usage showed to be significantly influenced positively by protection motivation. This study brings additional insight and theoretical implications to the existing literature. The findings reveal the PMT’s capacity to predict user behavior based on threat and coping appraisals within the context of mobile device security usage. Additionally, the extension of the PMT for the research model of this study implies that mobile devices users also can take recommended responses to protect their devices from security threats.
APA, Harvard, Vancouver, ISO, and other styles
12

Bennich-Björkman, Oscar, and Anton Nyström. "The Backup-Plan : En kvantitativ studie om säkerhetskopiering bland studenter på Uppsala universitet." Thesis, Uppsala universitet, Institutionen för informatik och media, 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-297582.

Full text
Abstract:
Få personer säkerhetskopierar tillräckligt ofta, trots att de riskerar att förlora viktiga filer. Vad beror det på? Denna uppsats har genom en kvantitativ undersökning försökt klarlägga vilka faktorer som har störst påverkan på detta beteende och om det finns ett samband mellan dessa. Datainsamlingen skedde genom en enkätundersökning, med över 300 svar från olika studenter på Uppsala universitet. Resultaten analyseras med hjälp av det teoretiska ramverket “Protection Motivation Theory” (PMT) och jämförs sedan med liknande forskning. Resultaten visar att lättja och glömska är de två faktorer som respondenterna själva anser har störst påverkan. Utöver detta har även det studieprogram vilket studenten går på betydelse. Resultaten visar också att hur studenterna bedömer sannolikheten för dataförlust och graden av de problem som kan uppstå vid en dataförlust båda har ett positivt samband med hur ofta säkerhetskopiering utförs. Av dessa har uppskattat problem störst påverkan. Detta resultat skiljer sig från vad delar av tidigare forskningen har visat, men ligger i linje med vad PMT säger om detta beteende.
Few people backup their files frequently enough, even though they risk losing important files. Why is this? This paper has through a quantitative survey attempted to elucidate which factors have the biggest impact on this behavior and if there is a correlation between these. The data was collected using a questionnaire which got over 300 answers from students at Uppsala University. The results were analyzed using the theoretical framework “Protection Motivation Theory” (PMT) and was then compared to similar research. The results show that laziness and forgetfulness are the two biggest factors that the respondents themselves say have the biggest impact on their behavior. In addition to this the kind of program the student is attending also has an effect. The results show that the assessed probability of losing data and the severity of the problem of losing data have a positive correlation with how often backup is done, where assessed problem has the biggest impact. These results differ from what some of the earlier research has shown, but is in line with what PMT says about this behavior.
APA, Harvard, Vancouver, ISO, and other styles
13

Slider, Cara L. "Encouraging testicular self-examination behaviors in college males examining the role of fear appeals in protection motivation theory /." Morgantown, W. Va. : [West Virginia University Libraries], 2009. http://hdl.handle.net/10450/10148.

Full text
Abstract:
Thesis (M.S.)--West Virginia University, 2009.
Title from document title page. Document formatted into pages; contains iii, 76 p. : ill. Includes abstract. Includes bibliographical references (p. 40-43).
APA, Harvard, Vancouver, ISO, and other styles
14

Thongsukmag, Juthamas. "Fear in the Workplace: The Relationships among Sex, Self-efficacy, and Coping Strategies." Diss., Virginia Tech, 2003. http://hdl.handle.net/10919/28454.

Full text
Abstract:
This study adopts the components of protection motivation theory to examine the differences between coping strategies used by males and females when dealing with four unique work-related fearful situations: fear of separation, fear of punishment, fear of embarrassment and fear of harm. Specifically, the components that are referenced include coping appraisal (self-efficacy) and threat appraisal (severity and vulnerability). Four different vignettes and a series of questions related to each of the fearful situations were presented to individuals willing to participate in the study. A total of 235 working professional graduate students and a group of full time professionals representing industries such as telecommunications, health care, and retail contributed to the study. While the first group (graduate students) was presented with the traditional paper-pencil questionnaire, the latter group was solicited to participate in the study via a sophisticated web-based instrument. Once the responses were received, the Chi-square, t-test, and a series of ANOVA tests with post hoc testing were computed to investigate where there were differences across all the dependent measures, which includes severity of threat, vulnerability to threats, and self efficacy. Sex was mainly applied as an independent variable in most analyses. The findings suggest that among the three coping strategies, problem solving is the most dominant strategy used by males and females across all situations as a group. However, females prefer seeking support as a coping strategy more than males do regardless of type of fears. In contrast, males prefer avoidance coping strategies to deal with situations that provoke fear of punishment. With regard to severity of the four fearful situations, both males and females perceived that the fear of harm scenario is the least severe while the remaining fearful scenarios are perceived as having a similar level of severity. In terms of vulnerability to the four fearful situations, males feel slightly more vulnerable to the fear of punishment scenario. Besides, males and females have comparable levels of self-efficacy. There are weak negative relationships between self-efficacy and seeking support, and avoidance strategies. However, self-efficacy has a positive correlation with problem solving strategies in both males and females. Research found that, the Asian ethnic group prefers to use seeking support strategy over the Black/African American and Caucasian ethnic groups. When comparing the latter two ethnic groups, Caucasians favor seeking support strategies.
Ph. D.
APA, Harvard, Vancouver, ISO, and other styles
15

Johansson, Erica. "Det nya coronaviruset, covid-19, och individuell beredskap : En enkätundersökning om hur riskperception kan påverka den individuella beredskapen hos Karlstads Universitetsstudenter." Thesis, Karlstads universitet, Institutionen för samhälls- och kulturvetenskap (from 2013), 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:kau:diva-77488.

Full text
Abstract:
En pandemisk influensa medför en stor risk för samhället där både sociala och ekonomiska aspekter tar skada. Risker kräver beredskap på såväl internationella som individuella nivåer och kan påverka hur stor konsekvensen av en risk blir. Denna studie syftar till att undersöka den individuella beredskapen kring det nya coronaviruset, covid-19. Med stöd av ramverket Protection Motivation Theory som beskriver människors olika beteenden inför en risk och vad som motiverar individer till att vidta en eller flera skyddande åtgärder. Vilka faktorer som påverkar en individs riskperception och hur detta i sin tur kan påverka den individuella beredskapen undersöks i studien. Även betalningsviljan för ett eventuellt vaccin mot covid-19 undersöks.   Metoden som används för att undersöka individernas riskperception av covid-19 är en kvantitativ enkätundersökning. Enkäten konstruerades till stor del utifrån ramverket och dess faktorer som sägs påverka en individs beteende men också utifrån studiens forskningsfråga och för att uppfylla uppsatsens syfte. Enkäten genomfördes av studenter på tre olika program på Karlstads Universitet.   Studiens resultat visar att Karlstads Universitetsstudenter inte uppfattar smittan eller spridningen av covid-19 som något stort hot vid den tiden då undersökningen genomfördes, mellan 24 februari och 11 mars. Detta har även lett till att skyddande åtgärder inte vidtagits i någon stor omfattning för att stoppa smittan eller spridningen av coronaviruset. De skyddande åtgärderna har inte heller, enligt majoriteten av studenterna, uppfattats som effektiva för att undvika smitta eller spridning av covid-19 trots att de rekommenderats av svenska myndigheter.  Betalningsviljan för vaccinering är enligt denna studie hög i jämförelse med vad tidigare vaccineringar mot pandemisk influensa har kostat trots att viljan för vaccination mot covid-19 endast finns hos hälften av respondenterna.   Slutligen kan det konstateras att riskperceptionen påverkar den individuella beredskapen gentemot en risk och att detta bidrar till vilka åtgärder som vidtas eller inte. Uppfattningen av en risk kan påverka vilken information som tas upp av en individ, vilka åtgärder som vidtas och under en pandemisk influensa kan den individuella beredskapen påverka spridningen av ett virus och därmed ett helt samhälle.
A pandemic flu poses a great risk to society where both social and economic aspects are harmed. Risks require preparedness at both international levels and individual levels and can affect the extent of the risk. This study aims to investigate the individual preparedness of the new coronavirus, covid-19. With support from the framework Protection Motivation Theory which describes people's various behaviors at risk and what motivates individuals to take one or several protective measures. The factors that affect an individual's risk perception and how they in turn influence the individual preparedness are examined in the study. The willingness to pay for a possible covid-19 vaccine is also being investigated.   The method used to investigate individuals' risk perception of covid-19 is a quantitative survey. The questionnaire was constructed mainly on the basis of the framework and its factors that states to have influence on individual behavior. Also, the questionnaire was constructed to answer the study's research question and fulfill the purpose of the essay. The survey was conducted by students in three various programs at Karlstads University.   The study's results show that students at Karlstads University do not perceive the infection or extent of covid-19 as a major threat at the time the survey was conducted. This has shown that protective measures have not been taken to prevent the spread of coronavirus. The protective measures have not been considered effective to avoid the virus or the spread of covid-19 although they have been recommended by Swedish authorities. According to this study, the willingness to pay for vaccination is high in comparison with what previous vaccines against pandemic flu has cost, although the willingness for vaccination against covid-19 is found only in half of the respondents.   Finally, it can be found that risk perception affects individual preparedness in a crisis and that this contributes to what measures are taken. The perception of a risk can affect how information is taken up by an individual, what measures are taken and during a pandemic flu the individual preparedness can affect the extent of a virus spread and by that an entire society.
APA, Harvard, Vancouver, ISO, and other styles
16

Erlandsson, Fabian. "Motivation att utföra skyddsåtgärder : Innan, under och efter översvämning i privata villahushåll." Thesis, Karlstads universitet, Institutionen för miljö- och livsvetenskaper (from 2013), 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:kau:diva-72716.

Full text
Abstract:
Introduktion och syfte: Årsmedelnederbörd och antalet extrema nederbördstillfällen i Sverige antas öka i framtiden. När antalet extrema nederbördstillfällen ökar så ökar också antalet försäkringskompensationer till privata husägare. Erfarenhet har visat sig göra människor mer medvetna om associerade risker och påverkar en individs motivation att själv utföra översvämningsskyddande åtgärder. Men bara en tredjedel av de som drabbas av översvämning genomför en åtgärd för att minska framtida risk. Tidigare studier har visat att Protection motivation theory (PMT) kan vara användbar för att förklara vad som påverkar en individs motivation att utföra åtgärder. Tillsammans med ytterligare faktorer som också identifierats påverka en individs benägenhet att utföra skyddsåtgärder mot översvämningar syftar studien till att undersöka orsaker till skada, hantering och uppkomna skador vid översvämning i privata hushåll samt hur olika faktorer påverkar en individs motivation att utföra skyddsåtgärder. Metod: Studien använder en kombination av kvantitativ- och kvalitativ metod för att undersöka förekomst och innebörd av olika fenomen kopplade till översvämning. Datainsamling gjordes med semistrukturerade telefonintervjuer som analyserades med tematisk analys och deskriptiv statistik. Resultat: Resultaten visar att PMT tillsammans med individens tillgängliga information om åtgärder och uppfattning av vem som har det huvudsakliga ansvaret för att hantera översvämning är viktiga för att förklara vad som motiverar en individ till att utföra åtgärder. Bedömning av hotet och bedömning av skyddsåtgärder som båda ingår i PMT påverkar individens motivation men bedömning av skyddsåtgärder verkar ha en större påverkan på utförda åtgärder. Slutsats: För att villaägare ska utföra skyddsåtgärder utöver de som de identifierat förhindrar skada är det viktigt att information om åtgärder och metoder för dess utförande kommer villaägare tillgodo. Även ansvarsfördelningen mellan privatperson och kommun behöver förtydligas då detta identifieras som en orsak till varför individer slutar genomföra åtgärder.
Introduction & aim: Annual mean precipitation and the number of heavy rainfalls is expected to increase in both the short- and long-term perspective in Sweden. As the number of heavy rainfalls increases, the number of insurance compensation to private homeowners also increase. Experience has shown to make people more aware of the associated risks and influences an individual's motivation to carry out flood protective measures himself but only a third of the people exposed performs measures to decrease the risk of future flooding. Previous studies have also found Protection Motivation Theory (PMT) to be a useful tool for explaining what influences the probability of an individual to take protective measures. This study aims to investigate causes of damage, management and damage caused by flooding in private households, and how various factors affect an individual's motivation to perform protective measures, using PMT together with additional literature as an explanatory tool. Method: The study uses a combination of quantitative and qualitative methods to examine the occurrence of the different phenomenon’srelated to flooding. Data collection Semi-structural interviews were performed an analysed with thematic analyses and descriptive statistics. Results: The results show that PMT, together with the individual's knowledge on measures and perception of who has the main responsibility for managing flooding, is important in explaining what motivates an individual to perform measures. Threat appraisal and coping appraisal, both included in the PMT, is shown to affect the individual's motivation. Thought coping appraisal seems to have a greater impact on the actions performed. Conclusion: For homeowners to carry out protective measures in addition to those already performed in response to the experienced flooding it’s important that information on measures and how to implement them are provided. The division of responsibility between the private person and the municipality also needs to be clarified to the homeowner as this is identified as a reason why individuals stop implementing measures.
Skyfallsmodellering- Planering, analys och sårbarhetshantering, SPLASH
APA, Harvard, Vancouver, ISO, and other styles
17

Vance, A. (Anthony). "Why do employees violate is security policies?:insights from multiple theoretical perspectives." Doctoral thesis, University of Oulu, 2010. http://urn.fi/urn:isbn:9789514262876.

Full text
Abstract:
Abstract Employee violations of IS security policies is recognized as a key concern for organizations. Although interest in IS security has risen in recent years, little empirical research has examined this problem. To address this research gap, this dissertation identifies deliberate IS security policy violations as a phenomenon unique from other forms of computer abuse. To better understand this phenomenon, three guidelines for researching deliberate IS security violations are proposed. An analysis of previous behavioral IS security literature shows that no existing study meets more than one of these guidelines. Using these guidelines as a basis, this dissertation examines IS security policy violations using three theoretical models drawn from the following perspectives: neutralization theory, rational choice theory, and protection motivation theory. Three field studies involving surveys of 1,423 professional respondents belonging to 7 organizations across 47 countries were performed for empirical testing of the models. The findings of these studies identify several factors that strongly predict intentions to violate IS security policies. These results significantly increase our understanding of why employees choose to violate IS security policies and provide empirically-grounded implications for how practitioners can improve employee IS security policy compliance.
APA, Harvard, Vancouver, ISO, and other styles
18

Gamboa, Sabina, and Kenny Chauca. "Studenters integritet i Big Data-eran : En kvalitativ studie om oro över personlig data och digital integritet." Thesis, Linnéuniversitetet, Institutionen för informatik (IK), 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-104420.

Full text
Abstract:
I den nuvarande Big data-eran där stora mängder information samlas och bearbetas för att användas i kommersiellt syfte har den digitala integritetens betydelse ökat. Oro kring hur information samlas in och används har blivit mer aktuellt de senaste åren. Facebook-Cambridge Analytica-skandalen är ett exempel på hur information har använts utan användares samtycke med allvarliga konsekvenser. Detta har ökat den oro många känner kring sin personliga integritet. I Europa har General Data Protection Regulation haft en viktig roll i att skydda användares digitala integritet. Tidigare studier visar att oro kring den digitala integriteten har ökat bland vissa grupper i Sverige. En av dessa grupper är universitetsstudenter som är fokus för denna undersökning. Syftet med denna studie var att undersöka oron för den digitala integriteten som finns i samhället utifrån studenters perspektiv. Den metod som har använts är semi-strukturerade intervjuer. Undersökningens resultat visar att studenter känner trygghet när de använder informationsteknologi. Resultatet tyder på att de faktorer som påverkar studenters oro, eller brist på den, för sin digitala integritet är kopplat till tillit och kontext. Resultatet visar att orsaken till detta är tillit till GDPR, tillit till att företag kommer att följa de lagar som finns, tron att viss personlig information inte anses ha högt värde samt tillit till den egna förmågan att kunna skydda sig själva. Resultatet visar också att studenter är villiga att ge tillgång till personlig informationen om de anser att det är nödvändigt eller gynnar dem på något sätt.
In the current Big data era, where large amounts of information is collected and processed for commercial use, the importance of digital integrity has become more evident. The Facebook-Cambdrige analytica scandal is an example on how information has been used without consent. This has increased the concerns about users personal information. In Europe the General Data Protection Regulation has been an important part of protecting users digital integrity.  Previous studies show that concerns about digital integrity have increased among certain groups in Sweden. One of these groups are university graduates which are the focus of this study. The purpose of this qualitative study was to examine the concern for digital integrity that exists in society from the students perspective. The method that has been used in this study has been individual semi-structured interviews.  The results of the study shows that students feel secure when they use information technology. The results suggest that the factors that affect students' concerns, or lack thereof, of their digital integrity are linked to trust and context. The results shows that the reason for this is trust in GDPR, trust that companies will follow the law, belief that some personal information isn't of a high value and belief in their own ability to protect themself. The results of the study also shows that the informants were willing to let websites get access to certain personal information when they trusted the website and when they found it beneficial to them.
APA, Harvard, Vancouver, ISO, and other styles
19

Brown, David A. "Examining the Behavioral Intention of Individuals' Compliance with Information Security Policies." ScholarWorks, 2017. https://scholarworks.waldenu.edu/dissertations/3750.

Full text
Abstract:
Target Corporation experienced an information security breach resulting in compromising customers' financial information. Management is responsible for implementing adequate information security policies that protect corporate data and minimize financial losses. The purpose of this experimental study was to examine the effect of a fear appeal communication on an individual's information security policy behavioral intention. The sample population involved information technology professionals randomly selected from the SurveyMonkey audience. A research model, developed using constructs from deterrence theory and protection motivation theory, became the structural model used for partial least squares-structural equation modeling (PLS-SEM) analysis of the survey response data, which indicated that self-efficacy was statistically significant. The remaining model variables, perceived threat vulnerability, perceived threat severity, response efficacy, informal sanction certainty, informal sanction severity, formal sanction certainty, and formal sanction severity, were not statistically significant. A statistically significant self-efficacy result could indicate confidence among the population to comply with information security policies. The nonsignificant results could indicate the fear appeal treatment did not motivate a change in behavior or information security policy awareness bias was introduced by selecting information technology professionals. Social change in information security could be achieved by developing an effective information security policy compliance fear appeal communication, which could change information security compliance behavior and contribute to securing the nation's critical cyber infrastructure and protecting data.
APA, Harvard, Vancouver, ISO, and other styles
20

Shen, Han. "Factors Related to Users’ Awareness of Information Security on Social Network Service --The Case of WeChat." Thesis, Linnéuniversitetet, Institutionen för informatik (IK), 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-73717.

Full text
Abstract:
Recent trends in social network services (SNS) have taken the rates of personal information sharing, storage and processing to an unprecedented level, which yield both benefits and undesirable consequences for their users. SNS is being exploited by criminals to fraudulently obtain information from unsuspecting users. User’s awareness of privacy protection has been far left behind by the increasing and popularizing utilization of social network services (SNS), the privacy security problems will become one of the important factors influencing the healthy development of social network service industry. This study was designed to collect data and produce knowledge about the security awareness of WeChat users (i.e., randomly selected from all over China), their preferences and their experience of using WeChat while facing security issues as well as the perspectives of how people perceive a specific security problems, in order to find out what factors influence user's security awareness. In order to carefully conduct the research process and explain the empirical findings, seven principles of interpretive field research and protection motivation theory is adopted as core theoretical foundation. Participants were asked to provide information about and their personal views of questions from their different experience and value. Eight persons interviewed for our research and their responses confirmed our objectives of the study. As a result, six factors are indentified in related to WeChat user’s security awareness. PMT helps to explain and understand that how six indentified concepts influence behaviour intention and security awareness of user.
APA, Harvard, Vancouver, ISO, and other styles
21

Persson, Tobias, and Emil Andersson. "Informationssäkerhetsrisker och organisatoriska sanktioner vid användandet av privata smarta enheter i Försvarsmakten : En studie om användning av privata smarta enheter." Thesis, Uppsala universitet, Institutionen för informatik och media, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-413565.

Full text
Abstract:
Denna uppsats undersöker intentionen att använda smarta enheter i tjänst hos personal i Försvarsmakten, som är en organisation med högt behov av verksamhetssäkerhet. Verksamhetens säkerhet är direkt beroende av hur personal inom verksamheten agerar utifrån ett säkerhetsperspektiv. Syftet är att belysa hur Försvarsmakten förmedlar informationssäkerheten kring smarta enheter och hur personalen påverkas utifrån det. Det empiriska materialet har samlats in genom en kvalitativ fallstudie i form av semistrukturerade intervjuer med två olika grupper. Resultatet analyseras med hjälp av ett teoretiskt ramverk bestående av Protection Motivation Theory (PMT) och General Deterrence Theory (GDT) i syfte att belysa vad det är som avgör personalens beteende. Teorierna utgår från att beteendet påverkas av rädsla för sanktioner eller för hot mot verksamhet och individ. Resultatet visar att aspekter från de båda teorierna är närvarande hos personalen och att det som påverkar den enskildes agerande beror på vilken information organisationen delgett och individernas personliga uppfattningar. Personalen är medveten om de risker som följer av användningen av smarta enheter, men enheterna används ändå i stor utsträckning. Faktorer som spelar in i intentionen är kunskapsnivån, befattningen individen besitteroch arbetsområdet individen verkar inom.
This paper examines the intention to use smart devices by staff in the Swedish Armed Forces,which is an organization with a high need for operational security. The security of the business isdependent on how staff within the business behave, in a security perspective. The purpose is toelucidate how the Swedish Armed Forces conveys information security regarding smart devicesand how their staff are affected. The empirical material has been collected through a qualitativecase study in the form of semi-structured interviews with two different groups. The results areanalyzed using a theoretical framework consisting of Protection Motivation Theory (PMT) andGeneral Deterrence Theory (GDT) in order to elucidate what determines the behavior of the staff.The theories are based on the fact that behavior is affected by fear of sanctions or threats to thebusiness and individuals. The result shows that aspects in both theories are present in the staffbehavior. What influences the individual's actions depends on what information the organizationhas shared and the personal perceptions of the individuals. Factors that play into the intention arethe level of knowledge, the position the individual possesses and the area of work the individualoperates within.
APA, Harvard, Vancouver, ISO, and other styles
22

Leigh, Laurasona. "Behavioral and Environmental Attributes of Ebola Epidemic in West Africa and United States Emergency Nurses’ Motivation to Protect Themselves against Ebola Infection." University of Toledo / OhioLINK, 2016. http://rave.ohiolink.edu/etdc/view?acc_num=toledo1470411786.

Full text
APA, Harvard, Vancouver, ISO, and other styles
23

Warrick, Brian. "Examining Employee Motivation, Environmental Systems, and Corporate Social Responsibility in Proenvironmental Behavior." ScholarWorks, 2016. https://scholarworks.waldenu.edu/dissertations/2906.

Full text
Abstract:
The World Health Organization has pointed to climate change as the most significant issue in the 21st century as a result of greenhouse gas emissions and environmental pollution. Organizations are leaning toward corporate social responsibility (CSR) and environmental management systems (EMS) to reverse the current trend; however, these efforts are often ineffective or pooly implemented. The purpose of this quantitative study was to determine the extent to which employees' proenvironmental behavior relates to their protection motivation and organizational identification, as well as their perception and knowledge of the organization's CSR and EMS, respectively. Using social identity as the theoretical framework, this research addressed how organizational and intrapersonal factors influence employees' proenvironmental behavior. One hundred-twenty employees from American-based organizations completed an online survey measuring self-assessed proenvironmental behaviors, among other variables. The results from a Pearson correlation analysis indicated that all of the independent variables had a significant positive relationship with employee proenvironmental behaviors. Multiple regression analysis showed that while each variable was a significant predictor of proenvironmental behaviors, only the economic dimension of CSR (β = .300, p = .014) and the self-efficacy dimension of protection motivation (β = .269, p = .037) significantly contributed to the model. Leaders' use of the findings may lead to positive social change through improved environmental performance in the form of decreased pollution, a more efficient use of natural resources, and reduced greenhouse gas emissions, all toward a more sustainable future.
APA, Harvard, Vancouver, ISO, and other styles
24

Leas, Loranie, and mikewood@deakin edu au. "Cardiovascular health behaviours and health needs among people with psychiatric disabilities." Deakin University. School of Psychology, 2004. http://tux.lib.deakin.edu.au./adt-VDU/public/adt-VDU20051208.095530.

Full text
Abstract:
Recent research in Australia has found that people with a mental illness experience higher mortality rates from preventable illnesses, such as cardiovascular disease, respiratory disease and diabetes compared to the general population. Lifestyle and other behavioural factors contribute significantly to these illnesses. Lifestyle behaviours that affect these illnesses include lack of physical activity, consumption of a poor diet and cigarette smoking. Research on the influence of these factors has been mainly directed towards the mainstream population in Australia. Consequently, there remains limited understanding of health behaviours among individuals with psychiatric disabilities, their health needs, or factors influencing their participation in protective health behaviours. This thesis presents findings from two studies. Study 1 evaluated the utility of the main components of Roger’s (1983) Protection Motivation Theory (PMT) to explain health behaviours among people with a mental illness. A clinical population of individuals with schizophrenia (N=83), Major Depressive Disorder (MDD) (N=70) and individuals without a mental illness (N=147) participated in the study. Respondents provided information on intentions and self-reported behaviour of engaging in physical activity, following a low-fat diet, and stopping smoking. Study 2 investigated the health care service needs of people with psychiatric disabilities (N=20). Results indicated that the prevalence of overweight, cigarette smoking and a sedentary lifestyle were significantly greater among people with a mental illness compared to that reported for individuals without a mental illness. Major predictors of the lack of intentions to adopt health behaviours among individuals with schizophrenia and MDD were high levels of fear of cardiovascular disease, lack of knowledge of correct dietary principles, lower self-efficacy, a limited social support network and a high level of psychiatric symptoms. In addition, findings demonstrated that psychiatric patients are disproportionately higher users of medical services, but they are under-users of preventive medical care services. These differences are primarily due to a lack of focus on preventive health, feelings of disempowerment and lower satisfaction of patient-doctor relationships. Implications of these results are discussed in terms of designing education and preventive programs for individuals with schizophrenia and MDD.
APA, Harvard, Vancouver, ISO, and other styles
25

Folck, Alcinda L. "Trouble in the air: Farmers’ perceptions of risk, self-efficacy, and response efficacy regarding herbicide drift." The Ohio State University, 2017. http://rave.ohiolink.edu/etdc/view?acc_num=osu1512135233700015.

Full text
APA, Harvard, Vancouver, ISO, and other styles
26

Burdsall, Deborah Patterson. "Exploring inappropriate glove use in long term care." Diss., University of Iowa, 2016. https://ir.uiowa.edu/etd/5724.

Full text
Abstract:
Healthcare personnel (HCP) frequently wear gloves when they care for patients in Standard Precautions to prevent contact with potentially infectious blood or body fluids. When HCP use gloves appropriately they reduce the risk of cross-contamination and decrease the risk of healthcare-associated infections (HAI). However, if HCP use gloves inappropriately they may inadvertently spread pathogens to patients and the patients’ environment. This study used a descriptive structured observational design to investigate three aspects of HCP glove use in a United States long-term care facility (LTCF). First, the PI examined the degree of inappropriate HCP glove use in a random sample of 76 HCP. Results indicate that the HCP used gloves inappropriately, failing to change gloves 66% of the time when a glove change was indicated. Over 44% of the HCP gloved touch points were defined as contaminated. Second, the PI examined the reliability of a new glove use tool (GUST). Results indicate the GUST is a reliable tool when used by trained observers documenting HCP glove use during toileting and perineal care events in LTCF, with intraclass correlation coefficients (ICC 2,1) over 0.75 for indicators of inappropriate glove use. Third, exploratory analysis indicated significant differences between inappropriate glove use in females and males. Female HCP had significantly more failed glove changes and contaminated touch points than male HCP in this study (p = 0.003). Future research studies should assess US HCP glove use to provide data needed for development of strategies to improve HCP glove use and reduce HAI.
APA, Harvard, Vancouver, ISO, and other styles
27

Swartz, Erik. "Mänskligt beteende - ett ofrånkomligt hot mot informationssäkerhet?" Thesis, Högskolan i Halmstad, Akademin för informationsteknologi, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-44967.

Full text
Abstract:
Information har idag kommit att bli så viktigt att det av många aktörer kallas för den nya digitala oljan, och med anledning av just detta är information idag en av de främsta tillgångar en organisation kan besitta. För att skydda informationen lägger organisationer massiva summor pengar på tekniska och fysiska åtgärder. Tillsammans med dessa åtgärder utfärdas även interna bestämmelser och riktlinjer för hur IT-system och information får eller inte får hanteras. Trots detta sker både intrång och andra säkerhetsrelaterade incidenter som kan härledas till mänskligt felaktigt beteende, eller den så kallade mänsklig faktorn. I den här uppsatsen har därför författaren gjort en djupdykning i ämnet för att studera vilka samband som kan finnas mellan beteendevetenskapliga teorier och efterlevnad av informationssäkerhet. Med kvalitativa metoder har bland annat litteraturstudier genomförts för att ta reda på vilka teorier som är mest relevanta i sammanhanget. Intervjuer har sedan nyttjats för att bredda författarens uppfattning om vilka faktorer som kan påverka mänskligt beteende. De personer som intervjuats har bland varit yrkesverksamma som säkerhetschefer, säkerhetskyddshandläggare och ledande forskare inom det specifika området.
APA, Harvard, Vancouver, ISO, and other styles
28

Van, Huyssteen Lucea. "Fear-based advertising appeals : assessing execution styles of social marketing campaigns." Thesis, Stellenbosch : University of Stellenbosch, 2010. http://hdl.handle.net/10019.1/5445.

Full text
Abstract:
Thesis (MComm (Economics)--University of Stellenbosch, 2010.
ENGLISH ABSTRACT: South Africa faces an epidemic, namely, HIV/Aids, which has grown substantially over the last ten years. It can be regarded as the country with the most alarming statistical figures concerning HIV infection rates. Even though South Africa is a country under scrutiny, given the high prevalence of HIV/Aids, this epidemic also constitutes as a global problem, given that an approximate number of 7400 individuals are infected with HIV every day. The number of Aids related deaths has risen from 100 000 in 1999 to over 400 000 in 2009. Given the concern, and in an effort to combat the fast spread of HIV/Aids, the South African government has implemented various educational and support programs. Marketing efforts are related to the above topic, given that various marketing-related practices have been implemented by non-profit organisations in an attempt to create awareness of HIV/Aids and the related risks. These marketing communication programs are referred to as social campaigns. HIV/Aids social campaigns involve communication strategies which attempt to persuade the target market to ensure that they adhere to safesexual practices, by making individuals aware of the threat that infection poses to their lifestyles. Various campaigns also explore how an individual can ensure safe sexual behaviour. Empirical research stretching back to 1975 has provided marketers with guidelines as to what social communication campaigns, concerning threats to human health, should include regarding an emotional, cognitive aspect. Evidence exists for the need to include emotional cues that would stimulate medium to high levels of fear, rather than low levels of fear, in order to effectively persuade an individual to adhere to a protective behavioural pattern. No research has been conducted in order to conclude whether one type of execution style or specific advertising content would result in significantly increased intentions to behave in the recommended protective manner. This study investigated whether different execution styles would result in significantly different levels of attitude, fear and behavioural intention. This was done by sampling a group of 450 respondents who participated in an experimental study. Three execution styles were tested by means of a post-test self administered questionnaire including items related to variables of the Protection Motivation Theory (PMT). The PMT explores the effects that fear appeal would have on attitude change. Not only was it found that different execution styles result in significantly different levels of the mentioned variables, it was also found that one execution style is significantly more effective in evoking these cognitive responses in one race group as compared to another. The empirical results of this study reveal that by discontinuing mass communication, and, in preference, segmenting the market towards which HIV/Aids social campaigns are currently aimed, based on race, these awareness campaigns would be more effective in inducing protective sexual behaviour.
AFRIKAANSE OPSOMMING: Suid-Afrika word gekonfronteer met ’n epidemie, naamlik MIV/Vigs, wat aansienlik gegroei het oor die afgelope tien jaar. Suid Afrika kan beskou word as die land met die mees ontstellende statistieke met betrekking tot MIV-infeksie. Selfs al is Suid-Afrika die land met die hoogste gevalle van MIV/Vigs, is hierdie epidemie ook 'n wêreldwye probleem, gegewe dat 'n ongeveer 7400 individue met MIV besmet word elke dag. Die aantal Vigs-verwante sterftes het toegeneem van 100 000 in 1999 tot meer as 400 000 in 2009. Gegewe bogenoemde en in 'n poging om MIV/Vigs verspreiding te beveg, het die Suid- Afrikaanse regering verskeie ondersteunende en opvoedkundige programme geïmplementeer om hierdie doel te bereik. Die verwantskap tussen bemarkingspogings en die betrokke onderwerp is dat verskeie bemarkingsverwante praktyke geïmplementeer word deur nie-winsgewende organisasies in 'n poging om bewustheid van MIV/Vigs en die verwante risiko's te skep. Hierdie bemarkingskommunikasie programme word na verwys as sosiale veldtogte. Die relevante MIV/Vigs-veldtogte behels sosiale kommunikasie strategieë wat die teikenmark probeer oorreed om te verseker dat hulle voldoen aan veilige seksuele praktyke, deur individue bewus te maak van die bedreiging wat infeksie inhou tot hul lewenswyse. Verskeie veldtogte brei ook uit oor hoe 'n individu veilige seksuele gedrag kan verseker. Empiriese navorsing wat terugstrek tot 1975 voorsien bemarkers met riglyne oor wat die sosiale kommunikasie veldtogte, wat 'n bedreiging vir menslike gesondheid behels, moet insluit met betrekking tot 'n emosionele, kognitiewe aspek. Bewyse bestaan in guns van die noodsaaklikheid van emosionele leidrade wat medium tot hoë vlakke van vrees in ‘n individu sal stimuleer, eerder as lae vlakke van vrees, om sodoende 'n individu effektief te oorreed om te voldoen aan beskermende gedragspatrone gegewe die bedreiging wat bestaan. Geen navorsing bestaan tans met betrekking tot of ‘n sekere tipe advertensie uitvoeringstyl of spesifieke advertensie-inhoud sou lei tot ‘n aansienlik hoër voorneme om te reageer op die aanbevole beskermende gedrag nie. Hierdie studie ondersoek of sekere advertensie uitvoeringstyle sou lei tot aansienlik verskillende vlakke van houding, vrees en gedrag. Die ondersoek is gedoen deur middel van 'n groep van 450 respondente wat deelgeneem het aan 'n eksperimentele studie. Drie uitvoeringstyle is getoets deur middel van 'n na-toets self-voltooiingsvraelys wat items ingesluit het wat verband hou met veranderlikes van die beskermings-motiveringsteorie (BMT). Die BMT ondersoek die uitwerking wat vreesaanlagte sal hê op houding en aanpassing daarvan. Hierdie studie het bevind dat verskillende advertensie uitvoeringstyle bydra tot aansienlike verskillende vlakke van die bogenoemde veranderlikes, asook dat een uitvoeringstyl beduidend meer effektief is in die ontlokking van kognitiewe respons in sekere rassegroepe in vergelyking met ander. Die empiriese resultate van hierdie studie bewys dat bemarkers die doeltreffendheid van MIV/Vigs sosiale veldtogte kan verbeter deur massa-kommunikasie te staak en eerder segmentering toe te pas binne die mark op wie veldtogte gemik is. Segmentering op grond van rassegroepe sal veroorsaak dat bewusmakingsveldtogte meer effektief is met betrekking tot hul invloed op die toepassing van beskermende seksuele gedrag binne die teikenmark.
APA, Harvard, Vancouver, ISO, and other styles
29

Alhussein, Nawras. "Investigation of the variables that govern user behaviors related to e-crime attacks." Thesis, Luleå tekniska universitet, Institutionen för system- och rymdteknik, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:ltu:diva-79293.

Full text
Abstract:
The users´ behaviors play an important role in securing information systems. At the same time, the users´ bad behaviors end-up in making them victims to e-crime attacks. To emphasize the positive side of users´ behaviors, the reasons for the bad behaviors must be investigated. In this research, e-crimes on users in Sweden were studied using the protection motivation theory and the theory of planned behavior in order to understand what variables govern the user behaviors. The information retrieved from the literature review and the web survey were used to answer the research question about which variables within the two used theories affect the user behaviors in connection to e-crimes. It turned out that perceived vulnerability, perceived severity, and user-efficacy have significant effect on the selected user behavior. Besides, the analysis of the results showed that IT/IS-knowledge is a determinant factor that affects all the variables of the protection motivation theory.
APA, Harvard, Vancouver, ISO, and other styles
30

DiGiusto, Dennis Michael. "A protection motivation theory approach to home wireless network security in New Zealand establishing if groups of concerned wireless network users exist and exploring characteristics of behavioral intention : submitted to the School of Information Management, Victoria University of Wellington in partial fulfilment of the requirements for the degree of Master of Information Management /." ResearchArchive@Victoria e-Thesis, 2008. http://hdl.handle.net/10063/1148.

Full text
APA, Harvard, Vancouver, ISO, and other styles
31

Eriksson, Beatrice, and Maria Grönte. "ON DIFFERENT TERMS - Social work among vulnerable children in a developing country." Thesis, Malmö högskola, Fakulteten för hälsa och samhälle (HS), 2011. http://urn.kb.se/resolve?urn=urn:nbn:se:mau:diva-25000.

Full text
Abstract:
The aim of this study is to get a deeper understanding, from a Swedish context, of how you can do social work with vulnerable and orphaned children in a developing country such as Uganda. We have investigated this through the example WEBALE, an NGO working in a context where among other things HIV/AIDS, poverty and a defective social safety net have led to social problems affecting children. Further, we have also aimed at acquiring a deeper understanding of what it is that motivates the volunteers and the director to work with vulnerable children at WEBALE. In order to fulfil this aim, the research has the following two key questions: What is the motivation for the teacher volunteers and the manager to work with vulnerable children at WEBALE? How do the teacher volunteers perceive the social work with the children in everyday life at WEBALE and what experiences do they have from this? The study is a field study with a phenomenological and ethnological approach. We were present at and took part in the everyday life of the informants at the school and orphanage in Uganda for eight weeks. The investigation uses a qualitative method where four interviews and participant observations were carried out. The results are analyzed in connection with theories on social work defining preventions and interventions, where theories on risk- and protection factors and the salutogenetic theory on SOC have been used. The analysis is also connected to theories on social work with children from a developmental-ecological and attachment-theoretical perspective. The results show what it is that motivates the volunteers and manager to work as volunteers in this specific contest through personal accounts of their background. Our observation is that the motivation of the volunteers and the manager to work with orphaned and vulnerable children is closely connected to their own background and childhood. The biggest reason for this kind of a life choice seems to be a sense of coherence and the largest motivating factor is that the work they do feels meaningful. The results further highlight the social work that is carried out and how the volunteers perceive their work at WEBALE. The study shows that the volunteers (who mainly consist of teachers) carry out what can be called social work, according to the definitions of interventions and preventions within various fields, such as health, education, emotional and behavioural development, ability to take care of oneself, social behaviour, family and social relations, and identity.
APA, Harvard, Vancouver, ISO, and other styles
32

Mousavizadeh, Kashipaz Seyed Mohammadreza. "Three Research Essays on Online Users' Concerns and Web Assurance Mechanisms." Thesis, University of North Texas, 2016. https://digital.library.unt.edu/ark:/67531/metadc862772/.

Full text
Abstract:
Online users struggle with different concerns whenever they use information systems. According to Miyazaki and Fernandez (2001), there are three important categories of concerns for online users: privacy concern, third party fraudulent behavior concern ("system security"), and online website fraudulent behavior concern ("security"). Kim, Sivasailam, and Rao (2004) proposed a similar categorization for web assurance dimensions. They argue that online websites are supposed to address users' privacy, security, and business integrity concerns to decrease user concerns. Although several researchers tried to answer how different factors affect these concerns and how these concerns affect users' behavior, there are so many ambiguities and contradictions in this area. This Essay I in this work develops a comprehensive map of the role of online privacy concern to identify related factors and categorize them through an in-depth literature review and conducting meta-analysis on online privacy concern. Although users have concerns about their privacy and security, there is still growth in the number of internet users and electronic commerce market share. One possible reason is that websites are applying assurance mechanisms to ensure the privacy of their users. Therefore, it could be an interesting research topic to investigate how privacy assurance mechanisms affect users concern and, consequently, their behavior in different concerns such as e-commerce and social networking sites. Different types of web assurance mechanisms are used by websites. The most prevalent among these assurance mechanisms include web assurance seals and assurance statements and privacy customization features. Essay II and III aims to address how these mechanisms influence e-commerce and social networking sites users' behavior. Essay II applies the procedural fairness theory by Lind and Tyler (1988) to explain how and why the web assurance mechanisms affect consumers' perceived risks. Essay III addresses the issue of self-disclosure on social networking sites. Applying protection motivation theory, this study aims to evaluate the effect of web assurance mechanisms on online privacy concern and self-disclosure behavior on the social networking sites.
APA, Harvard, Vancouver, ISO, and other styles
33

Araujo, Brandon. "Agricultural Adaptation to Climate Change: How Risk Influences Decision-Making." UNF Digital Commons, 2017. http://digitalcommons.unf.edu/etd/744.

Full text
Abstract:
Climate change is currently threatening the livelihoods of farmers in developing countries. Psychological models have been developed to identify factors associated with adapting to climate change; however, little work has investigated the role of farmers’ risk attitudes in these models. We assessed perceptions of adaptation cost and adaptation intentions for five drought- specific adaptive behaviors among 550 farmers from 12 villages in the dry zone of Sri Lanka, as well as their attitudes toward risk. Results suggest that perceived adaptation cost and risk attitude are negatively associated with adaptation intentions. The conditional effect of adaptation cost on adaptation intention as a function of risk attitude was also investigated. Results showed that only farmers with risk averse attitudes were impacted by their perceptions of adaptation costs. These findings have implications for those interested in increasing adaptive practices of farmers in developing countries who face increasingly scarce water supplies.
APA, Harvard, Vancouver, ISO, and other styles
34

Hillhouse, Joel J., and Rob Turrisi. "Motivations for Indoor Tanning: Theoretical Models." Digital Commons @ East Tennessee State University, 2016. https://dc.etsu.edu/etsu-works/63.

Full text
Abstract:
This chapter reviews the literature applying health behavior theories to indoor tanning. Few studies have tried to fit full versions of health behavior models to indoor tanning. Theoretical models from the family of theories referred to as the reasoned action approach (e.g., theory of planned behavior, behavioral alternative model, prototype willingness model, etc.) have been most commonly used to study indoor tanning. Results indicate that these models fit indoor tanning data moderately to extremely well. Two lesser known models, problem behavior theory and the terror management health model, have also demonstrated a reasonable fit. Two other common models, the health belief model and social cognitive theory, have never been fully tested with indoor tanning. However, key constructs from these models (e.g., perceived susceptibility and threat, modeling) have been used to understand indoor tanning. Empirical research conducted represents a solid start toward developing strong, comprehensive models of indoor tanning that can guide intervention efforts. This initial work needs to be expanded by conducting longitudinal studies and by including a broader age range in studies because the majority of existing work has focused on young adults. Incorporating findings related to tanning dependency, peer group affiliation, media influences and other constructs into these foundational models will also improve our understanding and ability to develop efficacious interventions to reduce engagement in this health risk behavior.
APA, Harvard, Vancouver, ISO, and other styles
35

Mason, Holly. "Protection Motivation Theory and Smartphone Security Behaviour: A qualitative investigation." Thesis, 2019. http://hdl.handle.net/2440/131442.

Full text
Abstract:
This item is only available electronically.
This review provides an initial assessment of the literature on smartphone reliance and the lack of good security behaviours displayed on smartphones within the general population. Protection Motivation Theory (PMT) is commonly used within information security contexts to investigate why someone might chose to engage in risky smartphone behaviour. There is theoretical support for PMT within both organisational and home settings. However, there is a lack of research within the PMT and smartphone context; therefore, an empirical investigation is warranted. Given the findings of this review, future research should examine user behaviour on smartphones across contexts.
Thesis (M.Psych(Organisational & Human Factors)) -- University of Adelaide, School of Psychology, 2019
APA, Harvard, Vancouver, ISO, and other styles
36

Pinho, Luís Filipe Antunes. "”Planned” or “protected” tourism? towards a planned protection motivation approach." Master's thesis, 2021. http://hdl.handle.net/10362/123753.

Full text
Abstract:
Dissertation presented as the partial requirement for obtaining a Master's degree in Data Science and Advanced Analytics, specialization in Business Analytics
This research aims to develop a new Planned-Protection-Motivation (PPM) approach on tourism research. Drawing on Protection Motivation and Planned Behavior theories, the proposed model combines the beliefs on travel intentions as well as the perceived level of threat and familiarity with the pandemic. Using PLS-SEM multi-group analysis, and a sample of 381 European travelers, this study aims to understand consumers’ demand for travel given the pandemic. Findings showed that consumers’ attitudes and social influence are the main drivers of travel intentions. Moreover, social influence moderates COVID-19 travelers’ fear effects on attitudes and improves travel intentions. However, consumers who have not travelled have mixed feelings, and both response cost and fear negatively influence their travel intentions. The findings represent a shift in the tourism, deepening the understanding of customer motivation for traveling during the pandemic.
APA, Harvard, Vancouver, ISO, and other styles
37

Hou-dian-Lung and 侯殿龍. "Combining the Interventions of Protection Motivation Theory and Implementation Intentions to Promote Exercise Participation." Thesis, 2007. http://ndltd.ncl.edu.tw/handle/51573432883514450838.

Full text
Abstract:
碩士
國立臺北教育大學
體育學系碩士班
95
The main purpose of this study was to make comparison the significance of three groups in exercise participation based on interventions of Coronary Atherosclerotic Heart Disease (CAD) health information and implementation intentions. The study collected two waves of data collection over a 2-week period. Participants (N =357) were randomly allocated to a control group or one of two intervention groups. The dates were analyzed with Descriptive Statistics, t-test, One-way ANOVA, Two Factors Mixed Design, Variants Analysis, One-way ANCOVA and Stepwise Regression Analysis. The important conclusions were as follows: 1. The interventions of CAD health information and implementation intentions had significant differences and changes on “PMT measure cognition” between three groups. 2. The variables of protection motivation theory had significant differences between the three groups and pre/post test. 3. The interventions of CAD health information and implementation intentions had significant differences and changes on “exercise participation” between three groups and pre/post test. 4. The result of Stepwise Regression Analysis was that “response efficacy” and “self-efficacy” had the most influences on “exercise participation”. Except the explanation of the results on this study, there was also a discussion on the application of this research results. Meanwhile, there were some suggestions to the future study.
APA, Harvard, Vancouver, ISO, and other styles
38

LI, YU-LING, and 李郁苓. "A Study of Factors Influencing Users’ Prevention and Action toward WannaCry: Protection Motivation Theory." Thesis, 2018. http://ndltd.ncl.edu.tw/handle/su5u7u.

Full text
Abstract:
碩士
銘傳大學
企業管理學系
106
The development of Information Computer Technologies is more and more importance since the end of the 19th century. Although technological progress brings about great benefits for human, the threat of cybercrime has become an omnipresent and important issue. With the rapid development of Information Computer Technologies, Computer Virus are Continuous changing. WannaCry is a new type of Computer Virus that is not only extorting high bitcoin bitcoins through locked files, but also doubling the ransom and destroy files if it is not paid within the time limit. WannaCry has caused disastrous damage to corporation and Internet users of the world. However, studies related to the above concerns are still limited. Drawing on the perspective of protection motivation theory and data collection from Internet users, the objective of this study is to investigate factors influencing user’s prevention measure intention toward WannaCry. We found that information privacy concerns and information security concerns positively affect user’s “action” and “seeking help”, but not significant affects “avoidance”. Perceived severity positively affects information privacy concerns and information security concerns, while self-efficacy positively affects information privacy concerns. This study not only provides advice on future improvement strategies and marketing for country, government, corporation and information security service providers, but also proposes research limitations and future research directions.
APA, Harvard, Vancouver, ISO, and other styles
39

Chang, Shih-hsien, and 張師獻. "The Influence of Information Security Stress on Security Policy Compliance: A Protection Motivation Theory Perspective." Thesis, 2017. http://ndltd.ncl.edu.tw/handle/nqrx94.

Full text
Abstract:
碩士
國立中山大學
資訊管理學系研究所
105
The occurrence of security incidents will not only cause substantial loss to the enterprise but also serious damage to goodwill. In order to reduce the occurrence of security incidents, it is a fundamental practice to formulate effective security policies and implement them. However, the process of promoting the security policy will put stress on employees. The focus of this paper is whether these pressures will affect staff''s compliance with the security policies. Based on the protection motivation theory, this study considers that information security stress will affect the compliance of security policies through the two cognitive processes of threat appraisal and coping appraisal of protection motivation theory. In this study, opinions of 324 users were collected and the empirical study was conducted. Twelve research hypotheses were used to validate the study model. The results showed that the threat appraisal and coping appraisal affect security compliance significantly except for vulnerability. Security task and job stress have a significant impact on the formation of security role stress. Security role stress has a significant impact on threat and coping appraisals in the protection motivation theory. Security task stress was significantly positively correlated with response efficacy in coping appraisal, and this result were contrary to our expectation.
APA, Harvard, Vancouver, ISO, and other styles
40

Peng, Shih Yao, and 彭詩窈. "Investigating determinants of privacy setting behavior in social network sites from perspective of Protection Motivation Theory." Thesis, 2015. http://ndltd.ncl.edu.tw/handle/j626jp.

Full text
APA, Harvard, Vancouver, ISO, and other styles
41

Blunt, Emily Ann. "Protection Motivation Theory and Consumer Willingness-to-Pay, in the Case of Post-Harvest Processed Gulf Oysters." Thesis, 2012. http://hdl.handle.net/1969.1/ETD-TAMU-2012-08-11864.

Full text
Abstract:
Gulf oysters are harvested and consumed year-round, with more than 90% consumed in a raw, unprocessed state. A chief concern of policymakers in recent years is the incidence of Vibrio vulnificus infection following raw seafood consumption. V.vulnificus refers to a halophilic bacterium naturally occurring in brackish coastal waters, which concentrates in filter-feeding oysters. Proposed FDA legislation requiring processing of all raw Gulf oysters sold during warmer summer months threatens the Gulf oyster industry, as little to no research regarding demand for post-harvest processing (PHP) has preceded the potential mandate. This research endeavors to examine the relationship between oyster consumers' fears of V.vulnificus infection and their willingness-to-pay (WTP) for processing of an oyster meal. The psychological model of Protection Motivation Theory (PMT) is employed alongside the economic framework of contingent valuation (CV) to result in an analysis of oyster processing demand with respect to threats and efficacy. A survey administered to 2,172 oyster consumers in six oyster producing states elicits projected consumption and PMT data. Principal Component Analysis is used to reduce the number of PMT variables to a smaller size, resulting in five individual principal components representing the PMT elements of source information, threat appraisal, coping appraisal, maladaptive coping, and protection motivation. Using survey data, the marginal willingness-to-pay (MWTP) for PHP per oyster meal is also calculated, and the five created PMT variables are regressed on this calculation using four separate OLS models. Results indicate significant correlation for four of the five created PMT variables. In addition, a mean MWTP for PHP of $0.31 per oyster meal is determined, contributing to the demand analysis for processing of Gulf oysters. The findings suggest a strong relationship between the fear elements and the demand for processing, and support arguments in favor of further research on specific PHP treatments and the necessity for a valid PMT survey instrument.
APA, Harvard, Vancouver, ISO, and other styles
42

Chou, Hui-lien, and 周慧蓮. "Taiwan Teenagers’ Privacy Practices on Social Networking Sites: An Analysis of Multiple Factors Based on the Protection Motivation Theory." Thesis, 2018. http://ndltd.ncl.edu.tw/handle/sa5v23.

Full text
Abstract:
博士
國立交通大學
教育研究所
106
The advent of the Internet has changed people’s life revolutionarily. Second thoughts about the technology use, however, always have to run in response to the fears expressed in the context of online privacy. Among all the Internet activities, social networking sites (SNSs) offer many mechanisms for users to share personal data as well as to restrict the access to the disclosure. However, underage students (in the current study, aged 18 or below) are often not mature enough to be aware of online risks as well as safeguards. Facebook, being prominent SNS for the underage students in Taiwan, is thus chosen as the main theme to explore factors relating to online privacy practices. In the current study, the Protection Motivation Theory (PMT) is adopted to explain why underage students conduct various privacy practices when confronted with the risks. According to the PMT, an individual will appraise the factors incurring threats as well as the competence of tackling the incidents, and then decide to keep or modify the behavior. The key components of the PMT involve perceived vulnerability, perceived severity, self-efficacy, response efficacy and response costs. This study has six research questions. The first one is to find out the prevalence of Facebook usage among the underage students in Taiwan. The second one is to grasp a general understanding of students’ protective and problematic privacy practices on Facebook. The third one is to investigate the gender difference of students’ privacy practices. The fourth to the sixth research questions are to explore the factors relating to students’ privacy practices and the schooling level differences thereof. These research questions were answered by the analysis of the quantitative data collected from the cross-sectional surveys. The survey involves respondents' general information, the PMT measurement instrument, and ten indicators concerning online privacy practices developed based on the prior studies. Multistage sampling was adopted to secure a representative sample of the underage students all around Taiwan. With a response rate of 20%, the team collected 714, 1057 and 990 questionnaires from students in three schooling levels (elementary, junior high, and senior high schools) respectively. According to the analytical results, the students in primary education engage in less protective privacy practices than those in secondary education do. The younger students also conduct more problematic practices towards themselves than older ones do. It highlights the necessity of privacy education for the underage. Males in the secondary education, when compared with females, are less willing to conduct the protective privacy practices. On the other hand, males are more inclined to conduct problematic privacy practices. The last finding is the “new” relationships between the PMT components and underage students’ online privacy practices. That is, perceived vulnerability is perplexing in explaining students’ privacy practices. However, perceived severity bears a consistent relationship with privacy practices for students across three schooling levels. Response efficacy links positively to senior high school students’ protective practices, and negatively to problematic practices. Response costs have no significant relationship with protective practices, but relate positively to problematic practices for students in secondary education. Several suggestions for the instructional designs of the privacy education are proposed based on the results of the analyses. A new framework of exploring factors relating to students’ privacy practices is presented as well.
APA, Harvard, Vancouver, ISO, and other styles
43

Plotnikoff, Ronald C. "An application of protection motivation theory to coronary heart disease risk factor behaviour in three Australian samples: community adults, cardiac patients, and school children." Thesis, 1994. http://hdl.handle.net/1959.13/1415858.

Full text
Abstract:
Research Doctorate - Doctor of Philosophy (PhD)
The Hunter Region of New South Wales has high levels of heart disease risk factors; its population has one of the highest rates of coronary heart disease (CHD) in Australia. This thesis sought to gain an understanding of the thought process involved in achieving desired change in risk factor behaviour among samples of this regions' residents. The research had two main aims: 1. To develop valid and reliable instruments to measure people's motivation to take protection against CHD; and, 2. To test the Protection Motivation Theoretical Model with respect to CHD risk factor behaviours. Protection Motivation refers to the cognitive process mediating health attitudes and behaviours. It concerns how individuals think about health threats and select responses to cope with danger brought about by those threats. A subsidiary aim tested the recently developed Ordered Protection Motivation Theoretical Model. Each of these rums was pursued in three separate study populations: an adult community (N =800); cardiac patients (N = 147); and school children (N = 151). Measurement of risk factor behaviour consisted of assessing the extent to which subjects follow a low-fat diet, maintain adequate exercise and do not smoke cigarettes. For the Cardiac and School Studies, the developed instruments were further tested for their sensitivity to detect the effects of heart health interventions. The results revealed that the study was generally successful in developing valid and reliable measures of the PMT model over the three separate population groups. Evaluation of the validity and reliability of the theory's domains was demonstrated through the psychometric robustness of these measures. The test of the Protection Motivation Theory revealed that CHD threat components had negligible effects on risk factor intentions and behaviours. The coping appraisal variables, however, demonstrated a greater influence on the outcome measures; self--efficacy was the most powerful mediating variable. Fear had a stronger role in Protection Motivation Theory than the theory hypothesised and the Ordered Protection Motivation Theory was partially supported. Recommendations based on these findings suggest that: (1) the developed measures from this research can be utilised by health professionals, program evaluators and academic researchers; and (2), that education and health promotion programs for the prevention of CHO should focus upon enhancing people's self-efficacy to follow a low-fat diet, maintain adequate exercise and not smoke.
APA, Harvard, Vancouver, ISO, and other styles
44

Tasantab, Jerry Chati. "Beyond coping in informal settlements: the factors influencing flood risk adaptation intentions." Thesis, 2021. http://hdl.handle.net/1959.13/1432279.

Full text
Abstract:
Research Doctorate - Doctor of Philosophy (PhD)
Flooding is a nightmare in many parts of the world, with the poor and vulnerable usually the worst affected. Extensive flood risks are a significant concern in many countries, including Ghana, where localised annual flooding is common in urban areas. There is concern that climate change will increase the intensity of precipitation, with resultant flooding affecting vulnerable populations, especially those in informal settlements in developing countries. Households in the informal settlements have habitually adopted coping measures to deal with the existing flood risks. Coping measures are reactive, short-term measures, and are unable to ensure resilience. Although coping measures are a critical part of building flood resilience, adaptation measures ensure proactive and long-term adjustments to existing and future flooding risk that increases resilience. Nevertheless, adaptation measures that can build the resilience of households are not adopted currently in Ghana, and this is placing lives at risk. Only a few empirical studies have focused on the flood risk adaptation intentions of informal settlements in the Ghanaian context. This research, therefore, investigates the informal settlements’ flood risk adaptation intentions, with a view to understanding how flood experience, fear, coping experience and cognitive appraisals affect those intentions. The conceptual position of this research is underpinned by the protection motivation theory (PMT). The application of PMT to the study of the flood risk adaptation intentions of households in informal settlements is novel. Therefore, a new conceptual model was developed, based on PMT, to examine how flood experience, fear, coping experience and cognitive appraisals influence flood risk adaptation intention. The study employed a convergent mixed methods design, comprising a concurrent quantitative and qualitative data collection approach. The research focused on Glefe, an informal settlement in Accra, Ghana, as a case study. The quantitative data was collected using a household survey, resulting in 392 responses. The qualitative data was collected from interviews with nineteen key informants, comprising seventeen community members and two National Disaster Management Organisation (NADMO) officials. The quantitative data was then analysed using Structural Equation Modelling (SEM) analysis with the support of Statistical Package for the Social Sciences (SPSS) and WarpPLS, while the qualitative data was analysed with thematic analysis with the aid of NVivo. The quantitative results showed that there exist statistically significant relationships between the aforementioned independent variables and flood risk adaptation intentions. With few exceptions, the hypothesised relationships in the conceptual model were generally supported by the results. The adaptation appraisal had a substantial positive influence on adaptation intention, explaining 68% of the variance. The qualitative findings also showed that the residents were fearful and anxious about current and future flooding risks. The households in the informal settlement also perceived that adaptation actions could be effective in reducing flooding risks and impacts. The qualitative results concurred with the quantitative results, underlining that household experiences and appraisals are vital in households’ flood risk adaptation intentions. The results revealed that there was a general willingness and intention to undertake adaptation measures against flooding. Crucially, the results indicated that flood experience and coping experience positively influenced the flood risk adaptation intentions of households in the informal settlement. The research results also found that informal settlement households place a greater emphasis on the response efficacy of adaptation measures than the cost or their self-efficacy. The findings of the research have, therefore, underscored the relevance of household experiences and appraisals to flood risk adaptation intentions in informal settlements, which may be crucial to aid transition, beyond coping, to adaptation to the impacts of climate change.
APA, Harvard, Vancouver, ISO, and other styles
45

Richards, Jay. "The case for health behaviour model comparison and theoretical integration: comparing and combining predictions of models in order to optimise the prediction of health behaviours." Thesis, 2015. http://hdl.handle.net/1959.13/1308165.

Full text
Abstract:
Research Doctorate - Doctor of Philosophy (PhD)
The health behaviour literature is currently littered with theoretical models offering competing accounts of the determinants of health behaviour. However, despite the large amount of research there is still no consensus regarding which model/s are the most useful and accurate. A reason for this is that there are few studies comparing these models for their effectiveness in explaining health behaviour. One method of determining which health behaviour models are superior is directly comparing models for accuracy. Another method of improving the prediction of health behaviour may be theoretical integration – that is combining predictions of multiple models within the rich health behaviour literature in order to develop an integrated model with greater explanatory power than its constituent models. The four research studies presented herein represent examples of how model comparison and theoretical integration may be applied to identify the existing health behaviour models with greatest explanatory power and to increase the explanatory power of such models respectively. Study 1 investigates how fear-based messages impact on individuals’ health knowledge. It also investigates whether health knowledge contributes to the prediction of intentions to exercise or adopt a healthy diet after controlling for Protection Motivation Theory constructs. Results suggest that fear-based messages do not affect information retention and that health knowledge does not explain unique variance in behavioural intentions. Studies 2 and 3 compared the predictions of the Theory of Planned Behaviour and Protection Motivation Theory. Study 2 was conducted in the context of smoking and Study 3 was conducted in the context of diet and exercise. An integrated model which combined the predictions of the Theory of Planned Behaviour and Protection Motivation Theory was also devised and tested. Results of both studies suggested that the Theory of Planned Behaviour was the superior model – performing equivalently or better than Protection Motivation Theory in terms of accuracy for all health behaviours investigated. Investigating the integrated model highlighted relationships between constructs of both theories – most notably a consistent relationship between response-efficacy and attitudes. Finally, in Study 4 an integrated model combining the predictions of the Extended Parallel Process Model, Theory of Planned Behaviour, Stage Model and Risk Perception Attitude Framework is devised and tested. This model attempted to explain individuals’ responses to a fear-provoking health message based on their existing psychological characteristics and the message components. It was found that fear-provoking messages elicited little change in individuals’ perceptions of threat and efficacy and their attitudes and intentions. However, fear-provoking messages were associated with greater fear and maladaptive defensive responses – especially in those who were not already engaging in health protective behaviour. Numerous heretofore undiscovered associations between constructs of these models (e.g., individuals’ thoughts concerning the fear-provoking health message [Stage Model] being associated with reactance, defensive avoidance, self- and response-efficacy [Extended Parallel Process Model]) were also highlighted as a result of investigating the predictions of the integrated model. Taken together these findings suggest that model comparison can be utilised to identify the superior model from a candidate set of models. Further, theoretical integration can be utilised to increase the explanatory power of existing health behaviour models. Implications for theory and practice are discussed at length.
APA, Harvard, Vancouver, ISO, and other styles
46

Gangire, Yotamu. "Assessing information security compliant behaviour using the self-determination theory." Diss., 2021. http://hdl.handle.net/10500/27798.

Full text
Abstract:
Information security research shows that employees are a source of some of the security incidents in the organisation. This often results from failure to comply with the Information Security Policies (ISPs). The question is, therefore, how to improve information security behaviour of employees so that it complies with the ISPs. This study aims to contribute to the understanding of information security behaviour, especially how it can be improved, from an intrinsic motivation perspective. A review of the literature suggested that research in information security behaviour is still predominantly based on the extrinsic perspective, while the intrinsic perspective has not received as much attention. This resulted in the study being carried out from the perspective of the self-determination theory (SDT) since this theory has also not received as much attention in the study of information security behaviour. The study then proposed an information security compliant behaviour conceptual model based on the self-determination theory, (ISCBMSDT). Based on this model, a questionnaire, the ISCBMSDT questionnaire, was developed using the Human Aspects of Information Security Questionnaire and SDT. Using this questionnaire, a survey (n = 263) was carried out at a South African university and responses were received from the academic, administrative and operational staff. The following statistical analysis of the data was carried out: exploratory factor analysis, reliability analysis, analysis of variance (ANOVA), independent samples test (t-tests) and Pearson correlation analysis. The responses to the survey questions suggest that autonomy questions received positive perception followed by competence questions and relatedness questions. The correlation analysis results show the existence of a statistically significant relationship between competence and autonomy factors. Also, a partial significant relationship between autonomy and relatedness factors as well as between competence and relatedness factors was observed. The exploratory factor analysis that was performed on the questionnaire produced 11 factors. Cronbach alpha was then computed for the eleven factors and all were found to be above 0.7, thus suggesting that the questionnaire is valid and reliable. The results of the research study also suggest that competence and autonomy could be more important than relatedness in directing information security behaviour among employees.
School of Computing
M. Tech. (Information Technology)
APA, Harvard, Vancouver, ISO, and other styles
47

Negash, Wossen Assefa. "Development of an integrated framework for delivery care seeking behaviour among pregnant women in rural Ethiopia." Thesis, 2020. http://hdl.handle.net/10500/26943.

Full text
Abstract:
The aim of this study was to identify factors affecting facility-based delivery with the purpose of developing a framework for the promotion of facility-based delivery among women living in rural Ethiopia. Explanatory mixed methods design, comprising of four phases-the descriptive (quantitative), explorative (qualitative), meta-inference and development phases was employed. The quantitative phase was conducted first using a structured questionnaire to identify the variables influencing facility-based delivery care seeking behaviour. A sample of 389 responses were used for data analysis using Structural Equation Modeling. The quantitative phase conducted next to explain the determinants that contributed to influencing facility-based delivery care seeking behaviour. Sixteen participants who were involved the first phase were involved in the follow-up second phase. As illustrated by the results of the study, the majority of women in the study areas continued to deliver at home, putting themselves at risk of dying from pregnancy related causes. As highlighted by the key findings from the quantitative and qualitative data of this study, the most influential factors in predicting and explaining delivery care seeking behaviour are response efficacy, attitude, subjective norm, and perceived behavioural control which are shaped by mothers’ confidence in the outcome, quality of care, interpersonal relations with family members, willingness to conform, access to services, and their decision making power. The way these findings emphasized the factors attitude, subjective norm and perceived behavioural control were consistent with the Theory of Planned Behaviour, while the significance of response efficacy was in line with Protection Motivation Theory. The study developed a framework to help promote facility-based delivery among mothers living in rural Ethiopia.
Health Studies
D. Litt. et Phil. (Health Studies)
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography