X
Search Filters
Format Format
Format Format
X
Sort by Item Count (A-Z)
Filter by Count
Journal Article (982) 982
Publication (57) 57
Conference Proceeding (56) 56
Dissertation (14) 14
Book Chapter (11) 11
Reference (8) 8
Report (5) 5
Magazine Article (3) 3
Book Review (2) 2
Electronic Resource (1) 1
Newspaper Article (1) 1
Paper (1) 1
more...
Subjects Subjects
Subjects Subjects
X
Sort by Item Count (A-Z)
Filter by Count
protection motivation theory (747) 747
humans (330) 330
fear appeals (313) 313
female (243) 243
protection motivation (226) 226
behavior (223) 223
index medicus (222) 222
male (211) 211
self-efficacy (195) 195
adult (191) 191
motivation (176) 176
health behavior (151) 151
risk (149) 149
public, environmental & occupational health (140) 140
protection-motivation theory (137) 137
middle aged (134) 134
planned behavior (134) 134
analysis (132) 132
perceptions (118) 118
studies (116) 116
communication (113) 113
model (112) 112
attitude-change (110) 110
health knowledge, attitudes, practice (108) 108
surveys and questionnaires (106) 106
metaanalysis (102) 102
risk perception (101) 101
adolescent (100) 100
psychology, multidisciplinary (96) 96
self efficacy (96) 96
intention (93) 93
management (90) 90
prevention (89) 89
attitudes (85) 85
psychology (85) 85
research (85) 85
intervention (83) 83
information science & library science (82) 82
young adult (79) 79
computer science, information systems (77) 77
health (74) 74
efficacy (73) 73
perception (73) 73
psychology, clinical (68) 68
fear (66) 66
intentions (66) 66
risk assessment (63) 63
information (62) 62
threat (60) 60
aged (59) 59
information security (59) 59
adolescents (57) 57
risk factors (53) 53
attitude to health (52) 52
business (51) 51
decision-making (50) 50
deterrence (50) 50
exercise (49) 49
health belief model (49) 49
health promotion (49) 49
psychological theory (49) 49
environmental sciences (48) 48
knowledge (48) 48
models, psychological (46) 46
internet (45) 45
decision making (44) 44
determinants (44) 44
impact (44) 44
psychological aspects (44) 44
safety and security measures (44) 44
security management (43) 43
health aspects (42) 42
models (42) 42
policy compliance (42) 42
parallel process model (41) 41
persuasion (41) 41
risk communication (41) 41
attitude (40) 40
cancer (40) 40
coping (40) 40
vulnerability (40) 40
computer security (39) 39
cross-sectional studies (39) 39
environmental studies (38) 38
persuasive communication (38) 38
public health (38) 38
physical-activity (37) 37
privacy (37) 37
psychology, social (37) 37
compliance (36) 36
health education (36) 36
usage (35) 35
women (34) 34
appeals (33) 33
cognition (33) 33
security (33) 33
theory of planned behavior (32) 32
climate change (31) 31
regression analysis (31) 31
trust (31) 31
more...
Language Language
Language Language
X
Sort by Item Count (A-Z)
Filter by Count
English (1032) 1032
Japanese (11) 11
Chinese (10) 10
Korean (10) 10
Persian (9) 9
French (3) 3
German (3) 3
Indonesian (1) 1
Italian (1) 1
Spanish (1) 1
more...
Publication Date Publication Date
Click on a bar to filter by decade
Slide to change publication date range


Computers & Security, ISSN 0167-4048, 2012, Volume 31, Issue 1, pp. 83 - 95
Journal Article
Information & Management, ISSN 0378-7206, 05/2012, Volume 49, Issue 3-4, pp. 190 - 198
Employees’ failure to comply with IS security procedures is a key concern for organizations today. A number of socio-cognitive theories have been used to... 
Habit theory | Protection Motivation Theory | Information security policy compliance | Information security | Scenario methodology | MANAGEMENT | INFORMATION | INFORMATION SCIENCE & LIBRARY SCIENCE | COMPUTER SCIENCE, INFORMATION SYSTEMS | DETERRENCE | MODEL
Journal Article
Journal of Management Information Systems, ISSN 0742-1222, 10/2017, Volume 34, Issue 4, pp. 1203 - 1230
Journal Article
Journal Article
Journal of Environmental Management, ISSN 0301-4797, 05/2019, Volume 237, pp. 15 - 23
Agricultural non-point source (NPS) pollution in water source protection areas poses serious challenges for governments in developing countries. It is... 
Non-point source pollution | Farmers' environmental behavior | Protection motivation theory | Theory of planned behavior | METAANALYSIS | CLIMATE-CHANGE | DROUGHT | DISCHARGE | INTENTIONS | ENVIRONMENTAL SCIENCES | MODELS | AREAS | WATER
Journal Article
Computers & Security, ISSN 0167-4048, 06/2016, Volume 59, pp. 138 - 150
Internet users experience a variety of online security threats that require them to enact safety precautions. Protection motivation theory (PMT) provides a... 
Habit strength | Protection motivation theory | Computer security | Response cost | Online safety | COMPUTER SCIENCE, INFORMATION SYSTEMS | MOBILE BANKING | MODEL | PLANNED BEHAVIOR | MECHANICAL TURK | INDIVIDUALS | USER ACCEPTANCE | SYSTEMS | FEAR APPEALS | INFORMATION SECURITY POLICIES | TECHNOLOGY | Safety and security measures | Internet
Journal Article
Health Psychology Review, ISSN 1743-7199, 05/2013, Volume 7, Issue S1, pp. S8 - S31
Journal Article
Journal of Environmental Management, ISSN 0301-4797, 02/2019, Volume 231, pp. 869 - 877
Journal Article
Annals of Behavioral Medicine, ISSN 0883-6612, 2007, Volume 33, Issue 1, pp. 1 - 10
Journal Article
Journal of Arid Environments, ISSN 0140-1963, 04/2016, Volume 127, pp. 128 - 136
Recurrent drought in arid and semi-arid regions poses serious challenges for populations whose livelihoods depend principally on natural resources. In order to... 
Drought impacts | Environment | Drought management | Vulnerability | Protection motivation theory | Conservation | RISKS |