Search results for "motivation theory"

showing 9 items of 9 documents

What factors relate to three profiles of perception of motor competence in young children?

2022

The study aims were to 1) examine profiles of perception of motor competence (PMC) in relation to actual motor competence (AMC), i.e. under-estimators (UEs), realistic estimators (REs) and over-estimators (OEs) and 2) investigate associations between the profiles and selected socioecological factors at the individual, family and environmental levels. PMC (Pictorial Scale of Perceived Movement Skill Competence) and AMC (Test of Gross Motor Development-Third Edition) were administered to a representative sample of children from 37 childcare centres in Finland (n=441;6.2±0.6yrs;52% boys). Socioecological factors were investigated using a parental questionnaire. The three profiles were formed b…

liikuntataidotminäkuvaphysical self-perceptionleikki-ikäisetPhysical self-perceptionsocioecological modellapset (ikäryhmät)motoriset taidotarviointifundamental movement skillstgmd-3competence motivation theory
researchProduct

The Use of Fear Appeals in Greek Magazine Advertisements

2015

This paper examines fear appeals in Greek magazine advertisements. A total number of 3,262 advertisements were selected from a sample of 14 magazines representing various genre. Advertisements were content analyzed, on the basis of fear appeal categories and consequences. The findings indicate that advertisements use the fear appeal in 16.46 percent of the total number examined. Positive fear appeals and social consequence theme show the highest frequency of appearance with 91.06 and 79.83 percent respectively. There is also a variance in the use of various types of fear appeals, according to magazine classifications and product categories.

Product categoryProtection motivation theoryPolitical scienceSocial consequenceAdvertisingConsumer researchFear appealTheme (narrative)
researchProduct

Exploring determinants of different information security behaviors

2016

Aim: The aim was to introduce new explanatory construct, namely illegitimate tasks from Stress-as-Offense-to-Self Theory (SOS), to better understand information security behavior (ISB). In addition, more commonly used constructs from Deterrence theory (DT) and Protection Motivation Theory (PMT) were used to explain ISB. This study also investigated several behaviors separately to evaluate the generalizability of the behavioral determinants. Methods: Four ISBs, namely general ISP compliance (ISP), not copying sensitive information to the unsecured USB drive (USB), locking or logging out from the computer (LOG), and not writing down passwords (PSW). Formal and informal sanctions from DT, thre…

suojautuminenDeterrence TheoryInformation security behaviorStress-as-Offense-to-Self TheorytietoturvaProtection Motivation Theory
researchProduct

Developing and Validating a Behavioural Model of Cyberinsurance Adoption

2021

Business disruption from cyberattacks is a growing concern, yet cyberinsurance uptake remains low. Using an online behavioural economics experiment with 4800 participants across four EU countries, this study tests a predictive model of cyberinsurance adoption, incorporating elements of Protection Motivation Theory (PMT) and the Theory of Planned Behaviour (TPB) as well as factors in relation to risk propensity and price. During the experiment, participants were given the opportunity to purchase different cybersecurity measures and cyberinsurance products before performing an online task. Participants likelihood of suffering a cyberattack was dependent upon their adoption of cybersecurity me…

cybersecurityMoral hazardtheory of planned behaviourGeography Planning and Development0211 other engineering and technologiesPsychological interventionTJ807-83002 engineering and technologyManagement Monitoring Policy and LawTD194-195Structural equation modelingRenewable energy sourcesTask (project management)SAFER0502 economics and businessRisk propensityGE1-350050207 economics021110 strategic defence & security studiesActuarial scienceEnvironmental effects of industries and plantsRenewable Energy Sustainability and the Environmentcyberinsuranceprotection motivation theory05 social sciencesTheory of planned behaviorG900C800Environmental sciencesProtection motivation theoryPsychologySustainability
researchProduct

Evaluating the missing links in the relationship between executives' compensation and firm performance

2014

The research on the relationship between executive compensation and firm performance is extensive but has produced inconsistent results and, typically, weak explanatory power. One cause of these results is use of an incomplete theoretical framework that ignores some variables that are related to these two concepts. We explore the missing links between them. The paper contributes to scholarly and practical understanding of this important issue in the literature by extending and combining agency theory, upper echelons theory, and motivation theory perspectives. The paper develops a model that describes and explains the interactive relationship between executive managerial ability, executive c…

MicroeconomicsVariable (computer science)Executive compensationArgumentCompensation (psychology)Principal–agent problemEconomicsStrategic ChoiceMotivation theoryExplanatory powerGeneral Business Management and AccountingInternational Journal of Business and Globalisation
researchProduct

Why Is Your Crowd Abandoning You? : Exploring Crowdsourcing Discontinuance through the Lens of Motivation Theory

2019

A typical crowdsourcing platform connects organisations in need for workforce to individuals willing to work for a compensation. Considering that a motivated crowd constitutes a vital resource of such platforms, nurturing it becomes a crucial managerial consideration. Yet, little is known of why individual workers abandon crowdsourcing platforms after long periods of usage. Therefore, we set out to explore how crowd-workers’ motivations change during a platform’s usage lifecycle, from initial usage, to continued use, to its eventual abandonment. To this end, we conducted an in-depth qualitative inquiry into a popular crowdsourcing platform in the software-testing domain. Leveraging self-det…

motivaatioalustatalousjoukkoistaminencrowdsourcingIS discontinuancemotivation theorymotivointi
researchProduct

Using protection motivation theory in the design of nudges to improve online security behavior

2019

Abstract We conducted an online experiment (n = 2024) on a representative sample of internet users in Germany, Sweden, Poland, Spain and the UK to explore the effect of notifications on security behaviour. Inspired by protection motivation theory (PMT), a coping message advised participants on how to minimize their exposure to risk and a threat appeal highlighted the potential negative consequences of not doing so. Both increased secure behavior – but the coping message significantly more so. The coping message was also as effective as both messages combined, but not so the threat appeal. Risk attitudes, age and country had a significant effect on behavior. Initiatives seeking to promote se…

Online securityCoping (psychology)Nudge theoryG40005 social sciencesApplied psychologyGeneral EngineeringAppealHuman Factors and Ergonomics02 engineering and technologyBehavioral economicsFear appealC800EducationHuman-Computer InteractionProtection motivation theoryHardware and Architecture020204 information systems0502 economics and business0202 electrical engineering electronic engineering information engineering050211 marketingInternet usersPsychologySoftwareInternational Journal of Human-Computer Studies
researchProduct

Protection Motivation Theory in Information Systems Security Research

2021

Protection motivation theory (PMT) is one of the most commonly used theories to examine information security behaviors. Our systematic review of the application of PMT in information systems (IS) security and the comparison with its application for decades in psychology identified five categories of important issues that have not yet been examined in IS security research. Discussing these issues in terms of why they are relevant and important for IS security, and to what extent IS research has not considered them, offers new research opportunities associated with the study of PMT and IS security threats. We suggest how future studies can approach each of the open issues to provide a new roa…

Future studiesKnowledge managementthreat messageliterature reviewkäyttäjätComputer Networks and CommunicationsuhatInformation systems securityasenteet02 engineering and technologyProtection Motivation TheoryManagement Information Systemssuojelumotivaaatioteoria020204 information systems0502 economics and business0202 electrical engineering electronic engineering information engineeringIs securityInformation systemRoad maptietoturvasuojelutietojärjestelmätbehavioral IS securitybusiness.industry05 social sciencesInformation securityIS security threatFear appealProtection motivation theoryfear appeal050211 marketingbusinessACM SIGMIS Database: the DATABASE for Advances in Information Systems
researchProduct

Understanding the inward emotion-focused coping strategies of individual users in response to mobile malware threats

2021

According to coping theory, individuals cope with information system threats by adopting either problem-focused coping (PFC) or emotion-focused coping (EFC). However, little is known about EFC in the information security (ISec) literature. Moreover, there is potential confusion regarding the meaning of some EFC strategies. Hence, ISec scholars and practitioners may (i) have a narrow view of EFC or (ii) confuse it with other concepts. In this study, we offer one response to this issue. We first address the ambiguity regarding EFC before differentiating five inward EFC strategies and assessing them empirically in the mobile malware context. To the best of our knowledge, this study is the firs…

Coping (psychology)vaikutuksetApplied psychologyuhatasenteetMobile malwareCoping theoryArts and Humanities (miscellaneous)tunteetDevelopmental and Educational PsychologyInformation systemtietoturvariskittietojärjestelmättorjuntaturvallisuusEmotion focusedprotection motivation theoryselviytyminenGeneral Social SciencestietoturvakäyttäytyminenHuman-Computer InteractionhaittaohjelmatProtection motivation theoryinformation security behaviourPsychologyinward emotion-focused copingcoping theory
researchProduct