Search results for "motivation theory"
showing 9 items of 9 documents
What factors relate to three profiles of perception of motor competence in young children?
2022
The study aims were to 1) examine profiles of perception of motor competence (PMC) in relation to actual motor competence (AMC), i.e. under-estimators (UEs), realistic estimators (REs) and over-estimators (OEs) and 2) investigate associations between the profiles and selected socioecological factors at the individual, family and environmental levels. PMC (Pictorial Scale of Perceived Movement Skill Competence) and AMC (Test of Gross Motor Development-Third Edition) were administered to a representative sample of children from 37 childcare centres in Finland (n=441;6.2±0.6yrs;52% boys). Socioecological factors were investigated using a parental questionnaire. The three profiles were formed b…
The Use of Fear Appeals in Greek Magazine Advertisements
2015
This paper examines fear appeals in Greek magazine advertisements. A total number of 3,262 advertisements were selected from a sample of 14 magazines representing various genre. Advertisements were content analyzed, on the basis of fear appeal categories and consequences. The findings indicate that advertisements use the fear appeal in 16.46 percent of the total number examined. Positive fear appeals and social consequence theme show the highest frequency of appearance with 91.06 and 79.83 percent respectively. There is also a variance in the use of various types of fear appeals, according to magazine classifications and product categories.
Exploring determinants of different information security behaviors
2016
Aim: The aim was to introduce new explanatory construct, namely illegitimate tasks from Stress-as-Offense-to-Self Theory (SOS), to better understand information security behavior (ISB). In addition, more commonly used constructs from Deterrence theory (DT) and Protection Motivation Theory (PMT) were used to explain ISB. This study also investigated several behaviors separately to evaluate the generalizability of the behavioral determinants. Methods: Four ISBs, namely general ISP compliance (ISP), not copying sensitive information to the unsecured USB drive (USB), locking or logging out from the computer (LOG), and not writing down passwords (PSW). Formal and informal sanctions from DT, thre…
Developing and Validating a Behavioural Model of Cyberinsurance Adoption
2021
Business disruption from cyberattacks is a growing concern, yet cyberinsurance uptake remains low. Using an online behavioural economics experiment with 4800 participants across four EU countries, this study tests a predictive model of cyberinsurance adoption, incorporating elements of Protection Motivation Theory (PMT) and the Theory of Planned Behaviour (TPB) as well as factors in relation to risk propensity and price. During the experiment, participants were given the opportunity to purchase different cybersecurity measures and cyberinsurance products before performing an online task. Participants likelihood of suffering a cyberattack was dependent upon their adoption of cybersecurity me…
Evaluating the missing links in the relationship between executives' compensation and firm performance
2014
The research on the relationship between executive compensation and firm performance is extensive but has produced inconsistent results and, typically, weak explanatory power. One cause of these results is use of an incomplete theoretical framework that ignores some variables that are related to these two concepts. We explore the missing links between them. The paper contributes to scholarly and practical understanding of this important issue in the literature by extending and combining agency theory, upper echelons theory, and motivation theory perspectives. The paper develops a model that describes and explains the interactive relationship between executive managerial ability, executive c…
Why Is Your Crowd Abandoning You? : Exploring Crowdsourcing Discontinuance through the Lens of Motivation Theory
2019
A typical crowdsourcing platform connects organisations in need for workforce to individuals willing to work for a compensation. Considering that a motivated crowd constitutes a vital resource of such platforms, nurturing it becomes a crucial managerial consideration. Yet, little is known of why individual workers abandon crowdsourcing platforms after long periods of usage. Therefore, we set out to explore how crowd-workers’ motivations change during a platform’s usage lifecycle, from initial usage, to continued use, to its eventual abandonment. To this end, we conducted an in-depth qualitative inquiry into a popular crowdsourcing platform in the software-testing domain. Leveraging self-det…
Using protection motivation theory in the design of nudges to improve online security behavior
2019
Abstract We conducted an online experiment (n = 2024) on a representative sample of internet users in Germany, Sweden, Poland, Spain and the UK to explore the effect of notifications on security behaviour. Inspired by protection motivation theory (PMT), a coping message advised participants on how to minimize their exposure to risk and a threat appeal highlighted the potential negative consequences of not doing so. Both increased secure behavior – but the coping message significantly more so. The coping message was also as effective as both messages combined, but not so the threat appeal. Risk attitudes, age and country had a significant effect on behavior. Initiatives seeking to promote se…
Protection Motivation Theory in Information Systems Security Research
2021
Protection motivation theory (PMT) is one of the most commonly used theories to examine information security behaviors. Our systematic review of the application of PMT in information systems (IS) security and the comparison with its application for decades in psychology identified five categories of important issues that have not yet been examined in IS security research. Discussing these issues in terms of why they are relevant and important for IS security, and to what extent IS research has not considered them, offers new research opportunities associated with the study of PMT and IS security threats. We suggest how future studies can approach each of the open issues to provide a new roa…
Understanding the inward emotion-focused coping strategies of individual users in response to mobile malware threats
2021
According to coping theory, individuals cope with information system threats by adopting either problem-focused coping (PFC) or emotion-focused coping (EFC). However, little is known about EFC in the information security (ISec) literature. Moreover, there is potential confusion regarding the meaning of some EFC strategies. Hence, ISec scholars and practitioners may (i) have a narrow view of EFC or (ii) confuse it with other concepts. In this study, we offer one response to this issue. We first address the ambiguity regarding EFC before differentiating five inward EFC strategies and assessing them empirically in the mobile malware context. To the best of our knowledge, this study is the firs…