Construct name . | Label . | Definition . |
---|---|---|
Email security behavior | BEH | An individual’s self-reported behavior when using email |
Perceived benefits | BEN | An individual’s beliefs of the value of an email security behavior to reduce the risk of a security incident |
Perceived barriers | BAR | An individual’s own evaluation of the obstacles in the way of adopting a new email security behavior |
Self-efficacy | EFF | The belief in an individual’s own ability to practice an email security behavior |
Perceived vulnerability | VUL | The personal risk or susceptibility of contracting a condition caused by a security incident |
Cues to action | CUE | Events, things, or people that move people to change their email security behavior |
Prior experience | EXP | An individual’s previous negative experience with security incidents |
Perceived severity | SEV | An individual’s belief about the seriousness or severity of a security incident |
Construct name . | Label . | Definition . |
---|---|---|
Email security behavior | BEH | An individual’s self-reported behavior when using email |
Perceived benefits | BEN | An individual’s beliefs of the value of an email security behavior to reduce the risk of a security incident |
Perceived barriers | BAR | An individual’s own evaluation of the obstacles in the way of adopting a new email security behavior |
Self-efficacy | EFF | The belief in an individual’s own ability to practice an email security behavior |
Perceived vulnerability | VUL | The personal risk or susceptibility of contracting a condition caused by a security incident |
Cues to action | CUE | Events, things, or people that move people to change their email security behavior |
Prior experience | EXP | An individual’s previous negative experience with security incidents |
Perceived severity | SEV | An individual’s belief about the seriousness or severity of a security incident |
Construct name . | Label . | Definition . |
---|---|---|
Email security behavior | BEH | An individual’s self-reported behavior when using email |
Perceived benefits | BEN | An individual’s beliefs of the value of an email security behavior to reduce the risk of a security incident |
Perceived barriers | BAR | An individual’s own evaluation of the obstacles in the way of adopting a new email security behavior |
Self-efficacy | EFF | The belief in an individual’s own ability to practice an email security behavior |
Perceived vulnerability | VUL | The personal risk or susceptibility of contracting a condition caused by a security incident |
Cues to action | CUE | Events, things, or people that move people to change their email security behavior |
Prior experience | EXP | An individual’s previous negative experience with security incidents |
Perceived severity | SEV | An individual’s belief about the seriousness or severity of a security incident |
Construct name . | Label . | Definition . |
---|---|---|
Email security behavior | BEH | An individual’s self-reported behavior when using email |
Perceived benefits | BEN | An individual’s beliefs of the value of an email security behavior to reduce the risk of a security incident |
Perceived barriers | BAR | An individual’s own evaluation of the obstacles in the way of adopting a new email security behavior |
Self-efficacy | EFF | The belief in an individual’s own ability to practice an email security behavior |
Perceived vulnerability | VUL | The personal risk or susceptibility of contracting a condition caused by a security incident |
Cues to action | CUE | Events, things, or people that move people to change their email security behavior |
Prior experience | EXP | An individual’s previous negative experience with security incidents |
Perceived severity | SEV | An individual’s belief about the seriousness or severity of a security incident |
This PDF is available to Subscribers Only
View Article Abstract & Purchase OptionsFor full access to this pdf, sign in to an existing account, or purchase an annual subscription.