Table 2.

Construct definitions for the research model presented in Fig. 1.

Construct nameLabelDefinition
Email security behaviorBEHAn individual’s self-reported behavior when using email
Perceived benefitsBENAn individual’s beliefs of the value of an email security behavior to reduce the risk of a security incident
Perceived barriersBARAn individual’s own evaluation of the obstacles in the way of adopting a new email security behavior
Self-efficacyEFFThe belief in an individual’s own ability to practice an email security behavior
Perceived vulnerabilityVULThe personal risk or susceptibility of contracting a condition caused by a security incident
Cues to actionCUEEvents, things, or people that move people to change their email security behavior
Prior experienceEXPAn individual’s previous negative experience with security incidents
Perceived severitySEVAn individual’s belief about the seriousness or severity of a security incident
Construct nameLabelDefinition
Email security behaviorBEHAn individual’s self-reported behavior when using email
Perceived benefitsBENAn individual’s beliefs of the value of an email security behavior to reduce the risk of a security incident
Perceived barriersBARAn individual’s own evaluation of the obstacles in the way of adopting a new email security behavior
Self-efficacyEFFThe belief in an individual’s own ability to practice an email security behavior
Perceived vulnerabilityVULThe personal risk or susceptibility of contracting a condition caused by a security incident
Cues to actionCUEEvents, things, or people that move people to change their email security behavior
Prior experienceEXPAn individual’s previous negative experience with security incidents
Perceived severitySEVAn individual’s belief about the seriousness or severity of a security incident
Table 2.

Construct definitions for the research model presented in Fig. 1.

Construct nameLabelDefinition
Email security behaviorBEHAn individual’s self-reported behavior when using email
Perceived benefitsBENAn individual’s beliefs of the value of an email security behavior to reduce the risk of a security incident
Perceived barriersBARAn individual’s own evaluation of the obstacles in the way of adopting a new email security behavior
Self-efficacyEFFThe belief in an individual’s own ability to practice an email security behavior
Perceived vulnerabilityVULThe personal risk or susceptibility of contracting a condition caused by a security incident
Cues to actionCUEEvents, things, or people that move people to change their email security behavior
Prior experienceEXPAn individual’s previous negative experience with security incidents
Perceived severitySEVAn individual’s belief about the seriousness or severity of a security incident
Construct nameLabelDefinition
Email security behaviorBEHAn individual’s self-reported behavior when using email
Perceived benefitsBENAn individual’s beliefs of the value of an email security behavior to reduce the risk of a security incident
Perceived barriersBARAn individual’s own evaluation of the obstacles in the way of adopting a new email security behavior
Self-efficacyEFFThe belief in an individual’s own ability to practice an email security behavior
Perceived vulnerabilityVULThe personal risk or susceptibility of contracting a condition caused by a security incident
Cues to actionCUEEvents, things, or people that move people to change their email security behavior
Prior experienceEXPAn individual’s previous negative experience with security incidents
Perceived severitySEVAn individual’s belief about the seriousness or severity of a security incident
Close
This Feature Is Available To Subscribers Only

Sign In or Create an Account

Close

This PDF is available to Subscribers Only

View Article Abstract & Purchase Options

For full access to this pdf, sign in to an existing account, or purchase an annual subscription.

Close