Supply disruptions and protection motivation: Why some managers act proactively (and others don't)

Author(s):  
Christoph Bode ◽  
John R. Macdonald ◽  
Maximilian Merath
2015 ◽  
Author(s):  
Lynn Williams ◽  
Susan Rasmussen ◽  
Adam Kleczkowski ◽  
Savi Maharaj ◽  
Nicole Cairns

Author(s):  
Yumei Luo ◽  
Guiping Wang ◽  
Yuwei Li ◽  
Qiongwei Ye

M-health apps have developed rapidly and are widely accepted, but users’ continued intention to use m-health apps has not been fully explored. This study was designed to obtain a better understanding of users’ continued intention to use m-health apps. We developed a theoretical model by incorporating the protection motivation theory and network externalities and conducted an empirical study of a 368-respondent sample. The results showed that: (1) perceived vulnerability has a direct impact on users’ self-efficacy and response efficacy; (2) self-efficacy and response efficacy have a direct impact on users’ attitudes and continued intention; (3) network externalities affect users’ attitudes and continued intention, among which direct network externalities have an indirect impact on users’ continued intention through attitude; and (4) the impacts of self-efficacy, response efficacy, and indirect network externalities on continued intention are partially meditated by attitudes.


2021 ◽  
Vol 79 (1) ◽  
Author(s):  
Joris Adriaan Frank van Loenhout ◽  
Kirsten Vanderplanken ◽  
Bénédicte Scheen ◽  
Stephan Van den Broucke ◽  
Isabelle Aujoulat

Abstract Background Since the start of the COVID-19 outbreak, the Belgian government has implemented various infection prevention and control measures. This study assessed the extent to which the general population in Belgium adhered to these measures, and which determinants were associated with adherence. Methods We undertook an internet survey among a sample of the Belgian population, representative for sex, age, socio-economic status and province. The questionnaire included various demographic, socio-economic and health-related questions, and also drew upon the Protection Motivation Theory as a theoretical framework to measure levels of perceived severity, vulnerability, perceived usefulness of the measures (response efficacy), perceived personal capacity to adhere (self-efficacy), and past and future adherence. Data were collected in Dutch and French, the main languages of Belgium. Results Our study was carried out in September 2020, and the number of respondents was 2008. On average, respondents provided high scores for each of the measures in place in September in terms of response efficacy (range of 3.54–4.32 on 1 to 5 Likert-scale), self-efficacy (range of 3.00–4.00), past adherence (4.00–4.68) and future adherence (3.99–4.61). The measure that overall received the highest scores was wearing a face mask in public spaces, while ‘the social bubble of 5’ generally received the lowest scores. There was a statistically significant relationship between response efficacy and self-efficacy on the one hand and (past and future) adherence on the other hand, in a multivariate model corrected for confounders. Vulnerability and severity did not show statistical significance. Conclusion Risk communication regarding COVID-19 should place a stronger emphasis on helping people understand why implemented measures are useful and how they can be put into practice, more than on increasing fear appeals.


Author(s):  
Steffi Haag ◽  
Mikko Siponen ◽  
Fufan Liu

Protection motivation theory (PMT) is one of the most commonly used theories to examine information security behaviors. Our systematic review of the application of PMT in information systems (IS) security and the comparison with its application for decades in psychology identified five categories of important issues that have not yet been examined in IS security research. Discussing these issues in terms of why they are relevant and important for IS security, and to what extent IS research has not considered them, offers new research opportunities associated with the study of PMT and IS security threats. We suggest how future studies can approach each of the open issues to provide a new road map for quantitative and qualitative IS scholars.


Sign in / Sign up

Export Citation Format

Share Document