详情请进入 湖南阳光电子学校 已关注:人 咨询电话:0731-85579057 微信号:yp941688, yp94168
Download:
(1340KB)
(
461
)
Export: BibTeX | EndNote (RIS)
Abstract
This paper adds perceived threat and descriptive norms into Protection Motivation Theory (PMT) and con.structs the model of factors that influencing smartphone users’information security behavior. Then, the paper verifiesthe model through a questionnaire study and structural equation. The results show that perceived threat, response effica. cy and self-efficacy have a significant effect on smartphone users’information security behavior intention, response cost has no influence on behavior intention. Perceived vulnerability and perceived severity have indirect effects through perceived threat on smartphone users’information security behavior intention. The information security behav. ior intention of smartphone users is not only affected by the constructs considered in PMT, but also by other factors such as descriptive norms.
Published: 25 January 2018
Service
E-mail Alert
RSS
()
Articles by authors
Cite this article:
Zhang Xiaojuan Li Zhenzhen. Empirical Study on Influencing Factors of Smartphone Users' Information Security Behavior Intention. Information and Documentation Services, 2018, 39(1): 74-80.
URL:OR
No related articles found!
[1] . An Exploration of the Application and Practice of Library Strategic Planning Guide in China[J]. Information and Documentation Services, 2013, 34(1): 11 -15 .
[2] Xu Chunman. The Construction of Ubiquitous Learning Shared Space in the Visual Threshold of Contemporary Learning Theory[J]. Information and Documentation Services, 2013, 34(1): 27 -32 .
[3] Yang Mei . Research on the Information Guarantee System of Migrant Workers in the Citizenization Process[J]. Information and Documentation Services, 2013, 34(1): 33 -37 .
[4] Li Peng Han Yi. Research on Field Theory-based Information Aggregation Fields: Reflection on the Information Communication Behavior Places[J]. Information and Documentation Services, 2013, 34(1): 47 -51 .
[5] Jiang Jie. Cloud Data Security Risks and Regulation Framework[J]. Information and Documentation Services, 2013, 34(1): 57 -60 .
[6] . A study of the System Framework of Open Access User Service: Based on the Perspective of Folksonomy and Ontology Fusion[J]. Information and Documentation Services, 2013, 34(1): 76 -80 .
[7] Liu Jinyuan1,2 Cao Shujin2 Zhang Li2,3. Causal Mechanisms of Library Service Quality and Service Loyalty: Local Evidence and International Experience[J]. Information and Documentation Services, 2013, 34(1): 81 -85 .
[8] Li Lingli, Wu Xinnian Zhang Fu. Investigation and Analysis of Open Scientific Social Network Application: Taking Academia.edu for Example[J]. Information and Documentation Services, 2013, 34(1): 90 -93 .
[9] Hu Fang. Typical Cases and Inspiration of PDA-based Collaborative Collection Building of Foreign Libraries: Taking the Practice of University at Buffalo in America for Example[J]. Information and Documentation Services, 2013, 34(1): 98 -101 .
[10] Liu Zhifang. Research on the Identification of Infringing Information Network Communication Right of Library Mirror Service and Deep Links[J]. Information and Documentation Services, 2013, 34(1): 110 -112 .
Viewed
Full text
Abstract
Cited
Shared
Discussed
,晚上骑机车视频,2019摩托车报价及图片大全,15秒机车飙车短视频,15秒机车飙车短视频,6000左右最好摩托,龙嘉摩托车官方网,摩托,2019最好踏板摩托车排名,有斗门牌摩托车转让,2019新款中申太子摩托车,街车价格排行榜1~3万,2019新出踏板摩托车,雅马哈水冷150踏板车,赛摩比赛视频大全,2019最好的合资踏板摩托车,摩托车品牌排行榜,3万元内街车,赛摩比赛视频大全,二手买卖车,摩托机车之家2019最新报价,摩托车跑车比赛视频欣赏,最值得买的一万摩托车,雅马哈水冷150踏板车,一万左右的重机车,2019款铃木v125s踏板摩托车,3万左右的太子摩托车,买摩托车的平台,开125摩托车教学视频,交警扣押摩托车出售,川崎1万左右,15秒机车飙车短视频,报废125摩托车多少钱,交警扣押摩托车出售,3万以内的重机车,10000左右的街车推荐,有斗门牌摩托车转让,街车价格排行榜1~3万,川崎1万左右,龙嘉摩托车官方网,交警扣押摩托车出售,摩托赛车比赛视频直播,23万买什么机车好,3万以内的重机车,3万元内街车,二手125摩托车有人买吗,雅马哈tzm150历史,斗门二手摩托车,摩托车铝合金三箱排名,深夜机车飙车视频,2019新出踏板摩托车,摩托边箱哪个品牌好,世界摩托车锦标赛官网,2019新款太子摩托车,摩托600c赛车视频,一万左右的重机车,摩托车夜间骑行视频,深夜机车飙车视频,大飙车视频,珠海市二手摩托车转让,2019年大贸进口摩托车。鹤山市装修工培训学校,鹤山市装修工培训班,鹤山市装修工学校,鹤山市学装修工的学校,鹤山市装修工培训哪里好,鹤山市装修工培训学校,鹤山市装修工短期培训班,鹤山市装修工培训学校地址,鹤山市学装修工培训,鹤山市装修工培训哪里好,鹤山市装修工培训班,鹤山市装修工技术培训.(编辑:hnygdzxx888)(整理:鹤山市装修工培训学校)
湖南阳光电子学校教学特色