• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 20
  • 12
  • 4
  • 2
  • Tagged with
  • 45
  • 45
  • 45
  • 17
  • 13
  • 13
  • 11
  • 11
  • 9
  • 9
  • 9
  • 8
  • 7
  • 7
  • 5
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
21

Ransomware-attacker : En kvalitativ studie kring informationssäkerhetsarbetet inom mindre svenska kommuner

Järgenstedt, Tindra, Kvernplassen, Nelly January 2023 (has links)
Ransomware-attacker har blivit ett allt större hot i och med samhällets ständigt pågående digitalisering. Denna studie undersöker vilka faktorer som är viktiga för att förhindra ransomware-attacker mot mindre svenska kommuner. För att åstadkomma detta genomfördes semistrukturerade intervjuer med sex olika respondenter. De som intervjuades arbetade alla i mindre svenska kommuner och hade god insyn och kunskap kring kommunens IT- och informationssäkerhetsarbete. Materialet analyserades sedan utifrån Protection Motivation Theory (PMT). Studien diskuterar både kommunernas attityd till informationssäkerhet samt konstaterar vilka säkerhetsåtgärder som utmärker sig som viktigast. Dessa var skyddade säkerhetskopior, utbildning samt kontinuitetsplaner kopplade till just IT-attacker. / Ransomware attacks have become an increasing threat with the ongoing digitalization of society. This study investigates what factors are important to prevent ransomware attacks against smaller Swedish municipalities. To accomplish this, semi-structured interviews were conducted with six different respondents. The interviewees all worked in smaller Swedish municipalities and had good insight and knowledge of the municipality's IT and information security work. The material was then analyzed using Protection Motivation Theory (PMT). The study discusses both the municipalities' attitude to information security and notes which security measures stand out as most important. These were protected backups, education and continuity plans linked to IT attacks. The paper then concludes with suggestions for further research.
22

Cardiovascular health behaviours and health needs among people with psychiatric disabilities.

Leas, Loranie, mikewood@deakin.edu.au January 2004 (has links)
Recent research in Australia has found that people with a mental illness experience higher mortality rates from preventable illnesses, such as cardiovascular disease, respiratory disease and diabetes compared to the general population. Lifestyle and other behavioural factors contribute significantly to these illnesses. Lifestyle behaviours that affect these illnesses include lack of physical activity, consumption of a poor diet and cigarette smoking. Research on the influence of these factors has been mainly directed towards the mainstream population in Australia. Consequently, there remains limited understanding of health behaviours among individuals with psychiatric disabilities, their health needs, or factors influencing their participation in protective health behaviours. This thesis presents findings from two studies. Study 1 evaluated the utility of the main components of Roger’s (1983) Protection Motivation Theory (PMT) to explain health behaviours among people with a mental illness. A clinical population of individuals with schizophrenia (N=83), Major Depressive Disorder (MDD) (N=70) and individuals without a mental illness (N=147) participated in the study. Respondents provided information on intentions and self-reported behaviour of engaging in physical activity, following a low-fat diet, and stopping smoking. Study 2 investigated the health care service needs of people with psychiatric disabilities (N=20). Results indicated that the prevalence of overweight, cigarette smoking and a sedentary lifestyle were significantly greater among people with a mental illness compared to that reported for individuals without a mental illness. Major predictors of the lack of intentions to adopt health behaviours among individuals with schizophrenia and MDD were high levels of fear of cardiovascular disease, lack of knowledge of correct dietary principles, lower self-efficacy, a limited social support network and a high level of psychiatric symptoms. In addition, findings demonstrated that psychiatric patients are disproportionately higher users of medical services, but they are under-users of preventive medical care services. These differences are primarily due to a lack of focus on preventive health, feelings of disempowerment and lower satisfaction of patient-doctor relationships. Implications of these results are discussed in terms of designing education and preventive programs for individuals with schizophrenia and MDD.
23

Why do employees violate is security policies?:insights from multiple theoretical perspectives

Vance, A. (Anthony) 12 October 2010 (has links)
Abstract Employee violations of IS security policies is recognized as a key concern for organizations. Although interest in IS security has risen in recent years, little empirical research has examined this problem. To address this research gap, this dissertation identifies deliberate IS security policy violations as a phenomenon unique from other forms of computer abuse. To better understand this phenomenon, three guidelines for researching deliberate IS security violations are proposed. An analysis of previous behavioral IS security literature shows that no existing study meets more than one of these guidelines. Using these guidelines as a basis, this dissertation examines IS security policy violations using three theoretical models drawn from the following perspectives: neutralization theory, rational choice theory, and protection motivation theory. Three field studies involving surveys of 1,423 professional respondents belonging to 7 organizations across 47 countries were performed for empirical testing of the models. The findings of these studies identify several factors that strongly predict intentions to violate IS security policies. These results significantly increase our understanding of why employees choose to violate IS security policies and provide empirically-grounded implications for how practitioners can improve employee IS security policy compliance.
24

Exploring inappropriate glove use in long term care

Burdsall, Deborah Patterson 01 July 2016 (has links)
Healthcare personnel (HCP) frequently wear gloves when they care for patients in Standard Precautions to prevent contact with potentially infectious blood or body fluids. When HCP use gloves appropriately they reduce the risk of cross-contamination and decrease the risk of healthcare-associated infections (HAI). However, if HCP use gloves inappropriately they may inadvertently spread pathogens to patients and the patients’ environment. This study used a descriptive structured observational design to investigate three aspects of HCP glove use in a United States long-term care facility (LTCF). First, the PI examined the degree of inappropriate HCP glove use in a random sample of 76 HCP. Results indicate that the HCP used gloves inappropriately, failing to change gloves 66% of the time when a glove change was indicated. Over 44% of the HCP gloved touch points were defined as contaminated. Second, the PI examined the reliability of a new glove use tool (GUST). Results indicate the GUST is a reliable tool when used by trained observers documenting HCP glove use during toileting and perineal care events in LTCF, with intraclass correlation coefficients (ICC 2,1) over 0.75 for indicators of inappropriate glove use. Third, exploratory analysis indicated significant differences between inappropriate glove use in females and males. Female HCP had significantly more failed glove changes and contaminated touch points than male HCP in this study (p = 0.003). Future research studies should assess US HCP glove use to provide data needed for development of strategies to improve HCP glove use and reduce HAI.
25

Empirical Assessment of Mobile Device Users’ Information Security Behavior towards Data Breach: Leveraging Protection Motivation Theory

Giwah, Anthony Duke 01 January 2019 (has links)
User information security behavior has been an area of growing demand in information systems (IS) research. Unfortunately, most of the previous research done in user information security behavior have been in broad contexts, therefore creating a gap in the literature of similar research that focuses on specific emerging technologies and trends. With the growing reliance on mobile devices to increase the flexibility, speed and efficiency in how we work, communicate, shop, seek information and entertain ourselves, it is obvious that these devices have become data warehouses and platform for data in transit. This study was an empirical and quantitative study that gathered data leveraging a web-survey. Prior to conducting the survey for the main data collection, a Delphi study and pilot study were conducted. Convenience sampling was the category of nonprobability sampling design used to gather data. The 7-Point Likert Scale was used on all survey items. Pre-analysis data screening was conducted prior to data analysis. The Partial Least Square Structural Equation Modeling (PLS-SEM) was used to analyze the data gathered from a total of 390 responses received. The results of this study showed that perceived threat severity has a negative effect on protection motivation, while perceived threat susceptibility has a positive effect on protection motivation. Contrarily, the results from this study did not show that perceived response cost influences protection motivation. Response efficacy and mobile self-efficacy had a significant positive influence on protection motivation. Mobile device security usage showed to be significantly influenced positively by protection motivation. This study brings additional insight and theoretical implications to the existing literature. The findings reveal the PMT’s capacity to predict user behavior based on threat and coping appraisals within the context of mobile device security usage. Additionally, the extension of the PMT for the research model of this study implies that mobile devices users also can take recommended responses to protect their devices from security threats.
26

Factors Related to Users’ Awareness of Information Security on Social Network Service : The Case of WeChat

Shen, Han January 2018 (has links)
Recent trends in social network services (SNS) have taken the rates of personal information sharing, storage and processing to an unprecedented level, which yield both benefits and undesirable consequences for their users. SNS is being exploited by criminals to fraudulently obtain information from unsuspecting users. User’s awareness of privacy protection has been far left behind by the increasing and popularizing utilization of social network services (SNS), the privacy security problems will become one of the important factors influencing the healthy development of social network service industry. This study was designed to collect data and produce knowledge about the security awareness of WeChat users (i.e., randomly selected from all over China), their preferences and their experience of using WeChat while facing security issues as well as the perspectives of how people perceive a specific security problems, in order to find out what factors influence user's security awareness. In order to carefully conduct the research process and explain the empirical findings, seven principles of interpretive field research and protection motivation theory is adopted as core theoretical foundation. Participants were asked to provide information about and their personal views of questions from their different experience and value. Eight persons interviewed for our research and their responses confirmed our objectives of the study. As a result, six factors are indentified in related to WeChat user’s security awareness. PMT helps to explain and understand that how six indentified concepts influence behaviour intention and security awareness of user.
27

”ÄR DU BEREDD OM DET BLIR EN KRIS?” : En kvalitativ studie av hur medborgare i en kommun uppfattar och förhåller sig till riskkommunikation / “ARE YOU PREPARED FOR A CRISIS?” : A qualitative study on how citizens in a municipality perceive and engage with risk communication.

Madell, Moa January 2024 (has links)
In a time where crises are more present, risk communication plays an important role in equipping citizens with information and knowledge on how to prepare themselves. This study examines how citizens in the municipality Strängnäs perceive and interpret the municipality's risk communication, particularly focused on the information folder "Be prepared for a crisis or social disturbance". Through two focus group interviews, eight citizens of different ages have participated to discuss the content of the folder and reflect on topics such as crises and home preparedness. The study's theoretical framework is based on Ulrich Beck's theory of risk society and protection motivation theory, as well as previous research in areas such as risk communication and risk perception. The results show that the folder is generally perceived positively by the participants of the study, though there are some differences such as preferences on the amount of text and design which could be explained by their different coping styles. The results emphasize the folders’ significant role in making citizens more aware of their own home preparedness. Despite the concern about crises being higher today, the concern does not necessarily correspond to the participants level of preparedness which can be understood by a lack of motivation or an excessive trust in others. The research provides valuable insights to enhance the municipality's risk communication, aiming to raise awareness and preparedness levels among citizens. However, it is important to note that the results of the study are specific to the limited group of participants and require further research to be able to be generalized and understood in a wider context of risk communication.
28

Trouble in the air: Farmers’ perceptions of risk, self-efficacy, and response efficacy regarding herbicide drift

Folck, Alcinda L. January 2017 (has links)
No description available.
29

Fear-based advertising appeals : assessing execution styles of social marketing campaigns

Van Huyssteen, Lucea 12 1900 (has links)
Thesis (MComm (Economics)--University of Stellenbosch, 2010. / ENGLISH ABSTRACT: South Africa faces an epidemic, namely, HIV/Aids, which has grown substantially over the last ten years. It can be regarded as the country with the most alarming statistical figures concerning HIV infection rates. Even though South Africa is a country under scrutiny, given the high prevalence of HIV/Aids, this epidemic also constitutes as a global problem, given that an approximate number of 7400 individuals are infected with HIV every day. The number of Aids related deaths has risen from 100 000 in 1999 to over 400 000 in 2009. Given the concern, and in an effort to combat the fast spread of HIV/Aids, the South African government has implemented various educational and support programs. Marketing efforts are related to the above topic, given that various marketing-related practices have been implemented by non-profit organisations in an attempt to create awareness of HIV/Aids and the related risks. These marketing communication programs are referred to as social campaigns. HIV/Aids social campaigns involve communication strategies which attempt to persuade the target market to ensure that they adhere to safesexual practices, by making individuals aware of the threat that infection poses to their lifestyles. Various campaigns also explore how an individual can ensure safe sexual behaviour. Empirical research stretching back to 1975 has provided marketers with guidelines as to what social communication campaigns, concerning threats to human health, should include regarding an emotional, cognitive aspect. Evidence exists for the need to include emotional cues that would stimulate medium to high levels of fear, rather than low levels of fear, in order to effectively persuade an individual to adhere to a protective behavioural pattern. No research has been conducted in order to conclude whether one type of execution style or specific advertising content would result in significantly increased intentions to behave in the recommended protective manner. This study investigated whether different execution styles would result in significantly different levels of attitude, fear and behavioural intention. This was done by sampling a group of 450 respondents who participated in an experimental study. Three execution styles were tested by means of a post-test self administered questionnaire including items related to variables of the Protection Motivation Theory (PMT). The PMT explores the effects that fear appeal would have on attitude change. Not only was it found that different execution styles result in significantly different levels of the mentioned variables, it was also found that one execution style is significantly more effective in evoking these cognitive responses in one race group as compared to another. The empirical results of this study reveal that by discontinuing mass communication, and, in preference, segmenting the market towards which HIV/Aids social campaigns are currently aimed, based on race, these awareness campaigns would be more effective in inducing protective sexual behaviour. / AFRIKAANSE OPSOMMING: Suid-Afrika word gekonfronteer met ’n epidemie, naamlik MIV/Vigs, wat aansienlik gegroei het oor die afgelope tien jaar. Suid Afrika kan beskou word as die land met die mees ontstellende statistieke met betrekking tot MIV-infeksie. Selfs al is Suid-Afrika die land met die hoogste gevalle van MIV/Vigs, is hierdie epidemie ook 'n wêreldwye probleem, gegewe dat 'n ongeveer 7400 individue met MIV besmet word elke dag. Die aantal Vigs-verwante sterftes het toegeneem van 100 000 in 1999 tot meer as 400 000 in 2009. Gegewe bogenoemde en in 'n poging om MIV/Vigs verspreiding te beveg, het die Suid- Afrikaanse regering verskeie ondersteunende en opvoedkundige programme geïmplementeer om hierdie doel te bereik. Die verwantskap tussen bemarkingspogings en die betrokke onderwerp is dat verskeie bemarkingsverwante praktyke geïmplementeer word deur nie-winsgewende organisasies in 'n poging om bewustheid van MIV/Vigs en die verwante risiko's te skep. Hierdie bemarkingskommunikasie programme word na verwys as sosiale veldtogte. Die relevante MIV/Vigs-veldtogte behels sosiale kommunikasie strategieë wat die teikenmark probeer oorreed om te verseker dat hulle voldoen aan veilige seksuele praktyke, deur individue bewus te maak van die bedreiging wat infeksie inhou tot hul lewenswyse. Verskeie veldtogte brei ook uit oor hoe 'n individu veilige seksuele gedrag kan verseker. Empiriese navorsing wat terugstrek tot 1975 voorsien bemarkers met riglyne oor wat die sosiale kommunikasie veldtogte, wat 'n bedreiging vir menslike gesondheid behels, moet insluit met betrekking tot 'n emosionele, kognitiewe aspek. Bewyse bestaan in guns van die noodsaaklikheid van emosionele leidrade wat medium tot hoë vlakke van vrees in ‘n individu sal stimuleer, eerder as lae vlakke van vrees, om sodoende 'n individu effektief te oorreed om te voldoen aan beskermende gedragspatrone gegewe die bedreiging wat bestaan. Geen navorsing bestaan tans met betrekking tot of ‘n sekere tipe advertensie uitvoeringstyl of spesifieke advertensie-inhoud sou lei tot ‘n aansienlik hoër voorneme om te reageer op die aanbevole beskermende gedrag nie. Hierdie studie ondersoek of sekere advertensie uitvoeringstyle sou lei tot aansienlik verskillende vlakke van houding, vrees en gedrag. Die ondersoek is gedoen deur middel van 'n groep van 450 respondente wat deelgeneem het aan 'n eksperimentele studie. Drie uitvoeringstyle is getoets deur middel van 'n na-toets self-voltooiingsvraelys wat items ingesluit het wat verband hou met veranderlikes van die beskermings-motiveringsteorie (BMT). Die BMT ondersoek die uitwerking wat vreesaanlagte sal hê op houding en aanpassing daarvan. Hierdie studie het bevind dat verskillende advertensie uitvoeringstyle bydra tot aansienlike verskillende vlakke van die bogenoemde veranderlikes, asook dat een uitvoeringstyl beduidend meer effektief is in die ontlokking van kognitiewe respons in sekere rassegroepe in vergelyking met ander. Die empiriese resultate van hierdie studie bewys dat bemarkers die doeltreffendheid van MIV/Vigs sosiale veldtogte kan verbeter deur massa-kommunikasie te staak en eerder segmentering toe te pas binne die mark op wie veldtogte gemik is. Segmentering op grond van rassegroepe sal veroorsaak dat bewusmakingsveldtogte meer effektief is met betrekking tot hul invloed op die toepassing van beskermende seksuele gedrag binne die teikenmark.
30

Protection Motivation Theory and Consumer Willingness-to-Pay, in the Case of Post-Harvest Processed Gulf Oysters

Blunt, Emily Ann 2012 August 1900 (has links)
Gulf oysters are harvested and consumed year-round, with more than 90% consumed in a raw, unprocessed state. A chief concern of policymakers in recent years is the incidence of Vibrio vulnificus infection following raw seafood consumption. V.vulnificus refers to a halophilic bacterium naturally occurring in brackish coastal waters, which concentrates in filter-feeding oysters. Proposed FDA legislation requiring processing of all raw Gulf oysters sold during warmer summer months threatens the Gulf oyster industry, as little to no research regarding demand for post-harvest processing (PHP) has preceded the potential mandate. This research endeavors to examine the relationship between oyster consumers' fears of V.vulnificus infection and their willingness-to-pay (WTP) for processing of an oyster meal. The psychological model of Protection Motivation Theory (PMT) is employed alongside the economic framework of contingent valuation (CV) to result in an analysis of oyster processing demand with respect to threats and efficacy. A survey administered to 2,172 oyster consumers in six oyster producing states elicits projected consumption and PMT data. Principal Component Analysis is used to reduce the number of PMT variables to a smaller size, resulting in five individual principal components representing the PMT elements of source information, threat appraisal, coping appraisal, maladaptive coping, and protection motivation. Using survey data, the marginal willingness-to-pay (MWTP) for PHP per oyster meal is also calculated, and the five created PMT variables are regressed on this calculation using four separate OLS models. Results indicate significant correlation for four of the five created PMT variables. In addition, a mean MWTP for PHP of $0.31 per oyster meal is determined, contributing to the demand analysis for processing of Gulf oysters. The findings suggest a strong relationship between the fear elements and the demand for processing, and support arguments in favor of further research on specific PHP treatments and the necessity for a valid PMT survey instrument.

Page generated in 0.1693 seconds