31 |
Protection Motivation Theory and Consumer Willingness-to-Pay, in the Case of Post-Harvest Processed Gulf OystersBlunt, Emily Ann 2012 August 1900 (has links)
Gulf oysters are harvested and consumed year-round, with more than 90% consumed in a raw, unprocessed state. A chief concern of policymakers in recent years is the incidence of Vibrio vulnificus infection following raw seafood consumption. V.vulnificus refers to a halophilic bacterium naturally occurring in brackish coastal waters, which concentrates in filter-feeding oysters. Proposed FDA legislation requiring processing of all raw Gulf oysters sold during warmer summer months threatens the Gulf oyster industry, as little to no research regarding demand for post-harvest processing (PHP) has preceded the potential mandate.
This research endeavors to examine the relationship between oyster consumers' fears of V.vulnificus infection and their willingness-to-pay (WTP) for processing of an oyster meal. The psychological model of Protection Motivation Theory (PMT) is employed alongside the economic framework of contingent valuation (CV) to result in an analysis of oyster processing demand with respect to threats and efficacy. A survey administered to 2,172 oyster consumers in six oyster producing states elicits projected consumption and PMT data. Principal Component Analysis is used to reduce the number of PMT variables to a smaller size, resulting in five individual principal components representing the PMT elements of source information, threat appraisal, coping appraisal, maladaptive coping, and protection motivation. Using survey data, the marginal willingness-to-pay (MWTP) for PHP per oyster meal is also calculated, and the five created PMT variables are regressed on this calculation using four separate OLS models.
Results indicate significant correlation for four of the five created PMT variables. In addition, a mean MWTP for PHP of $0.31 per oyster meal is determined, contributing to the demand analysis for processing of Gulf oysters. The findings suggest a strong relationship between the fear elements and the demand for processing, and support arguments in favor of further research on specific PHP treatments and the necessity for a valid PMT survey instrument.
|
32 |
Investigation of the variables that govern user behaviors related to e-crime attacksAlhussein, Nawras January 2020 (has links)
The users´ behaviors play an important role in securing information systems. At the same time, the users´ bad behaviors end-up in making them victims to e-crime attacks. To emphasize the positive side of users´ behaviors, the reasons for the bad behaviors must be investigated. In this research, e-crimes on users in Sweden were studied using the protection motivation theory and the theory of planned behavior in order to understand what variables govern the user behaviors. The information retrieved from the literature review and the web survey were used to answer the research question about which variables within the two used theories affect the user behaviors in connection to e-crimes. It turned out that perceived vulnerability, perceived severity, and user-efficacy have significant effect on the selected user behavior. Besides, the analysis of the results showed that IT/IS-knowledge is a determinant factor that affects all the variables of the protection motivation theory.
|
33 |
Information security and hybrid work : A case study of shifts in perceived information security when working hybridlyNordmark, John, Källebo Rebermark, Oskar January 2023 (has links)
Hybrid work is already a big part of many organizations' structure. This phenomenon presents many new ways of how work is performed and carries new challenges with it. Parallel to that, the importance of working IT securely and coping with IT threats is significant in all fields of work. In this case study, we interview employees at a Swedish IT consultancy company, about their perceptions of hybrid work and their perceived ability to keep information secure in a hybrid work setting. Six employees from the company were selected for interviews. These interviews were then analyzed from the theoretical framework of Protection Motivation Theory which presents ways to explain how individuals are motivated to mediate threats alongside the ISO standard which is used to explain coping behaviors. This study concludes that the employees’ perception regarding the ability to keep information secure while working hybridly is diverse. Furthermore, the office has an important role in perceived security. The final finding reveals that current information security guidelines in ISO need to be updated or expanded to better guide organizations implementing remote work.
|
34 |
Inter- and intraindividual determinants of bicycle helmet use from a health behaviour perspectiveBittner, Julius, Huemer, Anja Katharina 02 January 2023 (has links)
Determinants of wearing a bicycle helmet were examined. Interindividual differences in helmet wearing were formalized with three different health psychological theories. The Protection Motivation Theory (PMT) [1], explains intention for a health behavior using subjective beliefs on the efficacy and costs of a specific health behavior, self-efficacy and risk and severity of negative consequences as well as benefits of not doing said behavior. The Theory of Planned Behavior (TPB) [2] uses attitude, subjective norms and behavioral control about a (health) behavior to predict intention to a behavior, which in turn can predict actual behavior. Lastly, the Health Action Process Approach (HAPA) [3] is similar to PMT, but puts more emphasis on self-efficacy while omitting costs of beneficial behavior. lt includes both intention and behavior, as well as planning as an intermediate step between intention and behavior. [From: Theory]
|
35 |
Analysing drought risk preparedness by smallholder livestock farmers: an application of protection motivation theory in Blouberg Local Municipality, Limpopo ProvinceSeanego, Kgabo Chantel January 2022 (has links)
Thesis (M.Sc.(Agriculture (Agricultural Economics)) -- University of Limpopo, 2022 / Understanding the factors that influence farmers' decisions to take preventive measures
against natural hazards provides insight that can be used to develop user-specific
interventions to support their adaptation processes. The use of Protection Motivation
Theory in analysing climate risk adaptation behaviour is driven by the increase in
climate change, which is projected to increase the frequency and severity of climate related risks such as heatwaves, floods, and droughts. Given the importance of
livestock in rural communities, information about their adaptation must be prioritised;
yet, this is not the case, as most climate change adaptation research focus on crop
production.
The main aim of the study was to analyse the drought risk preparedness of smallholder
livestock farmers in the Limpopo Province's Blouberg Local Municipality. The study's
specific objectives were to identify and describe the socioeconomic characteristics of
smallholder livestock farmers in the Blouberg Local Municipality, as well as to determine
the drought coping and adaptation strategies used by them and to evaluate the
protection motivation theory components influencing that coping and adaptation
behaviour.
The study collected primary cross-sectional data from 130 smallholder livestock farmers
in the Blouberg Local Municipality using a semi-structured questionnaire. The farmers'
drought risk coping and adaptation strategies were described using descriptive
statistics, while multiple linear regression was used to test whether protection motivation
theory variables influence the adaptation and coping choices of smallholder livestock
farmers in Blouberg Local Municipality.
According to the findings, smallholder livestock farmers in Blouberg Local Municipality
use four measures on average to protect their livestock against drought. With an R2
adjusted of 0.70, protection motivation theory variables explain 70% of the variation in
farmer protection motivation. Perceived risk probability, perceived severity, perceived
self-efficacy, and perceived costs were significant variables associated with farmers'
protection motive. It is recommended that interventions meant to increase drought risk
resilience of the farmers should prioritise early warning signals to increase perceived
probability of the farmers, create platforms for information exchange to increase
perceived severity, teach farmers methods practically to increase perceived self-efficacy
and keep the price of utilising measures low to decrease perceived cost / Risk and Vulnerability Science Centre (RVSC)
|
36 |
Behavioral and Environmental Attributes of Ebola Epidemic in West Africa and United States Emergency Nurses’ Motivation to Protect Themselves against Ebola InfectionLeigh, Laurasona January 2016 (has links)
No description available.
|
37 |
Understanding Health and Physical Activity Message Strategies: Risk Information and Message FramingBassett, Rebecca L. 10 1900 (has links)
<p>The purpose of this dissertation was to examine the use of health risk communications as a strategy to change risk perceptions and motivate leisure time physical activity (LTPA) among people with spinal cord injury (SCI). Guided by protection motivation theory (PMT; Rogers, 1983) and the extended parallel processing model (EPPM; Witte, 1992), two strategies were examined as unique approaches to enhancing the effectiveness of health risk information. First, risk information was tailored to individualized, objective data regarding participants’ health risk. Second, risk information was supplemented with framed leisure time physical activity (LTPA) efficacy messages. Gain-framed messages emphasized the benefits of LTPA, whereas loss-framed messages emphasized the risks of inactivity. The relative effectiveness of gain- versus loss-framed messages was considered within the context of the EPPM (Witte, 1992). A secondary purpose of the dissertation was to explore cognitive processing in relation to framed LTPA messages. The attention and elaboration phases of cognitive processing were examined for gain- and loss-framed LTPA messages following exposure to health risk information. Three experiments were conducted to 1) test the effectiveness of individualized health risk information for changing health risk perceptions and LTPA among people with SCI, 2) test the relative effectiveness of gain- and loss-framed LTPA efficacy messages presented following health risk information for changing LTPA response efficacy and LTPA intentions among people with SCI, and, 3) investigate the relative attention given to gain-framed versus loss-framed LTPA response efficacy messages following presentation of health risk information to university students. The theoretical and pragmatic contributions are discussed.</p> / Doctor of Philosophy (PhD)
|
38 |
Adoption of Electronic Personal Health Records by Chronic Disease Patients: Integrating Protection Motivation Theory and Task-Technology FitLaugesen, David John 10 1900 (has links)
<p>With the increasing prevalence of chronic disease throughout the world, electronic Personal Health Records (ePHRs) have been suggested as a way to improve chronic disease self-management. However, ePHRs are not yet widely used by consumers. Protection Motivation Theory (PMT) has been successfully used to explain health related behaviours among chronic disease patients. In addition, Information Systems (IS) theories such as Task Technology Fit (TTF) have been successfully used to explain information technology adoption. This study combines PMT with Perceived Task Technology Fit (PTTF) and the health self-management readiness concept of the Patient Activation Measure (PAM) to propose a research model which will aid in the understanding of ePHR adoption by chronic disease patients. The role of educational interventions on various elements of the proposed model is also examined. A survey-based study of 230 participants is used to empirically validate the proposed model via structural equation modeling techniques. Results reveal that the PMT constructs, as well as PTTF and PAM all have significant direct or indirect effects on the intention to adopt an ePHR. In addition, the educational intervention analysis indicates that the provision of advanced ePHR education positively influences various constructs in the model, while the use of fear appeals through Diabetes complication education does not have an effect.</p> / Doctor of Philosophy (PhD)
|
39 |
Informationssäkerhetsrisker och organisatoriska sanktioner vid användandet av privata smarta enheter i Försvarsmakten : En studie om användning av privata smarta enheterPersson, Tobias, Andersson, Emil January 2020 (has links)
Denna uppsats undersöker intentionen att använda smarta enheter i tjänst hos personal i Försvarsmakten, som är en organisation med högt behov av verksamhetssäkerhet. Verksamhetens säkerhet är direkt beroende av hur personal inom verksamheten agerar utifrån ett säkerhetsperspektiv. Syftet är att belysa hur Försvarsmakten förmedlar informationssäkerheten kring smarta enheter och hur personalen påverkas utifrån det. Det empiriska materialet har samlats in genom en kvalitativ fallstudie i form av semistrukturerade intervjuer med två olika grupper. Resultatet analyseras med hjälp av ett teoretiskt ramverk bestående av Protection Motivation Theory (PMT) och General Deterrence Theory (GDT) i syfte att belysa vad det är som avgör personalens beteende. Teorierna utgår från att beteendet påverkas av rädsla för sanktioner eller för hot mot verksamhet och individ. Resultatet visar att aspekter från de båda teorierna är närvarande hos personalen och att det som påverkar den enskildes agerande beror på vilken information organisationen delgett och individernas personliga uppfattningar. Personalen är medveten om de risker som följer av användningen av smarta enheter, men enheterna används ändå i stor utsträckning. Faktorer som spelar in i intentionen är kunskapsnivån, befattningen individen besitteroch arbetsområdet individen verkar inom. / This paper examines the intention to use smart devices by staff in the Swedish Armed Forces,which is an organization with a high need for operational security. The security of the business isdependent on how staff within the business behave, in a security perspective. The purpose is toelucidate how the Swedish Armed Forces conveys information security regarding smart devicesand how their staff are affected. The empirical material has been collected through a qualitativecase study in the form of semi-structured interviews with two different groups. The results areanalyzed using a theoretical framework consisting of Protection Motivation Theory (PMT) andGeneral Deterrence Theory (GDT) in order to elucidate what determines the behavior of the staff.The theories are based on the fact that behavior is affected by fear of sanctions or threats to thebusiness and individuals. The result shows that aspects in both theories are present in the staffbehavior. What influences the individual's actions depends on what information the organizationhas shared and the personal perceptions of the individuals. Factors that play into the intention arethe level of knowledge, the position the individual possesses and the area of work the individualoperates within.
|
40 |
Mänskligt beteende - ett ofrånkomligt hot mot informationssäkerhet?Swartz, Erik January 2021 (has links)
Information har idag kommit att bli så viktigt att det av många aktörer kallas för den nya digitala oljan, och med anledning av just detta är information idag en av de främsta tillgångar en organisation kan besitta. För att skydda informationen lägger organisationer massiva summor pengar på tekniska och fysiska åtgärder. Tillsammans med dessa åtgärder utfärdas även interna bestämmelser och riktlinjer för hur IT-system och information får eller inte får hanteras. Trots detta sker både intrång och andra säkerhetsrelaterade incidenter som kan härledas till mänskligt felaktigt beteende, eller den så kallade mänsklig faktorn. I den här uppsatsen har därför författaren gjort en djupdykning i ämnet för att studera vilka samband som kan finnas mellan beteendevetenskapliga teorier och efterlevnad av informationssäkerhet. Med kvalitativa metoder har bland annat litteraturstudier genomförts för att ta reda på vilka teorier som är mest relevanta i sammanhanget. Intervjuer har sedan nyttjats för att bredda författarens uppfattning om vilka faktorer som kan påverka mänskligt beteende. De personer som intervjuats har bland varit yrkesverksamma som säkerhetschefer, säkerhetskyddshandläggare och ledande forskare inom det specifika området.
|
Page generated in 0.3613 seconds