Search the World's Largest Database of Information Science & Technology Terms & Definitions
InfInfoScipedia LogoScipedia
A Free Service of IGI Global Publishing House
Below please find a list of definitions for the term that
you selected from multiple scholarly research resources.

What is Personal Identifiers

Encyclopedia of Information Science and Technology, Third Edition
Names, social security numbers, phone numbers, and addresses which can be used open new credit card or utility accounts, obtain mortgages or automobiles loans, or make online purchases without the victim’s consent.
Published in Chapter:
Fear Appeals, Threat Perceptions, and Protection Motivation in Information Systems Security
Narasimha Paravastu (Metropolitan State University, USA) and Murugan Anandarajan (Drexel University, USA)
DOI: 10.4018/978-1-4666-5888-2.ch423
Abstract
Information security is important for organizations as well as individuals from the perspective of protection from data breaches, identity theft, malware and infections, hacking etc. This article presents the framework of Protection Motivation Theory and its constructs, and then reviews the past IS Literature on information systems security, from a protection motivation perspective. Specifically this article tries to explain how individuals perceive a fear appeal in an information systems security threat, and how the protection motivation framework of fear, threat perceptions of severity and vulnerability, impact the coping intentions of individuals to protect themselves from information systems security threats. This article further discusses the theoretical and managerial implications of protection motivation theory as it applies to information systems security.
Full Text Chapter Download: US $37.50 Add to Cart
eContent Pro Discount Banner
InfoSci OnDemandECP Editorial ServicesAGOSR