• Title/Summary/Keyword: Protection Motivation

Search Result 98, Processing Time 0.027 seconds

Effects of Young Children's Competence on Mastery Motivation Moderated by Mothers' Overprotective Parenting: Focus on Temperament Types of Young Children (유아의 유능감이 숙달동기에 미치는 영향에서 어머니 과보호의 조절효과: 유아의 기질 유형에 따른 차이를 중심으로)

  • Ji-Eun Song;Nary Shin
    • Korean Journal of Childcare and Education
    • /
    • v.19 no.2
    • /
    • pp.21-42
    • /
    • 2023
  • Objective: This study aims investigate the moderating effect of mothers' overprotective parenting in the influence of young children's competence, as determined by their temperament, on mastery motivation. Methods: An online survey was conducted on 429 mothers with children aged 3-5. The collected data was analyzed using K-means clustering in SPSS 23.0 and the Process macro Model 2. Results: Children's temperaments were categorized into four types : easy-active temperament, easy-inactive temperament, slow temperament, and difficult temperament. It was confirmed that children's competence directly affected their mastery motivation when they had easy-inactive, slow, or difficult temperament. It was also found that mothers' intrusive control had a direct main effect on object persistence when children had easy temperament, while there was no effect on mastery pleasure. The moderating effects of mothers' anxious protection on the pathway from children's competence to object persistence were significant only among children with a slow temperament. Conclusion/Implications: This study highlights the need for mothers to adapt their parenting behavior to their children's temperament type. The study confirmed partial moderating effects of mothers' overprotective parenting in the influence of children's competence, as determined by their temperament, on mastery motivation.

Analyzing the Privacy Leakage Prevention Behavior of Internet Users Based on Risk Perception and Efficacy Beliefs : Using Risk Perception Attitude Framework (위험지각과 효능감에 따른 인터넷 사용자의 개인정보 유출 예방행위 분석 : 위험지각태도 프레임웍을 기반으로)

  • Jang, Ickjin;Choi, Byounggu
    • The Journal of Society for e-Business Studies
    • /
    • v.19 no.3
    • /
    • pp.65-89
    • /
    • 2014
  • Although many studies have focused on the influences and outcomes of personal information leakage, few studies have investigated how the personal information leakage prevention behavior differs depending on internet user. This study attempts to supplement the existing studies' limitations with the use of risk perception attitude (RPA) framework. More specifically, this study tries to show internet user can be classified into four groups based on perceived risk of personal information leakage and efficacy beliefs of personal information protection, and to identify how the groups differ in terms of motivation, information seeking, and behaviors for privacy leakage prevention. Analysis on survey data from 276 internet users reveals that the users can be classified into responsive, avoidance, proactive, indifference groups. Furthermore, there are differences between groups in terms of motivation, information seeking, and behaviors for personal information leakage prevention. This study contributes to expand existing literature by providing tailored guidelines for implementation of personal information protection strategies and policy.

Effects of an Educational Intervention Based on the Protection Motivation Theory and Implementation Intentions on First and Second Pap Test Practice in Iran

  • Dehdari, Tahereh;Hassani, Laleh;Hajizadeh, Ebrahim;Shojaeizadeh, Davoud;Nedjat, Saharnaz;Abedini, Mehrandokht
    • Asian Pacific Journal of Cancer Prevention
    • /
    • v.15 no.17
    • /
    • pp.7257-7261
    • /
    • 2014
  • Background: Few Iranian women take the Papanicolaou test despite its important role in preventing cervical cancer. This study aimed to determine the effectiveness of an educational intervention based on the protection motivation theory (PMT) variables and implementation intentions in the first and second Pap test practice among Iranian women. Materials and Methods: In this quasi-randomized controlled trial, 200 women who were referred to 30 primary health care clinics in Tehran were randomly selected. PMT variables and Pap test practice were measured at baseline and again after 3 and 15 months. The 4-week educational intervention program was conducted for the intervention group. Results: Following the intervention, the mean scores of self-efficacy, perceived vulnerability, and behavior intention variables were significantly higher in the intervention group when compared to the control group (p<0.05). No significant differences were found in the perceived severity, response efficacy, response cost, and fear between the two groups following the intervention. Higher percent of women in the intervention group had obtained first and second Pap test compared to the controls. Conclusions: The PMT and implementation intentions provide a suitable theory-based framework for developing educational interventions regarding Pap test practice in Iran.

A Comparative Study on the Awareness of Health Risks and the Risk Reduction Measures Related to Sodium Intake between Female and Male University Students in Busan and Gyeongnam: An Application of Protection Motivation Theory (보호동기이론을 적용한 나트륨 과다섭취에 따른 위험성 및 나트륨 섭취 감소 방안의 효과성에 대한 부산·경남 지역 남녀 대학생들의 인식 비교 연구)

  • Jang, Soo-Hyun;Yoon, Eunju
    • Korean journal of food and cookery science
    • /
    • v.32 no.1
    • /
    • pp.136-146
    • /
    • 2016
  • The purpose of this study was to investigate whether there was a gender difference in motivating university students to decrease their sodium intake and to identify effective motivating factors. Within the protection motivation theory (PMT) framework, a survey questionnaire was developed to measure participants' perceptions on the severity of and the vulnerability to risk of serious diseases due to the high sodium intake, as well as the effectiveness (response efficacy) and the ability to perform preventive measures (self-efficacy). Behavioral intentions on five specific practices (checking nutrition label, consuming more fruits and vegetables, consuming less soups, avoiding spicy and pungent food, purchasing less instant or restaurant foods) related to decreasing sodium intake were also included. A total of 294 usable response data were collected from university students (92 male, 202 female) in Busan and Gyeongnam in June 2015 and analyzed using IBM SPSS 22. Severity was the highest (4.04) PMT factor followed by response efficacy (3.72), self-efficacy (3.42), and vulnerability (3.26). Compared to male students, female students thought that the threat was more severe (t=6.035, p<0.001) and reducing sodium intake would be effective to prevent serious illnesses (t=4.724, p<0.001), but their vulnerability and self-efficacy perceptions were not different from male students. Among the five items measuring behavioral intention, female students were more likely to increase fruits and vegetables consumption (t=3.811, p<0.001), while male students were more likely to avoid spicy and pungent foods (t=2.336, p=0.020). Based on findings of this study, the recommended strategy to effectively motivate university students to lower their sodium consumption level is the development of campaign focused on increased vulnerability perception, response efficacy, and ease of practicing preventive measures instead of emphasizing the severity of the consequences.

Role of Management and Protection Motivation's influence on the Intention of Compliance with Information Security Policies: Based on the Theory of Planned Behavior (경영진 역할과 보호동기 요인이 정보보안정책 준수 의지에 미치는 영향: 계획행동이론을 기반으로)

  • Shin, Hyuk;Kang, Min Hyung;Lee, Cheol Gyu
    • Convergence Security Journal
    • /
    • v.18 no.1
    • /
    • pp.69-84
    • /
    • 2018
  • This study examines antecedents of the intention of compliance with information security policies based on Ajzen's Theory of Planned Behavior. The study conducted the following: Verification of casual relations between role of management and protection motivation and the antecedents of planned behavior as parameters to determine the effect on the intention of compliance with information security policy, and comparative analysis between the research model and a competition model. The result of the study disclosed that, in the research model, attitude and subjective norm took an intermediary role on management beliefs, response efficacy, response cost, self-efficacy, and compliance intention, and perceived behavior control on management beliefs, self-efficacy and compliance intention.

  • PDF

Investigating the acceptance of the reopening Bataan nuclear power plant: Integrating protection motivation theory and extended theory of planned behavior

  • Ong, Ardvin Kester S.;Prasetyo, Yogi Tri;Salazar, Jose Ma Luis D.;Erfe, Justine Jacob C.;Abella, Arving A.;Young, Michael Nayat;Chuenyindee, Thanatorn;Nadlifatin, Reny;Redi, Anak Agung Ngurah Perwira
    • Nuclear Engineering and Technology
    • /
    • v.54 no.3
    • /
    • pp.1115-1125
    • /
    • 2022
  • Nuclear power plant (NPP) is currently considered as one of the most reliable power sources. However, 182 of them are considered decommissioned and inactive including the one in Bataan, Philippines. The aim of this study was to investigate the acceptance of the reopening of Bataan Nuclear Power Plant (BNPP) by integrating the Theory of Planned Behavior and Protection Motivation Theory. A total of 815 Filipinos answered an online questionnaire which consisted of 37 questions. The Structural Equation Modeling (SEM) indicated that knowledge towards nuclear power plants was the key factor in determining people's acceptance towards NPP reopening. In addition, knowing the benefits would lead to positive perceived behavioral control (PBC) and attitude towards intention. Results showed that PBC and attitude are mediators towards the acceptance of people regarding the reopening of BNPP. If an individual's knowledge gravitates towards the perceived risk, then this can lead to the negative acceptance of the NPP reopening. On the other hand, if an individual's knowledge gravitates towards the perceived benefits, then this will lead to positive acceptance. This study is the first study that explored the acceptance of the reopening BNPP. Finally, the study's model construct would also be very beneficial for researchers, government, and even private sectors worldwide.

Investigate the Roles of Sanctions, Psychological Capital, and Organizational Security Resources Factors in Information Security Policy Violation

  • Ayman Hasan Asfoor;Hairoladenan kasim;Aliza Binti Abdul Latif;Fiza Binti Abdul Rahim
    • Asia pacific journal of information systems
    • /
    • v.33 no.4
    • /
    • pp.863-898
    • /
    • 2023
  • Previous studies have shown that insiders pose risks to the security of organisations' secret information. Information security policy (ISP) intentional violation can jeopardise organisations. For years, ISP violations persist despite organisations' best attempts to tackle the problem through security, education, training and awareness (SETA) programs and technology solutions. Stopping hacking attempts e.g., phishing relies on personnel's behaviour. Therefore, it is crucial to consider employee behaviour when designing strategies to protect sensitive data. In this case, organisations should also focus on improving employee behaviour on security and creating positive security perceptions. This paper investigates the role of psychological capital (PsyCap), punishment and organisational security resources in influencing employee behaviour and ultimately reducing ISP violations. The model of the proposed study has been modified to investigate the connection between self-efficacy, resilience, optimism, hope, perceived sanction severity, perceived sanction certainty, security response effectiveness, security competence and ISP violation. The sample of the study includes 364 bank employees in Jordan who participated in a survey using a self-administered questionnaire. The findings show that the proposed approach acquired an acceptable fit with the data and 17 of 25 hypotheses were confirmed to be correct. Furthermore, the variables self-efficacy, resilience, security response efficacy, and protection motivation directly influence ISP violations, while perceived sanction severity and optimism indirectly influence ISP violations through protection motivation. Additionally, hope, perceived sanction certainty, and security skills have no effect on ISP infractions that are statistically significant. Finally, self-efficacy, resiliency, optimism, hope, perceived severity of sanctions, perceived certainty of sanctions, perceived effectiveness of security responses, and security competence have a substantial influence on protection motivation.

Who Cares More about Security?: Effects of Personality Traits on PC Security Intention (누가 보안에 더 신경을 쓰는가?: 성격특성이 PC보안의도에 미치는 영향)

  • June-Young Kim;Tae-Sung Kim
    • Information Systems Review
    • /
    • v.20 no.1
    • /
    • pp.99-114
    • /
    • 2018
  • Technical measures for computer security are essential, but they are not a sufficient condition for security. Therefore, a personal approach to user's security behavior should be developed. Personality, which is a human aspect, is a behavioral characteristic that characterizes each individual and facilitates prediction of how an individual will behave in certain situations. Protection motivation theory has been used extensively in the security research on human behavior. The present study discusses how protection motivation was formed from personality traits. Thus, organizations can refer the result of this study for their HRD and HRM concerns.

A Study on Exploring Factors Influencing Military Security Level (Based on the Theory of Planned Behavior, Deterrence and Protection Motivation) (군(軍) 보안수준에 미치는 영향요인 탐색에 관한 연구 (계획 행동이론, 억제이론, 보호 동기 이론을 중심으로))

  • Jong-Hyoun Kim;Sang-Jun Ahn
    • Convergence Security Journal
    • /
    • v.22 no.4
    • /
    • pp.3-9
    • /
    • 2022
  • Recently, as the environment of the 4th industrial revolution has arrived, the opening, sharing and convergence of data are actively being achieved in any organization. However, the opening and sharing of data inevitably leads to security vulnerability and there is ambivalence that is a threat that can affect the existence of an organization operated in the 4th industrial revolution environment. Especially security issues in the organization of the military can be a threat to the state, not the military itself, so it is always necessary to maintain a high level of security discipline. In this paper, 14 variables were selected through structural equation model applying theory of planned behavior, deterrence and protection motivation to find out the security level development measures by extracting factors that can affect security level. As a result, the theory of planned behavior that the security knowledge embodied through the usual security regulation education and evaluation affects the behavior was adopted, and the theory of deterrence and protection motivation showed the significance of the rejection level. In addition, it was confirmed that the variables that have the greatest impact on the military security level through the measured values of the three-year security audit were commanders and mental security. In conclusion, in order to improve the security level, it is suggested that security education, definite reward and punishment, and security system upgrading should be firmly established and mental security posture should be secured.

Personal Information Protection Behavior for Information Quality : Health Psychology Theory Perspectives (정보품질을 위한 개인정보 보호행위: 건강심리이론 관점을 중심으로)

  • Jee, Bum-Suk;Fan, Liu;Lee, Sang-Chul;Suh, Yung-Ho
    • Journal of Korean Society for Quality Management
    • /
    • v.39 no.3
    • /
    • pp.432-443
    • /
    • 2011
  • The purpose of this research is to understand users' information protection behavior on personal information security from health psychology theory perspectives. Empirical results indicate that users' information protection behavior on personal information is predicted by perceived threat and perceived responsiveness. Perceived threat is determined by perceived susceptibility and perceived severity. Perceived responsiveness is determined by response efficacy and self-efficacy, but response cost is not significant. These findings provide an enriched understanding about users' information protection behavior on personal information security.