References
- Abraham, C.S.; Sheeran, P.; Abrams, D.; and Spears, R. Exploring teenagers’ adaptive and maladaptive thinking in relation to the threat of HIV infection. Psychology & Health, 9, 4 (1994), 253–272.
- Aurigemma, S.; Mattson, T.; and Leonard, L.N. Evaluating the core and full protection motivation theory nomologies for the voluntary adoption of password manager applications. AIS Transactions on Replication Research, 5, 1 (2019), 1–21.
- Avgerou, C. Contextual explanation: Alternative approaches and persistent challenges. MIS Quarterly, 43, 3 (2019), 977–1006.
- Bastos, D.; Shackleton, M.; and El-Moussa, F. Internet of things: A survey of technologies and security risks in smart home and city environments. In Living in the Internet of Things: Cybersecurity of the IoT. London: IET, 2018, pp. 1–7.
- Beaudry, A.; and Pinsonneault, A. The other side of acceptance: Studying the direct and indirect effects of emotions on information technology use. MIS Quarterly, 34, 4 (2010), 689–710.
- Belk, R.W. Possessions and the extended self. Journal of Consumer Research, 15, 2 (1988), 139–168.
- Boss, S.R.; Galletta, D.F.; Lowry, P.B.; Moody, G.D.; and Polak, P. What do systems users have to fear? Using fear appeals to engender threats and fear that motivate protective security behaviors. MIS Quarterly, 39, 4 (2015), 837–864.
- Boysen, S.; Hewitt, B.; Gibbs, D.; and McLeod, A. Refining the threat calculus of technology threat avoidance theory. Communications of the Association for Information Systems, 45, 1 (2019), 5.
- Burns, A.J.; Posey, C.; Roberts, T.L.; and Benjamin Lowry, P. Examining the relationship of organizational insiders’ psychological capital with information security threat and coping appraisals. Computers in Human Behavior, 68, (2017), 190–209.
- Burns, A.J.; Roberts, T.L.; Posey, C.; and Lowry, P.B. The adaptive roles of positive and negative emotions in organizational insiders’ security-based precaution taking. Information Systems Research, 30, 4 (2019), 1228–1247.
- Byrne, B.M. Testing the factorial validity of scores from a measuring instrument. In, Structural Equation Modeling with Mplus: Basic Concepts, Applications, and Programming. New York: Routledge, Taylor and Francis Group, 2012, pp. 97–127.
- Carpenter, D.; Young, D.K.; Barrett, P.; and McLeod, A.J. Refining technology threat avoidance theory. Communications of the Association for Information Systems, 44, (2019), 380–407.
- Carter, M.; and Grover, V. Me, my self, and I (T): Conceptualizing information technology identity and its implications. MIS Quarterly, 39, 4 (2015), 931–958.
- Cericola, R. The Best Smart Home Devices to Help Seniors Age in Place. New York Times Wirecutter, 2021. https://www.nytimes.com/wirecutter/reviews/smart-home-for-seniors/.
- Chen, Y.; and Zahedi, F.M. Individuals’ internet security perceptions and behaviors: Polycontextual contrasts between the United States and China. MIS Quarterly, 40, 1 (2016), 205–222.
- Cheung, G.W.; and Rensvold, R.B. Evaluating goodness-of-fit indexes for testing measurement invariance. Structural Equation Modeling, 9, 2 (2002), 233–255.
- Chou, C.-P.; and Huh, J. Model modification in structural equation modeling. In, R.H. Hoyle (ed.), Handbook of Structural Equation Modeling. New York: The Guilford Press, 2012, pp. 232–246.
- CISA. CISA Cybersecurity Awareness Program. Cybersecurity & Infrastructure Security Agency. https://www.cisa.gov/cisa-cybersecurity-awareness-program.
- Cohen, J. Statistical Power Analysis for the Behavioral Sciences. Hillsdale: Lawrence Erlbaum, 1988.
- DeCarlo, L.T. On the meaning and use of kurtosis. Psychological Methods, 2, 3 (1997), 292.
- Descartes, R. The Passions of the Soul. 1649.
- Dittmar, H. Material and consumer identities. In S.J. Schwartz, K. Luyckx, and V.L. Vignoles (eds.), Handbook of Identity Theory and Research. New York: Springer, 2011, pp. 745–769.
- Elliot, A.J. The hierarchical model of approach-avoidance motivation. Motivation and Emotion, 30, 2 (2006), 111–116.
- Endler, N.S.; and Parker, J.D. Multidimensional assessment of coping: A critical evaluation. Journal of Personality and Social Psychology, 58, 5 (1990), 844–854.
- Folkman, S. Personal control and stress and coping processes: A theoretical analysis. Journal of Personality and Social Psychology, 46, 4 (1984), 839–852.
- Frijda, N.H. The Emotions. Cambridge: Cambridge University Press, 1986.
- Furby, L. Possession in humans: An exploratory study of its meaning and motivation. Social Behavior and Personality: An International Journal, 6, 1 (1978), 49–65.
- Furby, L. Collective possession and ownership: A study of its judged feasibility and desirability. Social Behavior & Personality: An International Journal, 8, 2 (1980), 165–183.
- Gefen, D.; Rigdon, R.E.; and Straub, D. Editor’s comments: An update and extension to SEM guidelines for administrative and social science research. MIS Quarterly, 35, 2 (2011), iii–xiv.
- Hallman, R.; Bryan, J.; Palavicini, G.; Divita, J.; and Romero-Mariona, J. IoDDoS-the internet of distributed denial of sevice attacks. In, Proceedings of the 2nd International Conference on Internet of Things, Big Data and Security. Setubal: Scitepress, 2017, pp. 47–58.
- Hong, W.; Chan, F.K.Y.; Thong, J.Y.L.; Chasalow, L.C.; and Dhillon, G. A framework and guidelines for context-specific theorizing in information systems research. Information Systems Research, 25, 1 (2014), 111–136.
- Hoyle, R.H. Model specification in structural equation modeling. In R.H. Hoyle (ed.), Handbook of Structural Equation Modeling. New York: The Guilford Press, 2012, pp. 126–144.
- Johnston, A.C.; and Warkentin, M. Fear appeals and information security behaviors: An empirical study. MIS Quarterly, 34, 3 (2010), 549.
- Johnston, A.C.; Warkentin, M.; and Siponen, M. An enhanced fear appeal rhetorical framework: leveraging threats to the human asset through sanctioning rhetoric. MIS Quarterly, 39, 1 (2015), 113–134.
- Kaspersky Lab. How to not break the Internet. Kaspersky Lab Daily, 2016. https://www.kaspersky.com/blog/attack-on-dyn-explained/13325/.
- Lazarus, R.S. Emotion and Adaptation. New York: Oxford University Press, 1991.
- Lazarus, R.S. Progress on a cognitive-motivational-relational theory of emotion. American Psychologist, (1991), 819-834.
- Lazarus, R.S. Hope: an emotion and a vital coping resource against despair. Social Research, 66, 2 (1999), 653–678.
- Lazarus, R.S.; and Folkman, S. Stress, Appraisal, and Coping. New York: Springer Publishing Company, 1984.
- Lazarus, R.S.; and Folkman, S. Transactional theory and research on emotions and coping. European Journal of Personality, 1, 3 (1987), 141–169.
- Lee, D.; Larose, R.; and Rifon, N. Keeping our network safe: A model of online protection behaviour. Behaviour & Information Technology, 27, 5 (2008), 445–454.
- Leventhal, H. Findings and Theory in the Study of Fear Communications. In L. Berkowitz (ed.), Advances in Experimental Social Psychology. New York: Academic Press, 1970, pp. 119–186.
- Li, H.; Yoo, S.; and Kettinger, W.J. The roles of IT strategies and security investments in reducing organizational security breaches. Journal of Management Information Systems, 38, 1 (January 2021), 222–245.
- Liang, H.; and Xue, Y. Understanding security behaviors in personal computer usage: A threat avoidance perspective. Journal of the Association for Information Systems, 11, 07 (2010), 394–413.
- Liang, H.; and Xue, Y. Avoidance of information technology threats: A theoretical perspective. MIS Quarterly, 33, 1 (2009), 71–90.
- Little, T.D. Longitudinal Structural Equation Modeling. New York: Guilford Press, 2013.
- MacInnis, D.J.; and de Mello, G.E. The concept of hope and its relevance to product evaluation and choice. Journal of Marketing, 69, 1 (2005), 1–14.
- Malhotra, N.K.; Kim, S.S.; and Patil, A. Common method variance in IS research: A comparison of alternative approaches and a reanalysis of past research. Management Science, 52, 12 (2006), 1865–1883.
- Meade, A.W.; Johnson, E.C.; and Braddy, P.W. Power and sensitivity of alternative fit indices in tests of measurement invariance. Journal of Applied Psychology, 93, 3 (2008), 568.
- Menard, P.; Bott, G.J.; and Crossler, R.E. User motivations in protecting information security: Protection motivation theory versus self-determination theory. Journal of Management Information Systems, 34, 4 (2017), 1203–1230.
- Menard, P.; Warkentin, M.; and Lowry, P.B. The impact of collectivism and psychological ownership on protection motivation: a cross-cultural examination. Computers & Security, 75, (June 2018), 147–166.
- Mueller, B.; and Urbach, N. Understanding the why, what, and how of theories in IS research. Communications of the Association for Information Systems, 41, 1 (2017), 17.
- Muthén, L.K.; and Muthén, B.O. Mplus User’s Guide. Los Angeles: Muthén & Muthén, 2017.
- Nabi, R.L. The case for emphasizing discrete emotions in communication research. Communication Monographs, 77, 2 (2010), 153–159.
- Ng, K.C.; Zhang, X.; Thong, J.Y.; and Tam, K.Y. Protecting against threats to information security: An attitudinal ambivalence perspective. Journal of Management Information Systems, 38, 3 (2021), 732–764.
- Pierce, J.L.; Kostova, T.; and Dirks, K.T. The state of psychological ownership: Integrating and extending a century of research. Review of General Psychology, 7, 1 (2003), 84–107.
- Posey, C.; Roberts, T.L.; and Lowry, P.B. The impact of organizational commitment on insiders’ motivation to protect organizational information assets. Journal of Management Information Systems, 32, 4 (2015), 179–214.
- Preacher, K.J.; and Hayes, A.F. Asymptotic and resampling strategies for assessing and comparing indirect effects in multiple mediator models. Behavior Research Methods, 40, 3 (2008), 879–891.
- Rogers, R.W. A protection motivation theory of fear appeals and attitude change. Journal of Psychology, 91, 1 (1975), 93–114.
- Rogers, R.W. Cognitive and psychological processes in fear appeals and attitude change: A revised theory of protection motivation. In J.T Cacioppo and R.E Petty (eds.), Social Psychophysiology: A Sourcebook. New York: Guilford Press, 1983, pp. 153–176.
- Roth, S.; and Cohen, L.J. Approach, avoidance, and coping with stress. American Psychologist, 41, 7 (1986), 813–819.
- Schau, H.J. Discourse of possessions: The metatheory of Russell W. Belk. In J.W. Alba and J.W. Hutchinson (eds.), Advances in Consumer Research. Provo, UT: Association for Consumer Research, 1998, pp. 37–44.
- Schuetz, S.W.; Lowry, P.B.; Pienta, D.A.; and Thatcher, J.B. The effectiveness of abstract versus concrete fear appeals in information security. Journal of Management Information Systems, 37, 3 (2020), 723–757.
- Sharpe Wessling, K.; Huber, J.; and Netzer, O. Mturk character misrepresentation: Assessment and solutions. Journal of Consumer Research, 44, 1 (2017), 211–230.
- Sivadas, E.; and Machleit, K.A. A scale to determine the extent of object incorporation in the extended self. Marketing Theory and Applications, 5, 1 (1994), 143–149.
- Smith, C.A.; and Lazarus, R.S. Emotion and adaptation. In L.A. Pervin (ed.), Handbook of Personality: Theory and research. New York: The Guilford Press, 1990, pp. 609–637.
- Snyder, C.R. Hope theory: rainbows in the mind. Psychological Inquiry, 13, 4 (2002), 249–275.
- Spinoza, B. Part III. On the Origin and Nature of Emotions. In Ethics. 1677.
- Statista. Smart home product ownership by age U.S. 2020. Statista, 2021. https://www.statista.com/statistics/799584/united-states-smart-home-device-survey-by-age/.
- Statista. Smart home devices unit shipments in the United States from 2016 to 2020. Statista, 2022. https://www.statista.com/statistics/798370/us-smart-home-units/.
- Venkatesh, V.; Thong, J.Y.; and Xu, X. Consumer acceptance and use of information technology: Extending the unified theory of acceptance and use of technology. MIS Quarterly, (2012), 157-178.
- Vignoles, V.L.; Schwartz, S.J.; and Luyckx, K. Introduction: Toward an integrative view of identity. In S.J. Schwartz, K. Luyckx, and V.L. Vignoles (eds.), Handbook of Identity Theory and Research. New York: Springer, 2011, pp. 1–27.
- Zhao, X.; Lynch, J.G.; and Chen, Q. Reconsidering Baron and Kenny: Myths and truths about mediation analysis. Journal of Consumer Research, 37, 2 (2010), 197–206.