[[File:Figure 1- The Process of IT Threat Avoidance.jpg|thumb|Figure 1: The Process of IT Threat Avoidance|none|542x542px]]
[[File:Figure 1- The Process of IT Threat Avoidance.jpg|thumb|Figure 1: The Process of IT Threat Avoidance|none|542x542px]]
−
[[File:Figure 2- The Variance Theory View of TTAT.jpg|thumb|Figure 2: The Variance Theory View of TTAT|none|547x547px]]
+
[[File:Figure 2- The Variance Theory View of TTAT.jpg|thumb|Figure 2: The Variance Theory View of TTAT|none|547x547px]]<small>'''Source''': Liang, H., & Xue, Y. (2009, March). Avoidance of Information Technology Threats: A Theoretical Perspective. MIS Quarterly, 33(1), 71-90.</small>