Changes

Jump to navigation Jump to search
no edit summary
Line 27: Line 27:  
== Diagram/schematic of theory ==
 
== Diagram/schematic of theory ==
 
[[File:Figure 1- The Process of IT Threat Avoidance.jpg|thumb|Figure 1: The Process of IT Threat Avoidance|none|542x542px]]
 
[[File:Figure 1- The Process of IT Threat Avoidance.jpg|thumb|Figure 1: The Process of IT Threat Avoidance|none|542x542px]]
[[File:Figure 2- The Variance Theory View of TTAT.jpg|thumb|Figure 2: The Variance Theory View of TTAT|none|547x547px]]
+
[[File:Figure 2- The Variance Theory View of TTAT.jpg|thumb|Figure 2: The Variance Theory View of TTAT|none|547x547px]]<small>'''Source''': Liang, H., & Xue, Y. (2009, March). Avoidance of Information Technology Threats: A Theoretical Perspective. MIS Quarterly, 33(1), 71-90.</small>
    
== Originating author(s) ==
 
== Originating author(s) ==
Line 45: Line 45:     
== Links from this theory to other theories ==
 
== Links from this theory to other theories ==
*
+
[[Protection motivation theory]], [[General systems theory]], [[Prospect theory]], [[Self-efficacy theory|Self-efficacy]], [[Social cognitive theory]], Cybernetic theory, Coping theory
    
== IS articles that use the theory ==
 
== IS articles that use the theory ==
Line 61: Line 61:  
== Date last updated ==
 
== Date last updated ==
 
*28 Feb 2017
 
*28 Feb 2017
 +
 +
== References ==

Navigation menu