Open Access. Powered by Scholars. Published by Universities.®

Psychology Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 2 of 2

Full-Text Articles in Psychology

Psychosocial Factors And E-Cigarette Use: An Application Of Problem Behavior Theory, Samantha A. Fitzer Dec 2022

Psychosocial Factors And E-Cigarette Use: An Application Of Problem Behavior Theory, Samantha A. Fitzer

Psychology Theses & Dissertations

Electronic cigarette (e-cigarette) use has increased among the U.S. population in recent years with estimates showing that nearly 15% of American adults have tried an e-cigarette (Villarroel et al., 2020). Problem Behavior Theory (PBT) has successfully outlined a variety of factors that affect an individual’s engagement in an identified problem behavior. In an attempt to better understand e-cigarette use among an emerging adult population (i.e., college student population), the purpose of the current study was to explore how a large subset of PBT factors may differentiate between e-cigarette user categories (nonuser, non-daily user, daily user). A sample of 487 college …


Precursors Of Email Response To Cybersecurity Scenarios: Factor Exploration And Scale Development, Miguel A. Toro-Jarrin, Pilar Pazos-Lago, Miguel Padilla Jan 2022

Precursors Of Email Response To Cybersecurity Scenarios: Factor Exploration And Scale Development, Miguel A. Toro-Jarrin, Pilar Pazos-Lago, Miguel Padilla

Engineering Management & Systems Engineering Faculty Publications

In the last decade, information security research has further expanded to include human factors as key elements of the organization's cybersecurity infrastructure. Numerous factors from several theories have been explored to explain and predict the multitude of information security-related behaviors in organizations. Lately, there has been a call for the study of specific cybersecurity behaviors in contextualized scenarios that reflect specific and realistic situations of a potential cyber-attack. This paper focuses on precursors of email response in situations that can be the origin of cybersecurity incidents in organizations (i.e., phishing attacks, ransomware, etc.). This study explores participants' intentions to follow …