Ali Vedadi’s research while affiliated with Middle Tennessee State University and other places

What is this page?


This page lists works of an author who doesn't have a ResearchGate profile or hasn't added the works to their profile yet. It is automatically generated from public (personal) data to further our legitimate goal of comprehensive and accurate scientific recordkeeping. If you are this author and want this page removed, please let us know.

Publications (1)


A Quantitative Textual Analysis of Three Types of Threat Communication and Subsequent Maladaptive Responses
  • Article

September 2018

·

48 Reads

·

16 Citations

Computers & Security

Kent Marett

·

Ali Vedadi

·

Alexandra Durcikova

Much research attention has been given to the behavioral outcomes of warning computer users about potential threats to their information security, primarily through the use of fear appeal messaging. This study explores not only the use of other types of external threat information (including vivid messaging and observational learning) but also the textual responses of computer users receiving the information, opening up the “black box” to their threat appraisal processes. Results indicate that maladaptive perceptions can appear throughout the appraisal process and that the type of external threat information can differently influence user attitudes.

Citations (1)


... Governments should motivate users to reduce use by exposing them to persuasive messages that contain information about the threats and recommendations to mitigate the threats. Social media are effective channels for making these persuasive messages publicly accessible (Marett et al., 2019;Matook et al., 2022). For example, governments can make Facebook posts or YouTube videos to inform users that problematic use is prevalent and may have severe effects on their wellbeing. ...

Reference:

Decreasing the Problematic Use of an Information System: A Conceptual Replication in the Context of Digital Streaming Services
A Quantitative Textual Analysis of Three Types of Threat Communication and Subsequent Maladaptive Responses
  • Citing Article
  • September 2018

Computers & Security