Rogers, R. W. (1975). "A protection motivation theory of fear appeals and attitude change". Journal of Psychology. 91 (1): 93–114. doi:10.1080/00223980.1975.9915803. PMID28136248.
Maddux, J.E.; Rogers, R. W. (1983). "Protection motivation theory and self-efficacy: A revised theory of fear appeals and attitude change". Journal of Experimental Social Psychology. 19 (5): 469–479. doi:10.1016/0022-1031(83)90023-9.
Floyd, D. L.; Prentice; Dunn, S.; Rogers, R. W. (2000). "A meta‐analysis of research on protection motivation theory". Journal of Applied Social Psychology. 30 (2): 407–429. doi:10.1111/j.1559-1816.2000.tb02323.x.
Milne, S.; Sheeran, P.; Orbell, S. (2000). "Prediction and intervention in health‐related behavior: A meta‐analytic review of protection motivation theory". Journal of Applied Social Psychology. 30 (1): 106–143. doi:10.1111/j.1559-1816.2000.tb02308.x.
Boer, H.; Mashamba, M. T. (2005). "Psychosocial correlates of HIV protection motivation among black adolescents in Venda, South Africa". AIDS Education and Prevention. 17 (6): 590–602. doi:10.1521/aeap.2005.17.6.590. PMID16398579.
Herath, T.; Rao, H. R. (2009). "Protection motivation and deterrence: a framework for security policy compliance in organisations". European Journal of Information Systems. 18 (2): 106–125. doi:10.1057/ejis.2009.6.
Ifinedo, P (2012). "Understanding information systems security policy compliance: An integration of the theory of planned behavior and the protection motivation theory". Computers & Security. 31 (1): 83–95. doi:10.1016/j.cose.2011.10.007.
Johnston, A. C.; Warkentin, M. (2010). "Fear appeals and information security behaviors: an empirical study". MIS Quarterly. 34 (3): 549–566. doi:10.2307/25750691. JSTOR25750691.
Lee, D.; Larose, R.; Rifon, N. (2008). "Keeping our network safe: a model of online protection behaviour". Behaviour & Information Technology. 27 (5): 445–454. doi:10.1080/01449290600879344.
Jenkins, Jeffrey L.; Grimes, Mark; Proudfoot, Jeff; Benjamin Lowry, Paul (2014). "Improving password cybersecurity through inexpensive and minimally invasive means: Detecting and deterring password reuse through keystroke-dynamics monitoring and just-in-time warnings". Information Technology for Development. 20 (2): 196–213. doi:10.1080/02681102.2013.814040.
Boss, Scott R.; Galletta, Dennis F.; Benjamin Lowry, Paul; Moody, Gregory D.; Polak, Peter (2015). "What do users have to fear? Using fear appeals to engender threats and fear that motivate protective behaviors in users". MIS Quarterly. 39 (4): 837–864. doi:10.25300/MISQ/2015/39.4.5. SSRN2607190.
jstor.org
Johnston, A. C.; Warkentin, M. (2010). "Fear appeals and information security behaviors: an empirical study". MIS Quarterly. 34 (3): 549–566. doi:10.2307/25750691. JSTOR25750691.
nih.gov
pubmed.ncbi.nlm.nih.gov
Rogers, R. W. (1975). "A protection motivation theory of fear appeals and attitude change". Journal of Psychology. 91 (1): 93–114. doi:10.1080/00223980.1975.9915803. PMID28136248.
Boer, H.; Mashamba, M. T. (2005). "Psychosocial correlates of HIV protection motivation among black adolescents in Venda, South Africa". AIDS Education and Prevention. 17 (6): 590–602. doi:10.1521/aeap.2005.17.6.590. PMID16398579.
Boss, Scott R.; Galletta, Dennis F.; Benjamin Lowry, Paul; Moody, Gregory D.; Polak, Peter (2015). "What do users have to fear? Using fear appeals to engender threats and fear that motivate protective behaviors in users". MIS Quarterly. 39 (4): 837–864. doi:10.25300/MISQ/2015/39.4.5. SSRN2607190.