
Keywords: اثربخشی پاسخ; Information security; Information security policy compliance; Protection Motivation Theory; Cognitive Evaluation Theory; Theory of Reasoned Action; Threat appraisal; Self-efficacy; Response efficacy; Attitude; Normative beliefs; Rewards; Moderating effect