ABSTRACT
Ⅰ. Introduction
Ⅱ. Literature Review
2.1. Password Security
2.2. Fatigue and Password Fatigue
2.3. Affective Events Theory and Affective Response
2.4. Theory of Planned Behavior and Shadow Work
Ⅲ. Research Model and Hypotheses
3.1. Research Model
3.2. Research Hypotheses
3.3. Construct Operationalization
3.4. Research Approach and Data Collection
Ⅳ. Data Analysis and Results
4.1. Descriptive Analysis
4.2. Measurement Model
4.3. PLS analysis
Ⅴ. Conclusion
5.1. Implications for Research
5.2. Implications for Practice
5.3. Limitations and Suggestions for Future Research
Acknowledgments