File Download
There are no files associated with this item.
Links for fulltext
(May Require Subscription)
- Publisher Website: 10.25300/MISQ/2015/39.4.5
- Scopus: eid_2-s2.0-84961795031
- WOS: WOS:000368424000006
- Find via
Supplementary
- Citations:
- Appears in Collections:
Article: What do systems users have to fear? Using fear appeals to engender threats and fear that motivate protective security behaviors
Title | What do systems users have to fear? Using fear appeals to engender threats and fear that motivate protective security behaviors |
---|---|
Authors | |
Keywords | Model comparison Information security Intentions Behavior Coping Fear appeals Threat System backups Protection motivation theory |
Issue Date | 2015 |
Citation | MIS Quarterly: Management Information Systems, 2015, v. 39, n. 4, p. 837-864 How to Cite? |
Abstract | Because violations of information security (ISec) and privacy have become ubiquitous in both personal and work environments, academic attention to ISec and privacy has taken on paramount importance. Consequently, a key focus of ISec research has been discovering ways to motivate individuals to engage in more secure behaviors. Over time, the protection motivation theory (PMT) has become a leading theoretical foundation used in ISec research to help motivate individuals to change their security-related behaviors to protect themselves and their organizations. Our careful review of the foundation for PMT identified four opportunities for improving ISec PMT research. First, extant ISec studies do not use the full nomology of PMT constructs. Second, only one study uses fear-appeal manipulations, even though these are a core element of PMT. Third, virtually no ISec study models or measures fear. Fourth, whereas these studies have made excellent progress in predicting security intentions, none of them have addressed actual security behaviors. This article describes the theoretical foundation of these four opportunities for improvement. We tested the nomology of PMT, including manipulated fear appeals, in two different ISec contexts that model the modern theoretical treatment of PMT more closely than do extant ISec studies. The first data collection was a longitudinal study in the context of data backups. The second study was a short-term cross-sectional study in the context of anti-malware software. Our new model demonstrated better results and stronger fit than the existing models and confirms the efficacy of the four potential improvements we identified. |
Persistent Identifier | http://hdl.handle.net/10722/233871 |
ISSN | 2023 Impact Factor: 7.0 2023 SCImago Journal Rankings: 4.105 |
ISI Accession Number ID |
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Boss, Scott R. | - |
dc.contributor.author | Galletta, Dennis F. | - |
dc.contributor.author | Lowry, Paul Benjamin | - |
dc.contributor.author | Moody, Gregory D. | - |
dc.contributor.author | Polak, Peter | - |
dc.date.accessioned | 2016-09-27T07:21:51Z | - |
dc.date.available | 2016-09-27T07:21:51Z | - |
dc.date.issued | 2015 | - |
dc.identifier.citation | MIS Quarterly: Management Information Systems, 2015, v. 39, n. 4, p. 837-864 | - |
dc.identifier.issn | 0276-7783 | - |
dc.identifier.uri | http://hdl.handle.net/10722/233871 | - |
dc.description.abstract | Because violations of information security (ISec) and privacy have become ubiquitous in both personal and work environments, academic attention to ISec and privacy has taken on paramount importance. Consequently, a key focus of ISec research has been discovering ways to motivate individuals to engage in more secure behaviors. Over time, the protection motivation theory (PMT) has become a leading theoretical foundation used in ISec research to help motivate individuals to change their security-related behaviors to protect themselves and their organizations. Our careful review of the foundation for PMT identified four opportunities for improving ISec PMT research. First, extant ISec studies do not use the full nomology of PMT constructs. Second, only one study uses fear-appeal manipulations, even though these are a core element of PMT. Third, virtually no ISec study models or measures fear. Fourth, whereas these studies have made excellent progress in predicting security intentions, none of them have addressed actual security behaviors. This article describes the theoretical foundation of these four opportunities for improvement. We tested the nomology of PMT, including manipulated fear appeals, in two different ISec contexts that model the modern theoretical treatment of PMT more closely than do extant ISec studies. The first data collection was a longitudinal study in the context of data backups. The second study was a short-term cross-sectional study in the context of anti-malware software. Our new model demonstrated better results and stronger fit than the existing models and confirms the efficacy of the four potential improvements we identified. | - |
dc.language | eng | - |
dc.relation.ispartof | MIS Quarterly: Management Information Systems | - |
dc.subject | Model comparison | - |
dc.subject | Information security | - |
dc.subject | Intentions | - |
dc.subject | Behavior | - |
dc.subject | Coping | - |
dc.subject | Fear appeals | - |
dc.subject | Threat | - |
dc.subject | System backups | - |
dc.subject | Protection motivation theory | - |
dc.title | What do systems users have to fear? Using fear appeals to engender threats and fear that motivate protective security behaviors | - |
dc.type | Article | - |
dc.description.nature | link_to_subscribed_fulltext | - |
dc.identifier.doi | 10.25300/MISQ/2015/39.4.5 | - |
dc.identifier.scopus | eid_2-s2.0-84961795031 | - |
dc.identifier.volume | 39 | - |
dc.identifier.issue | 4 | - |
dc.identifier.spage | 837 | - |
dc.identifier.epage | 864 | - |
dc.identifier.eissn | 2162-9730 | - |
dc.identifier.isi | WOS:000368424000006 | - |
dc.identifier.issnl | 0276-7783 | - |