WHAT DO SYSTEMS USERS HAVE TO FEAR? USING FEAR APPEALS TO ENGENDER THREATS AND FEAR THAT MOTIVATE PROTECTIVE SECURITY BEHAVIORS

被引:464
作者
Boss, Scott R. [1 ]
Galletta, Dennis F. [2 ]
Lowry, Paul Benjamin [3 ]
Moody, Gregory D. [4 ]
Polak, Peter [5 ]
机构
[1] Bentley Univ, Dept Accountancy, Waltham, MA 02452 USA
[2] Univ Pittsburgh, Katz Grad Sch Business, Pittsburgh, PA 15260 USA
[3] City Univ Hong Kong, Coll Business, Hong Kong, Hong Kong, Peoples R China
[4] Univ Nevada, Las Vegas, NV 89154 USA
[5] Florida Int Univ, Coll Business, Dept Decis Sci & Informat Syst, Miami, FL 33199 USA
关键词
Information security; protection motivation theory; system backups; model comparison; fear appeals; threat; coping; intentions; behavior; POLICY COMPLIANCE; SELF-EFFICACY; INFORMATION; INTERVENTION; DETERRENCE; IMPACT; MODEL; ACCOUNTABILITY; METAANALYSIS; VIOLATIONS;
D O I
10.25300/MISQ/2015/39.4.5
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Because violations of information security (ISec) and privacy have become ubiquitous in both personal and work environments, academic attention to ISec and privacy has taken on paramount importance. Consequently, a key focus of ISec research has been discovering ways to motivate individuals to engage in more secure behaviors. Over time, the protection motivation theory (PMT) has become a leading theoretical foundation used in ISec research to help motivate individuals to change their security-related behaviors to protect themselves and their organizations. Our careful review of the foundation for PMT identified four opportunities for improving ISec PMT research. First, extant ISec studies do not use the full nomology of PMT constructs. Second, only one study uses fear-appeal manipulations, even though these are a core element of PMT. Third, virtually no ISec study models or measures fear. Fourth, whereas these studies have made excellent progress in predicting security intentions, none of them have addressed actual security behaviors. This artticle describes the theoretical foundation of these four opportunities for improvement. We tested the nomology of PMT, including manipulated fear appeals, in two different ISec contexts that model the modern theoretical treatment of PMT more closely than do extant ISec studies. The first data collection was a longitudinal study in the context of data backups. The second study was a short-term cross-sectional study in the context of anti-malware software. Our new model demonstrated better results and stronger fit than the existing models and confirms the efficacy of the four potential improvements we identified.
引用
收藏
页码:837 / U461
页数:41
相关论文
共 83 条
[1]   THE THEORY OF PLANNED BEHAVIOR [J].
AJZEN, I .
ORGANIZATIONAL BEHAVIOR AND HUMAN DECISION PROCESSES, 1991, 50 (02) :179-211
[2]  
Anderson CL, 2010, MIS QUART, V34, P613
[3]   Consumer motivations in taking action against spyware: An empirical investigation [J].
Gurung, Anil ;
Luo, Xin ;
Liao, Qinyu .
Information Management and Computer Security, 2009, 17 (03) :276-289
[4]  
[Anonymous], INFORM SYSTEMS J
[5]  
[Anonymous], J MANAGEMENT INFORMA
[6]  
Babin BJ, 2010, Multivariate data analysis, V7
[7]  
Bulgurcu B, 2010, MIS QUART, V34, P523
[8]  
Burton-Jones A., 2015, EUROPEAN J IN PRESS
[9]  
Claar CL, 2012, J COMPUT INFORM SYST, V52, P20
[10]   COMPUTER SELF-EFFICACY - DEVELOPMENT OF A MEASURE AND INITIAL TEST [J].
COMPEAU, DR ;
HIGGINS, CA .
MIS QUARTERLY, 1995, 19 (02) :189-211