WHAT DO SYSTEMS USERS HAVE TO FEAR? USING FEAR APPEALS TO ENGENDER THREATS AND FEAR THAT MOTIVATE PROTECTIVE SECURITY BEHAVIORS

成果类型:
Article
署名作者:
Boss, Scott R.; Galletta, Dennis F.; Lowry, Paul Benjamin; Moody, Gregory D.; Polak, Peter
署名单位:
Bentley University; Pennsylvania Commonwealth System of Higher Education (PCSHE); University of Pittsburgh; City University of Hong Kong; Nevada System of Higher Education (NSHE); University of Nevada Las Vegas; State University System of Florida; Florida International University
刊物名称:
MIS QUARTERLY
ISSN/ISSBN:
0276-7783
DOI:
10.25300/MISQ/2015/39.4.5
发表日期:
2015
页码:
837-U461
关键词:
policy compliance self-efficacy INFORMATION intervention deterrence IMPACT MODEL ACCOUNTABILITY metaanalysis VIOLATIONS
摘要:
Because violations of information security (ISec) and privacy have become ubiquitous in both personal and work environments, academic attention to ISec and privacy has taken on paramount importance. Consequently, a key focus of ISec research has been discovering ways to motivate individuals to engage in more secure behaviors. Over time, the protection motivation theory (PMT) has become a leading theoretical foundation used in ISec research to help motivate individuals to change their security-related behaviors to protect themselves and their organizations. Our careful review of the foundation for PMT identified four opportunities for improving ISec PMT research. First, extant ISec studies do not use the full nomology of PMT constructs. Second, only one study uses fear-appeal manipulations, even though these are a core element of PMT. Third, virtually no ISec study models or measures fear. Fourth, whereas these studies have made excellent progress in predicting security intentions, none of them have addressed actual security behaviors. This artticle describes the theoretical foundation of these four opportunities for improvement. We tested the nomology of PMT, including manipulated fear appeals, in two different ISec contexts that model the modern theoretical treatment of PMT more closely than do extant ISec studies. The first data collection was a longitudinal study in the context of data backups. The second study was a short-term cross-sectional study in the context of anti-malware software. Our new model demonstrated better results and stronger fit than the existing models and confirms the efficacy of the four potential improvements we identified.
来源URL: