scholarly journals Using protection motivation theory in the design of nudges to improve online security behavior

2019 ◽  
Vol 123 ◽  
pp. 29-39 ◽  
Author(s):  
René van Bavel ◽  
Nuria Rodríguez-Priego ◽  
José Vila ◽  
Pam Briggs
2015 ◽  
Vol 9 (1) ◽  
pp. 26-46 ◽  
Author(s):  
Teodor Sommestad ◽  
Henrik Karlzén ◽  
Jonas Hallberg

Individuals' willingness to take security precautions is imperative to their own information security and the information security of the organizations they work within. This paper presents a meta-analysis of the protection motivation theory (PMT) to assess how its efficacy is influenced by the information security behavior it is applied to. It investigates if the PMT explains information security behavior better if: 1) The behavior is voluntary? 2) The threat and coping method is concrete or specific? 3) The information security threat is directed to the person itself? Synthesized data from 28 surveys suggests that the answers to all three questions are yes. Weighted mean correlation coefficients are on average 0.03 higher for voluntary behavior than mandatory behavior, 0.05 higher for specific behaviors than studies of general behaviors, 0.08 higher to threat appraisal when the threat targets the individual person instead of the person's organization or someone else.


2015 ◽  
Author(s):  
Lynn Williams ◽  
Susan Rasmussen ◽  
Adam Kleczkowski ◽  
Savi Maharaj ◽  
Nicole Cairns

2021 ◽  
Vol 79 (1) ◽  
Author(s):  
Joris Adriaan Frank van Loenhout ◽  
Kirsten Vanderplanken ◽  
Bénédicte Scheen ◽  
Stephan Van den Broucke ◽  
Isabelle Aujoulat

Abstract Background Since the start of the COVID-19 outbreak, the Belgian government has implemented various infection prevention and control measures. This study assessed the extent to which the general population in Belgium adhered to these measures, and which determinants were associated with adherence. Methods We undertook an internet survey among a sample of the Belgian population, representative for sex, age, socio-economic status and province. The questionnaire included various demographic, socio-economic and health-related questions, and also drew upon the Protection Motivation Theory as a theoretical framework to measure levels of perceived severity, vulnerability, perceived usefulness of the measures (response efficacy), perceived personal capacity to adhere (self-efficacy), and past and future adherence. Data were collected in Dutch and French, the main languages of Belgium. Results Our study was carried out in September 2020, and the number of respondents was 2008. On average, respondents provided high scores for each of the measures in place in September in terms of response efficacy (range of 3.54–4.32 on 1 to 5 Likert-scale), self-efficacy (range of 3.00–4.00), past adherence (4.00–4.68) and future adherence (3.99–4.61). The measure that overall received the highest scores was wearing a face mask in public spaces, while ‘the social bubble of 5’ generally received the lowest scores. There was a statistically significant relationship between response efficacy and self-efficacy on the one hand and (past and future) adherence on the other hand, in a multivariate model corrected for confounders. Vulnerability and severity did not show statistical significance. Conclusion Risk communication regarding COVID-19 should place a stronger emphasis on helping people understand why implemented measures are useful and how they can be put into practice, more than on increasing fear appeals.


Author(s):  
Steffi Haag ◽  
Mikko Siponen ◽  
Fufan Liu

Protection motivation theory (PMT) is one of the most commonly used theories to examine information security behaviors. Our systematic review of the application of PMT in information systems (IS) security and the comparison with its application for decades in psychology identified five categories of important issues that have not yet been examined in IS security research. Discussing these issues in terms of why they are relevant and important for IS security, and to what extent IS research has not considered them, offers new research opportunities associated with the study of PMT and IS security threats. We suggest how future studies can approach each of the open issues to provide a new road map for quantitative and qualitative IS scholars.


Sign in / Sign up

Export Citation Format

Share Document