Applying Protection Motivation Theory to Information Security Training for College Students

2013 ◽  
Vol 9 (1) ◽  
pp. 47-67 ◽  
Author(s):  
Peter Meso ◽  
Yi Ding ◽  
Shuting Xu
Author(s):  
EunWon Lee ◽  
GyeongAe Seomun

Background: Healthcare information includes sensitive data and, as such, must be secure; however, the risk of healthcare information leakage is increasing. Nurses manage healthcare information in hospitals; however, previous studies have either been conducted on medical workers from various other occupations or have not synthesized various factors. The purpose of this study was to create and prove a model of nurses’ healthcare information security (HIS). The hypothetical model used in this study was constructed on the basis of the protection motivation theory (PMT) proposed by Rogers. Methods: A total of 252 questionnaires scored using a five-point Likert scale were analyzed, incorporating data from nurses who had been working for more than one month in general hospitals with more than 300 beds in South Korea. The survey was conducted over a total of 30 days, from 1 to 30 September 2019. Results: The results showed that coping appraisal significantly influence HIS intentions (estimate = −1.477, p < 0.01), whereas HIS intentions significantly influence HIS behavior (estimate = 0.515, p < 0.001). A moderating effect on the association between coping appraisal and HIS intentions was found in the group of nurses who had been working for <5 years (estimate = −1.820, p < 0.05). Moreover, a moderating effect on the association between HIS intentions and HIS behavior was found in the group of nurses who had been working for <5 years (estimate = 0.600, p < 0.001). Conclusion: The results of this study can be used to develop a management plan to strengthen nurses’ HIS behavior and can be used by nursing managers as a basis for developing education programs.


2015 ◽  
Vol 9 (1) ◽  
pp. 26-46 ◽  
Author(s):  
Teodor Sommestad ◽  
Henrik Karlzén ◽  
Jonas Hallberg

Individuals' willingness to take security precautions is imperative to their own information security and the information security of the organizations they work within. This paper presents a meta-analysis of the protection motivation theory (PMT) to assess how its efficacy is influenced by the information security behavior it is applied to. It investigates if the PMT explains information security behavior better if: 1) The behavior is voluntary? 2) The threat and coping method is concrete or specific? 3) The information security threat is directed to the person itself? Synthesized data from 28 surveys suggests that the answers to all three questions are yes. Weighted mean correlation coefficients are on average 0.03 higher for voluntary behavior than mandatory behavior, 0.05 higher for specific behaviors than studies of general behaviors, 0.08 higher to threat appraisal when the threat targets the individual person instead of the person's organization or someone else.


2015 ◽  
Author(s):  
Lynn Williams ◽  
Susan Rasmussen ◽  
Adam Kleczkowski ◽  
Savi Maharaj ◽  
Nicole Cairns

2021 ◽  
Vol 79 (1) ◽  
Author(s):  
Joris Adriaan Frank van Loenhout ◽  
Kirsten Vanderplanken ◽  
Bénédicte Scheen ◽  
Stephan Van den Broucke ◽  
Isabelle Aujoulat

Abstract Background Since the start of the COVID-19 outbreak, the Belgian government has implemented various infection prevention and control measures. This study assessed the extent to which the general population in Belgium adhered to these measures, and which determinants were associated with adherence. Methods We undertook an internet survey among a sample of the Belgian population, representative for sex, age, socio-economic status and province. The questionnaire included various demographic, socio-economic and health-related questions, and also drew upon the Protection Motivation Theory as a theoretical framework to measure levels of perceived severity, vulnerability, perceived usefulness of the measures (response efficacy), perceived personal capacity to adhere (self-efficacy), and past and future adherence. Data were collected in Dutch and French, the main languages of Belgium. Results Our study was carried out in September 2020, and the number of respondents was 2008. On average, respondents provided high scores for each of the measures in place in September in terms of response efficacy (range of 3.54–4.32 on 1 to 5 Likert-scale), self-efficacy (range of 3.00–4.00), past adherence (4.00–4.68) and future adherence (3.99–4.61). The measure that overall received the highest scores was wearing a face mask in public spaces, while ‘the social bubble of 5’ generally received the lowest scores. There was a statistically significant relationship between response efficacy and self-efficacy on the one hand and (past and future) adherence on the other hand, in a multivariate model corrected for confounders. Vulnerability and severity did not show statistical significance. Conclusion Risk communication regarding COVID-19 should place a stronger emphasis on helping people understand why implemented measures are useful and how they can be put into practice, more than on increasing fear appeals.


Author(s):  
Steffi Haag ◽  
Mikko Siponen ◽  
Fufan Liu

Protection motivation theory (PMT) is one of the most commonly used theories to examine information security behaviors. Our systematic review of the application of PMT in information systems (IS) security and the comparison with its application for decades in psychology identified five categories of important issues that have not yet been examined in IS security research. Discussing these issues in terms of why they are relevant and important for IS security, and to what extent IS research has not considered them, offers new research opportunities associated with the study of PMT and IS security threats. We suggest how future studies can approach each of the open issues to provide a new road map for quantitative and qualitative IS scholars.


Sign in / Sign up

Export Citation Format

Share Document