scholarly journals Protection Motivation Theory in Information Systems Security Research

Author(s):  
Steffi Haag ◽  
Mikko Siponen ◽  
Fufan Liu

Protection motivation theory (PMT) is one of the most commonly used theories to examine information security behaviors. Our systematic review of the application of PMT in information systems (IS) security and the comparison with its application for decades in psychology identified five categories of important issues that have not yet been examined in IS security research. Discussing these issues in terms of why they are relevant and important for IS security, and to what extent IS research has not considered them, offers new research opportunities associated with the study of PMT and IS security threats. We suggest how future studies can approach each of the open issues to provide a new road map for quantitative and qualitative IS scholars.

Author(s):  
Narasimha Paravastu ◽  
Murugan Anandarajan

Information security is important for organizations as well as individuals from the perspective of protection from data breaches, identity theft, malware and infections, hacking etc. This article presents the framework of Protection Motivation Theory and its constructs, and then reviews the past IS Literature on information systems security, from a protection motivation perspective. Specifically this article tries to explain how individuals perceive a fear appeal in an information systems security threat, and how the protection motivation framework of fear, threat perceptions of severity and vulnerability, impact the coping intentions of individuals to protect themselves from information systems security threats. This article further discusses the theoretical and managerial implications of protection motivation theory as it applies to information systems security.


Author(s):  
Ken H. Guo

Knowledge is one of the critical factors that organizations need to consider when managing the security of resource management systems or information systems in general. This is because knowledge is not only the subject but also a tool of IS security management. On the one hand, IS security is about the security of knowledge (including data and information). On the other hand, IS security management is a knowledge-intensive activity that depends heavily on IS professionals’ expertise and skills and end user awareness. Given the important role of knowledge, this chapter aims to review current security research by applying knowledge management concepts and frameworks as a tool and lens. Based on the systemic review, this chapter identifies gaps in the current information systems security literature and provides some guidelines for future research and security practices.


Author(s):  
Narasimha Paravastu ◽  
Claire A. Simmers ◽  
Murugan Anandarajan

This study tested the context of employees using their devices for both work and personal use, and non-compliant device usage of a person potentially resulting in Information Systems (IS) security threat to personal as well as work data and/or the devices. Integrating bystander and protection motivation theory (PMT) perspectives this paper studies bystanders' responses to IS security threats and the extent to which a perceived security threat motivates individual intention to act, in the context of non-compliant mobile device usage behaviors. It tests the role of an individual's threat perceptions to protect their own IS security, and as a bystander, protecting their peers or the IS security of their organization. Data collected from 431 individuals support the hypotheses that security awareness predicts perceived severity and protection motivation. Evaluation apprehension and diffusion of responsibility inhibit bystander's intentions to act against non-compliant mobile device usage behaviors, while awareness facilitates it. Theoretical contributions and practical implications of the research are discussed.


Author(s):  
Frederick Ip ◽  
Yolande E. Chan

This study assists organizations and researchers in examining investments in IS security. A questionnaire was developed and administered to managers in Canadian financial firms and educational organizations. The survey examined security threats and the countermeasures adopted by organizations to prevent and respond to security breaches. Data gathered were used to investigate the relationships between investment in security, perceived security, and organizational performance.


2015 ◽  
Author(s):  
Lynn Williams ◽  
Susan Rasmussen ◽  
Adam Kleczkowski ◽  
Savi Maharaj ◽  
Nicole Cairns

2021 ◽  
Vol 79 (1) ◽  
Author(s):  
Joris Adriaan Frank van Loenhout ◽  
Kirsten Vanderplanken ◽  
Bénédicte Scheen ◽  
Stephan Van den Broucke ◽  
Isabelle Aujoulat

Abstract Background Since the start of the COVID-19 outbreak, the Belgian government has implemented various infection prevention and control measures. This study assessed the extent to which the general population in Belgium adhered to these measures, and which determinants were associated with adherence. Methods We undertook an internet survey among a sample of the Belgian population, representative for sex, age, socio-economic status and province. The questionnaire included various demographic, socio-economic and health-related questions, and also drew upon the Protection Motivation Theory as a theoretical framework to measure levels of perceived severity, vulnerability, perceived usefulness of the measures (response efficacy), perceived personal capacity to adhere (self-efficacy), and past and future adherence. Data were collected in Dutch and French, the main languages of Belgium. Results Our study was carried out in September 2020, and the number of respondents was 2008. On average, respondents provided high scores for each of the measures in place in September in terms of response efficacy (range of 3.54–4.32 on 1 to 5 Likert-scale), self-efficacy (range of 3.00–4.00), past adherence (4.00–4.68) and future adherence (3.99–4.61). The measure that overall received the highest scores was wearing a face mask in public spaces, while ‘the social bubble of 5’ generally received the lowest scores. There was a statistically significant relationship between response efficacy and self-efficacy on the one hand and (past and future) adherence on the other hand, in a multivariate model corrected for confounders. Vulnerability and severity did not show statistical significance. Conclusion Risk communication regarding COVID-19 should place a stronger emphasis on helping people understand why implemented measures are useful and how they can be put into practice, more than on increasing fear appeals.


Sign in / Sign up

Export Citation Format

Share Document