Protection Motivation Theory in Information Security Behavior Research: Reconsidering the Fundamentals

被引:0
|
作者
Siponen M. [1 ]
Rönkkö M. [2 ]
Haag S. [3 ]
Fufan L. [4 ]
Laatikainen G. [5 ]
机构
[1] Department of Information Systems, Statistics and Management Science Culverhouse College of Business, University of Alabama
[2] School of Business and Economics, University of Jyväskylä
[3] Institute of Computer Science, Heinrich Heine University, Düsseldorf
[4] Department of Innovation, Entrepreneurship, and Information Systems IESEG School of Management
[5] Faculty of Information Technology, University of Jyväskylä
关键词
Behavioral Information Security; Fear Appeal; Infosec Behavior; Protection Motivation Theory; Security Threat; Threat Message; Threatening Communication;
D O I
10.17705/1CAIS.05348
中图分类号
学科分类号
摘要
Scholars commonly use protection motivation theory (PMT) by Rogers to examine information systems (IS) security behaviors and behavioral intentions. A recent influential paper by Boss, Galletta, Lowry, Moody, and Polak (2015; hereafter BGLMP) in MIS Quarterly outlines correct and incorrect uses of PMT in Information Security behavior research. In this paper, we review some of BGLMP’s key recommendations, such as the claim that all IS behavior studies that apply PMT should always use the model of the full theory, contain and measure fear, and measure actual behaviors. We defend an interpretation of Rogers (1975, 1983) that differs from the interpretation that BGLMP propose. We present evidence that Rogers’ PMT and the empirical evidence do not adequately support many of BGLMP’s suggestions and that these suggestions contradict good scientific practices (e.g., restricting the use of the method of isolation) that the philosophy of science and the original literature on PMT uphold. As a result, if reviewers and editors continue to embrace these recommendations, they could hinder the progress of IS behavior research by not allowing isolation or the combination of different theoretical components. In contrast to BGLMP’s paper, we argue that further PMT research can focus on isolated PMT components and combine them with other theories. Some of our ideas (e.g., isolation) are not PMT-specific and could be useful for IS research in general. In summary, we contest BGLMP’s recommendations and offer revised recommendations in return. © 2023 by the Association for Information Systems.
引用
收藏
页码:1136 / 1165
页数:29
相关论文
共 50 条
  • [1] Protection Motivation Theory in Information Security Behavior Research: Reconsidering the Fundamentals
    Siponen, Mikko
    Ronkko, Mikko
    Fufan, Liu
    Haag, Steffi
    Laatikainen, Gabriella
    COMMUNICATIONS OF THE ASSOCIATION FOR INFORMATION SYSTEMS, 2023, 53
  • [2] Structural Model of the Healthcare Information Security Behavior of Nurses Applying Protection Motivation Theory
    Lee, EunWon
    Seomun, GyeongAe
    INTERNATIONAL JOURNAL OF ENVIRONMENTAL RESEARCH AND PUBLIC HEALTH, 2021, 18 (04) : 1 - 13
  • [3] Understanding information systems security policy compliance: An integration of the theory of planned behavior and the protection motivation theory
    Ifinedo, Princely
    COMPUTERS & SECURITY, 2012, 31 (01) : 83 - 95
  • [4] Protection Motivation Theory in Information Systems Security Research: A Review of the Past and a Road Map for the Future
    Haag, Steffi
    Siponen, Mikko
    Liu, Fufan
    DATA BASE FOR ADVANCES IN INFORMATION SYSTEMS, 2021, 52 (02): : 25 - 67
  • [5] A students' behaviors in information security: Extension of Protection Motivation Theory (PMT)
    Alam, Syed Shah
    Ahsan, Nilufar
    Kokash, Husam Ahmad
    Alam, Shafiul
    Ahmed, Saif
    INFORMATION SECURITY JOURNAL, 2024,
  • [6] Impact of Users' Security Awareness on Desktop Security Behavior: A Protection Motivation Theory Perspective
    Hanus, Bartlomiej
    Wu, Yu Andy
    INFORMATION SYSTEMS MANAGEMENT, 2016, 33 (01) : 2 - 16
  • [7] Factors Affecting Security Behavior of Kenyan Students: An Integration of Protection Motivation Theory and Theory of Planned Behavior
    Farooq, Ali
    Ndiege, Joshua Rumo A.
    Isoaho, Jouni
    2019 IEEE AFRICON, 2019,
  • [8] A Meta-Analysis of Studies on Protection Motivation Theory and Information Security Behaviour
    Sommestad, Teodor
    Karlzen, Henrik
    Hallberg, Jonas
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY AND PRIVACY, 2015, 9 (01) : 26 - 46
  • [9] Vaccination hesitancy: Applying the protection motivation theory on parents' information behavior
    Alwreikat, Asma
    INFORMATION DEVELOPMENT, 2024,
  • [10] Using protection motivation theory in the design of nudges to improve online security behavior
    van Bavel, Rene
    Rodriguez-Priego, Nuria
    Vila, Jose
    Briggs, Pam
    INTERNATIONAL JOURNAL OF HUMAN-COMPUTER STUDIES, 2019, 123 : 29 - 39