Protection Motivation Theory in Information Security Behavior Research: Reconsidering the Fundamentals

被引:0
|
作者
Siponen M. [1 ]
Rönkkö M. [2 ]
Haag S. [3 ]
Fufan L. [4 ]
Laatikainen G. [5 ]
机构
[1] Department of Information Systems, Statistics and Management Science Culverhouse College of Business, University of Alabama
[2] School of Business and Economics, University of Jyväskylä
[3] Institute of Computer Science, Heinrich Heine University, Düsseldorf
[4] Department of Innovation, Entrepreneurship, and Information Systems IESEG School of Management
[5] Faculty of Information Technology, University of Jyväskylä
关键词
Behavioral Information Security; Fear Appeal; Infosec Behavior; Protection Motivation Theory; Security Threat; Threat Message; Threatening Communication;
D O I
10.17705/1CAIS.05348
中图分类号
学科分类号
摘要
Scholars commonly use protection motivation theory (PMT) by Rogers to examine information systems (IS) security behaviors and behavioral intentions. A recent influential paper by Boss, Galletta, Lowry, Moody, and Polak (2015; hereafter BGLMP) in MIS Quarterly outlines correct and incorrect uses of PMT in Information Security behavior research. In this paper, we review some of BGLMP’s key recommendations, such as the claim that all IS behavior studies that apply PMT should always use the model of the full theory, contain and measure fear, and measure actual behaviors. We defend an interpretation of Rogers (1975, 1983) that differs from the interpretation that BGLMP propose. We present evidence that Rogers’ PMT and the empirical evidence do not adequately support many of BGLMP’s suggestions and that these suggestions contradict good scientific practices (e.g., restricting the use of the method of isolation) that the philosophy of science and the original literature on PMT uphold. As a result, if reviewers and editors continue to embrace these recommendations, they could hinder the progress of IS behavior research by not allowing isolation or the combination of different theoretical components. In contrast to BGLMP’s paper, we argue that further PMT research can focus on isolated PMT components and combine them with other theories. Some of our ideas (e.g., isolation) are not PMT-specific and could be useful for IS research in general. In summary, we contest BGLMP’s recommendations and offer revised recommendations in return. © 2023 by the Association for Information Systems.
引用
收藏
页码:1136 / 1165
页数:29
相关论文
共 50 条
  • [21] A meta-analysis of research on protection motivation theory
    Floyd, DL
    Prentice-Dunn, S
    Rogers, RW
    JOURNAL OF APPLIED SOCIAL PSYCHOLOGY, 2000, 30 (02) : 407 - 429
  • [22] A Test of Protection Motivation Theory in the Information Security Literature: A Meta-Analytic Structural Equation Modeling Approach
    Mou, Jian
    Cohen, Jason
    Bhattacherjee, Anol
    Kim, Jongki
    JOURNAL OF THE ASSOCIATION FOR INFORMATION SYSTEMS, 2022, 23 (01): : 196 - 236
  • [23] Motivating IS security compliance: Insights from Habit and Protection Motivation Theory
    Vance, Anthony
    Siponen, Mikko
    Pahnila, Seppo
    INFORMATION & MANAGEMENT, 2012, 49 (3-4) : 190 - 198
  • [24] Practical Approach of Security Enhancement Method based on the Protection Motivation Theory
    Choi, Heeyoung
    Young, Kang Ju
    2021 21ST ACIS INTERNATIONAL WINTER CONFERENCE ON SOFTWARE ENGINEERING, ARTIFICIAL INTELLIGENCE, NETWORKING AND PARALLEL/DISTRIBUTED COMPUTING (SNPD-WINTER 2021), 2021, : 96 - 97
  • [25] Smartphone Security and Privacy - A Gamified Persuasive Approach with Protection Motivation Theory
    Ganesh, Anirudh
    Ndulue, Chinenye
    Orji, Rita
    PERSUASIVE TECHNOLOGY (PERSUASIVE 2022), 2022, 13213 : 89 - 100
  • [26] Identifying Protection Motivation Theory Factors that Influence Smartphone Security Measures
    Schneider, Marvin
    Rahman, Shawon
    2021 IEEE INTERNATIONAL CONFERENCE ON BIG DATA (BIG DATA), 2021, : 3353 - 3359
  • [27] The utility of a protection motivation theory framework for understanding sedentary behavior
    Wong, Tiffany S.
    Gaston, Anca
    DeJesus, Stefanie
    Prapavessis, Harry
    HEALTH PSYCHOLOGY AND BEHAVIORAL MEDICINE, 2016, 4 (01): : 29 - 48
  • [28] Protection Motivation Theory and Stages of Change in Sun Protective Behavior
    Prentice-Dunn, Steven
    McMath, Ben F.
    Cramer, Robert J.
    JOURNAL OF HEALTH PSYCHOLOGY, 2009, 14 (02) : 297 - 305
  • [29] The security and protection strategy research of computer network information
    Liu, Yu
    Chang, Jing
    PROCEEDINGS OF THE 2016 2ND INTERNATIONAL CONFERENCE ON MATERIALS ENGINEERING AND INFORMATION TECHNOLOGY APPLICATIONS (MEITA 2016), 2017, 107 : 95 - 99
  • [30] Research of Computer Network Information Security and Protection Strategy
    Lu Zhen
    Xiong Zhen
    Tu Keqin
    FRONTIERS OF MANUFACTURING AND DESIGN SCIENCE IV, PTS 1-5, 2014, 496-500 : 2162 - +