Protection Motivation Theory in Information Security Behavior Research: Reconsidering the Fundamentals

被引:0
|
作者
Siponen M. [1 ]
Rönkkö M. [2 ]
Haag S. [3 ]
Fufan L. [4 ]
Laatikainen G. [5 ]
机构
[1] Department of Information Systems, Statistics and Management Science Culverhouse College of Business, University of Alabama
[2] School of Business and Economics, University of Jyväskylä
[3] Institute of Computer Science, Heinrich Heine University, Düsseldorf
[4] Department of Innovation, Entrepreneurship, and Information Systems IESEG School of Management
[5] Faculty of Information Technology, University of Jyväskylä
关键词
Behavioral Information Security; Fear Appeal; Infosec Behavior; Protection Motivation Theory; Security Threat; Threat Message; Threatening Communication;
D O I
10.17705/1CAIS.05348
中图分类号
学科分类号
摘要
Scholars commonly use protection motivation theory (PMT) by Rogers to examine information systems (IS) security behaviors and behavioral intentions. A recent influential paper by Boss, Galletta, Lowry, Moody, and Polak (2015; hereafter BGLMP) in MIS Quarterly outlines correct and incorrect uses of PMT in Information Security behavior research. In this paper, we review some of BGLMP’s key recommendations, such as the claim that all IS behavior studies that apply PMT should always use the model of the full theory, contain and measure fear, and measure actual behaviors. We defend an interpretation of Rogers (1975, 1983) that differs from the interpretation that BGLMP propose. We present evidence that Rogers’ PMT and the empirical evidence do not adequately support many of BGLMP’s suggestions and that these suggestions contradict good scientific practices (e.g., restricting the use of the method of isolation) that the philosophy of science and the original literature on PMT uphold. As a result, if reviewers and editors continue to embrace these recommendations, they could hinder the progress of IS behavior research by not allowing isolation or the combination of different theoretical components. In contrast to BGLMP’s paper, we argue that further PMT research can focus on isolated PMT components and combine them with other theories. Some of our ideas (e.g., isolation) are not PMT-specific and could be useful for IS research in general. In summary, we contest BGLMP’s recommendations and offer revised recommendations in return. © 2023 by the Association for Information Systems.
引用
收藏
页码:1136 / 1165
页数:29
相关论文
共 50 条
  • [31] Research of security protection system for railway information system
    Institute of Computing Technologies, China Academy of Railway Sciences, Beijing 100081, China
    Zhu, Y., 2012, Chinese Academy of Railway Sciences (33):
  • [32] The Research on Security Audit for Information System Classified Protection
    Lu, Hui
    Cu, Xiang
    Wang, Le
    Jiang, Yu
    Cui, Meng
    CLOUD COMPUTING AND SECURITY, PT II, 2018, 11064 : 300 - 308
  • [33] Research on information security and privacy protection model based on consumer behavior in big data environment
    Li, Yuxue
    Song, Lijun
    Zeng, Yucheng
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2019, 31 (10):
  • [34] Analysis of the Weight Management Behavior of Chinese Pregnant Women: An Integration of the Protection Motivation Theory and the Information-Motivation-Behavioral Skills Model
    Ge, Jinjin
    Zhao, Shiqi
    Peng, Xueqing
    Walker, Anita Nyarkoa
    Yang, Ni
    Zhou, Hua
    Wang, Li
    Zhang, Chi
    Zhou, Meng
    You, Hua
    FRONTIERS IN PUBLIC HEALTH, 2022, 10
  • [35] E-waste information security protection motivation: the role of optimism bias
    Chen, Hao
    Turel, Ofir
    Yuan, Yufei
    INFORMATION TECHNOLOGY & PEOPLE, 2022, 35 (02) : 600 - 620
  • [36] INFORMATION SECURITY BEHAVIOR: FACTORS AND RESEARCH DIRECTIONS
    Abraham, Sherly
    AMCIS 2011 PROCEEDINGS, 2011,
  • [37] Understanding smartphone security behaviors: An extension of the protection motivation theory with anticipated regret
    Verkijika, Silas Formunyuy
    COMPUTERS & SECURITY, 2018, 77 : 860 - 870
  • [38] Protection Motivation Driven Security Learning
    Ding, Yi
    Meso, Peter
    Xu, Shuting
    AMCIS 2014 PROCEEDINGS, 2014,
  • [39] An Extended Perspective on Individual Security Behaviors: Protection Motivation Theory and a Unified Security Practices (USP) Instrument
    Crossler, Robert
    Belanger, France
    DATA BASE FOR ADVANCES IN INFORMATION SYSTEMS, 2014, 45 (04): : 51 - 71
  • [40] Can protection motivation theory predict protective behavior against ticks?
    Hansen, Mette Frimodt
    Sorensen, Pelle Korsbaek
    Sorensen, Anja Elaine
    Krogfelt, Karen Angeliki
    BMC PUBLIC HEALTH, 2023, 23 (01)