Protection Motivation Theory in Information Security Behavior Research: Reconsidering the Fundamentals

被引:0
|
作者
Siponen M. [1 ]
Rönkkö M. [2 ]
Haag S. [3 ]
Fufan L. [4 ]
Laatikainen G. [5 ]
机构
[1] Department of Information Systems, Statistics and Management Science Culverhouse College of Business, University of Alabama
[2] School of Business and Economics, University of Jyväskylä
[3] Institute of Computer Science, Heinrich Heine University, Düsseldorf
[4] Department of Innovation, Entrepreneurship, and Information Systems IESEG School of Management
[5] Faculty of Information Technology, University of Jyväskylä
关键词
Behavioral Information Security; Fear Appeal; Infosec Behavior; Protection Motivation Theory; Security Threat; Threat Message; Threatening Communication;
D O I
10.17705/1CAIS.05348
中图分类号
学科分类号
摘要
Scholars commonly use protection motivation theory (PMT) by Rogers to examine information systems (IS) security behaviors and behavioral intentions. A recent influential paper by Boss, Galletta, Lowry, Moody, and Polak (2015; hereafter BGLMP) in MIS Quarterly outlines correct and incorrect uses of PMT in Information Security behavior research. In this paper, we review some of BGLMP’s key recommendations, such as the claim that all IS behavior studies that apply PMT should always use the model of the full theory, contain and measure fear, and measure actual behaviors. We defend an interpretation of Rogers (1975, 1983) that differs from the interpretation that BGLMP propose. We present evidence that Rogers’ PMT and the empirical evidence do not adequately support many of BGLMP’s suggestions and that these suggestions contradict good scientific practices (e.g., restricting the use of the method of isolation) that the philosophy of science and the original literature on PMT uphold. As a result, if reviewers and editors continue to embrace these recommendations, they could hinder the progress of IS behavior research by not allowing isolation or the combination of different theoretical components. In contrast to BGLMP’s paper, we argue that further PMT research can focus on isolated PMT components and combine them with other theories. Some of our ideas (e.g., isolation) are not PMT-specific and could be useful for IS research in general. In summary, we contest BGLMP’s recommendations and offer revised recommendations in return. © 2023 by the Association for Information Systems.
引用
收藏
页码:1136 / 1165
页数:29
相关论文
共 50 条
  • [41] The Theory of Planned Behavior and Information Security Policy Compliance
    Sommestad, Teodor
    Karlzen, Henrik
    Hallberg, Jonas
    JOURNAL OF COMPUTER INFORMATION SYSTEMS, 2019, 59 (04) : 344 - 353
  • [42] Safety Behavior of Nepalese Strawberry Farmers as Reflected by the Protection Motivation Theory
    Bhandari, Govinda
    Lalit, B. C.
    Sapkota, Utkal
    Fan, Liangxin
    Geissen, Violette
    INTERNATIONAL JOURNAL OF ENVIRONMENTAL RESEARCH, 2025, 19 (03)
  • [43] Can protection motivation theory predict protective behavior against ticks?
    Mette Frimodt Hansen
    Pelle Korsbaek Sørensen
    Anja Elaine Sørensen
    Karen Angeliki Krogfelt
    BMC Public Health, 23
  • [44] Fundamentals of quantum information theory
    Keyl, M
    PHYSICS REPORTS-REVIEW SECTION OF PHYSICS LETTERS, 2002, 369 (05): : 431 - 548
  • [45] Research on the information security and privacy protection mechanism of the internet of vehicles
    Zhang, Hongtao
    Zhang, Liancheng
    Guo, Yi
    Wang, Zhenxing
    BASIC & CLINICAL PHARMACOLOGY & TOXICOLOGY, 2020, 126 : 108 - 109
  • [46] Research on Network Security Management and Protection Technology of Information System
    Xu, Raoshan
    INTERNATIONAL CONFERENCE ON SUSTAINABLE ENERGY AND ENVIRONMENT PROTECTION (ICSEEP 2015), 2015, : 1036 - 1042
  • [47] Research on the Security of the Computer Network Information and the Strategies of Its Protection
    Yang, Jianqiang
    2014 4TH INTERNATIONAL CONFERENCE ON EDUCATION AND EDUCATION MANAGEMENT (EEM 2014), PT 6, 2014, 68 : 243 - 247
  • [48] Research on Security Protection of Key Information Infrastructure in Optical Networks
    Ren Shuai
    Zhang Yinfa
    Xia Guijin
    Rao Xuejun
    Wang Xiaoshuang
    2019 IEEE 11TH INTERNATIONAL CONFERENCE ON COMMUNICATION SOFTWARE AND NETWORKS (ICCSN 2019), 2019, : 442 - 445
  • [49] Research on multilevel security model for information systems classified protection
    Gao, Chao-Qin
    Xiao, Chuang-Bai
    Gao, Yun-Xiang
    Xu, Xiao
    Tongxin Xuebao/Journal on Communications, 2011, 32 (11 A): : 119 - 124
  • [50] Research on security of computer network information and its protection strategies
    Xie, Xiangcheng
    2019 2ND INTERNATIONAL CONFERENCE ON MECHANICAL ENGINEERING, INDUSTRIAL MATERIALS AND INDUSTRIAL ELECTRONICS (MEIMIE 2019), 2019, : 433 - 437