User Motivations in Protecting Information Security: Protection Motivation Theory Versus Self-Determination Theory

被引:156
|
作者
Menard, Philip [1 ]
Bott, Gregory J. [2 ]
Crossler, Robert E. [3 ]
机构
[1] Univ S Alabama, Informat Syst, Mobile, AL 36688 USA
[2] Univ Alabama, Culverhouse Coll Business, Informat Syst, Tuscaloosa, AL 35487 USA
[3] Washington State Univ, Carson Coll Business, Informat Syst, Pullman, WA 99164 USA
关键词
information security; protection motivation theory; security model comparison; self-determination theory; user security behaviors; INTRINSIC MOTIVATION; POLICY COMPLIANCE; FEAR APPEALS; HIERARCHICAL MODEL; PHISHING ATTACKS; ACCEPTANCE; TECHNOLOGY; SYSTEMS; PERCEPTIONS; BEHAVIORS;
D O I
10.1080/07421222.2017.1394083
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Managers desiring to protect information systems must understand how to most effectively motivate users to engage in secure behaviors. Information security researchers have frequently studied individuals' performance of secure behaviors in response to threats. Protection motivation theory (PMT) has been used to explain individuals' propensity to engage in voluntary secure behaviors, but the adaptation of this theory has yielded inconsistent results. Motivation as a measurable construct, as derived from self-determination theory (SDT), has never been included in or compared against PMT. In this study, we construct security messages that appeal to individuals' intrinsic motivation, rather than fear, as a way to elicit secure responses. Using three sets of respondents, we integrated the SDT and PMT models and compared the native models in the context of security behaviors. We demonstrate that by using data-and individual-focused appeals and providing choices for users, managers may observe greater intention to engage in secure behavior among employees.
引用
收藏
页码:1203 / 1230
页数:28
相关论文
共 50 条