Using protection motivation theory in the design of nudges to improve online security behavior

被引:100
|
作者
van Bavel, Rene [1 ]
Rodriguez-Priego, Nuria [1 ,4 ]
Vila, Jose [2 ]
Briggs, Pam [3 ]
机构
[1] European Commiss, Joint Res Ctr, Edificio Expo,C Inca Garcilaso 3, Seville 41092, Spain
[2] Univ Valencia, DevStat Chair Quantitat Decis Making & Intelligen, Ctr Res Social & Econ Behav, Valencia, Spain
[3] Northumbria Univ, Dept Psychol, Sch Life Sci, Northumberland Bldg, Newcastle Upon Tyne NE1 8ST, Tyne & Wear, England
[4] Univ Autonoma Madrid, Dept Anal Econ Teoria Econ & Hist Econ, Campus Cantoblanco, Madrid 28049, Spain
关键词
Security behavior; Protection motivation theory; Behavioral economics; Online experiment; Coping message; Threat appeal; Nudging; FEAR APPEALS; POLICY COMPLIANCE; SELF-EFFICACY; USERS; PERCEPTIONS; INTENTION; GENDER; THREAT; AGE; INTERVENTION;
D O I
10.1016/j.ijhcs.2018.11.003
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
We conducted an online experiment (n = 2024) on a representative sample of Internet users in Germany, Sweden, Poland, Spain and the UK to explore the effect of notifications on security behaviour. Inspired by protection motivation theory (PMT), a coping message advised participants on how to minimize their exposure to risk and a threat appeal highlighted the potential negative consequences of not doing so. Both increased secure behavior but the coping message significantly more so. The coping message was also as effective as both messages combined, but not so the threat appeal. Risk attitudes, age and country had a significant effect on behavior. Initiatives seeking to promote secure behavior should focus more on coping messages, either alone or in combination with fear appeals.
引用
收藏
页码:29 / 39
页数:11
相关论文
共 50 条
  • [1] Using the ARCS model to improve undergraduates' perceived information security protection motivation and behavior
    Tsai, Chun-Yen
    Shih, Wen-Ling
    Hsieh, Fu-Pei
    Chen, Yun-An
    Lin, Chien-Liang
    Wu, Hui-Ju
    [J]. COMPUTERS & EDUCATION, 2022, 181
  • [2] Protection Motivation Theory in Information Security Behavior Research: Reconsidering the Fundamentals
    Siponen, Mikko
    Ronkko, Mikko
    Fufan, Liu
    Haag, Steffi
    Laatikainen, Gabriella
    [J]. COMMUNICATIONS OF THE ASSOCIATION FOR INFORMATION SYSTEMS, 2023, 53
  • [3] Impact of Users' Security Awareness on Desktop Security Behavior: A Protection Motivation Theory Perspective
    Hanus, Bartlomiej
    Wu, Yu Andy
    [J]. INFORMATION SYSTEMS MANAGEMENT, 2016, 33 (01) : 2 - 16
  • [4] Factors Affecting Security Behavior of Kenyan Students: An Integration of Protection Motivation Theory and Theory of Planned Behavior
    Farooq, Ali
    Ndiege, Joshua Rumo A.
    Isoaho, Jouni
    [J]. 2019 IEEE AFRICON, 2019,
  • [5] Structural Model of the Healthcare Information Security Behavior of Nurses Applying Protection Motivation Theory
    Lee, EunWon
    Seomun, GyeongAe
    [J]. INTERNATIONAL JOURNAL OF ENVIRONMENTAL RESEARCH AND PUBLIC HEALTH, 2021, 18 (04) : 1 - 13
  • [6] Understanding information systems security policy compliance: An integration of the theory of planned behavior and the protection motivation theory
    Ifinedo, Princely
    [J]. COMPUTERS & SECURITY, 2012, 31 (01) : 83 - 95
  • [7] Understanding online safety behaviors: A protection motivation theory perspective
    Tsai, Hsin-yi Sandy
    Jiang, Mengtian
    Alhabash, Saleem
    LaRose, Robert
    Rifon, Nora J.
    Cotten, Shelia R.
    [J]. COMPUTERS & SECURITY, 2016, 59 : 138 - 150
  • [8] Hearing protection behavior of farmers in Iran: Application of the protection motivation theory
    Ataei, Pouria
    Moradhaseli, Somayeh
    Karimi, Hamid
    Abbasi, Enayat
    [J]. WORK-A JOURNAL OF PREVENTION ASSESSMENT & REHABILITATION, 2023, 74 (03): : 967 - 976
  • [9] Motivating IS security compliance: Insights from Habit and Protection Motivation Theory
    Vance, Anthony
    Siponen, Mikko
    Pahnila, Seppo
    [J]. INFORMATION & MANAGEMENT, 2012, 49 (3-4) : 190 - 198
  • [10] Practical Approach of Security Enhancement Method based on the Protection Motivation Theory
    Choi, Heeyoung
    Young, Kang Ju
    [J]. 2021 21ST ACIS INTERNATIONAL WINTER CONFERENCE ON SOFTWARE ENGINEERING, ARTIFICIAL INTELLIGENCE, NETWORKING AND PARALLEL/DISTRIBUTED COMPUTING (SNPD-WINTER 2021), 2021, : 96 - 97