A Meta-Analysis of Studies on Protection Motivation Theory and Information Security Behaviour

被引:77
|
作者
Sommestad, Teodor [1 ]
Karlzen, Henrik [1 ]
Hallberg, Jonas [1 ]
机构
[1] Swedish Def Res Agcy FOI, Linkoping, Sweden
关键词
Information Security Behavior; Information Security; Meta-Analysis; Policy Compliance; Protection Motivation Theory;
D O I
10.4018/IJISP.2015010102
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Individuals' willingness to take security precautions is imperative to their own information security and the information security of the organizations they work within. This paper presents a meta-analysis of the protection motivation theory (PMT) to assess how its efficacy is influenced by the information security behavior it is applied to. It investigates if the PMT explains information security behavior better if: 1) The behavior is voluntary? 2) The threat and coping method is concrete or specific? 3) The information security threat is directed to the person itself? Synthesized data from 28 surveys suggests that the answers to all three questions are yes. Weighted mean correlation coefficients are on average 0.03 higher for voluntary behavior than mandatory behavior, 0.05 higher for specific behaviors than studies of general behaviors, 0.08 higher to threat appraisal when the threat targets the individual person instead of the person's organization or someone else.
引用
收藏
页码:26 / 46
页数:21
相关论文
共 50 条
  • [21] Impact of Users' Security Awareness on Desktop Security Behavior: A Protection Motivation Theory Perspective
    Hanus, Bartlomiej
    Wu, Yu Andy
    INFORMATION SYSTEMS MANAGEMENT, 2016, 33 (01) : 2 - 16
  • [22] Motivating IS security compliance: Insights from Habit and Protection Motivation Theory
    Vance, Anthony
    Siponen, Mikko
    Pahnila, Seppo
    INFORMATION & MANAGEMENT, 2012, 49 (3-4) : 190 - 198
  • [23] Human-centric cyber security: Applying protection motivation theory to analyse micro business owners' security behaviours
    Jamil, Hassan
    Zia, Tanveer
    Nayeem, Tahmid
    Whitty, Monica T.
    D'Alessandro, Steven
    INFORMATION AND COMPUTER SECURITY, 2025, 33 (01) : 49 - 76
  • [24] Empirical assessment of mobile device users' information security behavior towards data breach Leveraging protection motivation theory
    Giwah, Anthony Duke
    Wang, Ling
    Levy, Yair
    Hur, Inkyoung
    JOURNAL OF INTELLECTUAL CAPITAL, 2020, 21 (02) : 215 - 233
  • [25] Using protection motivation theory in the design of nudges to improve online security behavior
    van Bavel, Rene
    Rodriguez-Priego, Nuria
    Vila, Jose
    Briggs, Pam
    INTERNATIONAL JOURNAL OF HUMAN-COMPUTER STUDIES, 2019, 123 : 29 - 39
  • [26] Protection motivation theory and pro-environmental behaviour: A systematic mapping review
    Kothe, Emily J.
    Ling, Mathew
    North, Madelon
    Klas, Anna
    Mullan, Barbara A.
    Novoradovskaya, Lisa
    AUSTRALIAN JOURNAL OF PSYCHOLOGY, 2019, 71 (04) : 411 - 432
  • [27] An Extended Perspective on Individual Security Behaviors: Protection Motivation Theory and a Unified Security Practices (USP) Instrument
    Crossler, Robert
    Belanger, France
    DATA BASE FOR ADVANCES IN INFORMATION SYSTEMS, 2014, 45 (04): : 51 - 71
  • [28] Water management information campaigns and protection motivation theory
    Nelson K.
    Cismaru M.
    Cismaru R.
    Ono T.
    International Review on Public and Nonprofit Marketing, 2011, 8 (2) : 163 - 193
  • [29] Factors Affecting Security Behavior of Kenyan Students: An Integration of Protection Motivation Theory and Theory of Planned Behavior
    Farooq, Ali
    Ndiege, Joshua Rumo A.
    Isoaho, Jouni
    2019 IEEE AFRICON, 2019,
  • [30] A meta-analysis of the deterrence theory in security-compliant and security-risk behaviors
    Kuo, Kuang-Ming
    Talley, Paul C.
    Huang, Chi-Hsien
    COMPUTERS & SECURITY, 2020, 96