To fear or not to fear? A critical review and analysis of fear appeals in the information security context

被引:0
作者
Wall J.D. [1 ]
Buche M.W. [2 ]
机构
[1] School of Business and Economics, Michigan Technological University
[2] Management Information Systems, Michigan Technological University
来源
| 1600年 / Association for Information Systems卷 / 41期
关键词
Critical literature review; Critical management studies; Critical realism; Fear appeals; Information security; Protection motivation;
D O I
10.17705/1cais.04113
中图分类号
学科分类号
摘要
Controlling organizational insiders’ security behaviors is an important management concern. Research presents fear appeals as a viable security control to promote protective security behaviors. To date, research has proven securityrelated fear appeals have to effectively control insiders’ security behaviors. However, from critically examining fear appeals, we find a different story. Specifically, we critically analyze security-related fear appeal research from two ontological positions: critical realism and critical constructivism. The critical realist analysis identifies several issues with existing fear appeal research, which particular research traditions may cause. We explicate these traditions and issues in the paper. The critical constructivist analysis draws on critical management studies of control and Foucault’s work to identify the identities, beliefs, and values that fear appeals promote and the ways in which fear appeals create discursive closures that limit the consideration and discussion of other positions. Based on the two analyses, we provide important directions for future fear appeal research. © 2017 by the Association for Information Systems.
引用
收藏
页码:277 / 300
页数:23
相关论文
共 72 条
  • [1] Al-Khouri A.M., Data ownership: Who owns “my data”?, International Journal of Management & Information Technology, 2, 1, pp. 1-8, (2012)
  • [2] Alvesson M., Sandberg J., Generating research questions through problematization, Academy of Management Review, 36, 2, pp. 247-271, (2011)
  • [3] Baskerville R.L., Myers M.D., Information systems as a reference discipline, MIS Quarterly, 26, 1, pp. 1-14, (2002)
  • [4] Boss S.R., Galletta D.F., Lowry P.B., Moody G.D., Polak P., What do users have to fear? Using fear appeals to engender threats and fear that motivate protective behaviors in users, MIS Quarterly, 39, 4, pp. 837-864, (2015)
  • [5] Carrier L.M., Prashler H., Attentional limits in memory retrieval, Journal of Experimental Psychology: Learning Memory and Cognition, 21, 5, pp. 1339-1348, (1995)
  • [6] Christian J.S., Ellis A.P.J., The crucial role of turnover intentions in transforming moral disengagement into deviant behavior at work, Journal of Business Ethics, 119, 2, pp. 193-208, (2014)
  • [7] Corbin J., Strauss A., Grounded theory method: Procedures, canons, and evaluative criteria, Qualitative Sociology, 13, 1, pp. 3-21, (1990)
  • [8] Crossler R.E., Johnston A.C., Lowry P.B., Hu Q., Warkentin M., Baskerville R., Future directions for behavioral information security research, Computers & Security, 32, pp. 90-101, (2013)
  • [9] D'arcy J., Herath T., Shoss M.K., Understanding employee responses to stressful information security requirements: A coping perspective, Journal of Management Information Systems, 31, 2, pp. 285-318, (2014)
  • [10] Das E.H.H.J., De Wit J.B.F., Stroebe W., Fear appeals motivate acceptance of action recommendations: Evidence for a positive bias in the processing of persuasive messages, Personality and Social Psychology Bulletin, 29, 5, pp. 650-664, (2003)