Whatmotivates users to adopt cybersecurity practices? A survey experiment assessing protection motivation theory

被引:12
作者
Dodge, Cassandra E. [1 ]
Fisk, Nathan [2 ]
Burruss, George W. [3 ]
Moule, Richard K., Jr. [3 ]
Jaynes, Chae M. [3 ]
机构
[1] Georgia Southern Univ, Dept Criminol & Criminal Justice, Statesboro, GA USA
[2] Univ S Florida, Coll Educ, Tampa, FL 33620 USA
[3] Univ S Florida, Dept Criminol, 4202 E Fowler Ave,SOC 107, Tampa, FL 33620 USA
关键词
cybersecurity; experimental vignette design; information security; protection motivation theory; FEAR APPEALS; METAANALYSIS; BEHAVIOR; INTENTION; THREAT; MODEL;
D O I
10.1111/1745-9133.12641
中图分类号
DF [法律]; D9 [法律];
学科分类号
0301 ;
摘要
Research Summary: A 2 x 2 x 3 fully crossed factorial experiment is used to examine the linkages between key dimensions of protection motivation theory (PMT; perceived severity of risk, vulnerability to risk, and response costs) and the intentions to adopt information technology (IT) cybersecurity recommendations after being informed of degrees of risk in the vignettes. Data in this study consist of a nationwide sample of 720 American adults. Results from a series of fractional logistic regressions indicate support for many of the core mechanisms within PMT. Seventy percent of respondents indicated they were likely to follow IT recommendations to mitigate a cyber threat. Self-efficacy and response costs affected intentions to do so. Policy Implications: The study's findings have important implications for improving cybersecurity and reducing vulnerabilities to cyber threats. Current training programs need more effective communication strategies and engagement tools. Perceptions of users as security threats rather than potential contributors hinder progress in the ability of organizations to improve cybersecurity. Collaborative, user-centered approaches can enhance users' self-efficacy and improve cybersecurity by aligning user and IT professional needs and capabilities. Strategies like gamified simulations and tailored interventions can create a more security-focused culture and encourage user participation in defending an organization. Recognizing individual differences among users and further examining personal characteristics that may impact user interactions with technology and cybersecurity interventions is crucial. Overall, more personalized, adaptable approaches to cybersecurity policies and technical solutions, accounting for diverse user needs and characteristics, should be a priority for improving cybersecurity practices.
引用
收藏
页码:849 / 868
页数:20
相关论文
共 57 条
  • [1] EXPLORING TEENAGERS ADAPTIVE AND MALADAPTIVE THINKING IN RELATION TO THE THREAT OF HIV-INFECTION
    ABRAHAM, CS
    SHEERAN, P
    ABRAMS, D
    SPEARS, R
    [J]. PSYCHOLOGY & HEALTH, 1994, 9 (04) : 253 - 272
  • [2] Ajzen I., 1980, UNDERSTANDING ATTITU
  • [3] The information security digital divide between information security managers and users
    Albrechtsen, Eirik
    Hovden, Jan
    [J]. COMPUTERS & SECURITY, 2009, 28 (06) : 476 - 490
  • [4] CLASSIFICATION FOR EFFECTIVE REHABILITATION - REDISCOVERING PSYCHOLOGY
    ANDREWS, DA
    BONTA, J
    HOGE, RD
    [J]. CRIMINAL JUSTICE AND BEHAVIOR, 1990, 17 (01) : 19 - 52
  • [5] [Anonymous], 2020, Census Bureau Releases 2020 Demographic Analysis Estimates
  • [6] [Anonymous], 2022, Quick Facts
  • [7] [Anonymous], 2018, Demographics of Internet and Home Broadband Usage
  • [8] PREDICTING DISHONEST ACTIONS USING THE THEORY OF PLANNED BEHAVIOR
    BECK, L
    AJZEN, I
    [J]. JOURNAL OF RESEARCH IN PERSONALITY, 1991, 25 (03) : 285 - 301
  • [9] Recruiting large online samples in the United States and India: Facebook, Mechanical Turk, and Qualtrics
    Boas, Taylor C.
    Christenson, Dino P.
    Glick, David M.
    [J]. POLITICAL SCIENCE RESEARCH AND METHODS, 2020, 8 (02) : 232 - 250
  • [10] Boer H., 1996, PREDICTING HLTH BEHA, P95, DOI DOI 10.1080/13548506.2011.579983