Putting the 'Motivation' in Protection Motivation Theory: An Examination of Persuasive Communication via Extrinsic and Intrinsic Means

被引:0
作者
Menard, Philip [1 ]
机构
[1] Mississippi State Univ, Mississippi State, MS 39762 USA
来源
AMCIS 2014 PROCEEDINGS | 2014年
关键词
protection motivation theory; self-determination theory; information security; persuasive communication; SELF-DETERMINATION THEORY; SECURITY POLICY COMPLIANCE; INFORMATION-TECHNOLOGY; HIERARCHICAL MODEL; USER ACCEPTANCE; FEAR APPEALS; AUTONOMY; WELL; PERCEPTIONS; ATTACHMENTS;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Protection Motivation Theory (PMT) has been widely adapted to the context of behavioral information security research, but results have not been as consistent as studies in PMT's native disciplines. One construct that may provide greater explanatory power in InfoSec contexts is motivation. One of the key elements of effective applications of PMT is the use of fear appeals, which focus on the danger of an outside threat and may be classified as a more control-oriented (i.e. extrinsic) form of communication. Motivation may provide an interesting counterpoint to prior PMT research by incorporating selfdetermined (i.e. intrinsic) forms of persuasive communication in motivating the end user to perform secure behaviors related to information protection. A research model and experimental design are proposed to capture the differences in end user perceptions due to applications of intrinsic or extrinsic forms of communication. Potential implications for research and practice are discussed.
引用
收藏
页数:11
相关论文
共 42 条
  • [1] Ajzen I., 1980, UNDERSTANDING ATTITU, DOI [DOI 10.1007/978-3-642-69746-3_2, DOI 10.1007/978-3-642-69746-32]
  • [2] THE NEED TO BELONG - DESIRE FOR INTERPERSONAL ATTACHMENTS AS A FUNDAMENTAL HUMAN-MOTIVATION
    BAUMEISTER, RF
    LEARY, MR
    [J]. PSYCHOLOGICAL BULLETIN, 1995, 117 (03) : 497 - 529
  • [3] Bhattacherjee A., 2012, SOCIAL SCI RES PRINC, P115
  • [4] Bulgurcu B, 2010, MIS QUART, V34, P523
  • [5] Future directions for behavioral information security research
    Crossler, Robert E.
    Johnston, Allen C.
    Lowry, Paul Benjamin
    Hu, Qing
    Warkentin, Merrill
    Baskerville, Richard
    [J]. COMPUTERS & SECURITY, 2013, 32 : 90 - 101
  • [6] User Awareness of Security Countermeasures and Its Impact on Information Systems Misuse: A Deterrence Approach
    D'Arcy, John
    Hovav, Anat
    Galletta, Dennis
    [J]. INFORMATION SYSTEMS RESEARCH, 2009, 20 (01) : 79 - 98
  • [7] USER ACCEPTANCE OF COMPUTER-TECHNOLOGY - A COMPARISON OF 2 THEORETICAL-MODELS
    DAVIS, FD
    BAGOZZI, RP
    WARSHAW, PR
    [J]. MANAGEMENT SCIENCE, 1989, 35 (08) : 982 - 1003
  • [8] Deci E.L., 1980, Advances in experimental social psychology, V13, P39, DOI [10.1016/S0065-2601(08)60130-6, DOI 10.1016/S0065-2601(08)60130-6]
  • [9] EFFECTS OF CONTINGENT AND NONCONTINGENT REWARDS AND CONTROLS ON INTRINSIC MOTIVATION
    DECI, EL
    [J]. ORGANIZATIONAL BEHAVIOR AND HUMAN PERFORMANCE, 1972, 8 (02): : 217 - 229
  • [10] THE SUPPORT OF AUTONOMY AND THE CONTROL OF BEHAVIOR
    DECI, EL
    RYAN, RM
    [J]. JOURNAL OF PERSONALITY AND SOCIAL PSYCHOLOGY, 1987, 53 (06) : 1024 - 1037