Using protection motivation theory in the design of nudges to improve online security behavior

被引:124
作者
van Bavel, Rene [1 ]
Rodriguez-Priego, Nuria [1 ,4 ]
Vila, Jose [2 ]
Briggs, Pam [3 ]
机构
[1] European Commiss, Joint Res Ctr, Edificio Expo,C Inca Garcilaso 3, Seville 41092, Spain
[2] Univ Valencia, DevStat Chair Quantitat Decis Making & Intelligen, Ctr Res Social & Econ Behav, Valencia, Spain
[3] Northumbria Univ, Dept Psychol, Sch Life Sci, Northumberland Bldg, Newcastle Upon Tyne NE1 8ST, Tyne & Wear, England
[4] Univ Autonoma Madrid, Dept Anal Econ Teoria Econ & Hist Econ, Campus Cantoblanco, Madrid 28049, Spain
关键词
Security behavior; Protection motivation theory; Behavioral economics; Online experiment; Coping message; Threat appeal; Nudging; FEAR APPEALS; POLICY COMPLIANCE; SELF-EFFICACY; USERS; PERCEPTIONS; INTENTION; GENDER; THREAT; AGE; INTERVENTION;
D O I
10.1016/j.ijhcs.2018.11.003
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
We conducted an online experiment (n = 2024) on a representative sample of Internet users in Germany, Sweden, Poland, Spain and the UK to explore the effect of notifications on security behaviour. Inspired by protection motivation theory (PMT), a coping message advised participants on how to minimize their exposure to risk and a threat appeal highlighted the potential negative consequences of not doing so. Both increased secure behavior but the coping message significantly more so. The coping message was also as effective as both messages combined, but not so the threat appeal. Risk attitudes, age and country had a significant effect on behavior. Initiatives seeking to promote secure behavior should focus more on coping messages, either alone or in combination with fear appeals.
引用
收藏
页码:29 / 39
页数:11
相关论文
共 80 条
[1]   Privacy and human behavior in the age of information [J].
Acquisti, Alessandro ;
Brandimarte, Laura ;
Loewenstein, George .
SCIENCE, 2015, 347 (6221) :509-514
[2]   Users are not the enemy [J].
Adams, A ;
Sasse, MA .
COMMUNICATIONS OF THE ACM, 1999, 42 (12) :41-46
[3]  
Ajzen I., 1985, UNDERSTANDING ATTITU, P11
[4]  
Anderson CL, 2010, MIS QUART, V34, P613
[5]  
[Anonymous], 2017, AM CYB
[6]  
Bandura A., 1997, Self-efficacy: The exercise of control
[7]  
Beautement A, 2009, NSPW'08: PROCEEDINGS OF THE 2008 NEW SECURITY PARADIGMS WORKSHOP, P47
[8]  
Blais AR, 2006, JUDGM DECIS MAK, V1, P33
[9]   Determinants of online safety behaviour: towards an intervention strategy for college students [J].
Boehmer, Jan ;
LaRose, Robert ;
Rifon, Nora ;
Alhabash, Saleem ;
Cotten, Shelia .
BEHAVIOUR & INFORMATION TECHNOLOGY, 2015, 34 (10) :1022-1035
[10]  
Boer H., 1996, PREDICTING HLTH BEHA, P95