FEAR APPEALS AND INFORMATION SECURITY BEHAVIORS: AN EMPIRICAL STUDY

被引:1
|
作者
Johnston, Allen C. [1 ]
Warkentin, Merrill [2 ]
机构
[1] Univ Alabama Birmingham, Sch Business, Dept Management Informat Syst & Quantitat Methods, Birmingham, AL 35294 USA
[2] Mississippi State Univ, Coll Business, Dept Management & Informat Syst, Mississippi State, MS 39762 USA
关键词
Information security; countermeasures; protection motivation theory; fear appeals; persuasive communication; information assurance; threat appraisal; coping appraisal; SELF-EFFICACY; PROTECTION MOTIVATION; TECHNOLOGY; SYSTEMS; MODEL; BELIEFS; PERCEPTIONS; ACCEPTANCE; INDICATORS; KNOWLEDGE;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Information technology executives strive to align the actions of end users with the desired security posture of management and of the firm through persuasive communication. In many cases, some element of fear is incorporated within these communications. However, within the context of computer security and information assurance, it is not yet clear how these fear-inducing arguments, known as fear appeals, will ultimately impact the actions of end users. The purpose of this study is to investigate the influence of fear appeals on the compliance of end users with recommendations to enact specific individual computer security actions toward the mitigation of threats. An examination was performed that culminated in the development and testing of a conceptual model representing an infusion of technology adoption and fear appeal theories. Results of the study suggest that fear appeals do impact end user behavioral intentions to comply with recommended individual acts of security, but the impact is not uniform across all end users. It is determined in part by perceptions of self-efficacy, response efficacy, threat severity, and social influence. The findings of this research contribute to information systems security research, human computer interaction, and organizational communication by revealing a new paradigm in which IT users form perceptions of the technology, not on the basis of performance gains, but on the basis of utility for threat mitigation.
引用
收藏
页码:549 / 566
页数:18
相关论文
共 50 条
  • [31] Cultivating and Assessing an Organizational Information Security Culture; an Empirical Study
    Al Hogail, Areej
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2015, 9 (07): : 163 - 178
  • [32] Young People and Smart Phones: An Empirical Study on Information Security
    Barn, Balbir S.
    Barn, Ravinder
    Tan, Jo-Pei
    2014 47TH HAWAII INTERNATIONAL CONFERENCE ON SYSTEM SCIENCES (HICSS), 2014, : 4504 - 4514
  • [33] IS professionals' information security behaviors in Chinese IT organizations for information security protection
    Ma, Xiaofen
    INFORMATION PROCESSING & MANAGEMENT, 2022, 59 (01)
  • [34] The effect of information seeking behaviors in fear control
    Restrepo-Castro, Juan C.
    Labrador, Francisco Javier
    Gantiva, Carlos
    Camacho, Katherine
    Castro-Camacho, Leonidas
    JOURNAL OF BEHAVIOR THERAPY AND EXPERIMENTAL PSYCHIATRY, 2023, 78
  • [35] Information Security in eLearning: A Discussion of Empirical Data on Information Security and eLearning
    Alwi, Najwa Hayaati Mohd
    Fan, Ip-Shing
    PROCEEDINGS OF THE 5TH INTERNATIONAL CONFERENCE ON E-LEARNING, 2010, : 282 - 290
  • [36] A Path to Successful Management of Employee Security Compliance: An Empirical Study of Information Security Climate
    Goo, Jahyun
    Yim, Myung-Seong
    Kim, Dan J.
    IEEE TRANSACTIONS ON PROFESSIONAL COMMUNICATION, 2014, 57 (04) : 286 - 308
  • [37] EXPLORING CONSUMER PRIVACY CONCERNS AND RFID TECHNOLOGY: THE IMPACT OF FEAR APPEALS ON CONSUMER BEHAVIORS
    Beitelspacher, Lauren
    Hansen, John
    Johnston, Allen
    Deitz, George
    JOURNAL OF MARKETING THEORY AND PRACTICE, 2012, 20 (02) : 147 - 159
  • [38] Understanding Coping Intentions of Fitness Tracker Users: An Empirical Investigation Using Fear Appeals
    Baskaran, Krutheeka
    Mathew, Saji K.
    INTERNATIONAL JOURNAL OF HUMAN-COMPUTER INTERACTION, 2024, 40 (03) : 795 - 807
  • [39] An Empirical Analysis of Engineers' Information Behaviors
    Robinson, Mark A.
    JOURNAL OF THE AMERICAN SOCIETY FOR INFORMATION SCIENCE AND TECHNOLOGY, 2010, 61 (04): : 640 - 658
  • [40] The Cyber-Doorn Effect: The Impact of Fear Appeals in the US Cyber Security Debate
    Lawson, Sean T.
    Yu, Haoran
    Yeo, Sara K.
    Greene, Ethan
    2017 INTERNATIONAL CONFERENCE ON CYBER CONFLICT (CYCON U.S.): PROCEEDINGS : 7-8 NOVEMBER 2017, WASHINGTON, DC, USA, 2016, : 65 - 80