FEAR APPEALS AND INFORMATION SECURITY BEHAVIORS: AN EMPIRICAL STUDY

被引:1
|
作者
Johnston, Allen C. [1 ]
Warkentin, Merrill [2 ]
机构
[1] Univ Alabama Birmingham, Sch Business, Dept Management Informat Syst & Quantitat Methods, Birmingham, AL 35294 USA
[2] Mississippi State Univ, Coll Business, Dept Management & Informat Syst, Mississippi State, MS 39762 USA
关键词
Information security; countermeasures; protection motivation theory; fear appeals; persuasive communication; information assurance; threat appraisal; coping appraisal; SELF-EFFICACY; PROTECTION MOTIVATION; TECHNOLOGY; SYSTEMS; MODEL; BELIEFS; PERCEPTIONS; ACCEPTANCE; INDICATORS; KNOWLEDGE;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Information technology executives strive to align the actions of end users with the desired security posture of management and of the firm through persuasive communication. In many cases, some element of fear is incorporated within these communications. However, within the context of computer security and information assurance, it is not yet clear how these fear-inducing arguments, known as fear appeals, will ultimately impact the actions of end users. The purpose of this study is to investigate the influence of fear appeals on the compliance of end users with recommendations to enact specific individual computer security actions toward the mitigation of threats. An examination was performed that culminated in the development and testing of a conceptual model representing an infusion of technology adoption and fear appeal theories. Results of the study suggest that fear appeals do impact end user behavioral intentions to comply with recommended individual acts of security, but the impact is not uniform across all end users. It is determined in part by perceptions of self-efficacy, response efficacy, threat severity, and social influence. The findings of this research contribute to information systems security research, human computer interaction, and organizational communication by revealing a new paradigm in which IT users form perceptions of the technology, not on the basis of performance gains, but on the basis of utility for threat mitigation.
引用
收藏
页码:549 / 566
页数:18
相关论文
共 50 条
  • [41] Analysis of health professional security behaviors in a real clinical setting: An empirical study
    Fernandez-Aleman, Jose Luis
    Sanchez-Henarejos, Ana
    Toval, Ambrosio
    Sanchez-Garcia, Ana Belen
    Hernandez-Hernandez, Isabel
    Fernandez-Luque, Luis
    INTERNATIONAL JOURNAL OF MEDICAL INFORMATICS, 2015, 84 (06) : 454 - 467
  • [42] Self- and Response Efficacy Information in Fear Appeals: A Meta-Analysis
    Bigsby, Elisabeth
    Albarracin, Dolores
    JOURNAL OF COMMUNICATION, 2022, 72 (02) : 241 - 263
  • [43] FEAR APPEALS TO SEGMENTS ONLY
    BURNETT, JJ
    WILKES, RE
    JOURNAL OF ADVERTISING RESEARCH, 1980, 20 (05) : 21 - 24
  • [44] Fear appeal cues to motivate users' security protection behaviors: an empirical test of heuristic cues to enhance risk communication
    Park, Jongpil
    Son, Jai-Yeol
    Suh, Kil-Soo
    INTERNET RESEARCH, 2022, 32 (03) : 708 - 727
  • [45] FEAR APPEALS - REVISITED AND REVISED
    STERNTHAL, B
    CRAIG, CS
    JOURNAL OF CONSUMER RESEARCH, 1974, 1 (03) : 22 - 34
  • [46] Factors Impacting Users' Compliance with Information Security Policies: An Empirical Study
    Alzahrani, Latifa
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2021, 12 (10) : 437 - 447
  • [47] Incorporating hacking projects in computer and information security education: an empirical study
    Alashwali, Eman
    INTERNATIONAL JOURNAL OF ELECTRONIC SECURITY AND DIGITAL FORENSICS, 2014, 6 (03) : 185 - 203
  • [48] Information Security and Organizational Performance: Empirical Study of Korean Securities Industry
    Kong, Heekyung
    Jung, Suhyun
    Lee, Insung
    Yeon, Seung-Jun
    ETRI JOURNAL, 2015, 37 (02) : 428 - 437
  • [49] Don't be afraid to use fear appeals: An experimental study
    LaTour, MS
    Snipes, RL
    Bliss, SJ
    JOURNAL OF ADVERTISING RESEARCH, 1996, 36 (02) : 59 - 67
  • [50] An empirical study on the use of the Generic Security Template for structuring the lessons from information security incidents
    He, Ying
    Johnson, Chris
    Renaud, Karen
    Lu, Yu
    Jebriel, Salem
    2014 6TH INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND INFORMATION TECHNOLOGY (CSIT), 2014, : 178 - 188