Changes

Jump to navigation Jump to search
no edit summary
Line 36: Line 36:     
Rogers, R. W. 1975. "A Protection Motivation Theory of Fear Appeals and Attitude Change," Journal of Psychology (91:1), pp. 93-114.
 
Rogers, R. W. 1975. "A Protection Motivation Theory of Fear Appeals and Attitude Change," Journal of Psychology (91:1), pp. 93-114.
 +
 
Rogers, R. W. 1983. "Cognitive and Physiological Processes in Fear Appeals and Attitude Change: A Revised Theory of Protection Motivation," in Social Psychophysiology: A Sourcebook, J. T. Cacioppo, and R. E. Petty (eds.), New York, NY: Guilford, pp. 153-176.
 
Rogers, R. W. 1983. "Cognitive and Physiological Processes in Fear Appeals and Attitude Change: A Revised Theory of Protection Motivation," in Social Psychophysiology: A Sourcebook, J. T. Cacioppo, and R. E. Petty (eds.), New York, NY: Guilford, pp. 153-176.
 +
 
Rogers, R. W., and Prentice-Dunn, S. 1997. "Protection Motivation Theory," in Handbook of Health Behavior Research I: Personal and Social Determinants, D. S. Gochman (ed.), New York, NY: Plenum Press, pp. 113-132.
 
Rogers, R. W., and Prentice-Dunn, S. 1997. "Protection Motivation Theory," in Handbook of Health Behavior Research I: Personal and Social Determinants, D. S. Gochman (ed.), New York, NY: Plenum Press, pp. 113-132.
 +
 
Floyd, D. L., Prentice-Dunn, S., and Rogers, R. W. 2000. "A Meta-Analysis of Research on Protection Motivation Theory," Journal of Applied Social Psychology (30:2), pp. 407-429.
 
Floyd, D. L., Prentice-Dunn, S., and Rogers, R. W. 2000. "A Meta-Analysis of Research on Protection Motivation Theory," Journal of Applied Social Psychology (30:2), pp. 407-429.
   Line 64: Line 67:  
== Level of analysis ==
 
== Level of analysis ==
   −
individual
+
Individual
    
== IS articles that use the theory ==
 
== IS articles that use the theory ==
    
Anderson, C. L., and Agarwal, R. 2010. "Practicing Safe Computing: A Multimethod Empirical Examination of Home Computer User Security Behavioral Intentions," MIS Quarterly (34:3), pp. 613-643.
 
Anderson, C. L., and Agarwal, R. 2010. "Practicing Safe Computing: A Multimethod Empirical Examination of Home Computer User Security Behavioral Intentions," MIS Quarterly (34:3), pp. 613-643.
 +
 
Scott R. Boss, Dennis F. Galletta, Paul Benjamin Lowry, Gregory D. Moody, and Peter Polak (2015). “What do users have to fear? Using fear appeals to engender threats and fear that motivate protective behaviors in users,” MIS Quarterly (MISQ), vol. 39 (4), pp. 837–864
 
Scott R. Boss, Dennis F. Galletta, Paul Benjamin Lowry, Gregory D. Moody, and Peter Polak (2015). “What do users have to fear? Using fear appeals to engender threats and fear that motivate protective behaviors in users,” MIS Quarterly (MISQ), vol. 39 (4), pp. 837–864
 +
 
Claar, C. L., and Johnson, J. 2012. "Analyzing Home PC Security Adoption Behavior," Journal of Computer Information Systems (52:4), pp. 20-29.
 
Claar, C. L., and Johnson, J. 2012. "Analyzing Home PC Security Adoption Behavior," Journal of Computer Information Systems (52:4), pp. 20-29.
 +
 
Crossler, R. E., and Bélanger, F. 2014. "An Extended Perspective on Individual Security Behaviors: Protection Motivation Theory and a Unified Security Practices (USP) Instrument," DATA BASE for Advances in Information Systems (45:4), pp. 51-71.
 
Crossler, R. E., and Bélanger, F. 2014. "An Extended Perspective on Individual Security Behaviors: Protection Motivation Theory and a Unified Security Practices (USP) Instrument," DATA BASE for Advances in Information Systems (45:4), pp. 51-71.
 +
 
Gurung, A., Luo, X., and Liao, Q. 2009. "Consumer Motivations in Taking Action against Spyware: An Empirical Investigation," Information Management & Computer Security (17:3), pp. 276-289.
 
Gurung, A., Luo, X., and Liao, Q. 2009. "Consumer Motivations in Taking Action against Spyware: An Empirical Investigation," Information Management & Computer Security (17:3), pp. 276-289.
 +
 
Herath, T., and Rao, H. 2009. "Protection Motivation and Deterrence: A Framework for Security Policy Compliance in Organisations," European Journal of Information Systems (18:2), pp. 106-125.
 
Herath, T., and Rao, H. 2009. "Protection Motivation and Deterrence: A Framework for Security Policy Compliance in Organisations," European Journal of Information Systems (18:2), pp. 106-125.
 +
 
Herath, T., Chen, R., Wang, J., Banjara, K., Wilbur, J., and Rao, H. R. 2012. "Security Services as Coping Mechanisms: An Investigation into User Intention to Adopt an Email Authentication Service," Information Systems Journal (24:1), pp. 61-84.
 
Herath, T., Chen, R., Wang, J., Banjara, K., Wilbur, J., and Rao, H. R. 2012. "Security Services as Coping Mechanisms: An Investigation into User Intention to Adopt an Email Authentication Service," Information Systems Journal (24:1), pp. 61-84.
 +
 
Ifinedo, P. 2012. "Understanding Information Systems Security Policy Compliance: An Integration of the Theory of Planned Behavior and the Protection Motivation Theory," Computers & Security (31:1), pp. 83-95.
 
Ifinedo, P. 2012. "Understanding Information Systems Security Policy Compliance: An Integration of the Theory of Planned Behavior and the Protection Motivation Theory," Computers & Security (31:1), pp. 83-95.
 +
 
Jenkins, J. L., Grimes, M., Proudfoot, J., and Lowry, P. B. 2013. "Improving Password Cybersecurity through Inexpensive and Minimally Invasive Means: Detecting and Deterring Password Reuse through Keystroke-Dynamics Monitoring and Just-in-Time Warnings," Information Technology for Development (20:2), pp. 196-213.
 
Jenkins, J. L., Grimes, M., Proudfoot, J., and Lowry, P. B. 2013. "Improving Password Cybersecurity through Inexpensive and Minimally Invasive Means: Detecting and Deterring Password Reuse through Keystroke-Dynamics Monitoring and Just-in-Time Warnings," Information Technology for Development (20:2), pp. 196-213.
 +
 
Johnston, A. C., and Warkentin, M. 2010. "Fear Appeals and Information Security Behaviors: An Empirical Study," MIS Quarterly (34:1), pp. 549-566.
 
Johnston, A. C., and Warkentin, M. 2010. "Fear Appeals and Information Security Behaviors: An Empirical Study," MIS Quarterly (34:1), pp. 549-566.
 +
 
Johnston, A. C., Warkentin, M., and Siponen, M. 2015. "An Enhanced Fear Appeal Rhetorical Framework: Leveraging Threats to the Human Asset through Sanctioning Rhetoric," MIS Quarterly (39:1), pp. 113-134.
 
Johnston, A. C., Warkentin, M., and Siponen, M. 2015. "An Enhanced Fear Appeal Rhetorical Framework: Leveraging Threats to the Human Asset through Sanctioning Rhetoric," MIS Quarterly (39:1), pp. 113-134.
 +
 
Lai, F., Li, D., and Hsieh, C.-T. 2012. "Fighting Identity Theft: The Coping Perspective," Decision Support Systems (52:2), pp. 353-363.
 
Lai, F., Li, D., and Hsieh, C.-T. 2012. "Fighting Identity Theft: The Coping Perspective," Decision Support Systems (52:2), pp. 353-363.
 +
 
LaRose, R., Rifon, N. J., and Enbody, R. 2008. "Promoting Personal Responsibility for Internet Safety," Communications of the ACM (51:3), pp. 71-76.
 
LaRose, R., Rifon, N. J., and Enbody, R. 2008. "Promoting Personal Responsibility for Internet Safety," Communications of the ACM (51:3), pp. 71-76.
 +
 
Lee, D., Larose, R., and Rifon, N. 2008. "Keeping Our Network Safe: A Model of Online Protection Behaviour," Behaviour & Information Technology (27:5), pp. 445-454.
 
Lee, D., Larose, R., and Rifon, N. 2008. "Keeping Our Network Safe: A Model of Online Protection Behaviour," Behaviour & Information Technology (27:5), pp. 445-454.
 +
 
Lee, Y., and Larsen, K. R. 2009. "Threat or Coping Appraisal: Determinants of SMB Executives' Decision to Adopt Anti-Malware Software," European Journal of Information Systems (18:2), pp. 177-187
 
Lee, Y., and Larsen, K. R. 2009. "Threat or Coping Appraisal: Determinants of SMB Executives' Decision to Adopt Anti-Malware Software," European Journal of Information Systems (18:2), pp. 177-187
 +
 
Lee, Y. 2011. "Understanding Anti-Plagiarism Software Adoption: An Extended Protection Motivation Theory Perspective," Decision Support Systems (50:2), pp. 361-369.
 
Lee, Y. 2011. "Understanding Anti-Plagiarism Software Adoption: An Extended Protection Motivation Theory Perspective," Decision Support Systems (50:2), pp. 361-369.
 +
 
Liang, H., and Xue, Y. 2010. "Understanding Security Behaviors in Personal Computer Usage: A Threat Avoidance Perspective," Journal of the Association for Information Systems (11:7), pp. 394-413.
 
Liang, H., and Xue, Y. 2010. "Understanding Security Behaviors in Personal Computer Usage: A Threat Avoidance Perspective," Journal of the Association for Information Systems (11:7), pp. 394-413.
    
Clay Posey, Tom L. Roberts, Paul Benjamin Lowry, James Courtney, and Rebecca J. Bennett (2011). “Motivating the insider to protect organizational information assets: Evidence from protection motivation theory and rival explanations,” Proceedings of the Dewald Roode Workshop in Information Systems Security 2011, IFIP WG 8.11 / 11.13, Blacksburg, VA, September 22–23, pp. 1–51.   
 
Clay Posey, Tom L. Roberts, Paul Benjamin Lowry, James Courtney, and Rebecca J. Bennett (2011). “Motivating the insider to protect organizational information assets: Evidence from protection motivation theory and rival explanations,” Proceedings of the Dewald Roode Workshop in Information Systems Security 2011, IFIP WG 8.11 / 11.13, Blacksburg, VA, September 22–23, pp. 1–51.   
 +
 
Clay Posey, Tom L. Roberts, and Paul Benjamin Lowry (2015). “The impact of organizational commitment on insiders’ motivation to protect organizational information assets,” Journal of Management Information Systems (JMIS) (forthcoming).
 
Clay Posey, Tom L. Roberts, and Paul Benjamin Lowry (2015). “The impact of organizational commitment on insiders’ motivation to protect organizational information assets,” Journal of Management Information Systems (JMIS) (forthcoming).
   Line 96: Line 116:     
n/a
 
n/a
Original Contributor(s)
+
 
 +
== Original Contributor(s) ==
 +
 
 
Paul Benjamin Lowry
 
Paul Benjamin Lowry
 
[http://www.cb.cityu.edu.hk/staff/pblowry]
 
[http://www.cb.cityu.edu.hk/staff/pblowry]
73

edits

Navigation menu