Changes

Jump to navigation Jump to search
theory content
Line 43: Line 43:  
Floyd, D. L., Prentice-Dunn, S., and Rogers, R. W. 2000. "A Meta-Analysis of Research on Protection Motivation Theory," Journal of Applied Social Psychology (30:2), pp. 407-429.
 
Floyd, D. L., Prentice-Dunn, S., and Rogers, R. W. 2000. "A Meta-Analysis of Research on Protection Motivation Theory," Journal of Applied Social Psychology (30:2), pp. 407-429.
   −
== Leading IS Articles that Contextualized to IS context ==
+
== Leading IS Articles that Contextualized PMT to IS context ==
   −
Johnston, A. C., and Warkentin, M. 2010. "Fear Appeals and Information Security Behaviors: An Empirical Study," MIS Quarterly (34:1), pp. 549-566
+
Johnston, A. C., and Warkentin, M. 2010. "Fear Appeals and Information Security Behaviors: An Empirical Study," MIS Quarterly (34:1), pp. 549-566<blockquote>This article re-introduced the idea of the fear appeal from PMT to the IS field.</blockquote>Johnston, A. C., Warkentin, M., and Siponen, M. 2015. "An Enhanced Fear Appeal Rhetorical Framework: Leveraging Threats to the Human Asset through Sanctioning Rhetoric," MIS Quarterly (39:1), pp. 113-134.<blockquote>This article shows how sanctioning rhetoric can improve the effectiveness of fear-appeal manipulations.</blockquote>Scott R. Boss, Dennis F. Galletta, Paul Benjamin Lowry, Gregory D. Moody, and Peter Polak (2015). “What do users have to fear? Using fear appeals to engender threats and fear that motivate protective behaviors in users,” MIS Quarterly (MISQ), vol. 39 (4), pp. 837–864.<blockquote>This article returns the IS field to the full nomology of PMT and shows how to use it properly for manipulated fear appeals with the full nomology, including the measurement of fear.</blockquote>Clay Posey, Tom L. Roberts, and Paul Benjamin Lowry (2015). “The impact of organizational commitment on insiders’ motivation to protect organizational information assets,” Journal of Management Information Systems (JMIS) (forthcoming).<blockquote>This article shows how to best use the full PMT nomology with organizational commitment in a non-manipulated fear appeal general threat context to increase ISP compliance</blockquote>
 
  −
This article re-introduced the idea of the fear appeal from PMT to the IS field.
  −
 
  −
Johnston, A. C., Warkentin, M., and Siponen, M. 2015. "An Enhanced Fear Appeal Rhetorical Framework: Leveraging Threats to the Human Asset through Sanctioning Rhetoric," MIS Quarterly (39:1), pp. 113-134.
  −
 
  −
This article shows how sanctioning rhetoric can improve the effectiveness of fear-appeal manipulations.
  −
 
  −
Scott R. Boss, Dennis F. Galletta, Paul Benjamin Lowry, Gregory D. Moody, and Peter Polak (2015). “What do users have to fear? Using fear appeals to engender threats and fear that motivate protective behaviors in users,” MIS Quarterly (MISQ), vol. 39 (4), pp. 837–864.
  −
 
  −
This article returns the IS field to the full nomology of PMT and shows how to use it properly for manipulated fear appeals with the full nomology, including the measurement of fear.
  −
 
  −
Clay Posey, Tom L. Roberts, and Paul Benjamin Lowry (2015). “The impact of organizational commitment on insiders’ motivation to protect organizational information assets,” Journal of Management Information Systems (JMIS) (forthcoming).
  −
 
  −
This article shows how to best use the full PMT nomology with organizational commitment in a non-manipulated fear appeal general threat context to increase ISP compliance
      
== Originating area ==
 
== Originating area ==
Line 73: Line 59:  
Anderson, C. L., and Agarwal, R. 2010. "Practicing Safe Computing: A Multimethod Empirical Examination of Home Computer User Security Behavioral Intentions," MIS Quarterly (34:3), pp. 613-643.
 
Anderson, C. L., and Agarwal, R. 2010. "Practicing Safe Computing: A Multimethod Empirical Examination of Home Computer User Security Behavioral Intentions," MIS Quarterly (34:3), pp. 613-643.
   −
Scott R. Boss, Dennis F. Galletta, Paul Benjamin Lowry, Gregory D. Moody, and Peter Polak (2015). “What do users have to fear? Using fear appeals to engender threats and fear that motivate protective behaviors in users,” MIS Quarterly (MISQ), vol. 39 (4), pp. 837–864
+
Scott R. Boss, Dennis F. Galletta, Paul Benjamin Lowry, Gregory D. Moody, and Peter Polak (2015). “[http://papers.ssrn.com/sol3/papers.cfm?abstract_id=2607190 What do users have to fear? Using fear appeals to engender threats and fear that motivate protective behaviors in users],” MIS Quarterly (MISQ), vol. 39 (4), pp. 837–864
    
Claar, C. L., and Johnson, J. 2012. "Analyzing Home PC Security Adoption Behavior," Journal of Computer Information Systems (52:4), pp. 20-29.
 
Claar, C. L., and Johnson, J. 2012. "Analyzing Home PC Security Adoption Behavior," Journal of Computer Information Systems (52:4), pp. 20-29.
Line 87: Line 73:  
Ifinedo, P. 2012. "Understanding Information Systems Security Policy Compliance: An Integration of the Theory of Planned Behavior and the Protection Motivation Theory," Computers & Security (31:1), pp. 83-95.
 
Ifinedo, P. 2012. "Understanding Information Systems Security Policy Compliance: An Integration of the Theory of Planned Behavior and the Protection Motivation Theory," Computers & Security (31:1), pp. 83-95.
   −
Jenkins, J. L., Grimes, M., Proudfoot, J., and Lowry, P. B. 2013. "Improving Password Cybersecurity through Inexpensive and Minimally Invasive Means: Detecting and Deterring Password Reuse through Keystroke-Dynamics Monitoring and Just-in-Time Warnings," Information Technology for Development (20:2), pp. 196-213.
+
Jenkins, J. L., Grimes, M., Proudfoot, J., and Lowry, P. B. 2013. "[http://papers.ssrn.com/sol3/papers.cfm?abstract_id=2292761 Improving password cybersecurity
 +
through inexpensive and minimally invasive means: Detecting and deterring
 +
password reuse through keystroke-dynamics monitoring and just-in-time warnings]," Information Technology for Development (20:2), pp. 196-213.
    
Johnston, A. C., and Warkentin, M. 2010. "Fear Appeals and Information Security Behaviors: An Empirical Study," MIS Quarterly (34:1), pp. 549-566.
 
Johnston, A. C., and Warkentin, M. 2010. "Fear Appeals and Information Security Behaviors: An Empirical Study," MIS Quarterly (34:1), pp. 549-566.
Line 105: Line 93:  
Liang, H., and Xue, Y. 2010. "Understanding Security Behaviors in Personal Computer Usage: A Threat Avoidance Perspective," Journal of the Association for Information Systems (11:7), pp. 394-413.
 
Liang, H., and Xue, Y. 2010. "Understanding Security Behaviors in Personal Computer Usage: A Threat Avoidance Perspective," Journal of the Association for Information Systems (11:7), pp. 394-413.
   −
Clay Posey, Tom L. Roberts, Paul Benjamin Lowry, James Courtney, and Rebecca J. Bennett (2011). “Motivating the insider to protect organizational information assets: Evidence from protection motivation theory and rival explanations,” Proceedings of the Dewald Roode Workshop in Information Systems Security 2011, IFIP WG 8.11 / 11.13, Blacksburg, VA, September 22–23, pp. 1–51.   
+
Clay Posey, Tom L. Roberts, Paul Benjamin Lowry, James Courtney, and Rebecca J. Bennett (2011). “[http://papers.ssrn.com/sol3/papers.cfm?abstract_id=2273594 Motivating the insider to protect organizational information assets: Evidence from protection motivation theory and rival explanations],” Proceedings of the Dewald Roode Workshop in Information Systems Security 2011, IFIP WG 8.11 / 11.13, Blacksburg, VA, September 22–23, pp. 1–51.   
   −
Clay Posey, Tom L. Roberts, and Paul Benjamin Lowry (2015). “The impact of organizational commitment on insiders’ motivation to protect organizational information assets,” Journal of Management Information Systems (JMIS) (forthcoming).
+
Clay Posey, Tom L. Roberts, and Paul Benjamin Lowry (2015). “[http://papers.ssrn.com/sol3/papers.cfm?abstract_id=2640911 The impact of organizational commitment on insiders’ motivation to protect organizational information assets],” Journal of Management Information Systems (JMIS) (forthcoming).
    
== Links from this theory to other theories ==
 
== Links from this theory to other theories ==
Line 119: Line 107:  
== Original Contributor(s) ==
 
== Original Contributor(s) ==
   −
Paul Benjamin Lowry
+
[http://www.cb.cityu.edu.hk/staff/pblowry Paul Benjamin Lowry]
[http://www.cb.cityu.edu.hk/staff/pblowry]
 
73

edits

Navigation menu