Changes

Jump to navigation Jump to search
m
Line 26: Line 26:  
== Diagram/schematic of theory ==
 
== Diagram/schematic of theory ==
 
   
 
   
 +
<gallery>
 +
File:PMT_figure_1.jpg
 +
</gallery>
    
Figure 1. Overview of the Core and Full Nomologies of PMT as Process Variance Model from Boss et. al. (2015, p. 840)
 
Figure 1. Overview of the Core and Full Nomologies of PMT as Process Variance Model from Boss et. al. (2015, p. 840)
Line 32: Line 35:     
R. W. Rogers; later revised with S. Prentice-Dunn
 
R. W. Rogers; later revised with S. Prentice-Dunn
   
== Seminal articles ==
 
== Seminal articles ==
   Line 43: Line 45:  
Floyd, D. L., Prentice-Dunn, S., and Rogers, R. W. 2000. "A Meta-Analysis of Research on Protection Motivation Theory," Journal of Applied Social Psychology (30:2), pp. 407-429.
 
Floyd, D. L., Prentice-Dunn, S., and Rogers, R. W. 2000. "A Meta-Analysis of Research on Protection Motivation Theory," Journal of Applied Social Psychology (30:2), pp. 407-429.
   −
== Leading IS Articles that Contextualized to IS context ==
+
== Leading IS Articles that Contextualized PMT to IS context ==
 
  −
Johnston, A. C., and Warkentin, M. 2010. "Fear Appeals and Information Security Behaviors: An Empirical Study," MIS Quarterly (34:1), pp. 549-566
  −
 
  −
This article re-introduced the idea of the fear appeal from PMT to the IS field.
  −
 
  −
Johnston, A. C., Warkentin, M., and Siponen, M. 2015. "An Enhanced Fear Appeal Rhetorical Framework: Leveraging Threats to the Human Asset through Sanctioning Rhetoric," MIS Quarterly (39:1), pp. 113-134.
  −
 
  −
This article shows how sanctioning rhetoric can improve the effectiveness of fear-appeal manipulations.
  −
 
  −
Scott R. Boss, Dennis F. Galletta, Paul Benjamin Lowry, Gregory D. Moody, and Peter Polak (2015). “What do users have to fear? Using fear appeals to engender threats and fear that motivate protective behaviors in users,” MIS Quarterly (MISQ), vol. 39 (4), pp. 837–864.
  −
 
  −
This article returns the IS field to the full nomology of PMT and shows how to use it properly for manipulated fear appeals with the full nomology, including the measurement of fear.
  −
 
  −
Clay Posey, Tom L. Roberts, and Paul Benjamin Lowry (2015). “The impact of organizational commitment on insiders’ motivation to protect organizational information assets,” Journal of Management Information Systems (JMIS) (forthcoming).
     −
This article shows how to best use the full PMT nomology with organizational commitment in a non-manipulated fear appeal general threat context to increase ISP compliance
+
Johnston, A. C., and Warkentin, M. 2010. "Fear Appeals and Information Security Behaviors: An Empirical Study," MIS Quarterly (34:1), pp. 549-566<blockquote>This article re-introduced the idea of the fear appeal from PMT to the IS field.</blockquote>Johnston, A. C., Warkentin, M., and Siponen, M. 2015. "An Enhanced Fear Appeal Rhetorical Framework: Leveraging Threats to the Human Asset through Sanctioning Rhetoric," MIS Quarterly (39:1), pp. 113-134.<blockquote>This article shows how sanctioning rhetoric can improve the effectiveness of fear-appeal manipulations.</blockquote>Scott R. Boss, Dennis F. Galletta, Paul Benjamin Lowry, Gregory D. Moody, and Peter Polak (2015). “What do users have to fear? Using fear appeals to engender threats and fear that motivate protective behaviors in users,” MIS Quarterly (MISQ), vol. 39 (4), pp. 837–864.<blockquote>This article returns the IS field to the full nomology of PMT and shows how to use it properly for manipulated fear appeals with the full nomology, including the measurement of fear.</blockquote>Clay Posey, Tom L. Roberts, and Paul Benjamin Lowry (2015). “The impact of organizational commitment on insiders’ motivation to protect organizational information assets,” Journal of Management Information Systems (JMIS) (forthcoming).<blockquote>This article shows how to best use the full PMT nomology with organizational commitment in a non-manipulated fear appeal general threat context to increase ISP compliance</blockquote>
    
== Originating area ==
 
== Originating area ==
Line 73: Line 61:  
Anderson, C. L., and Agarwal, R. 2010. "Practicing Safe Computing: A Multimethod Empirical Examination of Home Computer User Security Behavioral Intentions," MIS Quarterly (34:3), pp. 613-643.
 
Anderson, C. L., and Agarwal, R. 2010. "Practicing Safe Computing: A Multimethod Empirical Examination of Home Computer User Security Behavioral Intentions," MIS Quarterly (34:3), pp. 613-643.
   −
Scott R. Boss, Dennis F. Galletta, Paul Benjamin Lowry, Gregory D. Moody, and Peter Polak (2015). “What do users have to fear? Using fear appeals to engender threats and fear that motivate protective behaviors in users,” MIS Quarterly (MISQ), vol. 39 (4), pp. 837–864
+
Scott R. Boss, Dennis F. Galletta, Paul Benjamin Lowry, Gregory D. Moody, and Peter Polak (2015). “[http://papers.ssrn.com/sol3/papers.cfm?abstract_id=2607190 What do users have to fear? Using fear appeals to engender threats and fear that motivate protective behaviors in users],” MIS Quarterly (MISQ), vol. 39 (4), pp. 837–864
    
Claar, C. L., and Johnson, J. 2012. "Analyzing Home PC Security Adoption Behavior," Journal of Computer Information Systems (52:4), pp. 20-29.
 
Claar, C. L., and Johnson, J. 2012. "Analyzing Home PC Security Adoption Behavior," Journal of Computer Information Systems (52:4), pp. 20-29.
Line 87: Line 75:  
Ifinedo, P. 2012. "Understanding Information Systems Security Policy Compliance: An Integration of the Theory of Planned Behavior and the Protection Motivation Theory," Computers & Security (31:1), pp. 83-95.
 
Ifinedo, P. 2012. "Understanding Information Systems Security Policy Compliance: An Integration of the Theory of Planned Behavior and the Protection Motivation Theory," Computers & Security (31:1), pp. 83-95.
   −
Jenkins, J. L., Grimes, M., Proudfoot, J., and Lowry, P. B. 2013. "Improving Password Cybersecurity through Inexpensive and Minimally Invasive Means: Detecting and Deterring Password Reuse through Keystroke-Dynamics Monitoring and Just-in-Time Warnings," Information Technology for Development (20:2), pp. 196-213.
+
Jenkins, J. L., Grimes, M., Proudfoot, J., and Lowry, P. B. 2013. "[http://papers.ssrn.com/sol3/papers.cfm?abstract_id=2292761 Improving password cybersecurity
 +
through inexpensive and minimally invasive means: Detecting and deterring
 +
password reuse through keystroke-dynamics monitoring and just-in-time warnings]," Information Technology for Development (20:2), pp. 196-213.
    
Johnston, A. C., and Warkentin, M. 2010. "Fear Appeals and Information Security Behaviors: An Empirical Study," MIS Quarterly (34:1), pp. 549-566.
 
Johnston, A. C., and Warkentin, M. 2010. "Fear Appeals and Information Security Behaviors: An Empirical Study," MIS Quarterly (34:1), pp. 549-566.
Line 105: Line 95:  
Liang, H., and Xue, Y. 2010. "Understanding Security Behaviors in Personal Computer Usage: A Threat Avoidance Perspective," Journal of the Association for Information Systems (11:7), pp. 394-413.
 
Liang, H., and Xue, Y. 2010. "Understanding Security Behaviors in Personal Computer Usage: A Threat Avoidance Perspective," Journal of the Association for Information Systems (11:7), pp. 394-413.
   −
Clay Posey, Tom L. Roberts, Paul Benjamin Lowry, James Courtney, and Rebecca J. Bennett (2011). “Motivating the insider to protect organizational information assets: Evidence from protection motivation theory and rival explanations,” Proceedings of the Dewald Roode Workshop in Information Systems Security 2011, IFIP WG 8.11 / 11.13, Blacksburg, VA, September 22–23, pp. 1–51.   
+
Clay Posey, Tom L. Roberts, Paul Benjamin Lowry, James Courtney, and Rebecca J. Bennett (2011). “[http://papers.ssrn.com/sol3/papers.cfm?abstract_id=2273594 Motivating the insider to protect organizational information assets: Evidence from protection motivation theory and rival explanations],” Proceedings of the Dewald Roode Workshop in Information Systems Security 2011, IFIP WG 8.11 / 11.13, Blacksburg, VA, September 22–23, pp. 1–51.   
   −
Clay Posey, Tom L. Roberts, and Paul Benjamin Lowry (2015). “The impact of organizational commitment on insiders’ motivation to protect organizational information assets,” Journal of Management Information Systems (JMIS) (forthcoming).
+
Clay Posey, Tom L. Roberts, and Paul Benjamin Lowry (2015). “[http://papers.ssrn.com/sol3/papers.cfm?abstract_id=2640911 The impact of organizational commitment on insiders’ motivation to protect organizational information assets],” Journal of Management Information Systems (JMIS) (forthcoming).
    
== Links from this theory to other theories ==
 
== Links from this theory to other theories ==
Line 119: Line 109:  
== Original Contributor(s) ==
 
== Original Contributor(s) ==
   −
Paul Benjamin Lowry
+
[http://www.cb.cityu.edu.hk/staff/pblowry Paul Benjamin Lowry]
[http://www.cb.cityu.edu.hk/staff/pblowry]
 
Bots, Bureaucrats, checkuser, Administrators, trustedUser
291

edits

Navigation menu