Protection Motivation Theory in Information Systems Security Research : A Review of the Past and a Road Map for the Future
Haag, S., Siponen, M., & Liu, F. (2021). Protection Motivation Theory in Information Systems Security Research : A Review of the Past and a Road Map for the Future. Data base for advances in information systems, 52(2), 25-67. https://doi.org/10.1145/3462766.3462770
Published in
Data base for advances in information systemsDate
2021Copyright
© 2021 ACM
Protection motivation theory (PMT) is one of the most commonly used theories to examine information security behaviors. Our systematic review of the application of PMT in information systems (IS) security and the comparison with its application for decades in psychology identified five categories of important issues that have not yet been examined in IS security research. Discussing these issues in terms of why they are relevant and important for IS security, and to what extent IS research has not considered them, offers new research opportunities associated with the study of PMT and IS security threats. We suggest how future studies can approach each of the open issues to provide a new road map for quantitative and qualitative IS scholars.
Publisher
ACMISSN Search the Publication Forum
1532-0936Keywords
Publication in research information system
https://converis.jyu.fi/converis/portal/detail/Publication/35352163
Metadata
Show full item recordCollections
License
Related items
Showing items with similar title or keywords.
-
Protection Motivation Theory in Information Security Behavior Research : Reconsidering the Fundamentals
Siponen, Mikko; Rönkkö, Mikko; Fufan, Liu; Haag, Steffi; Laatikainen, Gabriella (Association for Information Systems, 2024)Scholars commonly use protection motivation theory (PMT) by Rogers to examine information systems (IS) security behaviors and behavioral intentions. A recent, influential paper by Boss, Galletta, Lowry, Moody, and Polak ... -
Understanding the inward emotion-focused coping strategies of individual users in response to mobile malware threats
Xin, Tong; Siponen, Mikko; Chen, Sihua (Taylor & Francis, 2022)According to coping theory, individuals cope with information system threats by adopting either problem-focused coping (PFC) or emotion-focused coping (EFC). However, little is known about EFC in the information security ... -
Common Misunderstandings of Deterrence Theory in Information Systems Research and Future Research Directions
Siponen, Mikko; Soliman, Wael; Vance, Anthony (ACM, 2022)In the 1980s, information systems (IS) borrowed deterrence theory (DT) from the field of criminology to explain information security behaviors (or intention). Today, DT is among the most commonly used theories in IS security ... -
User acceptance & use of Sisu system in the University of Jyväskylä
Laukka, Michael; Huotari, Samuel (2020)Sisu-järjestelmä korvaa vaiheittain Jyväskylän yliopistossa käytöstä väistyvän Korppi-järjestelmän. Opintotietojärjestelmä on kriittinen työskentely-ympäristö niin opiskelijoille kuin yliopiston työntekijöille, joten ... -
Making the most of information technology & systems usage: A literature review, framework and future research agenda
Shaikh, Aijaz A.; Karjaluoto, Heikki (Pergamon, 2015)This detailed literature review has considered a relatively large quantity (152 total) of scholarly empirical publications, conference proceedings, books and popular market reports published over the last 15 years, i.e., ...