dc.contributor.author | Haag, Steffi | |
dc.contributor.author | Siponen, Mikko | |
dc.contributor.author | Liu, Fufan | |
dc.date.accessioned | 2021-05-03T10:56:59Z | |
dc.date.available | 2021-05-03T10:56:59Z | |
dc.date.issued | 2021 | |
dc.identifier.citation | Haag, S., Siponen, M., & Liu, F. (2021). Protection Motivation Theory in Information Systems Security Research : A Review of the Past and a Road Map for the Future. <i>Data base for advances in information systems</i>, <i>52</i>(2), 25-67. <a href="https://doi.org/10.1145/3462766.3462770" target="_blank">https://doi.org/10.1145/3462766.3462770</a> | |
dc.identifier.other | CONVID_35352163 | |
dc.identifier.uri | https://jyx.jyu.fi/handle/123456789/75267 | |
dc.description.abstract | Protection motivation theory (PMT) is one of the most commonly used theories to examine information security behaviors. Our systematic review of the application of PMT in information systems (IS) security and the comparison with its application for decades in psychology identified five categories of important issues that have not yet been examined in IS security research. Discussing these issues in terms of why they are relevant and important for IS security, and to what extent IS research has not considered them, offers new research opportunities associated with the study of PMT and IS security threats. We suggest how future studies can approach each of the open issues to provide a new road map for quantitative and qualitative IS scholars. | en |
dc.format.mimetype | application/pdf | |
dc.language.iso | eng | |
dc.publisher | ACM | |
dc.relation.ispartofseries | Data base for advances in information systems | |
dc.rights | In Copyright | |
dc.subject.other | suojelumotivaaatioteoria | |
dc.subject.other | Protection Motivation Theory | |
dc.subject.other | behavioral IS security | |
dc.subject.other | IS security threat | |
dc.subject.other | threat message | |
dc.subject.other | fear appeal | |
dc.subject.other | literature review | |
dc.title | Protection Motivation Theory in Information Systems Security Research : A Review of the Past and a Road Map for the Future | |
dc.type | review article | |
dc.identifier.urn | URN:NBN:fi:jyu-202105032582 | |
dc.contributor.laitos | Informaatioteknologian tiedekunta | fi |
dc.contributor.laitos | Faculty of Information Technology | en |
dc.contributor.oppiaine | Tietojärjestelmätiede | fi |
dc.contributor.oppiaine | Information Systems Science | en |
dc.type.uri | http://purl.org/eprint/type/JournalArticle | |
dc.type.coar | http://purl.org/coar/resource_type/c_dcae04bc | |
dc.description.reviewstatus | peerReviewed | |
dc.format.pagerange | 25-67 | |
dc.relation.issn | 1532-0936 | |
dc.relation.numberinseries | 2 | |
dc.relation.volume | 52 | |
dc.type.version | acceptedVersion | |
dc.rights.copyright | © 2021 ACM | |
dc.rights.accesslevel | openAccess | fi |
dc.type.publication | article | |
dc.subject.yso | tietoturva | |
dc.subject.yso | tietojärjestelmät | |
dc.subject.yso | uhat | |
dc.subject.yso | suojelu | |
dc.subject.yso | käyttäjät | |
dc.subject.yso | asenteet | |
dc.format.content | fulltext | |
jyx.subject.uri | http://www.yso.fi/onto/yso/p5479 | |
jyx.subject.uri | http://www.yso.fi/onto/yso/p3927 | |
jyx.subject.uri | http://www.yso.fi/onto/yso/p21206 | |
jyx.subject.uri | http://www.yso.fi/onto/yso/p2290 | |
jyx.subject.uri | http://www.yso.fi/onto/yso/p16550 | |
jyx.subject.uri | http://www.yso.fi/onto/yso/p5619 | |
dc.rights.url | http://rightsstatements.org/page/InC/1.0/?language=en | |
dc.relation.doi | 10.1145/3462766.3462770 | |
dc.type.okm | A2 | |