Show simple item record

dc.contributor.authorHaag, Steffi
dc.contributor.authorSiponen, Mikko
dc.contributor.authorLiu, Fufan
dc.date.accessioned2021-05-03T10:56:59Z
dc.date.available2021-05-03T10:56:59Z
dc.date.issued2021
dc.identifier.citationHaag, S., Siponen, M., & Liu, F. (2021). Protection Motivation Theory in Information Systems Security Research : A Review of the Past and a Road Map for the Future. <i>Data base for advances in information systems</i>, <i>52</i>(2), 25-67. <a href="https://doi.org/10.1145/3462766.3462770" target="_blank">https://doi.org/10.1145/3462766.3462770</a>
dc.identifier.otherCONVID_35352163
dc.identifier.urihttps://jyx.jyu.fi/handle/123456789/75267
dc.description.abstractProtection motivation theory (PMT) is one of the most commonly used theories to examine information security behaviors. Our systematic review of the application of PMT in information systems (IS) security and the comparison with its application for decades in psychology identified five categories of important issues that have not yet been examined in IS security research. Discussing these issues in terms of why they are relevant and important for IS security, and to what extent IS research has not considered them, offers new research opportunities associated with the study of PMT and IS security threats. We suggest how future studies can approach each of the open issues to provide a new road map for quantitative and qualitative IS scholars.en
dc.format.mimetypeapplication/pdf
dc.language.isoeng
dc.publisherACM
dc.relation.ispartofseriesData base for advances in information systems
dc.rightsIn Copyright
dc.subject.othersuojelumotivaaatioteoria
dc.subject.otherProtection Motivation Theory
dc.subject.otherbehavioral IS security
dc.subject.otherIS security threat
dc.subject.otherthreat message
dc.subject.otherfear appeal
dc.subject.otherliterature review
dc.titleProtection Motivation Theory in Information Systems Security Research : A Review of the Past and a Road Map for the Future
dc.typereview article
dc.identifier.urnURN:NBN:fi:jyu-202105032582
dc.contributor.laitosInformaatioteknologian tiedekuntafi
dc.contributor.laitosFaculty of Information Technologyen
dc.contributor.oppiaineTietojärjestelmätiedefi
dc.contributor.oppiaineInformation Systems Scienceen
dc.type.urihttp://purl.org/eprint/type/JournalArticle
dc.type.coarhttp://purl.org/coar/resource_type/c_dcae04bc
dc.description.reviewstatuspeerReviewed
dc.format.pagerange25-67
dc.relation.issn1532-0936
dc.relation.numberinseries2
dc.relation.volume52
dc.type.versionacceptedVersion
dc.rights.copyright© 2021 ACM
dc.rights.accesslevelopenAccessfi
dc.type.publicationarticle
dc.subject.ysotietoturva
dc.subject.ysotietojärjestelmät
dc.subject.ysouhat
dc.subject.ysosuojelu
dc.subject.ysokäyttäjät
dc.subject.ysoasenteet
dc.format.contentfulltext
jyx.subject.urihttp://www.yso.fi/onto/yso/p5479
jyx.subject.urihttp://www.yso.fi/onto/yso/p3927
jyx.subject.urihttp://www.yso.fi/onto/yso/p21206
jyx.subject.urihttp://www.yso.fi/onto/yso/p2290
jyx.subject.urihttp://www.yso.fi/onto/yso/p16550
jyx.subject.urihttp://www.yso.fi/onto/yso/p5619
dc.rights.urlhttp://rightsstatements.org/page/InC/1.0/?language=en
dc.relation.doi10.1145/3462766.3462770
dc.type.okmA2


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record

In Copyright
Except where otherwise noted, this item's license is described as In Copyright