Näytä suppeat kuvailutiedot

dc.contributor.authorSiponen, Mikko
dc.contributor.authorRönkkö, Mikko
dc.contributor.authorFufan, Liu
dc.contributor.authorHaag, Steffi
dc.contributor.authorLaatikainen, Gabriella
dc.date.accessioned2024-01-12T06:09:23Z
dc.date.available2024-01-12T06:09:23Z
dc.date.issued2024
dc.identifier.citationSiponen, M., Rönkkö, M., Fufan, L., Haag, S., & Laatikainen, G. (2024). Protection Motivation Theory in Information Security Behavior Research : Reconsidering the Fundamentals. <i>Communications of the Association for Information Systems</i>, <i>53</i>, 1136-1165. <a href="https://doi.org/10.17705/1CAIS.05348" target="_blank">https://doi.org/10.17705/1CAIS.05348</a>
dc.identifier.otherCONVID_194658909
dc.identifier.urihttps://jyx.jyu.fi/handle/123456789/92716
dc.description.abstractScholars commonly use protection motivation theory (PMT) by Rogers to examine information systems (IS) security behaviors and behavioral intentions. A recent, influential paper by Boss, Galletta, Lowry, Moody, and Polak (2015; hereafter BGLMP) in MIS Quarterly outlines correct and incorrect uses of PMT in Information Security behavior research. In this paper, we review some of BGLMP’s key recommendations, such as the claim that all IS behavior studies that apply PMT should always use the model of the full theory, contain and measure fear, and measure actual behaviors. We defend an interpretation of Rogers (1975, 1983) that differs from the interpretation that BGLMP propose. We present evidence that Rogers’ PMT and the empirical evidence do not adequately support many of BGLMP’s suggestions and that these suggestions contradict good scientific practices (e.g., restricting the use of the method of isolation) that the philosophy of science and the original literature on PMT uphold. As a result, if reviewers and editors continue to embrace these recommendations, they could hinder the progress of IS behavior research by not allowing isolation or the combination of different theoretical components. In contrast to BGLMP’s paper, we argue that further PMT research can focus on isolated PMT components and combine them with other theories. Some of our ideas (e.g., isolation) are not PMT-specific and could be useful for IS research in general. In summary, we contest BGLMP’s recommendations and offer revised recommendations in return.en
dc.format.mimetypeapplication/pdf
dc.language.isoeng
dc.publisherAssociation for Information Systems
dc.relation.ispartofseriesCommunications of the Association for Information Systems
dc.relation.urihttps://aisel.aisnet.org/cais/vol53/iss1/47
dc.rightsIn Copyright
dc.subject.otherprotection motivation theory
dc.subject.otherinfosec behavior
dc.subject.otherbehavioral information security
dc.subject.othersecurity threat
dc.subject.otherthreat message
dc.subject.otherfear appeal
dc.subject.otherthreatening communication
dc.titleProtection Motivation Theory in Information Security Behavior Research : Reconsidering the Fundamentals
dc.typearticle
dc.identifier.urnURN:NBN:fi:jyu-202401121217
dc.contributor.laitosInformaatioteknologian tiedekuntafi
dc.contributor.laitosKauppakorkeakoulufi
dc.contributor.laitosFaculty of Information Technologyen
dc.contributor.laitosSchool of Business and Economicsen
dc.contributor.oppiaineTietojärjestelmätiedefi
dc.contributor.oppiaineEmpirical Cyber Security and Software Engineeringfi
dc.contributor.oppiaineInformation Systems Scienceen
dc.contributor.oppiaineEmpirical Cyber Security and Software Engineeringen
dc.type.urihttp://purl.org/eprint/type/JournalArticle
dc.type.coarhttp://purl.org/coar/resource_type/c_2df8fbb1
dc.description.reviewstatuspeerReviewed
dc.format.pagerange1136-1165
dc.relation.issn1529-3181
dc.relation.volume53
dc.type.versionpublishedVersion
dc.rights.copyright© Association for Information Systems
dc.rights.accesslevelopenAccessfi
dc.subject.ysotietojärjestelmät
dc.subject.ysouhat
dc.subject.ysosuositukset
dc.subject.ysoriskit
dc.subject.ysotietoturva
dc.subject.ysokäyttäjät
dc.subject.ysoriskienhallinta
dc.subject.ysotietoliikenne
dc.subject.ysokäyttäytyminen
dc.subject.ysoteoriat
dc.format.contentfulltext
jyx.subject.urihttp://www.yso.fi/onto/yso/p3927
jyx.subject.urihttp://www.yso.fi/onto/yso/p21206
jyx.subject.urihttp://www.yso.fi/onto/yso/p7637
jyx.subject.urihttp://www.yso.fi/onto/yso/p11099
jyx.subject.urihttp://www.yso.fi/onto/yso/p5479
jyx.subject.urihttp://www.yso.fi/onto/yso/p16550
jyx.subject.urihttp://www.yso.fi/onto/yso/p3134
jyx.subject.urihttp://www.yso.fi/onto/yso/p5446
jyx.subject.urihttp://www.yso.fi/onto/yso/p3625
jyx.subject.urihttp://www.yso.fi/onto/yso/p127
dc.rights.urlhttp://rightsstatements.org/page/InC/1.0/?language=en
dc.relation.doi10.17705/1CAIS.05348
dc.type.okmA1


Aineistoon kuuluvat tiedostot

Thumbnail

Aineisto kuuluu seuraaviin kokoelmiin

Näytä suppeat kuvailutiedot

In Copyright
Ellei muuten mainita, aineiston lisenssi on In Copyright