Encouraging information security behaviors in organizations: Role of penalties, pressures and perceived effectiveness

2009 ◽  
Vol 47 (2) ◽  
pp. 154-165 ◽  
Author(s):  
Tejaswini Herath ◽  
H.R. Rao
2020 ◽  
Author(s):  
Małgorzata Kossowska

One might assume that the desire to help (here described as Want) is the essential driver of helping declarations and/or behaviors. However, even if desire to help is low, helping behavior may still occur if the expectancy regarding the perceived effectiveness of helping is high. We tested these predictions in a set of three experimental studies. In all three, we measured the desire to help (Want) and the Expectancy that the aid would be impactful for the victim; in addition, we manipulated Expectancy in Study 3. In Studies 1 and 3, we measured the participants’ declaration to help while in Study 2, their helping behavior was examined. In all three studies, we used variations of the same story about a victim. The results supported our hypothesis. Thus, the studies help to tease apart the determinants of helping behavior under conditions of lowered desire to do so, an issue of great importance in public policymaking.


2021 ◽  
Vol ahead-of-print (ahead-of-print) ◽  
Author(s):  
Hao Chen ◽  
Ofir Turel ◽  
Yufei Yuan

PurposeElectronic waste (e-waste) such as discarded computers and smartphones may contain large amounts of confidential data. Improper handling of remaining information in e-waste can, therefore, drive information security risk. This risk, however, is not always properly assessed and managed. The authors take the protection motivation theory (PMT) lens of analysis to understand intentions to protect one's discarded electronic assets.Design/methodology/approachBy applying structural equation modeling, the authors empirically tested the proposed model with survey data from 348 e-waste handling users.FindingsResults highlight that (1) protection intention is influenced by the perceived threat of discarding untreated e-waste (a threat appraisal) and self-efficacy to treat the discarded e-waste (a coping appraisal) and (2) optimism bias plays a dual-role in a direct and moderating way to reduce the perceived threat of untreated e-waste and its effect on protection intentions.Originality/valueResults support the assertions and portray a unique theoretical account of the processes that underline people's motivation to protect their data when discarding e-waste. As such, this study explains a relatively understudied information security risk behavior in the e-waste context, points to the role of optimism bias in such decisions and highlights potential interventions that can help to alleviate this information security risk behavior.


2018 ◽  
Vol 40 (6) ◽  
pp. 957-991 ◽  
Author(s):  
Paula Pérez-Sobrino ◽  
Jeannette Littlemore ◽  
David Houghton

Abstract To date, research in advertising has focussed almost exclusively on metaphor, with linguists and marketing scholars paying very little attention to alternative types of figurative expression. Beyond the finding that metaphor leads to an increased appreciation of advertisements, there has been surprisingly little research into how consumer response is affected by metonymy, or by metaphor–metonymy interactions. In this article, we present findings from a study that investigated the depth to which participants (n = 90) from a range of cultural and linguistic backgrounds (the UK, Spain, and China) were found to process 30 real-world adverts featuring creative metaphor and metonymy in multimodal format. We focus on the cross-cultural variation in terms of time taken to process, appreciation and perceived effectiveness of adverts, and on individual differences explained by different levels of need for cognition. We found significant variation in the understanding of advertisements containing metaphor, metonymy, and combinations of the two, between subjects and across nationalities in terms of (i) processing time, (ii) overall appeal, and (iii) the way in which participants interpreted the advertisements.


2019 ◽  
Vol 81 ◽  
pp. 41-48 ◽  
Author(s):  
Lee Hadlington ◽  
Maša Popovac ◽  
Helge Janicke ◽  
Iryna Yevseyeva ◽  
Kevin Jones

2006 ◽  
Vol 36 (1) ◽  
pp. 73
Author(s):  
Freddy Harris ◽  
Bono Budi Priambodo

The authors here explain regarding the role of regulation to anticipating information security By sociological approaches it has reflected on the Indonesian conditions which had not adequate organized. Existing arranged is limited on certain sectors. social group. and corporations group either domestic and multinational levels. Most efforts to reach to better level have been initiated by many parties such as public sector. education. information technology industrial. professional community and civil. Here also recommended needs for clear policy and the whole implementation which be coordinated integrally under government chief's. Government leads under the authority to accomplishing the state under effective law and regulations


Author(s):  
Craig Williams ◽  
Helen M. Hodgetts ◽  
Candice Morey ◽  
Bill Macken ◽  
Dylan M. Jones ◽  
...  

Sign in / Sign up

Export Citation Format

Share Document