A Meta-Analysis of Studies on Protection Motivation Theory and Information Security Behaviour

2015 ◽  
Vol 9 (1) ◽  
pp. 26-46 ◽  
Author(s):  
Teodor Sommestad ◽  
Henrik Karlzén ◽  
Jonas Hallberg

Individuals' willingness to take security precautions is imperative to their own information security and the information security of the organizations they work within. This paper presents a meta-analysis of the protection motivation theory (PMT) to assess how its efficacy is influenced by the information security behavior it is applied to. It investigates if the PMT explains information security behavior better if: 1) The behavior is voluntary? 2) The threat and coping method is concrete or specific? 3) The information security threat is directed to the person itself? Synthesized data from 28 surveys suggests that the answers to all three questions are yes. Weighted mean correlation coefficients are on average 0.03 higher for voluntary behavior than mandatory behavior, 0.05 higher for specific behaviors than studies of general behaviors, 0.08 higher to threat appraisal when the threat targets the individual person instead of the person's organization or someone else.

Author(s):  
Yves Barlette ◽  
Katherine Gundolf ◽  
Annabelle Jaouen

This study presents an empirical investigation of factors affecting SMB CEOs decision to improve or not their company's information security (ISS). We developed a research model by adopting the protection motivation theory (PMT) to investigate the effect of threat and coping appraisal on protective actions. We conducted a questionnaire-based survey with SMB CEOs. Prior studies using PMT have never been focused on SMB CEOs behavior, and we postulate that in SMBs where there is no CIO or even IT people, CEO’s actions are of utmost importance for achieving a satisfying ISS.


Author(s):  
Narasimha Paravastu ◽  
Murugan Anandarajan

Information security is important for organizations as well as individuals from the perspective of protection from data breaches, identity theft, malware and infections, hacking etc. This article presents the framework of Protection Motivation Theory and its constructs, and then reviews the past IS Literature on information systems security, from a protection motivation perspective. Specifically this article tries to explain how individuals perceive a fear appeal in an information systems security threat, and how the protection motivation framework of fear, threat perceptions of severity and vulnerability, impact the coping intentions of individuals to protect themselves from information systems security threats. This article further discusses the theoretical and managerial implications of protection motivation theory as it applies to information systems security.


2000 ◽  
Vol 30 (2) ◽  
pp. 407-429 ◽  
Author(s):  
DONNA L. FLOYD ◽  
STEVEN PRENTICE-DUNN ◽  
RONALD W. ROGERS

Author(s):  
EunWon Lee ◽  
GyeongAe Seomun

Background: Healthcare information includes sensitive data and, as such, must be secure; however, the risk of healthcare information leakage is increasing. Nurses manage healthcare information in hospitals; however, previous studies have either been conducted on medical workers from various other occupations or have not synthesized various factors. The purpose of this study was to create and prove a model of nurses’ healthcare information security (HIS). The hypothetical model used in this study was constructed on the basis of the protection motivation theory (PMT) proposed by Rogers. Methods: A total of 252 questionnaires scored using a five-point Likert scale were analyzed, incorporating data from nurses who had been working for more than one month in general hospitals with more than 300 beds in South Korea. The survey was conducted over a total of 30 days, from 1 to 30 September 2019. Results: The results showed that coping appraisal significantly influence HIS intentions (estimate = −1.477, p < 0.01), whereas HIS intentions significantly influence HIS behavior (estimate = 0.515, p < 0.001). A moderating effect on the association between coping appraisal and HIS intentions was found in the group of nurses who had been working for <5 years (estimate = −1.820, p < 0.05). Moreover, a moderating effect on the association between HIS intentions and HIS behavior was found in the group of nurses who had been working for <5 years (estimate = 0.600, p < 0.001). Conclusion: The results of this study can be used to develop a management plan to strengthen nurses’ HIS behavior and can be used by nursing managers as a basis for developing education programs.


Sign in / Sign up

Export Citation Format

Share Document