IS

Johnston, Allen C.

Topic Weight Topic Terms
0.301 information security interview threats attacks theory fear vulnerability visibility president vulnerabilities pmt behaviors enforcement appeals
0.129 security threat information users detection coping configuration avoidance response firm malicious attack intrusion appraisal countermeasures
0.124 technology research information individual context acceptance use technologies suggests need better personality factors new traits
0.103 users end use professionals user organizations applications needs packages findings perform specialists technical computing direct

Focal Researcher     Coauthors of Focal Researcher (1st degree)     Coauthors of Coauthors (2nd degree)

Note: click on a node to go to a researcher's profile page. Drag a node to reallocate. Number on the edge is the number of co-authorships.

Warkentin, Merrill E. 1
coping appraisal 1 countermeasures 1 fear appeals 1 information assurance 1
Information security 1 persuasive communication 1 protection motivation theory 1 threat appraisal 1

Articles (1)

FEAR APPEALS AND INFORMATION SECURITY BEHAVIORS: AN EMPIRICAL STUDY. (MIS Quarterly, 2010)
Authors: Abstract:
    Information technology executives strive to align the actions of end users with the desired security posture of management and of the firm through persuasive communication. In many cases, some element of fear is incorporated within these communications. However, within the context of computer security and information assurance, it is not yet clear how these fear-inducing arguments, known as fear appeals, will ultimately impact the actions of end users. The purpose of this study is to investigate the influence of fear appeals on the compliance of end users with recommendations to enact specific individual computer security actions toward the mitigation of threats. An examination was performed that culminated in the development and testing of a conceptual model representing an infusion of technology adoption and fear appeal theories. Results of the study suggest that fear appeals do impact end user behavioral intentions to comply with recommended individual acts of security, but the impact is not uniform across all end users. It is determined in part by perceptions of self-efficacy, response efficacy, threat severity, and social influence. The findings of this research contribute to information systems security research, human--computer interaction, and organizational communication by revealing a new paradigm in which IT users form perceptions of the technology, not on the basis of performance gains, but on the basis of utility for threat mitigation.