IS

Polak, Peter

Topic Weight Topic Terms
0.314 information security interview threats attacks theory fear vulnerability visibility president vulnerabilities pmt behaviors enforcement appeals
0.242 website users websites technostress stress time online wait delay aesthetics user model image elements longer
0.177 model use theory technology intention information attitude acceptance behavioral behavior intentions research understanding systems continuance
0.167 research researchers framework future information systems important present agenda identify areas provide understanding contributions using
0.110 effects effect research data studies empirical information literature different interaction analysis implications findings results important
0.105 factors success information critical management implementation study factor successful systems support quality variables related results

Focal Researcher     Coauthors of Focal Researcher (1st degree)     Coauthors of Coauthors (2nd degree)

Note: click on a node to go to a researcher's profile page. Drag a node to reallocate. Number on the edge is the number of co-authorships.

Galletta, Dennis F. 2 Boss, Scott R. 1 Henry, Raymond M. 1 Lowry, Paul Benjamin 1
McCoy, Scott 1 Moody, Gregory D. 1
ATTITUDES 1 behavior 1 coping 1 ELECTRONIC COMMERCE 1
fear appeals 1 Information security 1 intentions 1 model comparison 1
PERFORMANCE 1 protection motivation theory 1 Response Time 1 system backups 1
threat 1 Website design 1

Articles (2)

What Do Systems Users Have to Fear? Using Fear Appeals to Engender Threats and Fear that Motivate Protective Security Behaviors (MIS Quarterly, 2015)
Authors: Abstract:
    Because violations of information security (ISec) and privacy have become ubiquitous in both personal and work environments, academic attention to ISec and privacy has taken on paramount importance. Consequently, a key focus of ISec research has been discovering ways to motivate individuals to engage in more secure behaviors. Over time, the protection motivation theory (PMT) has become a leading theoretical foundation used in ISec research to help motivate individuals to change their security-related behaviors to protect themselves and their organizations. Our careful review of the foundation for PMT identified four opportunities for improving ISec PMT research. First, extant ISec studies do not use the full nomology of PMT constructs. Second, only one study uses fear-appeal manipulations, even though these are a core element of PMT. Third, virtually no ISec study models or measures fear. Fourth, whereas these studies have made excellent progress in predicting security intentions, none of them have addressed actual security behaviors.
When the Wait Isn't So Bad: The Interacting Effects of Website Delay, Familiarity, and Breadth. (Information Systems Research, 2006)
Authors: Abstract:
    Although its popularity is widespread, the Web is well known for one particular drawback: its frequent delay when moving from one page to another. This experimental study examined whether delay and two other website design variables (site breadth and content familiarity) have interaction effects on user performance,attitudes, and behavioral intentions. The three experimental factors (delay, familiarity, and breadth) collectively impact the cognitive costs and penalties that users incur when making choices in their search for target information. An experiment was conducted with 160 undergraduate business majors in a completely counterbalanced, fully factorial design that exposed them to two websites and asked them to browse the sites for nine pieces of information. Results showed that all three factors have strong direct impacts on performance and user attitudes,in turn affecting behavioral intentions to return to the site, as might be expected. A significant three-way interaction was found between all three factors indicating that these factors not only individually impact a user's experiences with a website, but also act in combination to either increase or decrease the costs a user incurs. Two separate analyses support an assertion that attitudes mediate the relationship of the three factors on behavioral intentions. The implications of these results for both researchers and practitioners are discussed. Additional research is needed to discover other factors that mitigate or accentuate the effects of delay, other effects of delay, and under what amounts of delay these effects occur.