IS

Warkentin, Merrill E.

Topic Weight Topic Terms
0.895 information security interview threats attacks theory fear vulnerability visibility president vulnerabilities pmt behaviors enforcement appeals
0.471 security information compliance policy organizations breach disclosure policies deterrence breaches incidents results study abuse managed
0.243 issues management systems information key managers executives senior corporate important importance survey critical corporations multinational
0.142 usage use self-efficacy social factors individual findings influence organizations beliefs individuals support anxiety technology workplace
0.139 research researchers framework future information systems important present agenda identify areas provide understanding contributions using
0.130 security threat information users detection coping configuration avoidance response firm malicious attack intrusion appraisal countermeasures
0.124 technology research information individual context acceptance use technologies suggests need better personality factors new traits
0.122 mis problems article systems management edp managers organizations ;br> data survey application examines need experiences
0.109 research study influence effects literature theoretical use understanding theory using impact behavior insights examine influences
0.108 framework model used conceptual proposed given particular general concept frameworks literature developed develop providing paper
0.103 users end use professionals user organizations applications needs packages findings perform specialists technical computing direct
0.102 results study research information studies relationship size variables previous variable examining dependent increases empirical variance

Focal Researcher     Coauthors of Focal Researcher (1st degree)     Coauthors of Coauthors (2nd degree)

Note: click on a node to go to a researcher's profile page. Drag a node to reallocate. Number on the edge is the number of co-authorships.

Carr, Houston H. 1 Johnston, Allen C. 1 Johnston, Allen 1 Loch, Karen D. 1
Siponen, Mikko 1 Willison, Robert 1
fear appeals 2 information systems security 2 Information security 2 protection motivation theory 2
Threats 2 computer laws 1 computer security 1 computer viruses 1
coping appraisal 1 countermeasures 1 deterrence 1 Disgruntlement 1
deterrence theory 1 Expressive Crimes 1 information resources management 1 information assurance 1
insider 1 Instrumental Crimes 1 motivation 1 neutralization 1
organizational justice 1 persuasive communication 1 responses 1 rhetoric 1
sanctions 1 threat appraisal 1

Articles (4)

An Enhanced Fear Appeal Rhetorical Framework: Leveraging Threats to the Human Asset Through Sanctioning Rhetoric (MIS Quarterly, 2015)
Authors: Abstract:
    Fear appeals, which are used widely in information security campaigns, have become common tools in motivating individual compliance with information security policies and procedures. However, empirical assessments of the effectiveness of fear appeals have yielded mixed results, leading IS security scholars and practitioners to question the validity of the conventional fear appeal framework and the manner in which fear appeal behavioral modeling theories, such as protection motivation theory (PMT), have been applied to the study of information security phenomena. We contend that the conventional fear appeal rhetorical framework is inadequate when used in the context of information security threat warnings and that its primary behavioral modeling theory, PMT, has been misspecified in the extant information security research. Based on these arguments, we propose an enhanced fear appeal rhetorical framework that leverages sanctioning rhetoric as a secondary vector of threats to the human asset, thereby adding the dimension of personal-relevance threat, which is critically absent from previous fear appeal frameworks and PMT-grounded security studies. Following a hypothetical scenario research approach involving the employees of a Finnish city government, we validate the efficacy of the enhanced fear appeal framework and determine that informal sanction rhetoric effectively enhances conventional fear appeals, thus providing a significant positive influence on compliance intentions.
BEYOND DETERRENCE: AN EXPANDED VIEW OF EMPLOYEE COMPUTER ABUSE. (MIS Quarterly, 2013)
Authors: Abstract:
    Recent academic investigations of computer security policy violations have largely focused on non-malicious noncompliance due to poor training, low employee motivation, weak affective commitment, or individual oversight. Established theoretical foundations applied to this domain have related to protection motivation, deterrence, planned behavior, self-efficacy, individual adoption factors, organizational commitment, and other individual cognitive factors. But another class of violation demands greater research emphasis: the intentional commission of computer security policy violation, or insider computer abuse. Whether motivated by greed, disgruntlement, or other psychological processes, this act has the greatest potential for loss and damage to the employer. We argue the focus must include not only the act and its immediate antecedents of intention (to commit computer abuse) and deterrence (of the crime), but also phenomena which temporally precede these areas. Specifically, we assert the need to consider the thought processes of the potential offender and how these are influenced by the organizational context, prior to deterrence. We believe the interplay between thought processes and this context may significantly impact the efficacy of IS security controls, specifically deterrence safeguards. Through this focus, we extend the Straub and Welke (1998) security action cycle framework and propose three areas worthy of empirical investigation-techniques of neutralization(rationalization), expressive/instrumental criminal motivations, and disgruntlement as a result of perceptions of organizational injustice-and propose questions for future research in these areas.
FEAR APPEALS AND INFORMATION SECURITY BEHAVIORS: AN EMPIRICAL STUDY. (MIS Quarterly, 2010)
Authors: Abstract:
    Information technology executives strive to align the actions of end users with the desired security posture of management and of the firm through persuasive communication. In many cases, some element of fear is incorporated within these communications. However, within the context of computer security and information assurance, it is not yet clear how these fear-inducing arguments, known as fear appeals, will ultimately impact the actions of end users. The purpose of this study is to investigate the influence of fear appeals on the compliance of end users with recommendations to enact specific individual computer security actions toward the mitigation of threats. An examination was performed that culminated in the development and testing of a conceptual model representing an infusion of technology adoption and fear appeal theories. Results of the study suggest that fear appeals do impact end user behavioral intentions to comply with recommended individual acts of security, but the impact is not uniform across all end users. It is determined in part by perceptions of self-efficacy, response efficacy, threat severity, and social influence. The findings of this research contribute to information systems security research, human--computer interaction, and organizational communication by revealing a new paradigm in which IT users form perceptions of the technology, not on the basis of performance gains, but on the basis of utility for threat mitigation.
Threats to Information Systems: Today's Reality, Yesterday's Understanding. (MIS Quarterly, 1992)
Authors: Abstract:
    In formation systems security remains high on the list of key issues facing information systems executives. Traditional concerns range from forced entry into computer and storage rooms to destruction by fire, earthquake, flood, and hurricane. Recent attention focuses on protecting information systems and data from accidental or intentional unauthorized access, disclosure, modification, or destruction. The consequences of these events can range from degraded or disrupted service to customers to corporate failure. This article reports on a study investigating MIS executives' concern about a variety of threats. A relatively new threat, computer viruses, was found to be a particular concern. The results highlight a gap between the use of modern technology and the understanding of the security implications inherent in its use. Many of responding information systems managers have migrated their organizations into the highly interconnected environment of modern technology but continue to view threats from a perspective of a pre-connectivity era. They expose theft firms to unfamiliar risks of which they are unaware, refuse to acknowledge, or are often poorly equipped to manage.