Author List: Johnston, Allen C.; Warkentin, Merrill E.;
MIS Quarterly, 2010, Volume 34, Issue 3, Page 549-A4.
Information technology executives strive to align the actions of end users with the desired security posture of management and of the firm through persuasive communication. In many cases, some element of fear is incorporated within these communications. However, within the context of computer security and information assurance, it is not yet clear how these fear-inducing arguments, known as fear appeals, will ultimately impact the actions of end users. The purpose of this study is to investigate the influence of fear appeals on the compliance of end users with recommendations to enact specific individual computer security actions toward the mitigation of threats. An examination was performed that culminated in the development and testing of a conceptual model representing an infusion of technology adoption and fear appeal theories. Results of the study suggest that fear appeals do impact end user behavioral intentions to comply with recommended individual acts of security, but the impact is not uniform across all end users. It is determined in part by perceptions of self-efficacy, response efficacy, threat severity, and social influence. The findings of this research contribute to information systems security research, human--computer interaction, and organizational communication by revealing a new paradigm in which IT users form perceptions of the technology, not on the basis of performance gains, but on the basis of utility for threat mitigation.
Keywords: coping appraisal; countermeasures; fear appeals; information assurance; Information security; persuasive communication; protection motivation theory; threat appraisal
Algorithm:

List of Topics

#56 0.301 information security interview threats attacks theory fear vulnerability visibility president vulnerabilities pmt behaviors enforcement appeals protection insiders attackers precautions vice
#73 0.129 security threat information users detection coping configuration avoidance response firm malicious attack intrusion appraisal countermeasures benefit costs threats ability rate
#155 0.124 technology research information individual context acceptance use technologies suggests need better personality factors new traits telemedicine adoption examined does management
#134 0.103 users end use professionals user organizations applications needs packages findings perform specialists technical computing direct future selection ability help software
#93 0.078 performance results study impact research influence effects data higher efficiency effect significantly findings impacts empirical significant suggest outcomes better positive
#275 0.074 perceptions attitudes research study impacts importance perceived theory results perceptual perceive perception impact relationships basis significant positive reported common individuals