Author List: Johnston, Allen; Warkentin, Merrill E.; Siponen, Mikko;
MIS Quarterly, 2015, Volume 39, Issue 1, Page 113-134.
Fear appeals, which are used widely in information security campaigns, have become common tools in motivating individual compliance with information security policies and procedures. However, empirical assessments of the effectiveness of fear appeals have yielded mixed results, leading IS security scholars and practitioners to question the validity of the conventional fear appeal framework and the manner in which fear appeal behavioral modeling theories, such as protection motivation theory (PMT), have been applied to the study of information security phenomena. We contend that the conventional fear appeal rhetorical framework is inadequate when used in the context of information security threat warnings and that its primary behavioral modeling theory, PMT, has been misspecified in the extant information security research. Based on these arguments, we propose an enhanced fear appeal rhetorical framework that leverages sanctioning rhetoric as a secondary vector of threats to the human asset, thereby adding the dimension of personal-relevance threat, which is critically absent from previous fear appeal frameworks and PMT-grounded security studies. Following a hypothetical scenario research approach involving the employees of a Finnish city government, we validate the efficacy of the enhanced fear appeal framework and determine that informal sanction rhetoric effectively enhances conventional fear appeals, thus providing a significant positive influence on compliance intentions.
Keywords: Fear appeals; protection motivation theory; deterrence theory; information security; threats; responses; sanctions; rhetoric
Algorithm:

List of Topics

#56 0.427 information security interview threats attacks theory fear vulnerability visibility president vulnerabilities pmt behaviors enforcement appeals protection insiders attackers precautions vice
#125 0.105 framework model used conceptual proposed given particular general concept frameworks literature developed develop providing paper developing guidelines concepts appropriate set
#186 0.102 security information compliance policy organizations breach disclosure policies deterrence breaches incidents results study abuse managed isp violations based comply protection
#209 0.102 results study research information studies relationship size variables previous variable examining dependent increases empirical variance accounting independent demonstrate important addition
#138 0.063 use question opportunities particular identify information grammars researchers shown conceptual ontological given facilitate new little constraints dual answer post-adoption theory
#92 0.056 equity conventional punishment justice wisdom focus behavior fairness compliance suggest theory significant certainty misuse reward settings behavioral mandatory drawing widely