Protection Motivation Theory in Information Systems Security Research : A Review of the Past and a Road Map for the Future
Haag, S., Siponen, M., & Liu, F. (2021). Protection Motivation Theory in Information Systems Security Research : A Review of the Past and a Road Map for the Future. Data base for advances in information systems, 52(2), 25-67. https://doi.org/10.1145/3462766.3462770
Julkaistu sarjassa
Data base for advances in information systemsPäivämäärä
2021Tekijänoikeudet
© 2021 ACM
Protection motivation theory (PMT) is one of the most commonly used theories to examine information security behaviors. Our systematic review of the application of PMT in information systems (IS) security and the comparison with its application for decades in psychology identified five categories of important issues that have not yet been examined in IS security research. Discussing these issues in terms of why they are relevant and important for IS security, and to what extent IS research has not considered them, offers new research opportunities associated with the study of PMT and IS security threats. We suggest how future studies can approach each of the open issues to provide a new road map for quantitative and qualitative IS scholars.
Julkaisija
ACMISSN Hae Julkaisufoorumista
1532-0936Asiasanat
Julkaisu tutkimustietojärjestelmässä
https://converis.jyu.fi/converis/portal/detail/Publication/35352163
Metadata
Näytä kaikki kuvailutiedotKokoelmat
Lisenssi
Samankaltainen aineisto
Näytetään aineistoja, joilla on samankaltainen nimeke tai asiasanat.
-
Protection Motivation Theory in Information Security Behavior Research : Reconsidering the Fundamentals
Siponen, Mikko; Rönkkö, Mikko; Fufan, Liu; Haag, Steffi; Laatikainen, Gabriella (Association for Information Systems, 2024)Scholars commonly use protection motivation theory (PMT) by Rogers to examine information systems (IS) security behaviors and behavioral intentions. A recent, influential paper by Boss, Galletta, Lowry, Moody, and Polak ... -
Understanding the inward emotion-focused coping strategies of individual users in response to mobile malware threats
Xin, Tong; Siponen, Mikko; Chen, Sihua (Taylor & Francis, 2022)According to coping theory, individuals cope with information system threats by adopting either problem-focused coping (PFC) or emotion-focused coping (EFC). However, little is known about EFC in the information security ... -
Common Misunderstandings of Deterrence Theory in Information Systems Research and Future Research Directions
Siponen, Mikko; Soliman, Wael; Vance, Anthony (ACM, 2022)In the 1980s, information systems (IS) borrowed deterrence theory (DT) from the field of criminology to explain information security behaviors (or intention). Today, DT is among the most commonly used theories in IS security ... -
Do SETA Interventions Change Security Behavior? : A Literature Review
Nwachukwu, Uchechukwu; Vidgren, Jiri; Niemimaa, Marko; Järveläinen, Jonna (University of Hawaiʻi at Mānoa, 2023)Information security education, training, and awareness (SETA) are approaches to changing end-users’ security behavior. Research into SETA has conducted interventions to study the effects of SETA on security behavior. ... -
User acceptance & use of Sisu system in the University of Jyväskylä
Laukka, Michael; Huotari, Samuel (2020)Sisu-järjestelmä korvaa vaiheittain Jyväskylän yliopistossa käytöstä väistyvän Korppi-järjestelmän. Opintotietojärjestelmä on kriittinen työskentely-ympäristö niin opiskelijoille kuin yliopiston työntekijöille, joten ...
Ellei toisin mainittu, julkisesti saatavilla olevia JYX-metatietoja (poislukien tiivistelmät) saa vapaasti uudelleenkäyttää CC0-lisenssillä.