Protection motivation theory in information systems security research: A review of the past and a road map for the future

S Haag, M Siponen, F Liu - ACM SIGMIS Database: the DATABASE for …, 2021 - dl.acm.org
Protection motivation theory (PMT) is one of the most commonly used theories to examine
information security behaviors. Our systematic review of the application of PMT in …

The cybersecurity behavioral research: A tertiary study

NF Khan, A Yaqoob, MS Khan, N Ikram - Computers & Security, 2022 - Elsevier
Context Cybersecurity has seen a rise in behavioral investigation during the past decades.
This includes studies being carried out at the primary as well as secondary levels. There are …

IS professionals' information security behaviors in Chinese IT organizations for information security protection

X Ma - Information Processing & Management, 2022 - Elsevier
Continued integration of technology for the purpose of connecting and exchanging data with
other devices and systems over the Internet exposes information security (IS) to growing …

The effectiveness of abstract versus concrete fear appeals in information security

SW Schuetz, P Benjamin Lowry, DA Pienta… - Journal of …, 2020 - Taylor & Francis
Information security (ISec) is a pervasive concern of individuals, organizations, and
governments. To encourage individuals to engage in and learn about secure behaviors …

[HTML][HTML] VISTA: An inclusive insider threat taxonomy, with mitigation strategies

K Renaud, M Warkentin, G Pogrebna… - Information & …, 2024 - Elsevier
Insiders have the potential to do a great deal of damage, given their legitimate access to
organisational assets and the trust they enjoy. Organisations can only mitigate insider …

Examining the differential effectiveness of fear appeals in information security management using two-stage meta-analysis

PB Lowry, GD Moody, S Parameswaran… - Journal of …, 2023 - Taylor & Francis
Most of the information security management research involving fear appeals is guided by
either protection motivation theory or the extended parallel processing model. Over time …

Redefining threat appraisals of organizational insiders and exploring the moderating role of fear in cyberattack protection motivation

S Vrhovec, A Mihelič - Computers & Security, 2021 - Elsevier
Increasingly sophisticated cyberattacks often systematically target organizational insiders.
Their motivation for self-protection has therefore an important role in cybersecurity of …

The design and evaluation of a theory-based intervention to promote security behaviour against phishing

J Jansen, P van Schaik - International Journal of Human-Computer Studies, 2019 - Elsevier
This study examined the impact of fear appeal messages on user cognitions, attitudes,
behavioural attentions and precautionary behaviour regarding online information-sharing to …

Perceived argument quality's effect on threat and coping appraisals in fear appeals: An experiment and exploration of realism check heuristics

JD Wall, M Warkentin - Information & Management, 2019 - Elsevier
Persuasion is key to encourage compliance with information security policies through fear
appeals, though research has not examined how the perceived quality of their arguments …

Examining the role of stress and information security policy design in information security compliance behaviour: An experimental study of in-task behaviour

S Trang, I Nastjuk - Computers & Security, 2021 - Elsevier
Based on the transactional theory of stress, the study sets out to explore the relationship
between occupational stress, information security policy (ISP) designs, and security …