2015
DOI: 10.25300/misq/2015/39.1.06
|View full text |Cite
|
Sign up to set email alerts
|

An Enhanced Fear Appeal Rhetorical Framework: Leveraging Threats to the Human Asset Through Sanctioning Rhetoric

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

5
235
2

Year Published

2015
2015
2021
2021

Publication Types

Select...
4
4
1

Relationship

2
7

Authors

Journals

citations
Cited by 333 publications
(242 citation statements)
references
References 89 publications
5
235
2
Order By: Relevance
“…Indeed, such articles also appear in the best IS journals. Examples in MIS Quarterly include action research papers (Puhakainen & Siponen, 2010;Straub & Welke 1998) and a field experiment (Johnston, Warkentin, & Siponen, 2015). The Journal of the Association for Information Systems (JAIS) has also published ISS research carried out in a company setting (Siponen, Baskerville, & Heikka, 2006).…”
Section: Some Outcomes Of the Current Iss Researchmentioning
confidence: 99%
See 1 more Smart Citation
“…Indeed, such articles also appear in the best IS journals. Examples in MIS Quarterly include action research papers (Puhakainen & Siponen, 2010;Straub & Welke 1998) and a field experiment (Johnston, Warkentin, & Siponen, 2015). The Journal of the Association for Information Systems (JAIS) has also published ISS research carried out in a company setting (Siponen, Baskerville, & Heikka, 2006).…”
Section: Some Outcomes Of the Current Iss Researchmentioning
confidence: 99%
“…Examples of such applied research include Puhakainen and Siponen (2010), Warkentin and Johnston (2010), and Johnston et al (2015). Siponen and Puhkainen reported multicycle action research interventions that improved employees' e-mail encryption practices at a small company, while Warkentin and Johnston and Johnston et al described online campaigns using fear appeals to scare users into better password security, avoiding insecure use of USBs, and locking their computers.…”
Section: Applied Research Examplesmentioning
confidence: 99%
“…Human factors play a crucial role in cybersecurity [60], and recent analyses show that employees are often the weakest link in an organization with regard to cybersecurity [61]. As a result, organizations are urged to consider investing in cybersecurity training as a top priority [62], and to encourage protection-motivated behaviors [63,64]. These recommendations mean nothing if organizations fail to understand the impacts of delays and fall into the trap of shorttermism.…”
Section: Complex Systems and Delays In Building Cybersecurity Capabilmentioning
confidence: 99%
“…The key assumption is that behavior is driven by a rational decision process based on costs and benefits of the act to the focal actor. Other studies used protection motivation theory (PMT) and reactance theory (RT) as determinants to users' compliance with organizational information security policies (ISP) (e.g., [12], [18], [19]). PMT departure point assumes individual's desire to protect oneself and the organization, while RT assumes that users are likely to comply with security policies they perceive as justifiable (e.g., [16], [24]).…”
Section: Introductionmentioning
confidence: 99%