2010
DOI: 10.2307/25750691
|View full text |Cite
|
Sign up to set email alerts
|

Fear Appeals and Information Security Behaviors: An Empirical Study

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

29
671
4
1

Year Published

2011
2011
2022
2022

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 890 publications
(705 citation statements)
references
References 58 publications
29
671
4
1
Order By: Relevance
“…users deciding to comply with security policies, users intending to take preventive actions against spyware threats) (Johnston and Warkentin, 2010), this study has introduced PMT into the realm of personal information privacy. It could thus be argued that the current study involves risky behavior at a more personal level for the individual engaging in the risk assessment.…”
Section: Discussionmentioning
confidence: 99%
See 1 more Smart Citation
“…users deciding to comply with security policies, users intending to take preventive actions against spyware threats) (Johnston and Warkentin, 2010), this study has introduced PMT into the realm of personal information privacy. It could thus be argued that the current study involves risky behavior at a more personal level for the individual engaging in the risk assessment.…”
Section: Discussionmentioning
confidence: 99%
“…However, PMT has seldom been applied to individuals' risky use of the Internet and information technology, with exceptions including recent studies on computer users' decisions to employ virus protection (Lee et al, 2008) and to regularly back up work-related data (Boss and Galletta, 2008), employees' compliance with company security policies (Pahnila et al, 2007;Johnston and Warkentin, 2010), and the stress coping mechanisms for IT professionals (Tsai et al, 2007). Other recent studies have utilized some of the same health-related constructs modeled in PMT to help explain security consciousness in users (Ng et al, 2009).…”
Section: What Factors Influence An Individual To Post Personal Informmentioning
confidence: 99%
“…The message included a coping strategy, since this is a necessary adjunct to a risk appeal [4], [27]. b) Norms: Norms have been shown to be effective in promoting desirable behaviour [52], as they give information about what is typically approved or disapproved of in a society [14].…”
Section: ) Excluded Categoriesmentioning
confidence: 99%
“…Two other questions were used to gauge respondents' evaluation of the clarity of the voter communication [42], and their ability to verify a vote [27].…”
Section: ) Why We Used a Surveymentioning
confidence: 99%
“…Many marketers have stayed away from using fear appeals because it is difficult to use them effectively (Peng, 2006;LaTour & Tanner, 2003). Moreover, the effectiveness of fear appeals is not uniform, since other constructs that are connected with fear appeals -especially perceptions of self-efficacy ("I can do this"), response efficacy ("This can be done"), threat ("Something bad will happen unless you act this way"), severity ("You could even die"), and social influence ("Other people act this way") -influence an individual's behaviour (Johnston & Warkentin, 2010). Other forces as well influence a person's behaviour, such as one's own experience and one's culture.…”
Section: Introductionmentioning
confidence: 99%