Security concerns of system users: a study of perceptions of the adequacy of security
Information and Management
Explaining the role of user participation in information system use
Management Science
Communication and Trust in Global Virtual Teams
Organization Science
Spyware: a little knowledge is a wonderful thing
Communications of the ACM - Spyware
A framework for spyware assessment
Communications of the ACM - Spyware
Busting the ghost in the machine
Communications of the ACM - Spyware
Trust and TAM in online shopping: an integrated model
MIS Quarterly
Influencing mental models of security: a research agenda
Proceedings of the 2011 workshop on New security paradigms workshop
Fighting identity theft: The coping perspective
Decision Support Systems
Motivating IS security compliance: Insights from Habit and Protection Motivation Theory
Information and Management
Exploring perceived persuasiveness of a behavior change support system: a structural model
PERSUASIVE'12 Proceedings of the 7th international conference on Persuasive Technology: design for health and safety
Journal of Organizational and End User Computing
Modifying smartphone user locking behavior
Proceedings of the Ninth Symposium on Usable Privacy and Security
A Composite Framework for Behavioral Compliance with Information Security Policies
Journal of Organizational and End User Computing
A Composite Framework for Behavioral Compliance with Information Security Policies
Journal of Organizational and End User Computing
Modeling the Impact of Biometric Security on Millennials' Protection Motivation
Journal of Organizational and End User Computing
End User Security Training for Identification and Access Management
Journal of Organizational and End User Computing
Employees' adherence to information security policies: An exploratory field study
Information and Management
Hi-index | 0.00 |
Information technology executives strive to align the actions of end users with the desired security posture of management and of the firm through persuasive communication. In many cases, some element of fear is incorporated within these communications. However, within the context of computer security and information assurance, it is not yet clear how these fear-inducing arguments, known as fear appeals, will ultimately impact the actions of end users. The purpose of this study is to investigate the influence of fear appeals on the compliance of end users with recommendations to enact specific individual computer security actions toward the mitigation of threats. An examination was performed that culminated in the development and testing of a conceptual model representing an infusion of technology adoption and fear appeal theories. Results of the study suggest that fear appeals do impact end user behavioral intentions to comply with recommended individual acts of security, but the impact is not uniform across all end users. It is determined in part by perceptions of self-efficacy, response efficacy, threat severity, and social influence. The findings of this research contribute to information systems security research, human-computer interaction, and organizational communication by revealing a new paradigm in which IT users form perceptions of the technology, not on the basis of performance gains, but on the basis of utility for threat mitigation.