1
|
Jiang R, Zhang J. The impact of work pressure and work completion justification on intentional nonmalicious information security policy violation intention. Comput Secur 2023; 130:103253. [PMID: 37091524 PMCID: PMC10079594 DOI: 10.1016/j.cose.2023.103253] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 09/05/2022] [Revised: 02/23/2023] [Accepted: 04/05/2023] [Indexed: 04/25/2023]
Abstract
As businesses have had to change how they operate due to the coronavirus pandemic, the need for remote work has risen. With the continuous advancements in technology and increases in typical job demands, employees need to increase their work productivity beyond regular work hours in the office. This type of work environment creates even more opportunities for security breaches due to employees intentionally violating information security policy violations. Although explicitly prohibited by information security policies (ISP), organizations have observed that employees bring critical data out of the office to complete their work responsibilities remotely. Consequently, developing a deeper understanding of how work pressure may influence employees to violate ISPs intentionally is crucial for organizations to protect their critical information better. Based upon the fraud triangle theory, this study proposes the opportunity to copy critical data, work pressure, and work completion justification as the primary motivational factors behind why employees copy critical company data to unsecured storage devices to work at home. A survey was conducted of 207 employees from a marketing research firm. The results suggest that opportunity, work pressure, and work completion justification are positively related to nonmalicious ISP violation intentions. Furthermore, the interaction effect between work completion justification and work pressure on the ISP violation intention is significant and positive. This study provides new insights into our understanding of the roles of work pressure and work completion justification on intentional nonmalicious ISP violation behaviors.
Collapse
Affiliation(s)
- Randi Jiang
- School of Accounting, Grand Valley State University, MI, United States
| | - Jianru Zhang
- School of Management, Xi'an Jiaotong University, Xi'an, China
| |
Collapse
|
2
|
Mady A, Gupta S, Warkentin M. The effects of knowledge mechanisms on employees' information security threat construal. INFORMATION SYSTEMS JOURNAL 2023. [DOI: 10.1111/isj.12424] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 01/11/2023]
Affiliation(s)
- Ashraf Mady
- University of North Georgia Dahlonega Georgia USA
| | | | | |
Collapse
|
3
|
Explaining information seeking intentions: Insights from a Slovenian social engineering awareness campaign. Comput Secur 2022. [DOI: 10.1016/j.cose.2022.103038] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 12/03/2022]
|
4
|
Ebert N, Ackermann KA, Bearth A. When information security depends on font size: how the saliency of warnings affects protection behavior. JOURNAL OF RISK RESEARCH 2022; 26:233-255. [PMID: 36896244 PMCID: PMC9988306 DOI: 10.1080/13669877.2022.2142952] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Figures] [Subscribe] [Scholar Register] [Received: 07/05/2022] [Revised: 10/07/2022] [Accepted: 10/24/2022] [Indexed: 06/18/2023]
Abstract
Prior research on how to improve the effectiveness of information security warnings has predominantly focused on either the informational content of warnings or their visual saliency. In an online experiment (N = 1'486), we disentangle the effect of both manipulations and demonstrate that both factors simultaneously influence decision making. Our data indicate that the proportion of people who engage in protection behavior can be increased by roughly 65% by making a particular warning message more visually salient (i.e. a more conspicuous visual design is used). We also show that varying the message's saliency can make people behave very differently when confronted with the same threat or behave very similarly when confronted with threats that differ widely in terms of severity of outcomes. Our results suggest that the visual design of a warning may warrant at least as much attention as the informational content that the warning message conveys.
Collapse
Affiliation(s)
- Nico Ebert
- Center for Process Management & Information Security, Institute of Business Information Technology (IWI), ZHAW SML, Winterthur, Switzerland
| | - Kurt A. Ackermann
- Center for Behavioral Insights & Pricing, Institute of Marketing Management (IMM), ZHAW SML
| | - Angela Bearth
- Consumer Behavior, Institute for Environmental Decisions (IED), ETH Zurich
| |
Collapse
|
5
|
Wang Q, Zhou F, Zhang W, Tang C. A study of parental decision-making over the vaccination of girls, based on the protection motivation theory and the elaboration likelihood model. Front Public Health 2022; 10:1024399. [PMID: 36438257 PMCID: PMC9691002 DOI: 10.3389/fpubh.2022.1024399] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.3] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 08/21/2022] [Accepted: 10/27/2022] [Indexed: 11/12/2022] Open
Abstract
This study proposed a new theoretical framework that combines the protection motivation theory and the elaboration likelihood model to examine how health information processing patterns influence parents' vaccination decision-making on behalf of their daughters. Based on survey data from 359 parents of girls aged 9-15, we tested the theoretical model by using structural equation model. The results showed that the central route, represented by information quality, affected the parents' perceptions of HPV severity and susceptibility; the peripheral route, represented by source credibility, influenced their perceptions of HPV severity, HPV susceptibility, vaccine response efficacy, and secondary risks. Also, Chinese parents' perceptions of HPV vaccines, not perceptions of HPV, affected their intention to vaccinate their daughters. The study suggests in addition to improving the quality of health information, the peripheral route, such as the release of vaccination photos, public immunization evaluations, and case narratives, should also be used to change parents' perceptions. Besides, reducing the traditional stigmatization of female sexuality and improving parents' understanding of the new generation's sexual attitudes will increase parents' intention to have their daughters vaccinated against HPV.
Collapse
Affiliation(s)
- Qi Wang
- School of Industrial Design, Hubei University of Technology, Wuhan, China
| | - Fangzhou Zhou
- Institute of Communication Studies, Communication University of China, Beijing, China
| | - Wen Zhang
- School of Journalism and Culture Communication, Zhongnan University of Economics and Law, Wuhan, China,*Correspondence: Wen Zhang
| | - Chenjin Tang
- School of Journalism and Culture Communication, Zhongnan University of Economics and Law, Wuhan, China
| |
Collapse
|
6
|
Seeking Rhetorical Validity in Fear Appeal Research: An Application of Rhetorical Theory. Comput Secur 2022. [DOI: 10.1016/j.cose.2022.103020] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/23/2022]
|
7
|
Hassandoust F, Subasinghage M, Johnston AC. A neo-institutional perspective on the establishment of information security knowledge sharing practices. INFORMATION & MANAGEMENT 2022. [DOI: 10.1016/j.im.2021.103574] [Citation(s) in RCA: 2] [Impact Index Per Article: 0.7] [Reference Citation Analysis] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 11/05/2022]
|
8
|
Chen Y, Galletta DF, Lowry PB, Luo X(R, Moody GD, Willison R. Understanding Inconsistent Employee Compliance with Information Security Policies Through the Lens of the Extended Parallel Process Model. INFORMATION SYSTEMS RESEARCH 2021. [DOI: 10.1287/isre.2021.1014] [Citation(s) in RCA: 14] [Impact Index Per Article: 3.5] [Reference Citation Analysis] [Abstract] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/20/2022]
Abstract
A key approach in many organizations to address the myriad of information security threats is encouraging employees to better understand and comply with information security policies (ISPs). Despite a significant body of academic research in this area, a commonly held but questionable assumption in these studies is that noncompliance simply represents the opposite of compliance. Hence, explaining compliance is only half of the story, and there is a pressing need to understand the causes of noncompliance, as well. If organizational leaders understood what leads a normally compliant employee to become noncompliant, future security breaches might be avoided or minimized. In this study, we found that compliant and noncompliant behaviors can be better explained by uncovering actions that focus not only on efficacious coping behaviors, but also those that focus on frustrated users who must sometimes cope with emotions, too. Employees working from a basis of emotion-focused coping are unable to address the threat and, feeling overwhelmed, focus only on controlling their emotions, merely making themselves feel better. Based on our findings, organizations can enhance their security by understanding the “tipping point” where employees’ focus likely changes from problem-solving to emotion appeasement, and instead push them into a more constructive direction.Yan Chen is an associate professor at Florida International University. She received her PhD in management information systems from University of Wisconsin–Milwaukee. Her research focuses on information security management, online fraud, privacy, and social media. She has published more than 30 research papers in refereed academic journals and conference proceedings.Dennis F. Galletta is a LEO awardee, fellow, and former president of the Association for Information Systems and professor at University of Pittsburgh since 1985. He has published 108 articles and four books. He is a senior editor at MIS Quarterly and an editorial board member at the Journal of Management Information Systems, and has been on several other boards.Paul Benjamin Lowry is the Suzanne Parker Thornhill Chair Professor in Business Information Technology at the Pamplin College of Business at Virginia Tech. He has published more than 135 journal articles. His research areas include organizational and behavioral security and privacy; online deviance and harassment, and computer ethics; human–computer interaction, social media, and gamification; and decision sciences, innovation, and supply chains.Xin (Robert) Luo is Endowed Regent’s Professor and full professor of MIS at the University of New Mexico. His research has appeared in leading information systems journals, and he serves as an associate editor for the Journal of the Association for Information Systems, Decision Sciences Journal, Information & Management, Electronic Commerce Research, and the Journal of Electronic Commerce Research.Gregory D. Moody is currently Lee Professor of Information Systems at the University of Nevada Las Vegas, and director of the cybersecurity graduate program. His interests include information systems security and privacy, e-business, and human–computer interaction. He is currently a senior editor for the Information Systems Journal and Transactions on Human-Computer Interaction.Robert Willison is a professor of management at Xi’an Jiaotong–Liverpool University. He received his PhD in information systems from the London School of Economics. His research focuses on insider computer abuse, information security policy compliance/noncompliance, software piracy, and cyber-loafing. His research has appeared in refereed academic journals such as MIS Quarterly, Journal of the Association for Information Systems, Information Systems Journal, and others.
Collapse
Affiliation(s)
- Yan Chen
- College of Business, Florida International University, Miami, Florida 33199
| | - Dennis F. Galletta
- Katz Graduate School of Business, University of Pittsburgh, Pittsburgh, Pennsylvania 15260
| | | | - Xin (Robert) Luo
- Anderson School of Management, University of New Mexico, Albuquerque, New Mexico 87131
| | - Gregory D. Moody
- Lee Business School, University of Nevada, Las Vegas, Nevada 89154
| | - Robert Willison
- International Business School Suzhou, Xi’an Jiaotong–Liverpool University, Suzhou, Jiangsu Province 215123, P.R. China
| |
Collapse
|
9
|
Vrhovec S, Mihelič A. Redefining threat appraisals of organizational insiders and exploring the moderating role of fear in cyberattack protection motivation. Comput Secur 2021. [DOI: 10.1016/j.cose.2021.102309] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.3] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 02/02/2023]
|
10
|
Can financial incentives help with the struggle for security policy compliance? INFORMATION & MANAGEMENT 2021. [DOI: 10.1016/j.im.2021.103447] [Citation(s) in RCA: 3] [Impact Index Per Article: 0.8] [Reference Citation Analysis] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 11/21/2022]
|
11
|
Davis J, Agrawal D, Guo X. Enhancing users’ security engagement through cultivating commitment: the role of psychological needs fulfilment. EUR J INFORM SYST 2021. [DOI: 10.1080/0960085x.2021.1927866] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 10/21/2022]
|
12
|
Haag S, Siponen M, Liu F. Protection Motivation Theory in Information Systems Security Research. DATA BASE FOR ADVANCES IN INFORMATION SYSTEMS 2021. [DOI: 10.1145/3462766.3462770] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 10/21/2022]
Abstract
Protection motivation theory (PMT) is one of the most commonly used theories to examine information security behaviors. Our systematic review of the application of PMT in information systems (IS) security and the comparison with its application for decades in psychology identified five categories of important issues that have not yet been examined in IS security research. Discussing these issues in terms of why they are relevant and important for IS security, and to what extent IS research has not considered them, offers new research opportunities associated with the study of PMT and IS security threats. We suggest how future studies can approach each of the open issues to provide a new road map for quantitative and qualitative IS scholars.
Collapse
Affiliation(s)
- Steffi Haag
- Friedrich-Alexander University Erlangen- Nürnberg
| | | | | |
Collapse
|
13
|
Jaeger L, Eckhardt A, Kroenung J. The role of deterrability for the effect of multi-level sanctions on information security policy compliance: Results of a multigroup analysis. INFORMATION & MANAGEMENT 2021. [DOI: 10.1016/j.im.2020.103318] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.3] [Reference Citation Analysis] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 10/24/2022]
|
14
|
Tang Z, Miller AS, Zhou Z, Warkentin M. Does government social media promote users' information security behavior towards COVID-19 scams? Cultivation effects and protective motivations. GOVERNMENT INFORMATION QUARTERLY 2021; 38:101572. [PMID: 35719729 PMCID: PMC9188430 DOI: 10.1016/j.giq.2021.101572] [Citation(s) in RCA: 31] [Impact Index Per Article: 7.8] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Journal Information] [Submit a Manuscript] [Subscribe] [Scholar Register] [Received: 07/08/2020] [Revised: 01/14/2021] [Accepted: 01/14/2021] [Indexed: 11/18/2022]
Abstract
Cybercriminals are taking advantage of the COVID-19 outbreak and offering COVID-19-related scams to unsuspecting people. Currently, there is a lack of studies that focus on protecting people from COVID-19-related cybercrimes. Drawing upon Cultivation Theory and Protection Motivation Theory, we develop a research model to examine the cultivation effect of government social media on peoples' information security behavior towards COVID-19 scams. We employ structural equation modeling to analyze 240 survey responses collected from social media followers of government accounts. Our results suggest that government social media account followers' participation influences their information security behavior through perceived severity, perceived vulnerability, self-efficacy, and response efficacy. Our study highlights the importance of government social media for information security management during crises.
Collapse
Affiliation(s)
- Zhenya Tang
- College of Business, Mississippi State University, Mississippi State, MS 39762, United States
| | - Andrew S Miller
- College of Business, Mississippi State University, Mississippi State, MS 39762, United States
| | - Zhongyun Zhou
- School of Economics and Management, Tongji University, 1500 Siping Road, Shanghai, China
| | - Merrill Warkentin
- College of Business, Mississippi State University, Mississippi State, MS 39762, United States
| |
Collapse
|
15
|
Schuetz SW, Benjamin Lowry P, Pienta DA, Bennett Thatcher J. The Effectiveness of Abstract Versus Concrete Fear Appeals in Information Security. J MANAGE INFORM SYST 2020. [DOI: 10.1080/07421222.2020.1790187] [Citation(s) in RCA: 11] [Impact Index Per Article: 2.2] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 10/23/2022]
Affiliation(s)
- Sebastian W. Schuetz
- Department of Information Systems and Business Analytics, College of Business, Florida International University , Miami, FL, USA
| | - Paul Benjamin Lowry
- Department of Business Information Technology, Pamplin College of Business , Virginia Tech, Blacksburg, VA, USA
| | | | | |
Collapse
|
16
|
Integrating elaboration likelihood model and herd theory in information security message persuasiveness. Comput Secur 2020. [DOI: 10.1016/j.cose.2020.102009] [Citation(s) in RCA: 6] [Impact Index Per Article: 1.2] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/21/2022]
|
17
|
Orazi DC, Johnston AC. Running field experiments using Facebook split test. JOURNAL OF BUSINESS RESEARCH 2020; 118:189-198. [PMID: 32834210 PMCID: PMC7331542 DOI: 10.1016/j.jbusres.2020.06.053] [Citation(s) in RCA: 4] [Impact Index Per Article: 0.8] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Figures] [Subscribe] [Scholar Register] [Received: 06/13/2019] [Revised: 06/21/2020] [Accepted: 06/23/2020] [Indexed: 06/11/2023]
Abstract
Business researchers use experimental methods extensively due to their high internal validity. However, controlled laboratory and crowdsourcing settings often introduce issues of artificiality, data contamination, and low managerial relevance of the dependent variables. Field experiments can overcome these issues but are traditionally time- and resource-consuming. This primer presents an alternative experimental setting to conduct online field experiments in a time- and cost-effective way. It does so by introducing the Facebook A/B split test functionality, which allows for random assignment of manipulated variables embedded in ecologically-valid stimuli. We compare and contrast this method against laboratory settings and Amazon Mechanical Turk in terms of design flexibility, managerial relevance, data quality control, and sample representativeness. We then provide an empirical demonstration of how to set up, pre-test, run, and analyze FBST experiments.
Collapse
Affiliation(s)
| | - Allen C. Johnston
- Dept. of Info System, Statistics, & Management, University of Alabama, USA
| |
Collapse
|
18
|
Jensen ML, Durcikova A, Wright RT. Using susceptibility claims to motivate behaviour change in IT security. EUR J INFORM SYST 2020. [DOI: 10.1080/0960085x.2020.1793696] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.2] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 10/23/2022]
Affiliation(s)
- Matthew L. Jensen
- MIS Division, Price College of Business, University of Oklahoma, Norman, USA
| | - Alexandra Durcikova
- MIS Division, Price College of Business, University of Oklahoma, Norman, USA
| | - Ryan T Wright
- McIntire School of Commerce, University of Virginia, Charlottesville, USA
| |
Collapse
|
19
|
Bian J, Fu H, Jin J. Are We Sensitive to Different Types of Safety Signs? Evidence from ERPs. Psychol Res Behav Manag 2020; 13:495-505. [PMID: 32581609 PMCID: PMC7279717 DOI: 10.2147/prbm.s248947] [Citation(s) in RCA: 3] [Impact Index Per Article: 0.6] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 02/13/2020] [Accepted: 05/14/2020] [Indexed: 11/23/2022] Open
Abstract
Purpose Safety signs are widely used to deliver safety-related information. There are many different types of safety signs. Although previous studies have paid attention to the design and effectiveness of safety signs, little attention has been devoted to investigating how people process the information conveyed by different types of safety signs. Accordingly, the current study is intended to explore the neural mechanisms underlying people’s perception of different types of safety signs. Methods Three types of safety signs (prohibition, mandatory and warning signs) were used in the study. We employed questionnaire and event-related potentials (ERPs) experiment with an implicit paradigm to probe how people perceive these three types of safety signs. Results Behaviorally, warning signs induced a higher level of perceived hazard than prohibition signs and mandatory signs, and prohibition signs induced a higher level of perceived hazard than mandatory signs. At the brain level, prohibition signs and warning signs led to reduced P2 amplitudes compared to mandatory signs. In addition, warning signs elicited larger N2 and N4 amplitudes than prohibition signs and mandatory signs, and prohibition signs elicited larger N2 and N4 amplitudes than mandatory signs, coinciding with the behavioral results. Conclusion Different types of safety signs led to significant differences in individuals’ hazard perception. Based on the neural results, we suggest that the processing of safety signs consists of two stages: the rapid detection of hazard information (indicated by P2) and the conscious integration of hazard information in working memory (indicated by N2 and N4).
Collapse
Affiliation(s)
- Jun Bian
- Department of Traffic Information, Zhejiang Expressway Information Engineering Technology CO., LTD, Hangzhou, People's Republic of China.,ZEIET Research Institute, Hangzhou, People's Republic of China.,Neuromanagement Lab, Zhejiang University, Hangzhou, People's Republic of China
| | - Huijian Fu
- Department of Electronic Commerce, School of Management, Guangdong University of Technology, Guangzhou, People's Republic of China.,Academy of Neuroeconomics and Neuromanagement, Ningbo University, Ningbo, People's Republic of China
| | - Jia Jin
- Academy of Neuroeconomics and Neuromanagement, Ningbo University, Ningbo, People's Republic of China
| |
Collapse
|