Browse > Article
http://dx.doi.org/10.15207/JKCS.2022.13.01.283

Information Security Importance Perception: Protection Motivation Theory Perpectives  

Yim, Myung-Seong (Department of Business Administration, Sahmyook University)
Publication Information
Journal of the Korea Convergence Society / v.13, no.1, 2022 , pp. 283-295 More about this Journal
Abstract
This study attempts to explore factors that influence the perception of importance of information security. Three possible exogenous variables including perceived certainty of punishment, perceived response cost, and acquiescense are suggested that are based on the protectiom motivation theory. As a result, we found followings. First, The perceived punishment certainty has a significant effect on the perceived importance of information security. Also, it influences a negative effect on acquiescence. Second, the response cost has a negative effect on the perceived importance of information security. In addition, the response cost positively effects on acquiescence. Finally, acquiescence negatively influences on the perceived importance of information security. The results show that, in order to increase the perceived importance of information security among employees, it is necessary to make them aware that a security violation can result in certain punishment. At the same time, organizations should also attempt to remove major obstacles accompanying security behaviors of employees. Finally, organizations encourage open communication relating to information security among employees.
Keywords
Protection Motivation Theory; Information Security; Acquiescence; Punishment; Response Cost; Perceived Importance;
Citations & Related Records
Times Cited By KSCI : 4  (Citation Analysis)
연도 인용수 순위
1 T. Chenoweth, R. Minch & T. Gattiker. (2009). Application of Protection Motivation Theory to Adoption of Protective Technologies. Proceedings of the 42nd Hawaii International Conference on System Sciences, 1-10.
2 D. L. Floyd, S. Prentice-Dunn & R. W. Rogers (2000). A Meta-Analysis of Research on Protection Motivation Theory. Journal of Applied Social Psychology, 30(2), 407-429. DOI : 10.1111/j.1559-1816.2000.tb02323.x   DOI
3 R. C. Hollinger & J. P. Clark. (1983). Deterrence in the Workplace: Perceived Certainty, Perceived Severity, and Employee Theft. Social Forces, 62(2), 398-418. DOI : 10.1093/sf/62.2.398   DOI
4 M. Warr. (1987). Fear of Victimization and Sensitivity to Risk. Journal of Quantitative Criminology, 3(1), 29-46. DOI : 10.1007/bf01065199   DOI
5 S. P. Roche, T. Wilson & J. T. Pickett. (2020). Perceived Control, Severity, Certainty, and Emotional Fear: Testing an Expanded Model of Deterrence. Journal of Research in Crime and Delinquency, 57(4), 493-531. DOI : 10.1177/0022427819888249   DOI
6 J. T. Pickett, S. P. Roche & G. Pogarsky. (2018). Toward a Bifurcated Theory of Emotional Deterrence. Criminology, 56(1), 27-58. DOI : 10.1111/1745-9125.12153   DOI
7 M. Knoll & R. van Dick. (2013). Do I Hear the Whistle...? A First Attempt to Measure Four Forms of Employee Silence and Their Correlates. Journal of Business Ethics, 113(2), 349-362. DOI : 10.1007/s10551-012-1308-4   DOI
8 F. Pajares & L. Graham. (1999). Self-efficacy, Motivation Constructs, and Mathematics Performance of Entering Middle School Students. Contemporary Educational Psychology, 24, 124-139. DOI : 10.1006/ceps.1998.0991   DOI
9 C. Fornell & D. F. Larcker. (1981). Evaluating Structural Equation Models with Unobservable Variables and Measurement Error. Journal of Marketing Research, 18(1), 39-50. DOI : 10.1177/002224378101800104   DOI
10 R. B. Kline. (2005).. Principles and Practice of Structural Equation Modeling. Guilford Press.
11 M. Cismaru, R. Cismaru, T. Ono & K. Nelson. (2011). "Act on Climate Change": An Application of Protection Motivation Theory. Social Marketing Quarterly, 17(3), 61-84. DOI : 10.1080/15245004.2011.595539   DOI
12 W. Rocha Flores, E. Antonsen & M. Ekstedt. (2014). Information Security Knowledge Sharing in Organizations: Investigating the Effect of Behavioral Information Security Governance and National Culture. Computers & Security, 43, 90-110. DOI : 10.1016/j.cose.2014.03.004   DOI
13 S. B. Bruns, I. Asanov, R. Bode, M. Dunger, C. Funk, S. M. Hassan, J. Hauschildt, D. Heinisch, K. Kempa, J. Konig, J. Lips, M. Verbeck, E. Wolkfschutz & G. Buenstorf. (2019). Reporting Errors and Biases in Published Empirical Findings: Evidence from Innovation Research. Research Policy, 48, 103796. DOI : 10.1016/j.respol.2019.05.005   DOI
14 M. J. Bayarri, D. J. Benjamin, J. O. Berger & T. M. Sellke. (2016). Rejection Odds and Rejection Ratios: A Proposal for Statistical Practice in Testing Hypotheses. Journal of Mathematical Psychology. 72, 90-103. DOI : 10.1016/j.jmp.2015.12.007   DOI
15 E. K. Pellegrini & T. A. Scandura. (2005). Construct Equivalence Across Groups: An Unexplored Issue in Mentoring Research. Educational and Psychological Measurement, 65(2), 323-335. DOI : 10.1177/0013164404268665   DOI
16 H. S. Tsai, M. Jiang, S. Alhabash, R. LaRose, N. J. Rifon & S. R. Cotten. (2016). Understanding Online Safety Behaviors: A Protection Motivation Theory Perspective. Computers & Security, 59, 138-150. DOI : 10.1016/j.cose.2016.02.009   DOI
17 S. Chai, S. Bagchi-Sen, C. Morrel, H. R. Rao & S. Upadhyaya. (2006). Role of Perceived Importance of Information Security: An Exploratory Study of Middle School Children's Information Security Behavior. Issues in Informing Science and Information Technology, 3, 127-135. DOI : 10.28945/2956   DOI
18 T. Herath & H. R. Rao. (2009). Encouraging Information Security Behaviors in Organizations: Role of Penalties, Pressures and Perceived Effectiveness. Decision Support Systems, 47, 154-165. DOI : 10.1016/j.dss.2009.02.005   DOI
19 T. Herath & H. Rao. (2009). Protection Motivation and Deterrence: A Framework for Security Policy Compliance in Organisations. European Journal of Information Systems, 18(2), 106-125. DOI : 10.1057/ejis.2009.6   DOI
20 M. S. Yim. (2018). An Exploratory Research on Factors Influence Perceived Compliance Cost and Information Security Awareness in Small and Medium Enterprise. Journal of the Korea Convergence Society, 9(9), 69-81. DOI : 10.15207/JKCS.2018.9.9.069   DOI
21 E Dincelli & S. Goel (2017). Can Privacy and Security be Friends? A Cultural Fraemwork to Differentiate Security and Privacy Behaviors on Online Social Networks. Proceedings of the 50th Hawaii International Conference on System Sciences, 4011-4020.
22 D. Russo & K. -J. Stol. (2021). PLS-SEM for Software Engineering Research: An Introduction and Survey. ACM Computing Surveys, 54(4), Article #1. DOI : 10.1145/3447580   DOI
23 E. Paoletti & N. E. Grulke. (2010). Ozone Exposure and Stomatal Sluggishness in Different Plant Physiognomic Classes. Environmental Pollution, 158, 2664-2671. DOI : 10.1016/j.envpol.2010.04.024   DOI
24 S. R. Boss, D. F. Galletta, F. B. Lowry, G. D. Moody & P. Polak. (2015). What Do Systems Users Have to Fear? Using Fear Appeals Engender Threats and Fear That Motivate Protective Security Behaviors. MIS Quarterly, 39(4), 837-864. DOI : 10.25300/MISQ/2015/39.4.5   DOI
25 I. M. Y. Woon, G. W. Tan & R. T. Low (2005). A Protection Motivation Theory Approach to Home Wireless Security. 26th International Conference on Information Systems, 367-380.
26 R. van Bravel, N. Rodriguez-Priego, J. Vila & P. Briggs. (2019). Using Protection Motivation Theory in the Design of Nudges to Improve Online Security Behavior. International Journal of Human-Computer Studies, 123, 29-39. DOI : 10.1016/j.ijhcs.2018.11.003   DOI
27 M. Workman, W. H. Bommer & D. Straub (2008). Security Lapses and the Omission of Information Security Measures: A Threat Control Model and Empirical Test. Computers in Human Behavior, 24, 2799-2816. DOI : 10.1016/j.chb.2008.04.005   DOI
28 T. Sommestad, H. Karlzen & J. Hallberg (2015). A Meta-Analysis of Studies on Protection Motivation Theory and Information Security Behaviour. International Journal of Information Security and Privacy, 9(1), 26-46. DOI : 10.4018/IJISP.2015010102   DOI
29 J. Kim, K. Yang, J. Min & B. White (2021). Hope, Fear, and Consumer Behavioral Change amid COVID-19: Application of Protection Motivation Theory. International Journal of Consumer Studies, Early View, 1-17. DOI : 10.1111/ijcs.12700   DOI
30 M. S. Yim. (2015). Factor Analysis for Exploratory Research in the Distribution Science Field. Journal of Distribution Science, 13(9), 103-112. DOI : 10.15722/jds.13.9.201509.103   DOI
31 S. -J. Chang, A. van Witteloostuijn & L. Eden (2010). From the Editors: Common Method Variance in International Business Research. Journal of International Business Studies, 41, 178-184. DOI : 10.1057/jibs.2009.88   DOI
32 C. M. Fuller, M. J. Simmering, G. Atinc, Y. Atinc & B. J. Babin. (2016). Common Methods Variance Detection in Business Research. Journal of Business Research, 69(8), 3192-3198. DOI : 10.1016/j.jbusres.2015.12.008   DOI
33 B. Nunnally & I. R. Bernstein. (1994). Psychometric Theory. New York: Oxford Univer Press.
34 R. W. Rogers. (1983). Cognitive and Psysicological Processes in Fear Appreals and Attitude Change: A Revised Theory of Protection Motivation. In B. L. Cacioppo & L. L. Pretty (eds.), Social Psychophysiology: A Sourcebook, London, UK:Guilford.
35 D. Dang-Pham, S. Pittayachawan & V. Bruno. (2015). Investigating the Formation of Information Security Climate Perceptions with Social Network Analysis: A Research Proposal. Pacific Asia Conference on Information Systems.
36 J. F. Hair, J. J. Risher, M. Sarstedt & C. M. Ringle. (2019). When to Use and How to Report the Results of PLS-SEM. European Business Review, 31(1), 2-24. DOI : 10.1108/EBR-11-2018-0203   DOI
37 D. D. Boos & L. A. Stefanski. (2011). P-Value Precision and Reproducibility. American Statistician, 65(4), 213-221. DOI : 10.1198/tas.2011.10129   DOI
38 J. Jackson. (2011). Revisiting Risk Sensitivity in the Fear of Crime. Journal of Research in Crime and Delinquency, 48(4), 513-537. DOI : 10.1177/0022427810395146   DOI
39 R. Crossler & F. Belanger (2014). An Extended Perspective on Individual Security Behaviors: Protection Motivation Theory and a Unified Security Practices (USP) Instrument. DATABASE for Advances in Information Systems, 45(4), 51-71. DOI : 10.1145/2691517.2691521   DOI
40 R. W. Rogers (1975). A Protection Motivation Theory of Fear Appeals and Attitude Change. Journal of Psychology, 91, 31-114. DOI : 10.1080/00223980.1975.9915803   DOI
41 S. Milne, P. Sheeran & S. Orbell (2000). Prediction and Intervention in Health-Related Behavior: A Meta-Analytic Review of Protection Motivation Theory. Journal of Applied Social Psychology, 30(1), 106-143. DOI : 10.1111/j.1559-1816.2000.tb02308.x   DOI
42 J. E. Maddux & R. W. Rogers. (1983). Protection Motivation and Self-Efficacy: A Revised Theory of Fear Appeals and Attitude Change. Journal of Experimental Social Psychology, 19(5), 469-479. DOI: 10.1016/0022-1031(83)90023-9   DOI
43 A. Vance, M. Siponen & S. Pahnila. (2012). Motivating IS Security Compliance: Insights from Habit and Protection Motivation Theory. Information & Management, 40, 190-198. DOI : 10.1016/j.im.2012.04.002   DOI
44 N. Thompson, T. J. McGill & X. Wang (2017). "Security Begins at Home": Determinants of Home Computer and Mobile Device Security Behavior. Computers & Security, 70, 376-391. DOI : 10.1016/j.cose.2017.07.003   DOI
45 P. Ifinedo. (2012). Understanding Information Systems Security Policy Compliance: An Integration of the Theory of Planned Behavior and the Protection Motivation Theory. Computers & Security, 31(1), 83-95. DOI : 10.1016/j.cose.2011.10.007   DOI
46 M. S. Thiese, B. Ronna & U. Ott. (2016). P Value Interpretations and Considerations. Journal of Thoracic Disease, 8(9), 929-931. DOI : 10.21037/jtd.2016.08.16.   DOI
47 G. W. Burruss, C. M. Jaynes, R. K. Moule Jr. & R. E. Fairchild. (2021). Modeling Individual Defiance of COVID-19 Pandemic Mitigation Strategies. Criminal Justice and Behavior, 48(9), 1317-1338. DOI : 10.1177/00938548211010315   DOI
48 K. Marett, A. L. McNab & R. B. Harris (2011). Social Networking Websites and Posting Personal Information: An Evaluation of Protection Motivation Theory. AIS Transactions on Human-Computer Interaction, 3(3), 170-188.   DOI
49 A. Kankanhalli, H. -H. Teo, B. C. Y. Tan & K. -K. Wei. (2003). An Integrative Study of Information Systems Security Effectiveness. International Journal of Information Management, 23(2), 139-154. DOI : 10.1016/S0268-4012(02)00105-6   DOI
50 V. Cho & W. H. Ip (2018). A Study of BYOD Adoption from the Lens of Threat and Coping Appraisal of Its Security Policy. Enterprise Information Systems, 12(6), 659-673. DOI : 10.1080/17517575.2017.1404132   DOI
51 D. Arthur & P. Quester (2004). Who's Afraid of That Ad? Applying Segmentation to the Protection Motivation Model. Psychology & Marketing, 21(9), 671-696. DOI : 10.1002/mar.20024   DOI
52 K. Witte. (1992). Putting the Fear Back into Fear Appeals: The Extended Parallel Process Model. Communication Monographs, 59(4), 329-349. DOI : 10.1080/03637759209376276   DOI