Asset Details
MbrlCatalogueTitleDetail
Do you wish to reserve the book?
Fear Appeals and Information Security Behaviors: An Empirical Study
by
Johnston, Allen C.
, Warkentin, Merrill
in
Angst
/ Betriebliches Informationssystem
/ Compliance
/ Compliance-Management
/ Computer software
/ Cybersecurity
/ Data security
/ Datensicherheit
/ Effectiveness
/ End users
/ Fear
/ Impact analysis
/ Information storage and retrieval systems
/ Information technology
/ Self efficacy
/ Social influence
/ Special Issue: Information Systems Security
/ Spyware
/ Studies
/ Technology adoption
/ Test
/ User behavior
2010
Hey, we have placed the reservation for you!
By the way, why not check out events that you can attend while you pick your title.
You are currently in the queue to collect this book. You will be notified once it is your turn to collect the book.
Oops! Something went wrong.
Looks like we were not able to place the reservation. Kindly try again later.
Are you sure you want to remove the book from the shelf?
Fear Appeals and Information Security Behaviors: An Empirical Study
by
Johnston, Allen C.
, Warkentin, Merrill
in
Angst
/ Betriebliches Informationssystem
/ Compliance
/ Compliance-Management
/ Computer software
/ Cybersecurity
/ Data security
/ Datensicherheit
/ Effectiveness
/ End users
/ Fear
/ Impact analysis
/ Information storage and retrieval systems
/ Information technology
/ Self efficacy
/ Social influence
/ Special Issue: Information Systems Security
/ Spyware
/ Studies
/ Technology adoption
/ Test
/ User behavior
2010
Oops! Something went wrong.
While trying to remove the title from your shelf something went wrong :( Kindly try again later!
Do you wish to request the book?
Fear Appeals and Information Security Behaviors: An Empirical Study
by
Johnston, Allen C.
, Warkentin, Merrill
in
Angst
/ Betriebliches Informationssystem
/ Compliance
/ Compliance-Management
/ Computer software
/ Cybersecurity
/ Data security
/ Datensicherheit
/ Effectiveness
/ End users
/ Fear
/ Impact analysis
/ Information storage and retrieval systems
/ Information technology
/ Self efficacy
/ Social influence
/ Special Issue: Information Systems Security
/ Spyware
/ Studies
/ Technology adoption
/ Test
/ User behavior
2010
Please be aware that the book you have requested cannot be checked out. If you would like to checkout this book, you can reserve another copy
We have requested the book for you!
Your request is successful and it will be processed during the Library working hours. Please check the status of your request in My Requests.
Oops! Something went wrong.
Looks like we were not able to place your request. Kindly try again later.
Fear Appeals and Information Security Behaviors: An Empirical Study
Journal Article
Fear Appeals and Information Security Behaviors: An Empirical Study
2010
Request Book From Autostore
and Choose the Collection Method
Overview
Information technology executives strive to align the actions of end users with the desired security posture of management and of the firm through persuasive communication. In many cases, some element of fear is incorporated within these communications. However, within the context of computer security and information assurance, it is not yet clear how these fear-inducing arguments, known as fear appeals, will ultimately impact the actions of end users. The purpose of this study is to investigate the influence of fear appeals on the compliance of end users with recommendations to enact specific individual computer security actions toward the mitigation of threats. An examination was performed that culminated in the development and testing of a conceptual model representing an infusion of technology adoption and fear appeal theories. Results of the study suggest that fear appeals do impact end user behavioral intentions to comply with recommended individual acts of security, but the impact is not uniform across all end users. It is determined in part by perceptions of self-efficacy, response efficacy, threat severity, and social influence. The findings of this research contribute to information systems security research, human—computer interaction, and organizational communication by revealing a new paradigm in which IT users form perceptions of the technology, not on the basis of performance gains, but on the basis of utility for threat mitigation.
Publisher
Management Information Systems Research Center, University of Minnesota,Soc,University of Minnesota, MIS Research Center
This website uses cookies to ensure you get the best experience on our website.