Get 20M+ Full-Text Papers For Less Than $1.50/day. Start a 14-Day Trial for You and Your Team.

Learn More →

Protection Motivation Theory in Information Systems Security Research

Protection Motivation Theory in Information Systems Security Research Protection motivation theory (PMT) is one of the most commonly used theories to examine information security behaviors. Our systematic review of the application of PMT in information systems (IS) security and the comparison with its application for decades in psychology identified five categories of important issues that have not yet been examined in IS security research. Discussing these issues in terms of why they are relevant and important for IS security, and to what extent IS research has not considered them, offers new research opportunities associated with the study of PMT and IS security threats. We suggest how future studies can approach each of the open issues to provide a new road map for quantitative and qualitative IS scholars. http://www.deepdyve.com/assets/images/DeepDyve-Logo-lg.png ACM SIGMIS Database: the DATABASE for Advances in Information Systems Association for Computing Machinery

Protection Motivation Theory in Information Systems Security Research

Loading next page...
 
/lp/association-for-computing-machinery/protection-motivation-theory-in-information-systems-security-research-YjFipyRZjR
Publisher
Association for Computing Machinery
Copyright
Copyright © 2021 Copyright is held by the owner/author(s)
ISSN
0095-0033
eISSN
1532-0936
DOI
10.1145/3462766.3462770
Publisher site
See Article on Publisher Site

Abstract

Protection motivation theory (PMT) is one of the most commonly used theories to examine information security behaviors. Our systematic review of the application of PMT in information systems (IS) security and the comparison with its application for decades in psychology identified five categories of important issues that have not yet been examined in IS security research. Discussing these issues in terms of why they are relevant and important for IS security, and to what extent IS research has not considered them, offers new research opportunities associated with the study of PMT and IS security threats. We suggest how future studies can approach each of the open issues to provide a new road map for quantitative and qualitative IS scholars.

Journal

ACM SIGMIS Database: the DATABASE for Advances in Information SystemsAssociation for Computing Machinery

Published: Apr 28, 2021

Keywords: behavioral is security

References