1
|
Limbu YB, Huhmann BA. Message Effectiveness of Fear Appeals in Vaccination Communication Campaigns: A Systematic Review. Vaccines (Basel) 2024; 12:653. [PMID: 38932382 PMCID: PMC11209406 DOI: 10.3390/vaccines12060653] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Received: 05/06/2024] [Revised: 06/08/2024] [Accepted: 06/09/2024] [Indexed: 06/28/2024] Open
Abstract
This systematic review of 54 cross-disciplinary peer-reviewed causal empirical studies helps public health officials, researchers, and healthcare professionals better comprehend the effects of fear appeals in vaccine promotional campaigns on message processing, persuasion, vaccination attitudes, and vaccination intentions. This review documents inconsistent findings across studies, which it attempts to clarify by considering differences in research designs, sample populations, and outcomes measured. In general, we find that fear appeals increase risk perceptions, message involvement, and vaccination attitudes. However, fear appeals have less influence on vaccination intentions, especially among female and general adult populations or populations from the U.S. and other Western cultures. On the other hand, the effect of fear appeals on vaccination intentions is stronger among student populations and those from China (People's Republic of China and Hong Kong) and other non-Western cultures. Also, fear appeals are less persuasive when promoting COVID-19 vaccines and boosters than they are for other vaccines (e.g., HPV, influenza, MMR). Future research should compare fear appeal effectiveness in messages across vaccines or when combined with other executional elements, such as the endorser or type of evidence provided. Finally, future studies should explore other methodological approaches and measure underexplored message outcomes, such as vaccine uptake behavior, in more naturalistic settings.
Collapse
Affiliation(s)
- Yam B. Limbu
- Department of Marketing, Montclair State University, Montclair, NJ 07043, USA
| | - Bruce A. Huhmann
- Department of Marketing, Virginia Commonwealth University, Richmond, VA 23284, USA;
| |
Collapse
|
2
|
Ogbanufe O, Ge L. A Comparative Evaluation of Behavioral Security Motives: Protection, Intrinsic, and Identity Motivations. Comput Secur 2023. [DOI: 10.1016/j.cose.2023.103136] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 02/19/2023]
|
3
|
Securing online accounts and assets: An examination of personal investments and protection motivation. INTERNATIONAL JOURNAL OF INFORMATION MANAGEMENT 2023. [DOI: 10.1016/j.ijinfomgt.2022.102590] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/07/2022]
|
4
|
Mady A, Gupta S, Warkentin M. The effects of knowledge mechanisms on employees' information security threat construal. INFORMATION SYSTEMS JOURNAL 2023. [DOI: 10.1111/isj.12424] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 01/11/2023]
Affiliation(s)
- Ashraf Mady
- University of North Georgia Dahlonega Georgia USA
| | | | | |
Collapse
|
5
|
The valued coexistence of protection motivation and stewardship in information security behaviors. Comput Secur 2023. [DOI: 10.1016/j.cose.2022.102960] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/06/2022]
|
6
|
Khan F, Bashir S, Talib MNA, Khan KU. The impact of psychological ownership of knowledge on knowledge hiding behaviour: a bibliographic analysis. CURRENT PSYCHOLOGY 2022. [DOI: 10.1007/s12144-022-04033-7] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 12/03/2022]
|
7
|
Nehme A, George JF. Approaching IT Security & Avoiding Threats in the Smart Home Context. J MANAGE INFORM SYST 2022. [DOI: 10.1080/07421222.2022.2127449] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 12/14/2022]
Affiliation(s)
- Alaa Nehme
- Department of Management and Information Systems, College of Business, Mississippi State University, MS, USA
| | - Joey F. George
- Ivy College of Business, Iowa State University, Ames, IA, USA
| |
Collapse
|
8
|
Wong LW, Lee VH, Tan GWH, Ooi KB, Sohal A. The role of cybersecurity and policy awareness in shifting employee compliance attitudes: Building supply chain capabilities. INTERNATIONAL JOURNAL OF INFORMATION MANAGEMENT 2022. [DOI: 10.1016/j.ijinfomgt.2022.102520] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 10/18/2022]
|
9
|
Understanding Combined Health and Business Risk Behaviour: Small Tourism Firm Owners Reopening Amid COVID-19 in Pingyao, China. Behav Sci (Basel) 2022; 12:bs12100358. [PMID: 36285927 PMCID: PMC9598443 DOI: 10.3390/bs12100358] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Download PDF] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 07/29/2022] [Revised: 09/04/2022] [Accepted: 09/07/2022] [Indexed: 11/16/2022] Open
Abstract
This study explores the psychological factors affecting small tourism firm (STF) owners’ decision making about reopening businesses in the midst of COVID-19 based on protection motivation theory and the theory of planned behaviour. The data were collected from a sample of 300 STFs in the Ancient City of Pingyao when the lockdown policy was lifted in China. A symmetric approach, i.e., partial least squares structural equation modelling (PLS–SEM), and an asymmetric model, i.e., a fuzzy set/qualitative comparative analysis (fsQCA), were used to analyse the net effect of the psychological determinants and correlations between the variables leading to high and low behavioural intentions to reopen businesses. The results indicate that social norms and perceived business uncertainty were the critical factors influencing the intention to reopen. The pathway (low perceived risk of infection, low perceived business uncertainty, high reward, high response efficacy, high self-efficacy, high attitude, and high subjective norm) was only one configuration for a high intention to reopen. The study results are discussed based on dual-process theory, and practical implications are offered to guide STF recovery amid COVID-19.
Collapse
|
10
|
|
11
|
Cybersecurity Behavior among Government Employees: The Role of Protection Motivation Theory and Responsibility in Mitigating Cyberattacks. INFORMATION 2022. [DOI: 10.3390/info13090413] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/16/2022] Open
Abstract
This study examines the factors influencing government employees’ cybersecurity behavior in Malaysia. The country is considered the most vulnerable in Southeast Asia. Applying the protection motivation theory, this study addresses the gap by investigating how government employees behave toward corresponding cyberrisks and threats. Using partial least-squares structural equation modeling (PLS-SEM), 446 respondents participated and were analyzed. The findings suggest that highly motivated employees with high severity, vulnerability, response efficacy, and self-efficacy exercise cybersecurity. Incorporating the users’ perceptions of vulnerability and severity facilitates behavioral change and increases the understanding of cybersecurity behavior’s role in addressing cybersecurity threats—particularly the impact of the threat response in predicting the cybersecurity behavior of government employees. The implications include providing robust information security protection to the government information systems.
Collapse
|
12
|
Collignon SE, Nazir S, Surendra NC. Agile Systems Development: Privacy Theoretical Lens to Challenge the Full Information Disclosure Paradigm. INFORMATION & MANAGEMENT 2022. [DOI: 10.1016/j.im.2022.103679] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 11/05/2022]
|
13
|
Madan S, Savani K, Katsikeas CS. Privacy please: Power distance and people's responses to data breaches across countries. JOURNAL OF INTERNATIONAL BUSINESS STUDIES 2022; 54:731-754. [PMID: 35607320 PMCID: PMC9118180 DOI: 10.1057/s41267-022-00519-5] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Figures] [Subscribe] [Scholar Register] [Received: 09/30/2020] [Revised: 02/15/2022] [Accepted: 02/22/2022] [Indexed: 06/13/2023]
Abstract
Information security and data breaches are perhaps the biggest challenges that global businesses face in the digital economy. Although data breaches can cause significant harm to users, businesses, and society, there is significant individual and national variation in people's responses to data breaches across markets. This research investigates power distance as an antecedent of people's divergent reactions to data breaches. Eight studies using archival, correlational, and experimental methods find that high power distance makes users more willing to continue patronizing a business after a data breach (Studies 1-3). This is because they are more likely to believe that the business, not they themselves, owns the compromised data (Studies 4-5A) and, hence, do not reduce their transactions with the business. Making people believe that they (not the business) own the shared data attenuates this effect (Study 5B). Study 6 provides additional evidence for the underlying mechanism. Finally, Study 7 shows that high uncertainty avoidance acts as a moderator that mitigates the effect of power distance on willingness to continue patronizing a business after a data breach. Theoretical contributions to the international business literature and practitioner and policy insights are discussed. Supplementary Information The online version contains supplementary material available at 10.1057/s41267-022-00519-5.
Collapse
Affiliation(s)
- Shilpa Madan
- Pamplin College of Business, Virginia Tech, Blacksburg, Virginia 24061 USA
| | - Krishna Savani
- Faculty of Business, The Hong Kong Polytechnic University, Li Ka Shing Tower, Hung Hom, Kowloon, Hong Kong
- Nanyang Business School, Nanyang Technological University, Singapore, 639798 Singapore
| | | |
Collapse
|
14
|
Burns AJ, Roberts TL, Posey C, Lowry PB, Fuller B. Going Beyond Deterrence: A Middle-Range Theory of Motives and Controls for Insider Computer Abuse. INFORMATION SYSTEMS RESEARCH 2022. [DOI: 10.1287/isre.2022.1133] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/20/2022]
Abstract
Reports indicate that employees are willing to share sensitive information under certain circumstances, and one-third to half of security breaches are tied to insiders. These statistics reveal that organizational security efforts, which most often rely on deterrence-based sanctions to address the insider threats to information security, are insufficient. Thus, insiders’ computer abuse (ICA)—unauthorized and deliberate misuse of organizational information resources by organizational insiders—remains a significant issue for industry. We present a motive–control theory of ICA that distinguishes among instrumental and expressive motives and internal and external controls. Specifically, we show that organizational deterrents (e.g., sanctions) do not create motives for ICA, but weaken existing motives (e.g., financial benefits). Conversely, financial benefits and psychological contract violations create motives to perform ICA, and insiders’ self-control diminishes the influence of these motives. The implications for practice are threefold: (1) organizations should make efforts to reduce psychological contract breach for employees by increasing the congruence between expectations and reality to reduce expressive motives for ICA; (2) organizations should seek maintain personnel with adequate self-control to diminish the impact of harmful ICA motives should they arise; and (3) organizations should develop targeted sanctions for committing ICA to control the harmful influence of financial motives.
Collapse
Affiliation(s)
- A. J. Burns
- Stephenson Department of Entrepreneurship and Information Systems, E. J. Ourso College of Business, Louisiana State University, Baton Rouge, Louisiana 70803
| | - Tom L. Roberts
- Soules College of Business, The University of Texas at Tyler, Tyler, Texas 75799
| | - Clay Posey
- Information Systems Department, Marriott School of Business, Brigham Young University, Provo, Utah 84602
| | - Paul Benjamin Lowry
- Business Information Technology, Pamplin College of Business, Virginia Tech, Blacksburg, Virginia 24061
| | - Bryan Fuller
- Department of Management, Louisiana Tech University, Ruston, Louisiana 71272
| |
Collapse
|
15
|
Iseki S, Sasaki K, Kitagami S. Development of a Japanese version of the Psychological Ownership Scale. PeerJ 2022; 10:e13063. [PMID: 35350635 PMCID: PMC8957756 DOI: 10.7717/peerj.13063] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.5] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 09/21/2021] [Accepted: 02/14/2022] [Indexed: 01/11/2023] Open
Abstract
The present study addresses the need for a valid instrument for measuring dimensions of psychological ownership, including that of owned and non-owned objects, for use in the language and culture of Japan. Although the theory of psychological ownership has expanded self-extension theory, the most widely used scale of psychological ownership does not measure the extent to which one feels that it (the owned object) is a part of them. Thus, the present study aimed to develop a Japanese version of the Psychological Ownership Scale (POS-J) and examine its reliability and validity. Study 1 measured the POS-J of an owned object, finding the POS-J to have a two-factor structure (possession-self link and feeling of ownership) and its internal consistency and reliability to be adequate. Moreover, POS-J scores were positively correlated with perceived control and self-extension tendency, but not monetary value, indicating that conceptual validity was generally supported. To confirm whether the POS-J could be used for a non-owned object, Study 2 rephrased the expressions of item descriptions and examined the effect of imagining touching a non-owned object on the POS-J scores, showing that doing so increased the POS-J scores for the object. Our findings suggest that the POS-J is a reliable and valid measure of the psychological ownership of owned and non-owned objects for use in Japan.
Collapse
Affiliation(s)
- Sayo Iseki
- Department of Management, Chukyo University, Nagoya, Aichi, Japan
| | - Kyoshiro Sasaki
- Faculty of Informatics, Kansai University, Takatsuki, Osaka, Japan
| | - Shinji Kitagami
- Department of Psychology, Graduate School of Informatics, Nagoya University, Nagoya, Japan
| |
Collapse
|
16
|
Karlsson F, Kolkowska E, Petersson J. Information security policy compliance-eliciting requirements for a computerized software to support value-based compliance analysis. Comput Secur 2022. [DOI: 10.1016/j.cose.2021.102578] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.5] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/03/2022]
|
17
|
Ogbanufe O, Pavur R. Going through the emotions of regret and fear: Revisiting protection motivation for identity theft protection. INTERNATIONAL JOURNAL OF INFORMATION MANAGEMENT 2022. [DOI: 10.1016/j.ijinfomgt.2021.102432] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.5] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 10/20/2022]
|
18
|
Ma X. IS professionals’ information security behaviors in Chinese IT organizations for information security protection. Inf Process Manag 2022. [DOI: 10.1016/j.ipm.2021.102744] [Citation(s) in RCA: 4] [Impact Index Per Article: 2.0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/30/2022]
|
19
|
Marett K, Nabors M. Local learning from municipal ransomware attacks: A geographically weighted analysis. INFORMATION & MANAGEMENT 2021. [DOI: 10.1016/j.im.2021.103482] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 10/21/2022]
|
20
|
Abumalloh RA, Asadi S, Nilashi M, Minaei-Bidgoli B, Nayer FK, Samad S, Mohd S, Ibrahim O. The impact of coronavirus pandemic (COVID-19) on education: The role of virtual and remote laboratories in education. TECHNOLOGY IN SOCIETY 2021; 67:101728. [PMID: 34538984 PMCID: PMC8435357 DOI: 10.1016/j.techsoc.2021.101728] [Citation(s) in RCA: 10] [Impact Index Per Article: 3.3] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Subscribe] [Scholar Register] [Received: 09/23/2020] [Revised: 07/01/2021] [Accepted: 09/01/2021] [Indexed: 05/21/2023]
Abstract
To avoid the spread of the COVID-19 crisis, many countries worldwide have temporarily shut down their academic organizations. National and international closures affect over 91% of the education community of the world. E-learning is the only effective manner for educational institutions to coordinate the learning process during the global lockdown and quarantine period. Many educational institutions have instructed their students through remote learning technologies to face the effect of local closures and promote the continuity of the education process. This study examines the expected benefits of e-learning during the COVID-19 pandemic by providing a new model to investigate this issue using a survey collected from the students at Imam Abdulrahman Bin Faisal University. Partial Least Squares Structural Equation Modeling (PLS-SEM) was employed on 179 useable responses. This study applied Push-Pull-Mooring theory and examined how push, pull, and mooring variables impact learners to switch to virtual and remote educational laboratories. The Protection Motivation theory was employed to explain how the potential health risk and environmental threat can influence the expected benefits from e-learning services. The findings revealed that the push factor (environmental threat) is significantly related to perceived benefits. The pull factors (e-learning motivation, perceived information sharing, and social distancing) significantly impact learners' benefits. The mooring factor, namely perceived security, significantly impacts learners' benefits.
Collapse
Affiliation(s)
- Rabab Ali Abumalloh
- Computer Department, Community College, Imam Abdulrahman Bin Faisal University, P.O. Box. 1982, Dammam, Saudi Arabia
| | - Shahla Asadi
- Centre of Software Technology and Management, Faculty of Information Science and Technology, Universiti Kebangsaan Malaysia, 43600, Bangi, Selangor, Malaysia
| | - Mehrbakhsh Nilashi
- Centre for Global Sustainability Studies (CGSS), Universiti Sains Malaysia, 11800, George Town, Malaysia
- School of Computer Engineering, Iran University of Science and Technology, Iran
| | | | - Fatima Khan Nayer
- College of Computer and Information Sciences, Prince Sultan University, Saudi Arabia
| | - Sarminah Samad
- Department of Business Administration, College of Business and Administration, Princess Nourah bint Abdulrahman University, Riyadh, Saudi Arabia
| | - Saidatulakmal Mohd
- Centre for Global Sustainability Studies & School of Social Sciences, Universiti Sains Malaysia, Malaysia
| | - Othman Ibrahim
- Azman Hashim International Business School, Universiti Teknologi Malaysia (UTM), Skudai, Johor, 81310, Malaysia
| |
Collapse
|
21
|
Ogbanufe O. Enhancing End-User Roles in Information Security: Exploring the Setting, Situation, and Identity. Comput Secur 2021. [DOI: 10.1016/j.cose.2021.102340] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.3] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 10/21/2022]
|
22
|
Iqbal S, Zakar R, Fischer F. Extended Theoretical Framework of Parental Internet Mediation: Use of Multiple Theoretical Stances for Understanding Socio-Ecological Predictors. Front Psychol 2021; 12:620838. [PMID: 34177688 PMCID: PMC8219882 DOI: 10.3389/fpsyg.2021.620838] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.3] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 10/23/2020] [Accepted: 05/14/2021] [Indexed: 11/13/2022] Open
Abstract
Digital media is a common phenomenon in contemporary societies. Recognizing the popularity of digital and online devices among the younger generation, the subject of parental internet mediation is of utmost significance for avoiding the adverse effects of digital media on the physical, cognitive, and social wellbeing of youngsters. Taking insights from an informed review of multi-grounded theories, we propose an extended framework of socio-ecological predictors concerning parental internet mediation. This contribution offers an innovative methodological and analytical perspective to consider both psychological and behavioral predictors for promoting resilience. This review acknowledged resilience as a strength-based measure to ensure online safety among young individuals. This review suggests that an integrated socio-ecological approach is critical to formulating the basis for a theoretical framework to fully comprehend the socio-ecological predictors of parental internet mediation.
Collapse
Affiliation(s)
- Sarosh Iqbal
- Institute of Social and Cultural Studies, University of the Punjab, Lahore, Pakistan
| | - Rubeena Zakar
- Department of Public Health, Institute of Social and Cultural Studies, University of the Punjab, Lahore, Pakistan
| | - Florian Fischer
- Institute of Public Health, Charité - Universitätsmedizin Berlin, Berlin, Germany.,Institute of Gerontological Health Services and Nursing Research, Ravensburg-Weingarten University of Applied Sciences, Weingarten, Germany
| |
Collapse
|
23
|
Can financial incentives help with the struggle for security policy compliance? INFORMATION & MANAGEMENT 2021. [DOI: 10.1016/j.im.2021.103447] [Citation(s) in RCA: 3] [Impact Index Per Article: 1.0] [Reference Citation Analysis] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 11/21/2022]
|
24
|
Sarkar S, Vance A, Ramesh B, Demestihas M, Wu DT. The Influence of Professional Subculture on Information Security Policy Violations: A Field Study in a Healthcare Context. INFORMATION SYSTEMS RESEARCH 2020. [DOI: 10.1287/isre.2020.0941] [Citation(s) in RCA: 10] [Impact Index Per Article: 2.5] [Reference Citation Analysis] [Abstract] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/20/2022]
Abstract
The Influence of Professional Subculture on Information Security Policy Violations: A Field Study in a Healthcare Context
Collapse
Affiliation(s)
- Sumantra Sarkar
- School of Management, Binghamton University, State University of New York, Binghamton, New York 13902
| | - Anthony Vance
- Fox School of Business, Temple University, Philadelphia, Pennsylvania 19122
| | | | | | - Daniel Thomas Wu
- Emergency Medicine, Emory University Hospital, Emory University School of Medicine, Atlanta, Georgia 30303
| |
Collapse
|
25
|
Schuetz SW, Benjamin Lowry P, Pienta DA, Bennett Thatcher J. The Effectiveness of Abstract Versus Concrete Fear Appeals in Information Security. J MANAGE INFORM SYST 2020. [DOI: 10.1080/07421222.2020.1790187] [Citation(s) in RCA: 11] [Impact Index Per Article: 2.8] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 10/23/2022]
Affiliation(s)
- Sebastian W. Schuetz
- Department of Information Systems and Business Analytics, College of Business, Florida International University , Miami, FL, USA
| | - Paul Benjamin Lowry
- Department of Business Information Technology, Pamplin College of Business , Virginia Tech, Blacksburg, VA, USA
| | | | | |
Collapse
|
26
|
Park J, Shin M. The Impact of Information Ownership and Psychological Context on Employee Information Sharing Motivation. JOURNAL OF INFORMATION & KNOWLEDGE MANAGEMENT 2020. [DOI: 10.1142/s0219649220500021] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.3] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 11/18/2022]
Abstract
The purpose of this paper is to define a model to examine information sharing behaviour from a psychological ownership perspective in an organisation. The importance of psychological ownership is emphasised in various researches as the cause of the attitude and behaviour of individuals within an organisation, and many researchers have developed and expanded the concept of psychological ownership. Despite its importance, research that examines information sharing behaviour from a psychological ownership perspective is lacking, and the results of each research show conflicting positive and negative results. In order to explain such results, this study examined the concept of psychological ownership by subdividing it into intuition-based information ownership (IBIO) and reasoning-based information ownership (RBIO) based on the prospect theory (PT). Also using the structural equation model, we examined and verified the types of information factors (cost, profits, expertise and hobbies) as leading factors. The main findings have confirmed that IBIO and RBIO have a significant related effect (i.e. the positive effect, however, RBIO has a negative effect on enjoying helping others) on information sharing motivations (reputation, controlling, enjoying helping others and reciprocity). This study supports and expands the theories of psychological ownership and information sharing to aid in the understanding of information sharing within an organisation, and provides practical insights into situations of conflicts of interest regarding information sharing.
Collapse
Affiliation(s)
- Joonyong Park
- School of Business, Hanyang University, 222 Wangsimni-ro, Seongdong-Gu, Seoul, South Korea
| | - Minsoo Shin
- School of Business, Hanyang University, 222 Wangsimni-ro, Seongdong-Gu, Seoul, South Korea
| |
Collapse
|
27
|
Experimental Evaluation of Information Interventions to Encourage Non-Motorized Travel: A Case Study in Hefei, China. SUSTAINABILITY 2020. [DOI: 10.3390/su12156201] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.3] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 11/16/2022]
Abstract
This study aims at presenting an experimental evaluation of the different effects of environmental and health information on encouraging car owners to travel on foot and by bicycle. Health information consists of a high and a low target setting. One hundred and forty-six participants in Hefei city reported their travel behaviors in terms of mode, time, and trip before and after the experiment. Their cognitive and emotional processes with regard to the protection motivation theory (PMT) that determine their potential travel behavior changes in response to information intervention are also identified. Three experimental groups and one control group based on a between-group design are adopted and the methodology of paired sample chi-squared tests and stepwise linear regressions are used. The results show that environmental information alone fails to encourage car owners’ non-motorized travel. When health information is added, information intervention can effectively encourage a time increase in walking and cycling as well as a time and trip decrease in car use in the short term. But the long-term effect is not significant after a year and a half. Moreover, there are no significant differences between the high and the low target settings in health information for encouraging non-motorized travel. In terms of PMT constructs, severity has a significant relationship with the change of time or trip on foot and by bicycle. Vulnerability emerges as a non-effective predictor. Reward, self-efficacy, response efficacy, and response cost are more remarkable in predicting the change of time or trip by car. This study recommends that (1) health information with a target setting is superior to environmental information, (2) reduction strategy is potentially superior to transfer strategy to control car usage, (3) policymakers should design intervention strategies relevant to the coping appraisal rather than to the threat appraisal.
Collapse
|
28
|
Wu D, Moody GD, Zhang J, Lowry PB. Effects of the design of mobile security notifications and mobile app usability on users’ security perceptions and continued use intention. INFORMATION & MANAGEMENT 2020. [DOI: 10.1016/j.im.2019.103235] [Citation(s) in RCA: 8] [Impact Index Per Article: 2.0] [Reference Citation Analysis] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 10/25/2022]
|
29
|
Protection Motivation Theory: A Proposed Theoretical Extension and Moving beyond Rationality—The Case of Flooding. WATER 2020. [DOI: 10.3390/w12071848] [Citation(s) in RCA: 9] [Impact Index Per Article: 2.3] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 11/17/2022]
Abstract
Despite the significant financial and non-financial costs of household flooding, and the availability of products that can reduce the risk or impact of flooding, relatively few consumers choose to adopt these products. To help explain this, we combine the existing theoretical literature with evidence from 20 one-to-one discussions and three workshops with key stakeholders, as well as five round tables, to draw practical evidence of actual responses to flood risk. This analysis leads us to propose an extension to Protection Motivation Theory (PMT), which more accurately captures the decision-making process of consumers by highlighting the role of ‘ownership appraisal’. We then assess the extent to which behavioral biases impact on this revised framework. By highlighting the interaction with an augmented model of PMT and behavioral biases, the paper sheds light on potential reasons behind the fact that consumers are unlikely to adopt property-level flood resilience measures and identifies strategies to increase flood protection. The Augmented PMT suggests that policymakers might focus on increasing the Ownership Appraisal element, both directly and by targeting the creation of more supportive social norms. The work presented here opens up a wide range of areas for future research in the field.
Collapse
|
30
|
Effects of sanctions, moral beliefs, and neutralization on information security policy violations across cultures. INFORMATION & MANAGEMENT 2020. [DOI: 10.1016/j.im.2019.103212] [Citation(s) in RCA: 21] [Impact Index Per Article: 5.3] [Reference Citation Analysis] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 11/21/2022]
|
31
|
Sharma S. Can’t change my political disaffection! The role of political disaffection, trust, and resistance to change in internet voting. DIGITAL POLICY, REGULATION AND GOVERNANCE 2020. [DOI: 10.1108/dprg-07-2019-0049] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.3] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 11/17/2022]
Abstract
Purpose
This paper aims to put the focus on political disaffection that the voters may have and its impact on their resistance to the changes, thereby influencing intention to adopt Internet voting. This study also examines the impact of perceived risk and technological skills on the trust of the Internet technology and informal networks, such as social influence and media influence on the trust of the government.
Design/methodology/approach
To empirically test the model, an online survey is administered to 851 people who are eligible to vote.
Findings
The findings show that positive media influence and social influence also significantly impact trust in government but trust in government does not necessarily decrease resistance to change and positively impact intention to adopt eVoting. Also, the resistance to change was shown to significantly influence the intention to use Internet voting.
Research limitations/implications
A primary potential limitation of this study is the use of convenience sampling, which may lead to self-selection bias that limits the generalization of our research to all citizens.
Practical implications
Government institutions, as well as political parties, can use the findings of this research to understand how political dissatisfaction such as apathy and cynicism can increase trust in technology and lead to higher participation in online voting.
Originality/value
While the focus on previous literature has been heavily on security and system requirements, this study expands existing research by exploring voting habits, political disaffection, the resistance of change and informal influence on intention to use online voting.
Collapse
|
32
|
Karjalainen M, Siponen M, Puhakainen P, Sarker S. Universal and Culture-dependent Employee Compliance of Information Systems Security Procedures. JOURNAL OF GLOBAL INFORMATION TECHNOLOGY MANAGEMENT 2019. [DOI: 10.1080/1097198x.2019.1701355] [Citation(s) in RCA: 3] [Impact Index Per Article: 0.6] [Reference Citation Analysis] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 10/25/2022]
Affiliation(s)
- Mari Karjalainen
- Faculty of Information Technology and Electrical Engineering, University of Oulu, Oulu, Finland
| | - Mikko Siponen
- Research Faculty of Information Technology, University of Jyvaskyla, Jyväskylä, Finland
| | | | - Suprateek Sarker
- McIntire School of Commerce, University of Virginia, Charlottesville, VA, USA
| |
Collapse
|
33
|
Verkijika SF. “If you know what to do, will you take action to avoid mobile phishing attacks”: Self-efficacy, anticipated regret, and gender. COMPUTERS IN HUMAN BEHAVIOR 2019. [DOI: 10.1016/j.chb.2019.07.034] [Citation(s) in RCA: 14] [Impact Index Per Article: 2.8] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 12/01/2022]
|
34
|
Kari T, Salo M, Frank L. Role of situational context in use continuance after critical exergaming incidents. INFORMATION SYSTEMS JOURNAL 2019. [DOI: 10.1111/isj.12273] [Citation(s) in RCA: 5] [Impact Index Per Article: 1.0] [Reference Citation Analysis] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 11/28/2022]
Affiliation(s)
- Tuomas Kari
- Faculty of Information TechnologyUniversity of Jyvaskyla Jyvaskyla Finland
| | - Markus Salo
- Faculty of Information TechnologyUniversity of Jyvaskyla Jyvaskyla Finland
| | - Lauri Frank
- Faculty of Information TechnologyUniversity of Jyvaskyla Jyvaskyla Finland
| |
Collapse
|
35
|
Institutional governance and protection motivation: Theoretical insights into shaping employees’ security compliance behavior in higher education institutions in the developing world. Comput Secur 2019. [DOI: 10.1016/j.cose.2019.101594] [Citation(s) in RCA: 32] [Impact Index Per Article: 6.4] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/30/2022]
|
36
|
Sharma S, Warkentin M. Do I really belong?: Impact of employment status on information security policy compliance. Comput Secur 2019. [DOI: 10.1016/j.cose.2018.09.005] [Citation(s) in RCA: 18] [Impact Index Per Article: 3.6] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/24/2022]
|
37
|
Crossler RE, Andoh-Baidoo FK, Menard P. Espoused cultural values as antecedents of individuals’ threat and coping appraisal toward protective information technologies: Study of U.S. and Ghana. INFORMATION & MANAGEMENT 2019. [DOI: 10.1016/j.im.2018.11.009] [Citation(s) in RCA: 9] [Impact Index Per Article: 1.8] [Reference Citation Analysis] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 10/27/2022]
|
38
|
Renaud K, Otondo R, Warkentin M. “This is the way ‘I’ create my passwords” ... does the endowment effect deter people from changing the way they create their passwords? Comput Secur 2019. [DOI: 10.1016/j.cose.2018.12.018] [Citation(s) in RCA: 11] [Impact Index Per Article: 2.2] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 10/27/2022]
|
39
|
Aurigemma S, Mattson T. Effect of long-term orientation on voluntary security actions. INFORMATION AND COMPUTER SECURITY 2019. [DOI: 10.1108/ics-07-2018-0086] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.2] [Reference Citation Analysis] [Abstract] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/17/2022]
Abstract
PurposeThis paper aims to examine the impact an individual’s long-term orientation (a cultural dimension) has on their attitude, behavioral intention and actual voluntary security actions taken in the context of the dangers related to poor account access management.Design/methodology/approachThe paper relied upon survey data and actual usage information from a culturally diverse sample of 227 individuals who were introduced to the specific security problem and the accepted solution of using a password manager application.FindingsThe paper provides empirical evidence that the effect of positive attitudes increased when individuals were more long-term oriented, but the effect was reversed for average/negative attitudes toward the voluntary security behavior. Furthermore, participants with high long-term orientation and strong positive attitudes toward the security action actually adopted password manager applications 57 per cent more than the average adoption rate across the sample.Research limitations/implicationsDue to the research approach (survey data), security context and sample population, the research results may lack generalizability.Practical implicationsThe findings suggest that security awareness messaging and training should account for differences in long-term orientation of the target audience and integrate the distinctly different types of messages that have been shown to improve an individual’s participation in voluntary security actions.Originality/valueThe paper addresses previous research calls for examining possible cultural differences that impact security behaviors and is the only study that has focused on the impact of long-term orientation, specifically on voluntary security actions.
Collapse
|