Heeding the messenger: The influence of sender characteristics on security message compliance intentions

dc.contributor.authorSchuetz, Sebastianen
dc.contributor.authorBansal, Gauraven
dc.contributor.authorWeng, Qinen
dc.contributor.authorLowry, Paul Benjaminen
dc.contributor.authorThatcher, Jasonen
dc.date.accessioned2025-08-05T12:39:16Zen
dc.date.available2025-08-05T12:39:16Zen
dc.date.issued2025en
dc.description.abstractHow security messages can be used to motivate information technology (IT) users’ security behaviour has been of keen interest to IS research. To that end, studies have focused on the content of security messages; however, few studies have examined the influence of message senders. In this paper, we build on social influence theory and integrate it with the concept of inferences of manipulative intent (IMI) to develop a model that examines how perceptions of sender characteristics—cybersecurity expertise, coercive power, and similarity—can yield positive and negative influence on message outcomes, captured in recipients’ message compliance intentions. We test our model in four different studies using field and scenario experiments across three target populations: the general public, students, and employees. Perceived expertise, power, and similarity had similar effects among the general public and students: Perceived expertise was positively associated with message outcomes, but perceived power and similarity were negatively associated. In contrast, employees reacted differently from the general public and students in that they responded positively to perceived power, with perceived expertise and similarity having negligible effects. Across these three target populations, we found that participants reacted to senders high in perceived power and similarity with IMI, which reduced their message compliance intentions. Our results suggest that senders must be chosen carefully, depending on the target population, because selecting the wrong sender can increase the likelihood of a message being rejected.en
dc.description.versionAccepted versionen
dc.format.mimetypeapplication/pdfen
dc.identifier.doihttps://doi.org/10.1111/isj.70013en
dc.identifier.orcidLowry, Paul [0000-0002-0187-5808]en
dc.identifier.urihttps://hdl.handle.net/10919/136966en
dc.language.isoenen
dc.publisherWileyen
dc.rightsIn Copyrighten
dc.rights.urihttp://rightsstatements.org/vocab/InC/1.0/en
dc.subjectSecurity messageen
dc.subjectcomplianceen
dc.subjectspokespersonen
dc.subjectsocial influenceen
dc.subjectsocial influence theory (SIT)en
dc.subjectinference of manipulative intent (IMI)en
dc.titleHeeding the messenger: The influence of sender characteristics on security message compliance intentionsen
dc.title.serialInformation Systems Journalen
dc.typeArticle - Refereeden
dc.type.dcmitypeTexten
dc.type.otherArticleen
dcterms.dateAccepted2025-07-25en
pubs.organisational-groupVirginia Techen
pubs.organisational-groupVirginia Tech/Pamplin College of Businessen
pubs.organisational-groupVirginia Tech/Pamplin College of Business/Business Information Technologyen
pubs.organisational-groupVirginia Tech/All T&R Facultyen
pubs.organisational-groupVirginia Tech/Pamplin College of Business/PCOB T&R Facultyen

Files

Original bundle
Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
2025-July ISJ head the messenger POST-PRINTS + appendices.pdf
Size:
718.43 KB
Format:
Adobe Portable Document Format
Description:
Accepted version
License bundle
Now showing 1 - 1 of 1
Name:
license.txt
Size:
1.5 KB
Format:
Plain Text
Description: