VTechWorks staff will be away for the winter holidays starting Tuesday, December 24, 2024, through Wednesday, January 1, 2025, and will not be replying to requests during this time. Thank you for your patience, and happy holidays!
 

Examining the differential effectiveness of fear appeals in information security management using two-stage meta-analysis

dc.contributor.authorLowry, Paul Benjaminen
dc.contributor.authorMoody, Gregory D.en
dc.contributor.authorParameswaran, Srikanthen
dc.contributor.authorBrown, Nicholas J.en
dc.date.accessioned2023-04-12T13:02:21Zen
dc.date.available2023-04-12T13:02:21Zen
dc.date.issued2023-12-11en
dc.date.updated2023-04-11T20:37:06Zen
dc.description.abstractMost of the information security management research involving fear appeals is guided by either protection motivation theory or the extended parallel processing model. Over time, extant research has extended these theories, as well as their derivative theories, in a variety of ways, leading to several theoretical and empirical inconsistencies. The large body of fragmented, and sometimes conflicting, research has muddied the broader understanding of what drives protection- and defensive motivation. We provide guidance to the security discourse by offering the first study in the literature to employ two-stage meta-analytic structural equation modeling (TSSEM), which combines covariance-based structural equation modeling and meta-analysis. IS researchers have traditionally used meta-analysis for structural equation modeling for such purposes—an approach that has several serious statistical flaws. Using 341 systematically selected empirical security articles (representing 383 unique studies) and TSSEM, we pool a large series of five datasets to test six models, from which we examine the effects of constructs and paths in the security fear-appeals literature. We compare and test six versions of models inspired by issues in the broader fear-appeals literature. We confirm the importance of both the threat- and coping-appraisal processes; establish the central role of fear and that it has greater importance than threat; show that efficacy is a stronger predictor of protection motivation than is threat; demonstrate that response costs as currently measured are ineffective but that maladaptive rewards have a strong negative effect on protection motivation and a positive effect on defensive motivation; and provide evidence that dual models of danger control and fear control should be used.en
dc.description.versionAccepted versionen
dc.format.extentPages 1099-1138en
dc.format.mimetypeapplication/pdfen
dc.identifier.issn0742-1222en
dc.identifier.issue4en
dc.identifier.orcidLowry, Paul [0000-0002-0187-5808]en
dc.identifier.urihttp://hdl.handle.net/10919/114479en
dc.identifier.volume40en
dc.language.isoenen
dc.publisherTaylor & Francisen
dc.rightsIn Copyrighten
dc.rights.urihttp://rightsstatements.org/vocab/InC/1.0/en
dc.subjectSecurityen
dc.subjectinformation security management (ISM)en
dc.subjecttwo-stage meta-analytic structural equation modeling (TSSEM)en
dc.subjectprotection motivation theory (PMT)en
dc.subjectextended parallel process model (EPPM)en
dc.titleExamining the differential effectiveness of fear appeals in information security management using two-stage meta-analysisen
dc.title.serialJournal of Management Information Systemsen
dc.typeArticle - Refereeden
dc.type.dcmitypeTexten
dc.type.otherArticleen
dcterms.dateAccepted2023-04-10en
pubs.organisational-group/Virginia Techen
pubs.organisational-group/Virginia Tech/Pamplin College of Businessen
pubs.organisational-group/Virginia Tech/Pamplin College of Business/Business Information Technologyen
pubs.organisational-group/Virginia Tech/All T&R Facultyen
pubs.organisational-group/Virginia Tech/Pamplin College of Business/PCOB T&R Facultyen

Files

Original bundle
Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
2023-Apr JMIS two-stage meta-analytic SEM security POST-PRINTS + APPENDICES.pdf
Size:
2.7 MB
Format:
Adobe Portable Document Format
Description:
Accepted version