Examining the differential effectiveness of fear appeals in information security management using two-stage meta-analysis
dc.contributor.author | Lowry, Paul Benjamin | en |
dc.contributor.author | Moody, Gregory D. | en |
dc.contributor.author | Parameswaran, Srikanth | en |
dc.contributor.author | Brown, Nicholas J. | en |
dc.date.accessioned | 2023-04-12T13:02:21Z | en |
dc.date.available | 2023-04-12T13:02:21Z | en |
dc.date.issued | 2023-12-11 | en |
dc.date.updated | 2023-04-11T20:37:06Z | en |
dc.description.abstract | Most of the information security management research involving fear appeals is guided by either protection motivation theory or the extended parallel processing model. Over time, extant research has extended these theories, as well as their derivative theories, in a variety of ways, leading to several theoretical and empirical inconsistencies. The large body of fragmented, and sometimes conflicting, research has muddied the broader understanding of what drives protection- and defensive motivation. We provide guidance to the security discourse by offering the first study in the literature to employ two-stage meta-analytic structural equation modeling (TSSEM), which combines covariance-based structural equation modeling and meta-analysis. IS researchers have traditionally used meta-analysis for structural equation modeling for such purposes—an approach that has several serious statistical flaws. Using 341 systematically selected empirical security articles (representing 383 unique studies) and TSSEM, we pool a large series of five datasets to test six models, from which we examine the effects of constructs and paths in the security fear-appeals literature. We compare and test six versions of models inspired by issues in the broader fear-appeals literature. We confirm the importance of both the threat- and coping-appraisal processes; establish the central role of fear and that it has greater importance than threat; show that efficacy is a stronger predictor of protection motivation than is threat; demonstrate that response costs as currently measured are ineffective but that maladaptive rewards have a strong negative effect on protection motivation and a positive effect on defensive motivation; and provide evidence that dual models of danger control and fear control should be used. | en |
dc.description.version | Accepted version | en |
dc.format.extent | Pages 1099-1138 | en |
dc.format.mimetype | application/pdf | en |
dc.identifier.issn | 0742-1222 | en |
dc.identifier.issue | 4 | en |
dc.identifier.orcid | Lowry, Paul [0000-0002-0187-5808] | en |
dc.identifier.uri | http://hdl.handle.net/10919/114479 | en |
dc.identifier.volume | 40 | en |
dc.language.iso | en | en |
dc.publisher | Taylor & Francis | en |
dc.rights | In Copyright | en |
dc.rights.uri | http://rightsstatements.org/vocab/InC/1.0/ | en |
dc.subject | Security | en |
dc.subject | information security management (ISM) | en |
dc.subject | two-stage meta-analytic structural equation modeling (TSSEM) | en |
dc.subject | protection motivation theory (PMT) | en |
dc.subject | extended parallel process model (EPPM) | en |
dc.title | Examining the differential effectiveness of fear appeals in information security management using two-stage meta-analysis | en |
dc.title.serial | Journal of Management Information Systems | en |
dc.type | Article - Refereed | en |
dc.type.dcmitype | Text | en |
dc.type.other | Article | en |
dcterms.dateAccepted | 2023-04-10 | en |
pubs.organisational-group | /Virginia Tech | en |
pubs.organisational-group | /Virginia Tech/Pamplin College of Business | en |
pubs.organisational-group | /Virginia Tech/Pamplin College of Business/Business Information Technology | en |
pubs.organisational-group | /Virginia Tech/All T&R Faculty | en |
pubs.organisational-group | /Virginia Tech/Pamplin College of Business/PCOB T&R Faculty | en |
Files
Original bundle
1 - 1 of 1
Loading...
- Name:
- 2023-Apr JMIS two-stage meta-analytic SEM security POST-PRINTS + APPENDICES.pdf
- Size:
- 2.7 MB
- Format:
- Adobe Portable Document Format
- Description:
- Accepted version