IDEAS home Printed from https://ideas.repec.org/a/taf/tjisxx/v18y2009i2p177-187.html
   My bibliography  Save this article

Threat or coping appraisal: determinants of SMB executives’ decision to adopt anti-malware software

Author

Listed:
  • Younghwa Lee
  • Kai R Larsen

Abstract

This study presents an empirical investigation of factors affecting small- and medium-sized business (SMB) executives’ decision to adopt anti-malware software for their organizations. A research model was developed by adopting and expanding the protection motivation theory from health psychology, which has successfully been used to investigate the effect of threat and coping appraisal on protective actions. A questionnaire-based field survey with 239 U.S. SMB executives was conducted, and the data were analyzed using partial least squares (PLS). This study demonstrates that threat and coping appraisal successfully predict SMB executives’ anti-malware software adoption intention, leading to SMB adoption. In addition, considerable variance in adoption intention and actual SMB adoption is addressed by social influence from key stakeholders and situation-specific variables, such as IT budget and vendor support. Further, the generalizability of the model was tested using industry type and IS expertise. The adoption intention of IS experts and IT intensive industries was mainly affected by threat appraisal and social influence, while that of non-IS experts and non-IT intensive industries was significantly influenced by coping appraisal and IT budget. Vendor support was a key facilitator of the anti-malware adoption for IS experts and IT intensive industry groups, while IT budget was for non-IS expert and non-IT intensive industry groups. Key implications for theory and practice are discussed.

Suggested Citation

  • Younghwa Lee & Kai R Larsen, 2009. "Threat or coping appraisal: determinants of SMB executives’ decision to adopt anti-malware software," European Journal of Information Systems, Taylor & Francis Journals, vol. 18(2), pages 177-187, April.
  • Handle: RePEc:taf:tjisxx:v:18:y:2009:i:2:p:177-187
    DOI: 10.1057/ejis.2009.11
    as

    Download full text from publisher

    File URL: http://hdl.handle.net/10.1057/ejis.2009.11
    Download Restriction: Access to full text is restricted to subscribers.

    File URL: https://libkey.io/10.1057/ejis.2009.11?utm_source=ideas
    LibKey link: if access is restricted and if your library uses this service, LibKey will redirect you to where you can use your library subscription to access this item
    ---><---

    As the access to this document is restricted, you may want to search for a different version of it.

    Citations

    Citations are extracted by the CitEc Project, subscribe to its RSS feed for this item.
    as


    Cited by:

    1. Randy Yee Man Wong & Christy M. K. Cheung & Bo Xiao & Jason Bennett Thatcher, 2021. "Standing Up or Standing By: Understanding Bystanders’ Proactive Reporting Responses to Social Media Harassment," Information Systems Research, INFORMS, vol. 32(2), pages 561-581, June.
    2. Sefora Hailu Yoseph & Gao Chongyan, 2024. "Antecedents of Consumers’ Privacy Protection Behavior and Intention to Disclose Personal Information: Mediating Role of Personal Information Transparency," International Journal of Science and Business, IJSAB International, vol. 37(1), pages 96-118.
    3. Davit Marikyan & Savvas Papagiannidis, 2024. "Exercising the “Right to Repair”: A Customer’s Perspective," Journal of Business Ethics, Springer, vol. 193(1), pages 35-61, August.
    4. Olfa Ismail, 2022. "Designing Information Security Culture Artifacts to Improve Security Behavior: An Evaluation in SMEs [Conception des artefacts de culture de sécurité de l'information pour améliorer les comportemen," Post-Print hal-04215032, HAL.

    More about this item

    Statistics

    Access and download statistics

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:taf:tjisxx:v:18:y:2009:i:2:p:177-187. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    We have no bibliographic references for this item. You can help adding them by using this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Chris Longhurst (email available below). General contact details of provider: http://www.tandfonline.com/tjis .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.