IDEAS home Printed from https://ideas.repec.org/p/hal/journl/hal-04711810.html
   My bibliography  Save this paper

Protection motivation theory in information security behavior research: reconsidering the fundamentals

Author

Listed:
  • Mikko Siponen

    (UA - University of Alabama [Tuscaloosa])

  • Mikko Rönkkö

    (JYU - University of Jyväskylä)

  • Liu Fufan

    (IÉSEG School Of Management [Puteaux])

  • Steffi Haag

    (Heinrich Heine Universität Düsseldorf = Heinrich Heine University [Düsseldorf])

  • Gabriella Laatikainen

    (JYU - University of Jyväskylä)

Abstract

Scholars commonly use protection motivation theory (PMT) by Rogers to examine information systems (IS) security behaviors and behavioral intentions. A recent influential paper by Boss, Galletta, Lowry, Moody, and Polak (2015; hereafter BGLMP) in MIS Quarterly outlines correct and incorrect uses of PMT in Information Security behavior research. In this paper, we review some of BGLMP's key recommendations, such as the claim that all IS behavior studies that apply PMT should always use the model of the full theory, contain and measure fear, and measure actual behaviors. We defend an interpretation of Rogers (1975, 1983) that differs from the interpretation that BGLMP propose. We present evidence that Rogers' PMT and the empirical evidence do not adequately support many of BGLMP's suggestions and that these suggestions contradict good scientific practices (e.g., restricting the use of the method of isolation) that the philosophy of science and the original literature on PMT uphold. As a result, if reviewers and editors continue to embrace these recommendations, they could hinder the progress of IS behavior research by not allowing isolation or the combination of different theoretical components. In contrast to BGLMP's paper, we argue that further PMT research can focus on isolated PMT components and combine them with other theories. Some of our ideas (e.g., isolation) are not PMT-specific and could be useful for IS research in general. In summary, we contest BGLMP's recommendations and offer revised recommendations in return.

Suggested Citation

  • Mikko Siponen & Mikko Rönkkö & Liu Fufan & Steffi Haag & Gabriella Laatikainen, 2023. "Protection motivation theory in information security behavior research: reconsidering the fundamentals," Post-Print hal-04711810, HAL.
  • Handle: RePEc:hal:journl:hal-04711810
    DOI: 10.17705/1CAIS.05348
    as

    Download full text from publisher

    To our knowledge, this item is not available for download. To find whether it is available, there are three options:
    1. Check below whether another version of this item is available online.
    2. Check on the provider's web page whether it is in fact available.
    3. Perform a search for a similarly titled item that would be available.

    More about this item

    Statistics

    Access and download statistics

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:hal:journl:hal-04711810. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    We have no bibliographic references for this item. You can help adding them by using this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: CCSD (email available below). General contact details of provider: https://hal.archives-ouvertes.fr/ .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.