Neural correlates of protection motivation for secure IT behaviors: An fMRI examination

Merrill Warkentin, Eric Walden, Allen C. Johnston, Detmar William Straub

Research output: Contribution to journalArticle

39 Scopus citations

Abstract

Information security management programs have long included “fear appeals”, managerial communiqués designed to promote secure behaviors among organizational insiders. However, recent research has found a conflict between the predictions of contemporary fear appeal theory for how we expect individuals to experience fear appeals and what actually occurs in IS security situations. Using the opportunity presented by neuroimaging tools to examine cognitive and affective reactions to fear appeals, we take a comparative look at the contentions of fear appeal theory and the realities of what insiders experience neurologically when exposed to ecologically relevant IS security fear appeals. Our fMRI results suggest that fear appeals elicit threat and threat response assessments, which partially supports fear appeal theory but does not support the presence of an actual fear response. Furthermore, appraisals of recommended threat responses had a stronger impact on intentions to enact security behaviors than appraisals of the threat itself, which suggests that a focus on threats might be misplaced. Instead, focusing on ways to make the responses to the threats more appealing to users might work better. These controversial findings suggest future research that should explore how fear appeals play out in IS security and in what ways.

Original languageEnglish
Pages (from-to)194-215
Number of pages22
JournalJournal of the Association for Information Systems
Volume17
Issue number3
DOIs
StatePublished - 2016

Keywords

  • Affect
  • Cognition
  • Fear appeal theory
  • IS security
  • Neural correlates
  • Self-efficacy
  • Threat
  • Threat response

Fingerprint Dive into the research topics of 'Neural correlates of protection motivation for secure IT behaviors: An fMRI examination'. Together they form a unique fingerprint.

  • Cite this