User Motivations in Protecting Information Security: Protection Motivation Theory Versus Self-Determination Theory

Philip Menard,Gregory J. Bott,Robert E. Crossler
DOI: https://doi.org/10.1080/07421222.2017.1394083
IF: 7.582
2017-10-02
Journal of Management Information Systems
Abstract:Managers desiring to protect information systems must understand how to most effectively motivate users to engage in secure behaviors. Information security researchers have frequently studied individuals’ performance of secure behaviors in response to threats. Protection motivation theory (PMT) has been used to explain individuals’ propensity to engage in voluntary secure behaviors, but the adaptation of this theory has yielded inconsistent results. Motivation as a measurable construct, as derived from self-determination theory (SDT), has never been included in or compared against PMT. In this study, we construct security messages that appeal to individuals’ intrinsic motivation, rather than fear, as a way to elicit secure responses. Using three sets of respondents, we integrated the SDT and PMT models and compared the native models in the context of security behaviors. We demonstrate that by using data- and individual-focused appeals and providing choices for users, managers may observe greater intention to engage in secure behavior among employees.
information science & library science,management,computer science, information systems
What problem does this paper attempt to address?