155
Views
3
CrossRef citations to date
0
Altmetric
Original Articles

Impact of Negative Message Framing on Security Adoption

, &
Pages 41-51 | Received 19 Oct 2009, Accepted 28 Jan 2010, Published online: 11 Dec 2015

References

  • Adams, A., and M. Sasse, “Users are not the enemy,” Communications of the ACM, (42:12), 1999, 40–46.
  • Agarwal, R., and E. Karahanna, “Time flies when you're having fun: Cognitive absorption and beliefs about information technology usage,” MIS Quarterly, (24:4), 2000, 665–694.
  • Aytes, K., and T. Connolly, “Computer security and risky computing practices: A rational choice perspective,” Journal of Organizational and End User Computing, (16:3), 2004, 22–40.
  • Becker, C., M. Glascoff, T. Mitchell, et al. “Assessing perceived health and associated health-promoting behaviors: An investigation of methods used to assess health status,” Journal of Applied Social Psychology, (37:2), 2007, 227–242.
  • Casey, M. K., “Fatalism and the modification of the extended parallel process model.” Speech Communication Association, San Antonio, TX, 1995.
  • Chang, C., “Health-care product advertising: The influences of message framing and perceived product characteristics,” Psychology & Marketing, (24:2), 2007, 143–169.
  • Cox, D., and A. Cox, “Communicating the consequences of early detection: The role of evidence and framing,” Journal of Marketing, (65:3), 2001, 91–103.
  • Davis, F., “Perceived usefulness, perceived ease of use, and user acceptance of information technology,” MIS Quarterly, (13:3), 1989, 319–339.
  • Dejong, W., and L. Wallack, “A critical perspective on the drug czar's antidrug media campaign,” Journal of Health Communication, (4:2), 1999, 155–160.
  • Dickson, G., G. DeSanctis, and D. McBride, “Understanding the effectiveness of computer graphics for decision support: A cumulative experimental approach,” Communications of the ACM, (29:1), 1986, 40–47.
  • Dillard, J., P.C. Dillard, L. Godbold, et al. “The multiple affective outcomes of aids PSAs: Fear appeals do more than scare people,” Communication Research, (23:1), 1996, 44–72.
  • Dillard, J., and R. Nabi, “The persuasive influence of emotion in cancer prevention and detection influence,” Journal of Communication, (56:3), 2006, S123–S139.
  • Donovan, R., and G. Jalleh, “Positively versus negatively framed product attributes: The influence of involvement,” Psychology & Marketing, (16:7), 1999, 613–630.
  • Fishbein, M., and I. Ajzen, Belief, attitude, intention and behavior, Addison-Wesley, Reading, MA, 1975.
  • Furnell, S., M. Gennatou, and P. Dowland, “A prototype tool for information security awareness and training,” Logistics Information Management, (15:6), 2002, 352–357.
  • Ganzach, Y., and N. Karsahi, “Message framing and buying behavior: A field experiment,” Journal of Business Research, (32:2), 1995, 11–17.
  • Gefen, D., E. Karahanna, and D. Straub, “Trust and TAM in online shopping: An integrated model,” MIS Quarterly, (27:1), 2003, 51–90.
  • Gopal, R., and G. Sanders, “The effect of preventive and deterrent software piracy strategies on producer profits.” Thirteenth International Conference on Information Systems, Dallas, TX, 1992.
  • Gopal, R., and G. Sanders, “Preventive and deterrent controls for software piracy,” Journal of Management Information Systems, (13:4), 1997, 29–47.
  • Gordon, L., M. Loeb, W. Lucyshyn, et al. CSI/FBI Computer Crime and Security Survey, Computer Security Institute, 2006.
  • Hair, J., R. Anderson, R. Tatham, et al. Multivariate data analysis, 6th ed., Prentice Hall, Englewood Cliffs, NJ, 2005.
  • Hoffer, J., and D. Straub, “The 9 to 5 underground: Are you policing computer crimes,” Sloan Management Review, (30:4), 1989, 35–44.
  • Jarvenpaa, S., and D. Leidner, “Communication and trust in global virtual teams,” Organization Science, (10:6), 1999, 791–815.
  • Johnston, A., and M. Warkentin, “Fear appeals and information security behaviors: An empirical study,” MIS Quarterly, (34:3), 2010, 549–566.
  • Jones, L., S.R. Jones, and K. Courneya, “The effects of source credibility and message framing on exercise intentions, behaviors, and attitudes: An integration of the elaboration likelihood model and prospect theory,” Journal of Applied Social Psychology, (33:1), 2006, 179–196.
  • Kahneman, D., and A. Tversky, “Prospect theory: An analysis of decision under risk,” Econometrica, (47:3), 1979, 263–291.
  • Karahanna, E., R. Agarwal, and C. Angst, “Reconceptualizing compatibility beliefs in technology acceptance research,” MIS Quarterly, (30:4), 2006, 781–804.
  • Ma, Q., A. Johnston, and M. Pearson, “Information security management objectives and practices: A parsimonious framework,” Information Management and Computer Security, (16:3), 2008, 251–270.
  • Maheswaran, D., and J. Meyers-Levy, “The influence of message framing and issue involvement,” Journal of Marketing Research, (27:3), 1990, 361–367.
  • Maner, J., and M. Gerend, “Motivationally selective risk judgments: Do fear and curiosity boost the boons or the banes?” Organizational Behavior and Human Decision Processes, (103:2), 2007, 256–267.
  • Meyerowitz, B., and S. Chaiken, “The effect of message framing on breast self examination attitudes, intentions, and behavior,” Journal of Personality and Social Psychology, (52:4), 1987, 500–510.
  • Mohamed, A., “The routes to end-point security,” Computer Weekly, pp. 22–24, June 12, 2007.
  • Niederman, F., and G. DeSanctis, “The impact of a structured-argument approach on group problem formulation,” Decision Sciences, (26:4), 1995, 451–474.
  • O'Keefe, D., Persuasion: Theory and research, Sage, Newbury Park, CA, 1990.
  • Robberson, M., and R. Rogers, “Beyond fear appeals: Negative and positive persuasive appeals to health and self-esteem,” Journal of Applied Social Psychology, (13:3), 2006, 277–287.
  • Rosenthal, D., “Intrusion detection technology: Leveraging the organization's security posture,” Information Systems Management, (19:1), 2002, 35–44.
  • Siponen, M., “A conceptual foundation for organizational information security awareness,” Information Management and Computer Security, (8:1), 2000, 31–41.
  • Siponen, M., “Five dimensions of information security awareness,” Computers and Society, (31:2), 2001, 24–29.
  • Skinner, C., V. Strecher, and H. Hospers, “Physicians' recommendations for mammography: Do tailored messages make a difference?” American Journal of Public Health, (84:1), 1994, 43–49.
  • Stablein, R., “Data in organization studies,” Studying Organizations: Theory and Method, S. Clegg and C. Hardy, eds., pp. 255–271, London: Sage Publications, 1999.
  • Stanton, J., K. Stam, I. Guzman, et al. “Examining the linkage between organizational commitment and information security.” IEEE Systems, Man, and Cybernetics Conference, Washington, DC, 2003.
  • Straub, D., “Effective IS security: An empirical study,” Information Systems Research, (1:3), 1990, 255–270.
  • Straub, D., and W. Nance, “Discovering and disciplining computer abuse in organizations: A field study,” MIS Quarterly, (14:1), 1990, 45–62.
  • Straub, D., and R. Welke, “Coping with systems risk: Security planning models for management decision making,” MIS Quarterly, (22:4), 1998, 441–469.
  • Tversky, A., and D. Kahneman, “The framing of decisions and the psychology of choice,” Science, (211:4481), 1981, 453–458.
  • Wang, W., and I. Benbasat, “Trust and adoption of online recommendation agents,” Journal of the Association of Information Systems, (6:3), 2005, 72–101.
  • Warkentin, M., K. Davis, and E. Bekkering, “Introducing the check-off password system (COPS): An advancement in user authentication methods and information security,” Journal of End User Computing, (16:3), 2004, 41–58.
  • Warkentin, M., L. Sayeed, and R. Hightower, “Virtual teams versus face-to-face teams: An exploratory study of a web-based conference system,” Decision Sciences, (28:4), 1997, 975–996.
  • Warkentin, M., J. Shropshire, and A. Johnston, “The IT security adoption conundrum: An initial step toward validation of applicable measures.” Americas Conference on Information Systems, Keystone, CO, 2007
  • Warkentin, M., and R. Willison, “Behavioral and policy issues in information systems security: the insider threat,” European Journal of Information Systems, (18:2), 2009, 101–105.
  • Whaley, C., “Security companies might be messing with IT managers' minds,” Computing Canada, 31, 2005.
  • Whitman, M., “Enemy at the gates: Threats to information security,” Communications of the ACM, (46:8), 2003, 91–95.
  • Wilson, D., K. Wallston, and J. King, “Effects of message contract framing, motivation to quit, and self-efficacy on smoking reduction,” Journal of Applied Social Psychology, (20:4), 1990, 531–547.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.