Adaptive and Maladaptive Coping with an It Threat

ABSTRACT Numerous studies have investigated employees’ decisions to adopt IS security measures by focusing on adaptive responses. Using the Extended Parallel Processing model (EPPM), this study evaluates subjects’ adaptive and maladaptive intentions with respect to antispyware software. Our results show that both adaptive and maladaptive coping occur, and we identify antecedents of each. We advance IS security theory by considering maladaptive coping along with adaptive coping and by modeling threat and efficacy as contingent effects.

[1]  Detmar W. Straub,et al.  Structural Equation Modeling and Regression: Guidelines for Research Practice , 2000, Commun. Assoc. Inf. Syst..

[2]  P. Sheeran,et al.  Prediction and Intervention in Health-Related Behavior: A Meta-Analytic Review of Protection Motivation Theory , 2000 .

[3]  Xinguang Chen,et al.  A Cluster Randomized Controlled Trial of an Adolescent HIV Prevention Program Among Bahamian Youth: Effect at 12 Months Post-Intervention , 2009, AIDS and Behavior.

[4]  Steven Prentice-Dunn,et al.  Protection Motivation Theory and Stages of Change in Sun Protective Behavior , 2009, Journal of health psychology.

[5]  Mikko T. Siponen,et al.  Motivating IS security compliance: Insights from Habit and Protection Motivation Theory , 2012, Inf. Manag..

[6]  Ritu Agarwal,et al.  Practicing Safe Computing: A Multimedia Empirical Examination of Home Computer User Security Behavioral Intentions , 2010, MIS Q..

[7]  E. Seydel,et al.  Protection Motivation Theory , 2022 .

[8]  E. Hardin,et al.  Understanding the gender gap: Social cognitive changes during an introductory stem course. , 2016, Journal of counseling psychology.

[9]  S. Orbell,et al.  Can protection motivation theory predict behaviour? A longitudinal test exploring the role of previous behaviour , 1998 .

[10]  Younghwa Lee,et al.  An empirical investigation of anti-spyware software adoption: A multitheoretical perspective , 2008, Inf. Manag..

[11]  R. Rimal,et al.  Perceived risk and efficacy beliefs as motivators of change: Use of the risk perception attitude (RPA) framework to understand health behaviors , 2003 .

[12]  Merrill Warkentin,et al.  Threat Protection and Convenience: Antecedents of Cloud-Based Data Backup , 2014, J. Comput. Inf. Syst..

[13]  G. Kok,et al.  Behavioural intentions in response to an influenza pandemic , 2010, BMC public health.

[14]  C. Fornell,et al.  Evaluating structural equation models with unobservable variables and measurement error. , 1981 .

[15]  Kim Witte,et al.  Addressing Underlying Mechanisms to HIV/AIDS Preventive Behaviors in Ethiopia , 2002 .

[16]  Mikko T. Siponen,et al.  Neutralization: New Insights into the Problem of Employee Systems Security Policy Violations , 2010, MIS Q..

[17]  R W Rogers,et al.  Identifying effective components of alcohol misuse prevention programs. , 1982, Journal of studies on alcohol.

[18]  L. Tucker,et al.  A reliability coefficient for maximum likelihood factor analysis , 1973 .

[19]  Atreyi Kankanhalli,et al.  Studying users' computer security behavior: A health belief perspective , 2009, Decis. Support Syst..

[20]  R. Rogers Cognitive and physiological processes in fear appeals and attitude change: a revised theory of prote , 1983 .

[21]  Richard G. Netemeyer,et al.  Handbook of Marketing Scales , 1999 .

[22]  Rui Chen,et al.  Security services as coping mechanisms: an investigation into user intention to adopt an email authentication service , 2014, Inf. Syst. J..

[23]  Richard G. Netemeyer,et al.  Handbook of Marketing Scales: Multi-Item Measures for Marketing and Consumer Behavior Research , 1993 .

[24]  Izak Benbasat,et al.  Development of an Instrument to Measure the Perceptions of Adopting an Information Technology Innovation , 1991, Inf. Syst. Res..

[25]  Dennis F. Galletta,et al.  What Do Systems Users Have to Fear? Using Fear Appeals to Engender Threats and Fear that Motivate Protective Security Behaviors , 2015, MIS Q..

[26]  Princely Ifinedo,et al.  Understanding information systems security policy compliance: An integration of the theory of planned behavior and the protection motivation theory , 2012, Comput. Secur..

[27]  Mary Sumner,et al.  Information Security Threats: A Comparative Analysis of Impact, Probability, and Preparedness , 2009, Inf. Syst. Manag..

[28]  C. Carver,et al.  Assessing coping strategies: a theoretically based approach. , 1989, Journal of personality and social psychology.

[29]  Robert LaRose,et al.  Keeping our network safe: a model of online protection behaviour , 2008, Behav. Inf. Technol..

[30]  G. Ruxton The unequal variance t-test is an underused alternative to Student's t-test and the Mann–Whitney U test , 2006 .

[31]  Steven Prentice-Dunn,et al.  Protection Motivation Theory and Skin Cancer Risk: The Role of Individual Differences in Responses to Persuasive Appeals , 2005 .

[32]  Mo Adam Mahmood,et al.  Employees' adherence to information security policies: An exploratory field study , 2014, Inf. Manag..

[33]  Irene Woon,et al.  A Protection Motivation Theory Approach to Home Wireless Security , 2005, ICIS.

[34]  Tejaswini Herath,et al.  Understanding Employee Responses to Stressful Information Security Requirements: A Coping Perspective , 2014, J. Manag. Inf. Syst..

[35]  Qing Hu,et al.  Future directions for behavioral information security research , 2013, Comput. Secur..

[36]  R. W. Rogers,et al.  Effects of components of protection-motivation theory on adaptive and maladaptive coping with a health threat. , 1987, Journal of personality and social psychology.

[37]  Wynne W. Chin The partial least squares approach for structural equation modeling. , 1998 .

[38]  R W Rogers,et al.  Fear appeals and attitude change: effects of a threat's noxiousness, probability of occurrence, and the efficacy of coping responses. , 1976, Journal of personality and social psychology.

[39]  Chun-Lin Lee,et al.  The Influence of Computer Literacy and Computer Anxiety on Computer Self-Efficacy: The Moderating Effect of Gender , 2014, Cyberpsychology Behav. Soc. Netw..

[40]  Yajiong Xue,et al.  Understanding Security Behaviors in Personal Computer Usage: A Threat Avoidance Perspective , 2010, J. Assoc. Inf. Syst..

[41]  S. Lippke,et al.  The protection motivation theory within the stages of the transtheoretical model - stage-specific interplay of variables and prediction of exercise stage transitions. , 2009, British journal of health psychology.

[42]  R. Bagozzi,et al.  On the evaluation of structural equation models , 1988 .

[43]  P. Sheeran,et al.  Combining motivational and volitional interventions to promote exercise participation: protection motivation theory and implementation intentions. , 2002, British journal of health psychology.

[44]  P. Bentler,et al.  Cutoff criteria for fit indexes in covariance structure analysis : Conventional criteria versus new alternatives , 1999 .

[45]  Yu Andy Wu,et al.  Impact of Users’ Security Awareness on Desktop Security Behavior: A Protection Motivation Theory Perspective , 2016, Inf. Syst. Manag..

[46]  R. Rimal Perceived Risk and Self-Efficacy as Motivators: Understanding Individuals' Long-Term Use of Health Information. , 2001 .

[47]  K. Witte Putting the fear back into fear appeals: The extended parallel process model , 1992 .

[48]  D. Lakens,et al.  Additional file to "Why Psychologists Should by Default Use Welch's t-test Instead of Student's t-test." (in press for the International Review of Social Psychology) , 2017 .

[49]  Fred D. Davis Perceived Usefulness, Perceived Ease of Use, and User Acceptance of Information Technology , 1989, MIS Q..

[50]  Wynne W. Chin,et al.  Advancing the Theory of Adaptive Structuration: The Development of a Scale to Measure Faithfulness of Appropriation , 1997, Inf. Syst. Res..

[51]  Qing Hu,et al.  Is spyware an Internet nuisance or public menace? , 2005, CACM.

[52]  H. Leventhal,et al.  Findings and Theory in the Study of Fear Communications , 1970 .

[53]  Lee A. Freeman,et al.  Are Men More Technology-Oriented Than Women? The Role of Gender on the Development of General Computer Self-Efficacy of College Students , 2010, AMCIS.

[54]  M. Conner,et al.  Predicting health behaviour : research and practice with social cognition models , 2005 .

[55]  Younghwa Lee,et al.  Threat or coping appraisal: determinants of SMB executives’ decision to adopt anti-malware software , 2009, Eur. J. Inf. Syst..

[56]  R. Stine,et al.  Bootstrapping Goodness-of-Fit Measures in Structural Equation Models , 1992 .

[57]  Qing Hu,et al.  The Centrality of Awareness in the Formation of User Behavioral Intention toward Protective Information Technologies , 2007, J. Assoc. Inf. Syst..

[58]  R. W. Rogers,et al.  Protection Motivation Theory and preventive health: beyond the Health Belief Model , 1986 .

[59]  Allan F Williams,et al.  Perceived Risk and Other Predictors and Correlates of Teenagers' Safety Belt Use During the First Year of Licensure , 2008, Traffic injury prevention.

[60]  R R McCrae Situational determinants of coping responses: loss, threat, and challenge. , 1984, Journal of personality and social psychology.

[61]  H. Raghav Rao,et al.  Protection motivation and deterrence: a framework for security policy compliance in organisations , 2009, Eur. J. Inf. Syst..

[62]  Dominic Abrams,et al.  Exploring teenagers' adaptive and maladaptive thinking in relation to the threat of hiv infection. , 1994, Psychology & health.

[63]  Merrill Warkentin,et al.  Fear Appeals and Information Security Behaviors: An Empirical Study , 2010, MIS Q..

[64]  M. Allen,et al.  A Meta-Analysis of Fear Appeals: Implications for Effective Public Health Campaigns , 2000, Health education & behavior : the official publication of the Society for Public Health Education.

[65]  A. Good,et al.  Can the effectiveness of health promotion campaigns be improved using self-efficacy and self-affirmation interventions? An analysis of sun protection messages , 2011, Psychology & health.

[66]  Yajiong Xue,et al.  Avoidance of Information Technology Threats: A Theoretical Perspective , 2009, MIS Q..

[67]  Robert Ho,et al.  Predicting Intention for Protective Health Behaviour: A test of the Protection versus the Ordered Protection Motivation Model , 2000 .

[68]  D. Lakens,et al.  Why Psychologists Should by Default Use Welch's t-test Instead of Student's t-test with Unequal Group Sizes , 2017 .

[69]  Dahui Li,et al.  Fighting identity theft: The coping perspective , 2012, Decis. Support Syst..

[70]  James C. Anderson,et al.  STRUCTURAL EQUATION MODELING IN PRACTICE: A REVIEW AND RECOMMENDED TWO-STEP APPROACH , 1988 .

[71]  Detmar W. Straub,et al.  Security lapses and the omission of information security measures: A threat control model and empirical test , 2008, Comput. Hum. Behav..