Learning from Climate Research: Applying the finite Pool of worry on Cyber-Related Risks

Experts in climate change and cybersecurity face a similar challenge: although most people do perceive the severity and likelihood of hazards like global warming or data theft, they rarely actively engage in a change of behaviour to decrease their risk that exposure to the hazard will lead to negative consequences. Whereas most research in Information Systems predominantly draws on cognitive, consequentialist models, climate researchers claim that negative affect can be seen as the wellspring of actions and that a lack of emotions and affects delays or defers behavioral changes. Especially, the role of worry as trigger for behavioral change has been accentuated in the last decade but remains largely overlooked in the context of cyber-related hazards. However, behavioral scientists claim that humans’ capacity of emotions is limited which leads to the hypothetical mental formation of a Hierarchy of Concerns. Only risks that are perceived as probable, serious and concern-inducing will elicit personal worry which ultimately leads to action. Due to the limited capacity of emotions, climate researchers attribute inaction to the so-called Finite Pool of Worry. We thus assume that cyber-related hazards are affected similarly by these mental formations and present our experimental approach aimed at demonstrating its existence.

[1]  Teresa A. Myers,et al.  The Polls—Trends Twenty Years of Public Opinion about Global Warming , 2007 .

[2]  M. Becker,et al.  Health Belief Model and Personal Health Behavior , 1976 .

[3]  G. W. Fischer,et al.  Preferences for separating or combining events. , 1991, Journal of personality and social psychology.

[4]  Linda Little,et al.  Unpacking Security Policy Compliance: The Motivators and Barriers of Employees' Security Behaviors , 2015, SOUPS.

[5]  Karl Dake Myths of Nature: Culture and the Social Construction of Risk , 1992 .

[6]  S. Linden The social-psychological determinants of climate change risk perceptions: Towards a comprehensive model , 2015 .

[7]  Steven Prentice-Dunn,et al.  Protection motivation theory. , 1997 .

[8]  Ming-Chi Lee,et al.  Factors influencing the adoption of internet banking: An integration of TAM and TPB with perceived risk and perceived benefit , 2009, Electron. Commer. Res. Appl..

[9]  E. Higueras The Global Risk Report 2017 , 2017 .

[10]  Sadie Creese,et al.  Individual Differences in Cyber Security Behaviors: An Examination of Who Is Sharing Passwords , 2015, Cyberpsychology Behav. Soc. Netw..

[11]  Stephen M. Johnson,et al.  The affect heuristic in judgments of risks and benefits , 2000 .

[12]  Sabine M. Marx,et al.  The Role of Climate Perceptions, Expectations, and Forecasts in Farmer Decision Making: The Argentine Pampas and South Florida: Final Report of an IRI Seed Grant Project , 2004 .

[13]  Gary McGraw Security Fatigue? Shift Your Paradigm , 2014, Computer.

[14]  B. Fischhoff,et al.  How safe is safe enough? A psychometric study of attitudes towards technological risks and benefits , 1978 .

[15]  Paul A. Pavlou,et al.  Predicting E-Services Adoption: A Perceived Risk Facets Perspective , 2002, Int. J. Hum. Comput. Stud..

[16]  E. Weber Experience-Based and Description-Based Perceptions of Long-Term Risk: Why Global Warming does not Scare us (Yet) , 2006 .

[17]  A. Damasio,et al.  Deciding Advantageously Before Knowing the Advantageous Strategy , 1997, Science.

[18]  J. Fleiss Measuring nominal scale agreement among many raters. , 1971 .

[19]  Qing Hu,et al.  Future directions for behavioral information security research , 2013, Comput. Secur..

[20]  I. Ajzen,et al.  Understanding Attitudes and Predicting Social Behavior , 1980 .

[21]  Sarah Spiekermann,et al.  Online social networks: why we disclose , 2010, J. Inf. Technol..

[22]  A. Tversky,et al.  Prospect theory: an analysis of decision under risk — Source link , 2007 .

[23]  Douglas G. Altman,et al.  Practical statistics for medical research , 1990 .

[24]  Paul Slovic,et al.  Judgment under uncertainty: Corrective procedures , 1982 .

[25]  B. Fischhoff,et al.  Facts and Fears: Understanding Perceived Risk , 2005 .

[26]  Johnny Saldaña,et al.  The Coding Manual for Qualitative Researchers , 2009 .

[27]  S. Epstein Integration of the cognitive and the psychodynamic unconscious. , 1994, The American psychologist.

[28]  R. Nesse,et al.  Risk Perception by Patients with Anxiety Disorders , 1994, The Journal of nervous and mental disease.

[29]  Arnold Vedlitz,et al.  Personal Efficacy, the Information Environment, and Attitudes Toward Global Warming and Climate Change in the United States , 2008, Risk analysis : an official publication of the Society for Risk Analysis.

[30]  Daniel R. Horne,et al.  The Privacy Paradox: Personal Information Disclosure Intentions versus Behaviors , 2007 .

[31]  Peter Buxmann,et al.  Cloud Computing Providers' Unrealistic Optimism regarding IT Security Risks: A Threat to Users? , 2013, ICIS.

[32]  Margôt Kuttschreuter,et al.  Perceived usefulness, personal experiences, risk perception and trust as determinants of adoption of e-government services in The Netherlands , 2007, Comput. Hum. Behav..

[33]  Sophie A. Nicholson-Cole,et al.  Barriers perceived to engaging with climate change among the UK public and their policy implications , 2007 .

[34]  H Kunreuther,et al.  Determinants of Priority for Risk Reduction: The Role of Worry , 2000, Risk analysis : an official publication of the Society for Risk Analysis.

[35]  Ortwin Renn,et al.  The Social Amplification of Risk: A Conceptual Framework , 1988 .

[36]  L Sjöberg,et al.  Worry and Risk Perception , 1998, Risk analysis : an official publication of the Society for Risk Analysis.

[37]  Christopher K. Hsee,et al.  Risk as Feelings , 2001, Psychological bulletin.

[38]  S. Kaplan,et al.  On The Quantitative Definition of Risk , 1981 .

[39]  R. C. Silver,et al.  Mental- and Physical-Health Effects of Acute Exposure to Media Images of the September 11, 2001, Attacks and the Iraq War , 2013, Psychological science.

[40]  F. H. Mcclintock,et al.  Crime in England and Wales , 1969 .

[41]  A. Leiserowitz International Public Opinion, Perception, and Understanding of Global Climate Change , 2007 .

[42]  S. Linden Determinants and Measurement of Climate Change Risk Perception, Worry, and Concern , 2017 .

[43]  R. Zajonc Feeling and thinking : Preferences need no inferences , 1980 .

[44]  Baruch Fischhoff,et al.  The psychometric study of risk perception , 1986 .

[45]  H. Simon Models of Bounded Rationality: Empirically Grounded Economic Reason , 1997 .

[46]  L. Sjöberg Editorial: Asking questions about risk and worry: dilemmas of the pollsters , 2004 .

[47]  L Guttman,et al.  Worry, fear, and concern differentiated. , 1976, Issues in Mental Health Nursing.

[48]  Yacov Y Haimes,et al.  On the Complex Definition of Risk: A Systems‐Based Approach , 2009, Risk analysis : an official publication of the Society for Risk Analysis.

[49]  G. Fricchione Descartes’ Error: Emotion, Reason and the Human Brain , 1995 .

[50]  Melissa L. Finucane,et al.  Risk as Analysis and Risk as Feelings: Some Thoughts about Affect, Reason, Risk, and Rationality , 2004, Risk analysis : an official publication of the Society for Risk Analysis.

[51]  A. Braithwaite The Logic of Public Fear in Terrorism and Counter-terrorism , 2013 .

[52]  P. Sheeran,et al.  The Intention–Behavior Gap , 2016 .

[53]  E. Seydel,et al.  Protection Motivation Theory , 2022 .

[54]  P. Slovic,et al.  Science Current Directions in Psychological Risk Perception and Affect on Behalf Of: Association for Psychological Science Risk Perception and Affect , 2022 .

[55]  Therese Kobbeltvedt,et al.  The Risk-as-feelings hypothesis in a Theory-of-planned-behaviour perspective , 2009, Judgment and Decision Making.

[56]  R. W. Rogers,et al.  A meta-analysis of research on protection motivation theory. , 2000 .

[57]  Peter Buxmann,et al.  Gender Differences in Mobile Users' IT Security Appraisals and Protective Actions: Findings from a Mixed-Method Study , 2016, ICIS.

[58]  Dennis F. Galletta,et al.  What Do Systems Users Have to Fear? Using Fear Appeals to Engender Threats and Fear that Motivate Protective Security Behaviors , 2015, MIS Q..

[59]  Chuan-Hoo Tan,et al.  Addressing the Personalization-Privacy Paradox: An Empirical Assessment from a Field Experiment on Smartphone Users , 2013, MIS Q..

[60]  Paul Slovic,et al.  Why worry? Worry, risk perceptions, and willingness to act to reduce medical errors. , 2006, Health psychology : official journal of the Division of Health Psychology, American Psychological Association.

[61]  H. Simon,et al.  From substantive to procedural rationality , 1976 .

[62]  L. Pessoa How do emotion and motivation direct executive control? , 2009, Trends in Cognitive Sciences.

[63]  Young U. Ryu,et al.  Unrealistic optimism on information security management , 2012, Comput. Secur..

[64]  S. J,et al.  Distinctions Between Worry and Perceived Risk in the Context of the Theory of Planned Behavior , 2008 .

[65]  Alessandro Acquisti,et al.  Privacy in electronic commerce and the economics of immediate gratification , 2004, EC '04.