Abstract
Organizations increasingly use fear appeals to motivate users to engage in behaviors that protect information security. Though academic interest in the topic has burgeoned, prior research has mainly focused on providing process evidence on how low- and high-threat security messages influence protective behaviors. According to protection motivation theory, however, the threat-appraisal phase, in which the receiver evaluates whether a fear appeal is threatening or not, follows exposure to the fear appeal. One can indeed design fear appeals to manipulate different dimensions, including the threat depicted and the coping response provided. These dimensions, in turn, influence protection motivation. The general focus on low- and high-threat messages runs the risks of 1) foregoing key theoretical insights that can stem from specific message manipulations and 2) inadvertently introducing message confounds. To address this issue, we introduce construal-level theory as the theoretical lens to design and identify potential confounds in fear-appeal manipulations. We further discuss how researchers can seamlessly integrate construal-level theory into information security studies based on protection motivation theory. Our work has important theoretical and methodological implications for IS security researchers.
DOI
10.17705/1CAIS.04522
Recommended Citation
Orazi, D. C., Warkentin, M., & Johnston, A. C. (2019). Integrating Construal-level Theory in Designing Fear Appeals in IS Security Research. Communications of the Association for Information Systems, 45, pp-pp. https://doi.org/10.17705/1CAIS.04522
When commenting on articles, please be friendly, welcoming, respectful and abide by the AIS eLibrary Discussion Thread Code of Conduct posted here.