This paper provides data used to analyze the methodological replication of Menard et al. (2017) by Yang et al. (2020). The replication paper studied organizational users’ intentions to install password management software when they faced different appeals/persuasive messages. There were three different types of appeals based on Protection Motivation Theory, Self-Determination Theory, and the integrated model of the two. We provide the description here to meet the open data standards. Our dataset contained three separate files. PMT_CLEAN file was on PMT appeal; SDT_CLEAN file was on SDT appeals; INTEGRATED_CLEAN file was on the integrated appeals. The PMT appeal contained 157 observations; the SDT appeal contained 156 observations; the integrated appeal contained 153 observations. There is a total of 466 observations, which includes the following constructs: behavioral intention to install password manager software, response performance motivation, threat severity, threat susceptibility, response efficacy, self-efficacy, response cost, autonomy, competence, and relatedness. Control variables include gender, ethnicity, age, employee status, educational background, occupation, and computing experience.
Yang, Ning; Singh, Tripti; and Johnston, Allen
"Open Data: A Replication Study of User Motivation in Protecting Information Security using Protection Motivation Theory and Self-Determination Theory,"
AIS Transactions on Replication Research: Vol. 6, Article 12.
Available at: https://aisel.aisnet.org/trr/vol6/iss1/12
Additional FilesYang, Singh, & Johnston - Open Data.zip (14 kB)
Open Data File
When commenting on articles, please be friendly, welcoming, respectful and abide by the AIS eLibrary Discussion Thread Code of Conduct posted here.