468
Views
1
CrossRef citations to date
0
Altmetric
Research Article

Examining the Differential Effectiveness of Fear Appeals in Information Security Management Using Two-Stage Meta-Analysis

, , &

References

  • Aguinis, H; Beaty, J.C.; Boik, R.J.; and Pierce, C.A. Effect size and power in assessing moderating effects of categorical variables using multiple regression: A 30-year review. Journal of Applied Psychology, 90, 1 (2005), 94–107.
  • Aguinis, H; Dalton, D.R.; Bosco, F.A.; Pierce, C.A.; and Dalton, C.M. Meta-analytic choices and judgment calls: Implications for theory building and testing, obtained effect sizes, and scholarly impact. Journal of Management, 37, 1 (2012), 5–38.
  • Aguinis, H; Pierce, C.A.; Bosco, F.A.; Dalton, D.R.; and Dalton, C.M. Debunking myths and urban legends about meta-analysis. Organizational Research Methods, 14, 2 (2011), 306–331.
  • Aigbefo, Q.A.; Blount, Y.; and Marrone, M. The influence of hardiness and habit on security behaviour intention. Behaviour & Information Technology, 41, 6 (2022), 1151–1170.
  • Akaike, H. Maximum likelihood identification of Gaussian autoregressive moving average models. Biometrika, 60, 2 (1973), 255–265.
  • Allen, M.P. Understanding Regression Analysis. New York: Plenum Press, 1997.
  • Baroudi, JJ and Orlikowski, WJ. The problem of statistical power in MIS research. MIS Quarterly, 13, 1 (1989), 87–106.
  • Barrick, M.R.; and Mount, M.K. The big five personality dimensions and job performance: A meta-analysis. Personnel Psychology, 44, 1 (1991), 1–26.
  • Bax, S.; McGill, T.; and Hobbs, V. Maladaptive behaviour in response to email phishing threats: The roles of rewards and response costs. Computers & Security, 106 (2021), Article: 102278.
  • Begg, C.B.; and Mazumdar, M. Operating characteristics of a rank correlation test for publication bias. Biometrics, 50, 4 (1994), 1088–1101.
  • Bergh, D.D.; Aguinis, H.; Heavey, C.; Ketchen, D.J.; Boyd, B.K.; Su, P.; Lau, C.L.; and Joo, H. Using meta-analytic structural equation modeling to advance strategic management research: Guidelines and an empirical illustration via the strategic leadership-performance relationship. Strategic Management Journal, 37, 3 (2016), 477–497.
  • Boehmer, J.; LaRose, R.; Rifon, N.; Alhabash, S.; and Cotten, S. Determinants of online safety behaviour: Towards an intervention strategy for college students. Behaviour & Information Technology, 34, 10 (2015), 1022–1035.
  • Borenstein, M; Cooper, H; Hedges, L; and Valentine, J. Effect sizes for continuous data. In L.V. Hedges, H. Cooper, and J.C. Valentine (eds.), The Handbook of Research Synthesis and Meta-analysis, end ed. New York: Russell Sage Foundation, 2009, pp. 221–235.
  • Borenstein, M.; Hedges, L.V.; Higgins, J.P.; and Rothstein, H.R. Introduction to Meta-Analysis. West Sussex, UK: John Wiley & Sons, 2011.
  • Boss, S.R.; Galletta, D.F.; Lowry, P.B.; Moody, G.D.; and Polak, P. What do users have to fear? Using fear appeals to engender threats and fear that motivate protective security behaviors. MIS Quarterly, 39, 4 (2015), 837–864.
  • Bozdogan, H. Model selection and Akaike’s information criterion (AIC): The general theory and its analytical extensions. Psychometrika, 52, 3 (1987), 345–370.
  • Burnham, K.; and Anderson, D. Model Selection and Multimodel Inference. New York, NY: Springer-Verlag, 2002.
  • Burns, A.J.; Roberts, T.L.; Posey, C.; Bennett, R.J.; and Courtney, J.F. Intentions to comply versus intentions to protect: A VIE theory approach to understanding the influence of insiders’ awareness of organizational SETA efforts. Decision Sciences, 49, 6 (2018), 1187–1228.
  • Burns, A.J.; Roberts, T.L.; Posey, C.; and Lowry, P.B. Examining the influence of organisational insiders’ psychological capital on information security threat and coping appraisals. Computers in Human Behavior, 68, March (2017), 190–209.
  • Burns, A.J.; Roberts, T.L.; Posey, C.; and Lowry, P.B. The adaptive roles of positive and negative emotions in organizational insiders’ engagement in security-based precaution taking. Information Systems Research, 30, 4 (2019), 1228–1247.
  • Burns, A.J.; Roberts, T.L.; Posey, C.; Lowry, P.B., and Fuller, B. Going beyond deterrence: A middle-range theory of motives and controls for insider computer abuse. Information Systems Research 34, 1 (2023), 342–362.
  • Card, N.A. Applied Meta-Analysis for Social Science Research. New York: Guilford Press, 2011.
  • Champely, S. pwr: Basic functions for power analysis. R package version 1.3-0. (2020), Date last accessed:October 1, 2022. https://CRAN.R-project.org/package=pwr
  • Chen, Y. Security risk tolerance in mobile payment: A tradeoff framework. Ann Arbor: Old Dominion University, 2018, p. 145.
  • Chen, Y.; Galletta, D.F.; Lowry, P.B.; Luo, X.; Moody, G.D.; and Willison, R. Understanding inconsistent employee compliance with information security policies through the lens of the extended parallel process model. Information Systems Research, 32, 3 (2021), 1043–1065.
  • Chen, Y.; Wang, X.; Benitez, J.; Luo, X.; and Li, D. Does techno-invasion lead to employees’ deviant behaviors? Journal of Management Information Systems, 39, 2 (2022), 454–482.
  • Cheung, M.W.-L. A model for integrating fixed-, random-, and mixed-effects meta-analyses into structural equation modeling. Psychological Methods, 13, 3 (2008), 182–202.
  • Cheung, M.W.-L. Fixed-effects meta-analyses as multiple-group structural equation models. Structural Equation Modeling: A Multidisciplinary Journal, 17, 3 (2010), 481–509.
  • Cheung, M.W.-L. Multivariate meta-analysis as structural equation models. Structural Equation Modeling: A Multidisciplinary Journal, 20, 3 (2013), 429–454.
  • Cheung, M.W.-L. Fixed- and random-effects meta-analytic structural equation modeling: Examples and analyses in R. Behavior Research Methods, 46, 2014 (2014), 29–40.
  • Cheung, M.W.-L. Modeling dependent effect sizes with three-level meta-analyses: A structural equation modeling approach. Psychological Methods, 19, 2 (2014), 211–229.
  • Cheung, M.W.-L. Meta-Analysis, A Structural Equation Modeling Approach. Chichester, UK: Wiley, 2015.
  • Cheung, M.W.-L. {metaSEM}: An R package for meta-analysis using structural equation modeling. Frontiers in Psychology, 5, January (2015), Article 1521.
  • Cheung, M.W.-L. Computing multivariate effect sizes and their sampling covariance matrices with structural equation modeling: Theory, examples, and computer simulations. Frontiers in Psychology, 9, August (2018), Article: 1387.
  • Cheung, M.W.-L. Issues in solving the problem of effect size heterogeneity in meta-analytic structural equation modeling: A commentary and simulation study on Yu, Downes, Carter, and O’Boyle. Journal of Applied Psychology, 103, 7 (2018), 787–803.
  • Cheung, M.W.-L. metaSEM: An R package for meta-analysis using structural equation modeling. (2018), Date last accessed: October 17, 2022, https://cran.r-project.org/web/packages/metaSEM/vignettes/metaSEM.pdf
  • Cheung, M.W.-L. Some reflections on combining meta-analysis and structural equation modeling. Research Synthesis Methods, 10, 1 (2019), 15–22.
  • Cheung, M.W.-L.; and Chan, W. Meta-analytic structural equation modeling: A two-stage approach. Psychological Methods, 10, 1 (2005), 40–60.
  • Cheung, M.W.-L.; and Chan, W. A two-stage approach to synthesizing covariance matrices in meta-analytic structural equation modeling. Structural Equation Modeling: A Multidisciplinary Journal, 16, 1 (2009), 28–53.
  • Cheung, M.W.-L.; and Cheung, S.-F. Random effects models for meta-analytic structural equation modeling: Review, issues, and illustrations. Research Synthesis Methods, 7, 2 (2016), 140–155.
  • Cheung, M.W.-L.; and Hong, R.Y. Applications of meta-analytic structural equation modelling in health psychology: Examples, issues, and recommendations. Health Psychology Review, 11, 3 (2017), 265–279.
  • Chou, H.L.; and Sun, J.C.Y. The moderating roles of gender and social norms on the relationship between protection motivation and risky online behavior among in-service teachers. Computers & Education, 112, (2017), 83–96.
  • Cohen, J. Statistical Power Analysis for the Behavioral Sciences. Hillsdale, NJ: Lawrence Erlbaum, 1988.
  • Corley, K.G.; and Gioia, D.A. Building theory about theory building: What constitutes a theoretical contribution? Academy of Management Review, 36, 1 (2011), 12–32.
  • Cram, W.A.; D’Arcy, J.; and Proudfoot, J.G. Seeing the forest and the trees: A meta-analysis of the antecedents to information security policy compliance. MIS Quarterly, 43, 2 (2019), 525–554.
  • Cram, W.A.; Proudfoot, J.G.; and D’Arcy, J. Organizational information security policies: A review and research framework. European Journal of Information Systems, 26, 6 (2017), 605–641.
  • Cranney, A.; Guyatt, G.; Krolicki, N.; Welch, V.; Griffith, L.; Adachi, J.; Shea, B.; Tugwell, P.; and Wells, G. A meta-analysis of etidronate for the treatment of postmenopausal osteoporosis. Osteoporosis International, 12, 2 (2001), 140–151.
  • Cromer, C. Understanding Web 2.0’s influences on public e-services: A protection motivation perspective. Innovation: Management, Policy & Practice, 12, 2 (2010), 192–205.
  • Crook, T.; Ketchen, D.; Combs, J.; and Todd, S. Strategic resources and performance: A meta-analysis. Strategic Management Journal, 29, 11 (2008), 1141–1154.
  • Cudeck, R. Analysis of correlation matrices using covariance structure models. Psychological Bulletin, 105, 2 (1989), 317–327.
  • D’Arcy, J.; Herath, T.; and Shoss, M.K. Understanding employee responses to stressful information security requirements: A coping perspective. Journal of Management Information Systems, 31, 2 (2014), 285–318.
  • D’Arcy, J.; and Lowry, P.B. Cognitive-affective drivers of employees’ daily compliance with information security policies: A multilevel, longitudinal study. Information Systems Journal, 29, 1 (2019), 43–69.
  • Debb, S.M.; and McClellan, M.K. Perceived vulnerability as a determinant of increased risk for cybersecurity risk behavior. Cyberpsychology, Behavior, and Social Networking, 24, 9 (2021), 605–611.
  • Debray, T.P.A.; Moons, K.G.M.; and Riley, R.D. Detecting small-study effects and funnel plot asymmetry in meta-analysis of survival data: A comparison of new and existing tests. Research Synthesis Methods, 9, 1 (2018), 41–50.
  • Duriau, V.J.; Reger, R.K.; and Pfarrer, M.D. A content analysis of the content analysis literature in organization studies: Research themes, data sources, and methodological refinements. Organizational Research Methods, 10, 1 (2007), 5–34.
  • Duval, S.; and Tweedie, R. Trim and fill: A simple funnel-plot–based method of testing and adjusting for publication bias in meta-analysis. Biometrics, 56, 2 (2000), 455–463.
  • Eisend, M. Explaining digital piracy: A meta-analysis. Information Systems Research, 30, 2 (2019), 636–664.
  • Floyd, D.L.; Prentice-Dunn, S.; and Rogers, R.W. A meta-analysis of research on protection motivation theory. Journal of Applied Social Psychology, 30, 2 (2000), 407–429.
  • Gerow, J.E.; Ayyagari, R.; Thatcher, J.B.; and Roth, P.L. Can we have fun @ work? The role of intrinsic motivation for utilitarian systems. European Journal of Information Systems, 22, 3 (2013), 360–380.
  • Glass, G.; McGaw, B.; and Smith, M. Meta-Analysis in Social Research. Orlando, FL: Academic Press, 1981.
  • Guhr, N.; Lebek, B.; and Breitner, M.H. The impact of leadership on employees’ intended information security behaviour: An examination of the full-range leadership theory. Information Systems Journal, 29, 2 (2019), 340–362.
  • Hagger, M.S.; Cheung, M.W.-L.; Ajzen, I.; and Hamilton, K. Perceived behavioral control moderating effects in the theory of planned behavior: A meta-analysis. Health Psychology Review, 41, 2 (2022), 155–167.
  • Hair, J.F.; Black, W.C.; Babin, B.J., and Anderson, R.E. Multivariate Data Analysis: A Global Perspective (7th ed.). New York, NY: Prentice Hall, 2009.
  • He, J.; and King, W.R. The role of user participation in information systems development: Implications from a meta-analysis. Journal of Management Information Systems, 25, 1 (2008), 301–331.
  • Hedges, L.V.; and Vevea, J.L. Fixed- and random-effects models in meta-analysis. Psychological Methods, 3, 4 (1998), 486–504.
  • Hedström, K.; Kolkowska, E.; Karlsson, F.; and Allen, J.P. Value conflicts for information security management. Journal of Strategic Information Systems, 20, 4 (2011), 373–384.
  • Herath, T.; Chen, R.; Wang, J.; Banjara, K.; Wilbur, J.; and Rao, H.R. Security services as coping mechanisms: An investigation into user intention to adopt an email authentication service. Information Systems Journal, 24, 1 (2012), 61–84.
  • Herath, T.; and Rao, H. Protection motivation and deterrence: A framework for security policy compliance in organisations. European Journal of Information Systems, 18, 2 (2009), 106–125.
  • Hou, T.; Luo, X.; Ke, D.; and Cheng, X. Exploring different appraisals in deviant sharing behaviors: A mixed-methods study. Journal of Business Research, 139, February (2022), 496–509.
  • House, D.; and Raja, M.K. Phishing: Message appraisal and the exploration of fear and self-confidence. Behaviour & Information Technology, 39, 11 (2020), 1204–1224.
  • Hovland, C.I.; Janis, I.L.; and Kelley, H.H. Communication and Persuasion. New Haven, CT: Yale University Press, 1953.
  • Hu, L.; and Bentler, P.M. Cutoff criteria for fit indexes in covariance structure analysis: Conventional criteria versus new alternatives. Structural Equation Modeling: A Multidisciplinary Journal, 6, 1 (1999), 1–55.
  • Hu, Q.; Dinev, T.; Hart, P.; and Cooke, D. Managing employee compliance with information security policies: The critical role of top management and organizational culture. Decision Sciences, 43, 4 (2012), 615–660.
  • Hu, Q.; Hart, P.; and Cooke, D. The role of external and internal influences on information systems security: A neo-institutional perspective. Journal of Strategic Information Systems, 16, 2 (2007), 153–172.
  • Hunter, J.E.; and Schmidt, F.L. Methods of Meta-Analysis: Correcting Error and Bias in Research Findings. Newbury Park, CA: Sage, 2004.
  • Jak, S. Heterogeneity. In M. Bosnjak, M.W.L. Cheung, and W. Viechtbauer (eds.), Meta-analytic Structural Equation Modelling. Cham, Switzerland: Springer, 2015, pp. 25–31.
  • Jak, S.; and Cheung, M.W.-L. Accounting for missing correlation coefficients in fixed-effects MASEM. Multivariate Behavioral Research, 53, 1 (2018), 1–14.
  • Jak, S.;. and Cheung, MW.-L. Testing moderator hypotheses in meta-analytic structural equation modeling using subgroup analysis. Behavior Research Methods, 50, 4 (2018), 1359–1373.
  • Jak, S.; and Cheung, M.W.-L. Meta-analytic structural equation modeling with moderating effects on SEM parameters. Psychological Methods, 25, 4 (2020), 430–455.
  • Janis, I.L. Effects of fear arousal on attitude change: Recent developments in theory and experimental research. In L. Berkowitz (ed.), Advances in Experimental Social Psychology, 3. New York: Academic Press, 1967, pp. 166–224.
  • Jeon, S.; Son, I.; and Han, J. Exploring the role of intrinsic motivation in ISSP compliance: Enterprise digital rights management system case. Information Technology & People, 34, 2 (2021), 599–616.
  • Johnston, A.C.; and Warkentin, M. Fear appeals and information security behaviors: An empirical study. MIS Quarterly, 34, 1 (2010), 549–566.
  • Johnston, A.C.; Warkentin, M.; and Siponen, M.T. An enhanced fear appeal rhetorical framework: Leveraging threats to the human asset through sanctioning rhetoric. MIS Quarterly, 39, 1 (2015), 113–134.
  • Joseph, D.; Ng, K.-Y; Koh, C.; and Ang, S. Turnover of information technology professionals: A narrative review, meta-analytic structural equation modeling, and model development. MIS Quarterly, 31, 3 (2007), 547–577.
  • Kajtazi, M.; Holmberg, N.; Sarker, S.; Keller, C.; Johansson, B.; and Tona, O. Toward a unified model of information security policy compliance: A conceptual replication study. AIS Transactions on Replication Research, 7, 1 (2021), Article: 2.
  • Karjalainen, M.; Sarker, S.; and Siponen, M. Toward a theory of information systems security behaviors of organizational employees: A dialectical process perspective. Information Systems Research, 30, 2 (2019), 687–704.
  • King, W.R.; and Jun, H. Understanding the role and methods of meta-analysis in IS research. Communications of the Association for Information Systems, 16, 1 (2005), 665–686.
  • Kline, R.B. Global fit testing. In R.B. Kline (ed.), Principles and Practice of Structural Equation Modeling, 4th ed. New York: Guilford Press, 2016, pp. 262–299.
  • Knapova, L.; Kruzikova, A.; Dedkova, L.; and Smahel, D. Who Is smart with their smartphones? Determinants of smartphone security behavior. Cyberpsychology, Behavior, and Social Networking, 24, 9 (2021), 584–592.
  • Kolkowska, E.; and Dhillon, G. Organizational power and information security rule compliance. Computers & Security, 33, (2013), 3–11.
  • Kolkowska, E.; Karlsson, F.; and Hedström, K. Towards analysing the rationale of information security non-compliance: Devising a value-based compliance analysis method. The Journal of Strategic Information Systems, 26, 1 (2017), 39–57.
  • Lee, Y.; and Larsen, K.R. Threat or coping appraisal: Determinants of SMB executives’ decision to adopt anti-malware software. European Journal of Information Systems, 18, 2 (2009), 177–187.
  • Leventhal, H. Findings and theory in the study of fear communications. In L. Berkowitz (ed.), Advances in Experimental Social Psychology, 5. New York: Academic Press, 1970, pp. 119–186.
  • Liang, H.; and Xue, Y. Understanding security behaviors in personal computer usage: A threat avoidance perspective. Journal of the Association for Information Systems, 11, 7 (2010), 394–413.
  • Liang, H.; Xue, Y.; Pinsonneault, A.; and Wu, Y. What users do besides problem-focused coping when facing IT security threats: An emotion-focused coping perspective. MIS Quarterly, 43, 2 (2019), 373–394.
  • Lipsey, M.W.; and Wilson, D.B. Practical Meta-Analysis. 49. Thousand Oaks, CA: Sage, 2001.
  • Lowry, P.B.; Dinev, T.; and Willison, R. Why security and privacy research lies at the centre of the information systems (IS) artefact: Proposing a bold research agenda. European Journal of Information Systems, 26, 6 (2017), 546–563.
  • Lowry, P.B.; Zhang, J.; and Wu, T. Nature or nurture? A meta-analysis of the factors that maximize the prediction of digital piracy by using social cognitive theory as a framework. Computers in Human Behavior, 68, March (2017), 104–120.
  • Maddux, J.E.; and Rogers, R.W. Protection motivation and self-efficacy: A revised theory of fear appeals and attitude change. Journal of Experimental Social Psychology, 19, 5 (1983), 469–479.
  • Marett, K.; McNab, A.L.; and Harris, R.B. Social networking websites and posting personal information: An evaluation of protection motivation theory. AIS Transactions on Human-Computer Interaction, 3, 3 (2011), 170–188.
  • McElreath, R. Statistical Rethinking: A Bayesian Course with Examples in R and Stan. Boca Raton, FL: CRC Press, Taylor & Francis Group, 2018.
  • McGill, T.; and Thompson, N. Exploring potential gender differences in information security and privacy. Information & Computer Security, 29, 5 (2021), 850–865.
  • Mehta, P.; Jebarajakirthy, C.; Maseeh, H.I.; Anubha, A.; Saha, R.; and Dhanda, K. Artificial intelligence in marketing: A meta-analytic review. Psychology & Marketing, 39, August (2022), 2013–2038.
  • Menard, P.; Bott, G.J.; and Crossler, R.E. User motivations in protecting information security: Protection motivation theory versus self-determination theory. Journal of Management Information Systems, 34, 4 (2017), 1203–1230.
  • Mills, A.; and Sahi, N. An empirical study of home user intentions towards computer security. Presented at Hawaii International Conference on System Sciences (HICSS 2019), Maui, HI, 2019, pp. 4834–4840.
  • Milne, G.R.; Labrecque, L.I.; and Cromer, C. Toward an understanding of the online consumer’s risky behavior and protection practices. Journal of Consumer Affairs, 43, 3 (2009), 449–473.
  • Montazemi, A.R.; Pittaway, J.J.; Saremi, H.Q.; and Wei, Y. Factors of stickiness in transfers of know-how between MNC units. Journal of Strategic Information Systems, 21, 1 (2012), 31–57.
  • Montazemi, A.R.; and Qahri-Saremi, H. Factors affecting adoption of online banking: A meta-analytic structural equation modeling study. Information & Management, 52, 2 (2015), 210–226.
  • Moody, G.D.; Siponen, M.; and Pahnila, S. Toward a unified model of information security policy compliance. MIS Quarterly, 42, 1 (2018), 285–A22.
  • Mou, J.; Cohen, J.F.; Bhattacherjee, A; and Kim, J. A test of protection motivation theory in the information security literature: A meta-analytic structural equation modeling approach. Journal of the Association for Information Systems, 23, 1 (2022), 196–236.
  • Myung, J.I.; and Pitt, M.A. Model comparison methods. In L. Brand, and M.L. Johnson (eds.), Methods in Enzymology, Numerical Computer Methods, Part D, 383. Cambridge, MA: Academic Press, 2004, pp. 351–366.
  • Nehme, A.; and George, J.F. Approaching IT security & avoiding threats in the smart home context. Journal of Management Information Systems, 39, 4 (2022), 1184–1214.
  • Ng, B.-Y.; Kankanhalli, A.; and Xu, Y. Studying users’ computer security behavior: A health belief perspective. Decision Support Systems, 46, 4 (2009), 815–825.
  • Ogbanufe, O.; and Pavur, R. Going through the emotions of regret and fear: Revisiting protection motivation for identity theft protection. International Journal of Information Management, 62, February (2022), Article: 102432.
  • Orwin, R.G. A fail-safe N for effect size in meta-analysis. Journal of Educational Statistics, 8, 2 (1983), 157–159.
  • Popova, L. The extended parallel process model: Illuminating the gaps in research. Health Education & Behavior, 39, 4 (2012), 455–473.
  • Posey, C.; Roberts, T.L.; and Lowry, P.B. The impact of organizational commitment on insiders’ motivation to protect organizational information assets. Journal of Management Information Systems, 32, 4 (2015), 179–214.
  • Posey, C.; Roberts, T.L.; Lowry, P.B.; Bennett, R.J.; and Courtney, J. Insiders’ protection of organizational information assets: Development of a systematics-based taxonomy and theory of diversity for protection-motivated behaviors. MIS Quarterly, 37, 4 (2013), 1189–1210.
  • Prentice-Dunn, S.; and Rogers, RW. Protection motivation theory and preventive health: Beyond the health belief model. Health Education Research, 1, 3 (1986), 153–161.
  • Purssell, E. Meta-analysis in R using metafor, meta and MAd. London: King’s College London, 2015.
  • Qahri-Saremi, H.; and Montazemi, A.R. Factors affecting the adoption of an electronic word of mouth message: A meta-analysis. Journal of Management Information Systems, 36, 3 (2019), 969–1001.
  • Raftery, A.E. Bayesian model selection in social research. Sociological Methodology, 25, 1995 (1995), 111–164.
  • Revelle, W. psych: Procedures for personality and psychological research, Northwestern University, Evanston, IL (2021). https://CRAN.R-project.org/package=psychVersion=2.1.9 ( accessed March 1, 2023).
  • Rogers, R.W. A protection motivation theory of fear appeals and attitude change. Journal of Psychology, 91, 1 (1975), 93–114.
  • Rogers, R.W. Cognitive and physiological processes in fear appeals and attitude change: A revised theory of protection motivation. In J.T. Cacioppo, and R.E. Petty (eds.), Social Psychophysiology: A Sourcebook. New York: Guilford, 1983, pp. 153–176.
  • Rogers, R.W.; and Prentice-Dunn, S. Protection motivation theory. In D.S. Gochman (ed.), Handbook of Health Behavior Research I: Personal and Social Determinants. New York: Plenum Press, 1997, pp. 113–132.
  • Rosenthal, R. The file drawer problem and tolerance for null results. Psychological Bulletin, 86, 3 (1979), 638–641.
  • Salleh, N.; Hussein, R.; Mohamed, N.; Abdul Karim, N.S.; Ahlan, A.R.; and Aditiawarman, U. Examining information disclosure behavior on social network sites using protection motivation theory, trust and risk. Journal of Internet Social Networking & Virtual Communities, 2012, 2012 (2012), Article: 281869.
  • Samtani, S.; Zhu, H.; and Yu, S. Fear appeals and information security behaviors: An empirical study on Mechanical Turk. AIS Transactions on Replication Research, 5, Paper 5 (2019), 1–22.
  • Scherer, R.; Siddiq, F.; and Tondeur, J. The technology acceptance model (TAM): A meta-analytic structural equation modeling approach to explaining teachers’ adoption of digital technology in education. Computers & Education, 128, January (2019), 13–35.
  • Schuetz, S.W.; Lowry, P.B.; Pienta, D.A.; and Thatcher, J.B. The effectiveness of abstract versus concrete fear appeals in information security. Journal of Management Information Systems, 37, 3 (2020), 723–757.
  • Schuetz, S.W.; Lowry, P.B.; Pienta, D.A.; and Thatcher, J.B. Improving the design of information security messages by leveraging the effects of temporal distance and argument nature. Journal of the Association for Information Systems, 22, 5 (2021), 1376–1428.
  • Sharma, R.; and Yetton, P. The contingent effects of training, technical complexity, and task interdependence on successful information systems implementation. MIS Quarterly, 31, 2 (2007), 219–238.
  • Sharma, R.; and Yetton, P. Top management support and IS implementation: Further support for the moderating role of task interdependence. European Journal of Information Systems, 20, 6 (2011), 703–712.
  • Silic, M.; and Lowry, P.B. Using design-science based gamification to improve organizational security training and compliance. Journal of Management Information Systems, 37, 1 (2020), 129–161.
  • Siponen, M.; Pahnila, S.; and Mahmood, M.A. Compliance with information security policies: An empirical investigation. IEEE Computer, 43, 2 (2010), 64–71.
  • Stern, T.; and Kumar, N. Examining privacy settings on online social networks: A protection motivation perspective. International Journal of Electronic Business, 13, 2–3 (2017), 244–272.
  • Sterne, J.A.; and Egger, M. Regression methods to detect publication and other bias in meta-analysis. In H.R. Rothstein, A.J. Sutton, and M. Borenstein (eds.), Publication Bias in Meta-analysis: Prevention, Assessment and Adjustments. West Sussex, UK: Wiley, 2005, pp. 99–110.
  • Sterne, J.A.C.; and Egger, M. Funnel plots for detecting bias in meta-analysis: Guidelines on choice of axis. Journal of Clinical Epidemiology, 54, 10 (2001), 1046–1055.
  • Stolwijk, I.; Jak, S.; Eichelsheim, V.; and Hoeve, M. Dealing with dependent effect sizes in MASEM: A comparison of different approaches using empirical data. Zeitschrift für Psychologie, 230, 1 (2022), 16–32.
  • Taddy, M. Business Data Science: Combining Machine Learning and Economics to Optimize, Automate, and Accelerate Business Decisions. New York: McGraw Hill Professional, 2019.
  • Tang, R.W.; and Cheung, M.W.-L. Testing IB theories with meta-analytic structural equation modeling: The TSSEM approach and the univariate-r approach. Review of International Business and Strategy, 26, 4 (2016), 472–492.
  • Valentine, J.C.; Cheung, M.W.-L.; Smith, E.J.; Alexander, O.; Hatton, J.M.; Hong, R.Y.; Huckaby, L.T.; Patton, S.C.; Pössel, P.; and Seely, H.D. A primer on meta-analytic structural equation modeling: The case of depression. Prevention Science, 23, 3 (2022), 346–365.
  • Viechtbauer, W. Conducting meta-analyses in R with the metafor package. Journal of Statistical Software, 36, 3 (2010), 1–48.
  • Visinescu, L.L; Azogu, O.; Ryan, S.D.; Wu, Y.; and Kim, D.J. Better safe than sorry: A study of investigating individuals’ protection of privacy in the use of storage as a cloud computing service. International Journal of Human-Computer Interaction, 32, 11 (2016), 885–900.
  • Viswesvaran, C.; and Ones, D.S. Theory testing: Combining psychometric meta-analysis and structural equations modeling. Personnel Psychology, 48, 4 (1995), 865–885.
  • Wall, J.D.; and Buche, M.W. To fear or not to fear? A critical review and analysis of fear appeals in the information security context. Communications of the Association for Information Systems, 41, 1 (2017), Article: 13.
  • Wang, J.; Li, Y.; and Rao, H.R. Coping responses in phishing detection: An investigation of antecedents and consequences. Information Systems Research, 28, 2 (2017), 378–396.
  • Warkentin, M.; Johnston, A.C.; Walden, E.; and Straub, D.W. Neural correlates of protection motivation for secure IT behaviors: An fMRI examination. Journal of the Association for Information Systems, 17, 3 (2016), 194–215.
  • West, S.G.; Taylor, A.B.; and Wu, W. Model fit and model selection in structural equation modeling. In R.H. Hoyle (ed.), Handbook of Structural Equation Modeling, 1. New York: Guilford Press, 2012, pp. 209–231.
  • Willison, R.; and Lowry, P.B. Disentangling the motivations for organizational insider computer abuse through the rational choice and life course perspectives. The DATA BASE for Advances in Information System, 49, April (2018), 81–102.
  • Wit, E.; Heuvel, Evd; and Romeijn, J.W. “All models are wrong … ”: An introduction to model uncertainty. Statistica Neerlandica, 66, 3 (2012), 217–236.
  • Witte, K. Putting the fear back into fear appeals: The extended parallel process model. Communication Monographs, 59, 4 (1992), 329–349.
  • Witte, K. Fear control and danger control: A test of the extended parallel process model (EPPM). Communication Monographs, 61, 2 (1994), 113–134.
  • Witte, K.; and Allen, M. A meta-analysis of fear appeals: Implications for effective public health campaigns. Health Education & Behavior, 27, 5 (2000), 591–615.
  • Witte, K.K.; Cameron, A.; McKeon, J.K.; and Berkowitz, J.M. Predicting risk behaviors: Development and validation of a diagnostic scale. Journal of Health Communication, 1, 4 (1996), 317–342.
  • Witte, K.; and Morrison, K. The use of scare tactics in AIDS prevention: The case of juvenile detention and high school youth. Journal of Applied Communication Research, 23, 2 (1995), 128–142.
  • Woon, I.; Tan, G.-W.; and Low, R. A protection motivation theory approach to home wireless security. Presented at International Conference on Information Systems (ICIS 2005), Las Vegas, NV, 2005.
  • Wothke, W. Nonpositive definite matrices in structural modeling. In K.A. Bollen, and J.S. Long (eds.), Testing Structural Equation Models. Newbury Park, CA: Sage Publications, 1993, pp. 256–293.
  • Wu, J.; and Lederer, A. A meta-analysis of the role of environment-based voluntariness in information technology acceptance. MIS Quarterly, 33, 2 (2009), 419–432.
  • Wu, J.; and Lu, X. Effects of extrinsic and intrinsic motivators on using utilitarian, hedonic, and dual-purposed information systems: A meta-analysis. Journal of the Association for Information Systems, 14, 3 (2013), 153–191.
  • Xu, Z.; and Guo, K. It ain’t my business: A coping perspective on employee effortful security behavior. Journal of Enterprise Information Management, 32, 5 (2019), 824–842.
  • Zhang, L.; and McDowell, W.C. Am I really at risk? Determinants of online users’ intentions to use strong passwords. Journal of Internet Commerce, 8, 3–4 (2009), 180–197.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.