Using susceptibility claims to motivate behaviour change in IT security
Organisations face growing IT security risks with substantial consequences for missteps in business continuity, data loss, reputational harm, and future competitive advantage. To improve precaution-taking among organisation members, leaders frequently turn to susceptibility claims embedded in securi...
Saved in:
Published in | European journal of information systems Vol. 30; no. 1; pp. 27 - 45 |
---|---|
Main Authors | , , |
Format | Journal Article |
Language | English |
Published |
Taylor & Francis
02.01.2021
|
Subjects | |
Online Access | Get full text |
Cover
Loading…
Abstract | Organisations face growing IT security risks with substantial consequences for missteps in business continuity, data loss, reputational harm, and future competitive advantage. To improve precaution-taking among organisation members, leaders frequently turn to susceptibility claims embedded in security education, training, and awareness (SETA) initiatives to motivate change. However, prior studies have produced mixed empirical results concerning the role of susceptibility in motivating precaution-taking. To deepen theorising about using susceptibility claims to change behaviour, we argue that threat characteristics (overt versus furtive attacks) shape individuals' attitudes of the threat, and these attitudes subsequently anchor how individuals respond to new claims about the threats. We introduce social judgement theory (SJT) to argue that when individuals participate in SETA initiatives, susceptibility claims that are too distant from individuals' existing attitudes will be ignored, while claims that are more proximal are more likely to be accepted and result in behaviour change. Using a longitudinal field experiment, we found that susceptibility claims motivated precaution taking against phishing (overt attack) but did not against password cracking (furtive attack). These results support SJT predictions and imply latitudes of acceptability and rejection into which susceptibility claims are placed. Implications for researchers, organisation leaders, and SETA developers are discussed. |
---|---|
AbstractList | Organisations face growing IT security risks with substantial consequences for missteps in business continuity, data loss, reputational harm, and future competitive advantage. To improve precaution-taking among organisation members, leaders frequently turn to susceptibility claims embedded in security education, training, and awareness (SETA) initiatives to motivate change. However, prior studies have produced mixed empirical results concerning the role of susceptibility in motivating precaution-taking. To deepen theorising about using susceptibility claims to change behaviour, we argue that threat characteristics (overt versus furtive attacks) shape individuals' attitudes of the threat, and these attitudes subsequently anchor how individuals respond to new claims about the threats. We introduce social judgement theory (SJT) to argue that when individuals participate in SETA initiatives, susceptibility claims that are too distant from individuals' existing attitudes will be ignored, while claims that are more proximal are more likely to be accepted and result in behaviour change. Using a longitudinal field experiment, we found that susceptibility claims motivated precaution taking against phishing (overt attack) but did not against password cracking (furtive attack). These results support SJT predictions and imply latitudes of acceptability and rejection into which susceptibility claims are placed. Implications for researchers, organisation leaders, and SETA developers are discussed. |
Author | Jensen, Matthew L. Wright, Ryan T Durcikova, Alexandra |
Author_xml | – sequence: 1 givenname: Matthew L. orcidid: 0000-0001-8711-1827 surname: Jensen fullname: Jensen, Matthew L. organization: University of Oklahoma – sequence: 2 givenname: Alexandra orcidid: 0000-0002-6705-202X surname: Durcikova fullname: Durcikova, Alexandra organization: University of Oklahoma – sequence: 3 givenname: Ryan T orcidid: 0000-0002-9719-415X surname: Wright fullname: Wright, Ryan T email: rtw2n@virginia.edu organization: University of Virginia |
BookMark | eNqFkEFLwzAYhoNMcJv-BCF_oPNL06YNXpShczDwsoG3kKbJFmmbkWST_XtbNi8e9PTBx_O8h2eCRp3rNEL3BGYESngAzgDK_GOWQtq_Ck4ZZ1doTLKCJZxm2QiNByYZoBs0CeETepJnZIwWm2C7LQ6HoPQ-2so2Np6waqRtA44Oty7ao4waV3onj9YdPFY72W01th1ernHQ6uB75RZdG9kEfXe5U7R5fVnP35LV-2I5f14lihKIScGgNJzVzFADteZ1qWmqSmqIgpxkJZScmAx4BYXO81oTlhLJeVFRDroqFZ2ix_Ou8i4Er41QNspoXRe9tI0gIIYm4qeJGJqIS5Pezn_Ze29b6U__ek9nz3bG-VZ-Od_UIspT47zxslM2CPr3xDeYy3tO |
CitedBy_id | crossref_primary_10_1080_07421222_2022_2096551 crossref_primary_10_2139_ssrn_4413778 crossref_primary_10_1016_j_cose_2023_103252 crossref_primary_10_1016_j_cose_2024_103826 crossref_primary_10_3390_info15080505 crossref_primary_10_1016_j_im_2024_104060 crossref_primary_10_1109_JPROC_2024_3379855 crossref_primary_10_1080_0960085X_2024_2359460 crossref_primary_10_1145_3685235_3685242 |
Cites_doi | 10.1177/009365099026002006 10.25300/MISQ/2015/39.2.04 10.1016/S0268-4012(02)00105-6 10.17705/1jais.00424 10.1287/isre.2013.0502 10.2307/25750690 10.1111/j.1529-1006.2006.00026.x 10.2307/25750704 10.1007/1-4020-8090-5_13 10.17705/1jais.00375 10.1057/ejis.2015.15 10.1037/0021-9010.74.5.787 10.1080/00223980.1975.9915803 10.1002/smj.582 10.17705/1jais.00232 10.17705/1jais.00151 10.25300/MISQ/2013/37.4.09 10.4018/978-1-5225-2604-9.ch006 10.1287/isre.2014.0522 10.25300/MISQ/2014/38.2.08 10.25300/MISQ/2015/39.4.5 10.2307/20650303 10.17705/1jais.00109 10.1037/0021-9010.90.4.692 10.1016/j.jclinepi.2003.08.009 10.1002/0471722146 10.17705/1jais.00506 10.2308/isys-50704 10.1111/j.1464-0597.2007.00327.x 10.1109/HICSS.2010.311 10.1145/1754393.1754396 10.1037/h0029832 10.1348/000712605X47431 10.1109/HICSS.2007.206 10.1002/mar.4220120509 10.5465/AMR.2011.59330932 10.1177/002224299105500304 10.17705/1jais.00399 10.1057/ejis.2009.6 10.1111/1467-8721.ep10768783 10.25300/MISQ/2016/40.1.09 10.1111/deci.12328 10.1145/975817.975820 10.2307/25750688 10.17705/1jais.00524 10.25300/MISQ/2018/13853 10.17705/1jais.00274 10.1080/07421222.2017.1334499 10.1016/j.ijresmar.2008.06.005 10.1037/h0100799 10.2307/25750694 10.1080/03637759209376276 10.1111/j.1468-2885.2006.00009.x 10.1080/07421222.2015.1138374 10.1080/14792772143000003 10.1037/h0027342 10.1016/j.jsis.2018.11.002 10.1207/s15327027hc2002_6 10.1002/cb.130 10.25300/MISQ/2015/39.1.06 10.1111/j.1467-9221.2008.00678.x 10.1111/isj.12129 10.2307/25148817 10.2307/25750691 10.1145/1572532.1572536 10.1080/07421222.2017.1394083 10.1080/01621459.1958.10501452 |
ContentType | Journal Article |
Copyright | Operational Research Society 2019. 2019 |
Copyright_xml | – notice: Operational Research Society 2019. 2019 |
DBID | AAYXX CITATION |
DOI | 10.1080/0960085X.2020.1793696 |
DatabaseName | CrossRef |
DatabaseTitle | CrossRef |
DatabaseTitleList | |
DeliveryMethod | fulltext_linktorsrc |
Discipline | Engineering Library & Information Science |
EISSN | 1476-9344 |
EndPage | 45 |
ExternalDocumentID | 10_1080_0960085X_2020_1793696 1793696 |
Genre | Research Article |
GroupedDBID | .DC 0BK 0R~ 29G 30N 4.4 5GY 77K 7WY 8R4 8R5 AAJMT AALDU AAMIU AAPUL AAQRR ABJNI ABLIJ ABPAQ ABXUL ABXYU ACGFO ACGFS ACHQT ACREN ACTIO ADFRT ADGTB ADINQ AECXW AEISY AENEX AEOZL AEPSL AEXYK AEYOC AGAYW AGDLA AHBYD AHDZW AKBVH AKOOK ALMA_UNASSIGNED_HOLDINGS ALQZU ALSLI AMKLP AMTXH AQRUH ASPBG AVWKF AWYRJ BLEHA CCCUG CNYFK CS3 CSNOR DGEBU EBS H13 KYCEM L7B LJTGL M4Z MS~ O9- P2P Q2X RNANH ROSJB RPC RSV RTWRZ SNX SOJ TBQAZ TDBHL TEN TFL TFT TFW TTHFI TUROJ U5U UCJ WH7 XSW ZGOLN AAGDL AAHIA AAYXX ADYSH AFRVT AIYEW AMPGV CITATION |
ID | FETCH-LOGICAL-c310t-7608f96d6f3f0de9d8e32c83f1c051480891f409b07e55de1621a997b390eb8c3 |
ISSN | 0960-085X |
IngestDate | Tue Jul 01 03:20:31 EDT 2025 Thu Apr 24 23:05:29 EDT 2025 Wed Dec 25 09:07:44 EST 2024 |
IsPeerReviewed | true |
IsScholarly | true |
Issue | 1 |
Language | English |
LinkModel | OpenURL |
MergedId | FETCHMERGED-LOGICAL-c310t-7608f96d6f3f0de9d8e32c83f1c051480891f409b07e55de1621a997b390eb8c3 |
ORCID | 0000-0002-9719-415X 0000-0002-6705-202X 0000-0001-8711-1827 |
PageCount | 19 |
ParticipantIDs | crossref_primary_10_1080_0960085X_2020_1793696 crossref_citationtrail_10_1080_0960085X_2020_1793696 informaworld_taylorfrancis_310_1080_0960085X_2020_1793696 |
ProviderPackageCode | CITATION AAYXX |
PublicationCentury | 2000 |
PublicationDate | 2021-01-02 |
PublicationDateYYYYMMDD | 2021-01-02 |
PublicationDate_xml | – month: 01 year: 2021 text: 2021-01-02 day: 02 |
PublicationDecade | 2020 |
PublicationTitle | European journal of information systems |
PublicationYear | 2021 |
Publisher | Taylor & Francis |
Publisher_xml | – name: Taylor & Francis |
References | cit0033 cit0077 cit0034 cit0078 Wall J. D. (cit0086) 2017; 41 cit0031 cit0075 cit0032 cit0076 cit0073 cit0030 cit0074 cit0072 cit0039 cit0037 cit0038 cit0035 cit0079 cit0036 cit0022 cit0023 cit0067 cit0064 cit0021 cit0065 cit0062 cit0063 cit0060 LaTour M. S. (cit0046) 1989; 9 cit0061 Rogers R. W. (cit0066) 1983 Mantel N. (cit0049) 1966; 50 Disparte D. (cit0020) 2017; 5 cit0028 cit0029 cit0026 cit0027 cit0024 cit0068 cit0025 cit0069 cit0011 cit0055 cit0012 cit0056 cit0053 cit0010 cit0054 cit0051 cit0052 cit0050 cit0091 cit0092 cit0090 cit0019 Sherif C. W. (cit0070) 1965 cit0017 cit0018 cit0015 cit0059 cit0016 cit0013 cit0057 cit0014 cit0058 cit0044 cit0088 cit0001 cit0045 cit0089 cit0042 cit0043 cit0087 cit0040 cit0084 cit0041 cit0085 cit0082 cit0083 Sherif M. (cit0071) 1961 cit0080 cit0081 cit0008 cit0009 cit0006 cit0007 cit0004 cit0048 cit0005 cit0002 cit0003 cit0047 |
References_xml | – ident: cit0068 doi: 10.1177/009365099026002006 – ident: cit0083 doi: 10.25300/MISQ/2015/39.2.04 – ident: cit0041 doi: 10.1016/S0268-4012(02)00105-6 – ident: cit0087 doi: 10.17705/1jais.00424 – ident: cit0052 doi: 10.1287/isre.2013.0502 – ident: cit0011 doi: 10.2307/25750690 – ident: cit0015 – ident: cit0063 doi: 10.1111/j.1529-1006.2006.00026.x – ident: cit0067 – ident: cit0062 doi: 10.2307/25750704 – ident: cit0001 doi: 10.1007/1-4020-8090-5_13 – ident: cit0082 doi: 10.17705/1jais.00375 – volume-title: Social judgment: Assimilation and contrast effects in communication and attitude change year: 1961 ident: cit0071 – ident: cit0039 doi: 10.1057/ejis.2015.15 – ident: cit0023 doi: 10.1037/0021-9010.74.5.787 – ident: cit0054 – ident: cit0065 doi: 10.1080/00223980.1975.9915803 – ident: cit0032 doi: 10.1002/smj.582 – ident: cit0034 doi: 10.17705/1jais.00232 – ident: cit0006 – ident: cit0029 doi: 10.17705/1jais.00151 – ident: cit0025 – ident: cit0050 – ident: cit0061 doi: 10.25300/MISQ/2013/37.4.09 – ident: cit0021 – ident: cit0058 doi: 10.4018/978-1-5225-2604-9.ch006 – ident: cit0091 doi: 10.1287/isre.2014.0522 – ident: cit0077 – ident: cit0031 doi: 10.25300/MISQ/2014/38.2.08 – ident: cit0009 doi: 10.25300/MISQ/2015/39.4.5 – ident: cit0019 doi: 10.2307/20650303 – start-page: 153 volume-title: Social psychophysiology: A source book year: 1983 ident: cit0066 – ident: cit0081 doi: 10.17705/1jais.00109 – volume-title: Attitude and attitude change: The social judgment-involvement approach year: 1965 ident: cit0070 – ident: cit0079 doi: 10.1037/0021-9010.90.4.692 – ident: cit0010 doi: 10.1016/j.jclinepi.2003.08.009 – ident: cit0033 doi: 10.1002/0471722146 – ident: cit0005 doi: 10.17705/1jais.00506 – ident: cit0017 doi: 10.2308/isys-50704 – ident: cit0084 doi: 10.1111/j.1464-0597.2007.00327.x – ident: cit0016 doi: 10.1109/HICSS.2010.311 – ident: cit0045 doi: 10.1145/1754393.1754396 – ident: cit0064 doi: 10.1037/h0029832 – ident: cit0003 – ident: cit0076 – ident: cit0080 doi: 10.1348/000712605X47431 – ident: cit0028 – ident: cit0007 – ident: cit0024 – ident: cit0056 doi: 10.1109/HICSS.2007.206 – ident: cit0022 doi: 10.1002/mar.4220120509 – ident: cit0055 doi: 10.5465/AMR.2011.59330932 – ident: cit0078 doi: 10.1177/002224299105500304 – ident: cit0092 doi: 10.17705/1jais.00399 – ident: cit0030 doi: 10.1057/ejis.2009.6 – ident: cit0014 doi: 10.1111/1467-8721.ep10768783 – ident: cit0013 doi: 10.25300/MISQ/2016/40.1.09 – ident: cit0038 doi: 10.1111/deci.12328 – ident: cit0035 doi: 10.1145/975817.975820 – ident: cit0072 doi: 10.2307/25750688 – ident: cit0088 doi: 10.17705/1jais.00524 – ident: cit0053 doi: 10.25300/MISQ/2018/13853 – ident: cit0043 doi: 10.17705/1jais.00274 – ident: cit0036 doi: 10.1080/07421222.2017.1334499 – ident: cit0027 – ident: cit0012 doi: 10.1016/j.ijresmar.2008.06.005 – ident: cit0047 doi: 10.1037/h0100799 – ident: cit0004 – ident: cit0002 doi: 10.2307/25750694 – ident: cit0090 doi: 10.1080/03637759209376276 – volume: 5 year: 2017 ident: cit0020 publication-title: Harvard Business Review – ident: cit0075 doi: 10.1111/j.1468-2885.2006.00009.x – ident: cit0060 doi: 10.1080/07421222.2015.1138374 – volume: 9 start-page: 5 issue: 3 year: 1989 ident: cit0046 publication-title: Marketing Health Services – ident: cit0069 doi: 10.1080/14792772143000003 – ident: cit0059 doi: 10.1037/h0027342 – ident: cit0008 doi: 10.1016/j.jsis.2018.11.002 – ident: cit0073 doi: 10.1207/s15327027hc2002_6 – ident: cit0074 doi: 10.1002/cb.130 – volume: 41 start-page: 13 year: 2017 ident: cit0086 publication-title: Communications of the AIS – ident: cit0040 doi: 10.25300/MISQ/2015/39.1.06 – ident: cit0018 doi: 10.1111/j.1467-9221.2008.00678.x – ident: cit0085 – volume: 50 start-page: 163 issue: 3 year: 1966 ident: cit0049 publication-title: Cancer Chemotherapy Reports. Part 1 – ident: cit0026 – ident: cit0089 doi: 10.1111/isj.12129 – ident: cit0048 doi: 10.2307/25148817 – ident: cit0037 doi: 10.2307/25750691 – ident: cit0044 doi: 10.1145/1572532.1572536 – ident: cit0051 doi: 10.1080/07421222.2017.1394083 – ident: cit0057 – ident: cit0042 doi: 10.1080/01621459.1958.10501452 |
SSID | ssj0020941 |
Score | 2.3877473 |
Snippet | Organisations face growing IT security risks with substantial consequences for missteps in business continuity, data loss, reputational harm, and future... |
SourceID | crossref informaworld |
SourceType | Enrichment Source Index Database Publisher |
StartPage | 27 |
SubjectTerms | Anat Hovav Dov Te'eni fear appeal field experiment furtive attack latitude of acceptability latitude of rejection overt attack password Phishing social judgement theory susceptibility |
Title | Using susceptibility claims to motivate behaviour change in IT security |
URI | https://www.tandfonline.com/doi/abs/10.1080/0960085X.2020.1793696 |
Volume | 30 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwpV1La9wwEBZpckkPIU-a5oEOoZfFi23ZsnQMIY8tTQ7Fgb0ZW5ZhaeINu95C8uszetjWkkfT9mKMFlmL5vNoZjzzDUInNCgIj8rKA2OBeBEVgVeAZe9RUVYyD9WhoAqFr2_o1W30fRyP-9QhXV3SFEPx9Gpdyb9IFcZArqpK9i8k2z0UBuAe5AtXkDBcPyRj871_vpjr3BSd5vo4EHf55F7zNtyb3mWyrcVfzGydrwpyjNLB3PauezM631FKdCWOlvnZyTusbQjHNg4f_Bj2tvFMTH5Nf-dOIc2sPwW6sMDPR1gudcMPYaDDD72zmr7oBOKGGKnKlYvH5qwxCjZKqMeJ4XxsNbD9MuMizarTxDmYDe3kC5VvcyRhLbUUePwhDCa6T2F_xnWZh_aXT2gtBL9CKUbi33QeOvi6usVi-8fbki9Fxv7aAkvGzBLVrWOkpJtow3oX-NRAZQutyHobfXY4J7fRka1Uwd_wqJcrtjp-B11qUOFlUGEDKtxMcQsq3IEKG1DhSY1HKW5BtYtuL87TsyvPdtvwBJj4jZdQn1WclrQilV9KXjJJQsFIFQjFkc98xoMq8nnhJzKOSxnQMMg5T-Bd92XBBNlDq_W0ll8QThjPQ9VpLlYhRj9mJC84zUPJJFikZb6PonbbMmGp6FVHlLssaBlr7W5narczu9v7aNhNezBcLH-awF2ZZI0Ga2VwmpF35379j7kHaL1_VQ7RajNbyCOwXZviWOPtGQzqlDk |
linkProvider | Taylor & Francis |
linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwpV09T8MwED1BGYCBb0SBggfElpLEjWOPCAEtH52K1C1KHFuqaFPUpgP8enyJU7VIwNA10kWJfYnfnd69B3DFvISKVqodAxao02LScxKD7B0mU61iHw8FHBR-7bL2W-upH_QXZmGQVok1tC6FIop_NX7c2IyuKHE3CLsNVOib8s43l8LClG4dNgLBQsx16nbnRZcpXwrXPBPiYEw1xfPbbZbOpyX10oVz52EXZPXEJd3kvTnLk6b8-iHmuNor7cGOhaXktsyjfVhT2QFsL4gVHkDDjjiQa2JnmHBPif05HMJjwT4g09m0YMoUpNtPIofxYDQl-ZiMSic1RawywGxCyqljMshIp0em1knvCN4e7nt3bcfaNDjSYMPcCZnLtWAp01S7qRIpV9SXnGpPorg6d7nwtCkjEzdUQZAqj_leLERoksRVCZf0GGrZOFMnQEIuYh8tygLsTbkBp3EiWOwrrgyUSeM6tKrNiaTVMEcrjWHkVVKndh0jXMfIrmMdmvOwj1LE478AsbjzUV50T3RpdRLRP2NPV4i9hM127_Uleul0n89gy0f-DLZ7_HOo5ZOZahgAlCcXRYZ_A3Pl9rE |
linkToPdf | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwpV3LT8IwGP-imBg9-ECNqGgPxttwz649GhXBB_EACbdl69qECIOw7aB_ve3WETBRD1yXfMvWduvva34PgGtsRQ51Y2FIsOAYLmaWEUlkb2AWCx7aalNQQuG3Hu4M3OehV7EJU02rVD20KI0iin-1-rhnsagYcbcKdUukMJTdnS0v-UUm3SZsYSW0VCoOs7fouWT3UoTmyRJD1VQint9us7I9rZiXLm077X2Iqgcu2SYfrTyLWuzrh5fjWm90AHsalKK7chUdwgZP6rC7ZFVYh6YWOKAbpBVMakaR_jUcwVPBPUBpnhY8mYJy-4nYOBxNUpRN0aTMUeNI-wLkc1RqjtEoQd0-SnWO3jEM2o_9-46hQxoMJpFhZvjYJILiGAtHmDGnMeGOzYgjLKas1YlJqCVkExmZPve8mFvYtkJKfblETB4R5pxALZkm_BSQT2hoq4AyT51MmR5xwoji0OaESyAThw1wq7kJmHYwV0Ea48CqjE71OAZqHAM9jg1oLcpmpYXHfwV0eeKDrDg7EWXQSeD8WXu2Ru0VbL8_tIPXbu_lHHZsRZ5RZz32BdSyec6bEv1k0WWxvr8BZZz1VQ |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Using+susceptibility+claims+to+motivate+behaviour+change+in+IT+security&rft.jtitle=European+journal+of+information+systems&rft.au=Jensen%2C+Matthew+L.&rft.au=Durcikova%2C+Alexandra&rft.au=Wright%2C+Ryan+T&rft.date=2021-01-02&rft.pub=Taylor+%26+Francis&rft.issn=0960-085X&rft.eissn=1476-9344&rft.volume=30&rft.issue=1&rft.spage=27&rft.epage=45&rft_id=info:doi/10.1080%2F0960085X.2020.1793696&rft.externalDocID=1793696 |
thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=0960-085X&client=summon |
thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=0960-085X&client=summon |
thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=0960-085X&client=summon |