Using susceptibility claims to motivate behaviour change in IT security

Organisations face growing IT security risks with substantial consequences for missteps in business continuity, data loss, reputational harm, and future competitive advantage. To improve precaution-taking among organisation members, leaders frequently turn to susceptibility claims embedded in securi...

Full description

Saved in:
Bibliographic Details
Published inEuropean journal of information systems Vol. 30; no. 1; pp. 27 - 45
Main Authors Jensen, Matthew L., Durcikova, Alexandra, Wright, Ryan T
Format Journal Article
LanguageEnglish
Published Taylor & Francis 02.01.2021
Subjects
Online AccessGet full text

Cover

Loading…
Abstract Organisations face growing IT security risks with substantial consequences for missteps in business continuity, data loss, reputational harm, and future competitive advantage. To improve precaution-taking among organisation members, leaders frequently turn to susceptibility claims embedded in security education, training, and awareness (SETA) initiatives to motivate change. However, prior studies have produced mixed empirical results concerning the role of susceptibility in motivating precaution-taking. To deepen theorising about using susceptibility claims to change behaviour, we argue that threat characteristics (overt versus furtive attacks) shape individuals' attitudes of the threat, and these attitudes subsequently anchor how individuals respond to new claims about the threats. We introduce social judgement theory (SJT) to argue that when individuals participate in SETA initiatives, susceptibility claims that are too distant from individuals' existing attitudes will be ignored, while claims that are more proximal are more likely to be accepted and result in behaviour change. Using a longitudinal field experiment, we found that susceptibility claims motivated precaution taking against phishing (overt attack) but did not against password cracking (furtive attack). These results support SJT predictions and imply latitudes of acceptability and rejection into which susceptibility claims are placed. Implications for researchers, organisation leaders, and SETA developers are discussed.
AbstractList Organisations face growing IT security risks with substantial consequences for missteps in business continuity, data loss, reputational harm, and future competitive advantage. To improve precaution-taking among organisation members, leaders frequently turn to susceptibility claims embedded in security education, training, and awareness (SETA) initiatives to motivate change. However, prior studies have produced mixed empirical results concerning the role of susceptibility in motivating precaution-taking. To deepen theorising about using susceptibility claims to change behaviour, we argue that threat characteristics (overt versus furtive attacks) shape individuals' attitudes of the threat, and these attitudes subsequently anchor how individuals respond to new claims about the threats. We introduce social judgement theory (SJT) to argue that when individuals participate in SETA initiatives, susceptibility claims that are too distant from individuals' existing attitudes will be ignored, while claims that are more proximal are more likely to be accepted and result in behaviour change. Using a longitudinal field experiment, we found that susceptibility claims motivated precaution taking against phishing (overt attack) but did not against password cracking (furtive attack). These results support SJT predictions and imply latitudes of acceptability and rejection into which susceptibility claims are placed. Implications for researchers, organisation leaders, and SETA developers are discussed.
Author Jensen, Matthew L.
Wright, Ryan T
Durcikova, Alexandra
Author_xml – sequence: 1
  givenname: Matthew L.
  orcidid: 0000-0001-8711-1827
  surname: Jensen
  fullname: Jensen, Matthew L.
  organization: University of Oklahoma
– sequence: 2
  givenname: Alexandra
  orcidid: 0000-0002-6705-202X
  surname: Durcikova
  fullname: Durcikova, Alexandra
  organization: University of Oklahoma
– sequence: 3
  givenname: Ryan T
  orcidid: 0000-0002-9719-415X
  surname: Wright
  fullname: Wright, Ryan T
  email: rtw2n@virginia.edu
  organization: University of Virginia
BookMark eNqFkEFLwzAYhoNMcJv-BCF_oPNL06YNXpShczDwsoG3kKbJFmmbkWST_XtbNi8e9PTBx_O8h2eCRp3rNEL3BGYESngAzgDK_GOWQtq_Ck4ZZ1doTLKCJZxm2QiNByYZoBs0CeETepJnZIwWm2C7LQ6HoPQ-2so2Np6waqRtA44Oty7ao4waV3onj9YdPFY72W01th1ernHQ6uB75RZdG9kEfXe5U7R5fVnP35LV-2I5f14lihKIScGgNJzVzFADteZ1qWmqSmqIgpxkJZScmAx4BYXO81oTlhLJeVFRDroqFZ2ix_Ou8i4Er41QNspoXRe9tI0gIIYm4qeJGJqIS5Pezn_Ze29b6U__ek9nz3bG-VZ-Od_UIspT47zxslM2CPr3xDeYy3tO
CitedBy_id crossref_primary_10_1080_07421222_2022_2096551
crossref_primary_10_2139_ssrn_4413778
crossref_primary_10_1016_j_cose_2023_103252
crossref_primary_10_1016_j_cose_2024_103826
crossref_primary_10_3390_info15080505
crossref_primary_10_1016_j_im_2024_104060
crossref_primary_10_1109_JPROC_2024_3379855
crossref_primary_10_1080_0960085X_2024_2359460
crossref_primary_10_1145_3685235_3685242
Cites_doi 10.1177/009365099026002006
10.25300/MISQ/2015/39.2.04
10.1016/S0268-4012(02)00105-6
10.17705/1jais.00424
10.1287/isre.2013.0502
10.2307/25750690
10.1111/j.1529-1006.2006.00026.x
10.2307/25750704
10.1007/1-4020-8090-5_13
10.17705/1jais.00375
10.1057/ejis.2015.15
10.1037/0021-9010.74.5.787
10.1080/00223980.1975.9915803
10.1002/smj.582
10.17705/1jais.00232
10.17705/1jais.00151
10.25300/MISQ/2013/37.4.09
10.4018/978-1-5225-2604-9.ch006
10.1287/isre.2014.0522
10.25300/MISQ/2014/38.2.08
10.25300/MISQ/2015/39.4.5
10.2307/20650303
10.17705/1jais.00109
10.1037/0021-9010.90.4.692
10.1016/j.jclinepi.2003.08.009
10.1002/0471722146
10.17705/1jais.00506
10.2308/isys-50704
10.1111/j.1464-0597.2007.00327.x
10.1109/HICSS.2010.311
10.1145/1754393.1754396
10.1037/h0029832
10.1348/000712605X47431
10.1109/HICSS.2007.206
10.1002/mar.4220120509
10.5465/AMR.2011.59330932
10.1177/002224299105500304
10.17705/1jais.00399
10.1057/ejis.2009.6
10.1111/1467-8721.ep10768783
10.25300/MISQ/2016/40.1.09
10.1111/deci.12328
10.1145/975817.975820
10.2307/25750688
10.17705/1jais.00524
10.25300/MISQ/2018/13853
10.17705/1jais.00274
10.1080/07421222.2017.1334499
10.1016/j.ijresmar.2008.06.005
10.1037/h0100799
10.2307/25750694
10.1080/03637759209376276
10.1111/j.1468-2885.2006.00009.x
10.1080/07421222.2015.1138374
10.1080/14792772143000003
10.1037/h0027342
10.1016/j.jsis.2018.11.002
10.1207/s15327027hc2002_6
10.1002/cb.130
10.25300/MISQ/2015/39.1.06
10.1111/j.1467-9221.2008.00678.x
10.1111/isj.12129
10.2307/25148817
10.2307/25750691
10.1145/1572532.1572536
10.1080/07421222.2017.1394083
10.1080/01621459.1958.10501452
ContentType Journal Article
Copyright Operational Research Society 2019. 2019
Copyright_xml – notice: Operational Research Society 2019. 2019
DBID AAYXX
CITATION
DOI 10.1080/0960085X.2020.1793696
DatabaseName CrossRef
DatabaseTitle CrossRef
DatabaseTitleList
DeliveryMethod fulltext_linktorsrc
Discipline Engineering
Library & Information Science
EISSN 1476-9344
EndPage 45
ExternalDocumentID 10_1080_0960085X_2020_1793696
1793696
Genre Research Article
GroupedDBID .DC
0BK
0R~
29G
30N
4.4
5GY
77K
7WY
8R4
8R5
AAJMT
AALDU
AAMIU
AAPUL
AAQRR
ABJNI
ABLIJ
ABPAQ
ABXUL
ABXYU
ACGFO
ACGFS
ACHQT
ACREN
ACTIO
ADFRT
ADGTB
ADINQ
AECXW
AEISY
AENEX
AEOZL
AEPSL
AEXYK
AEYOC
AGAYW
AGDLA
AHBYD
AHDZW
AKBVH
AKOOK
ALMA_UNASSIGNED_HOLDINGS
ALQZU
ALSLI
AMKLP
AMTXH
AQRUH
ASPBG
AVWKF
AWYRJ
BLEHA
CCCUG
CNYFK
CS3
CSNOR
DGEBU
EBS
H13
KYCEM
L7B
LJTGL
M4Z
MS~
O9-
P2P
Q2X
RNANH
ROSJB
RPC
RSV
RTWRZ
SNX
SOJ
TBQAZ
TDBHL
TEN
TFL
TFT
TFW
TTHFI
TUROJ
U5U
UCJ
WH7
XSW
ZGOLN
AAGDL
AAHIA
AAYXX
ADYSH
AFRVT
AIYEW
AMPGV
CITATION
ID FETCH-LOGICAL-c310t-7608f96d6f3f0de9d8e32c83f1c051480891f409b07e55de1621a997b390eb8c3
ISSN 0960-085X
IngestDate Tue Jul 01 03:20:31 EDT 2025
Thu Apr 24 23:05:29 EDT 2025
Wed Dec 25 09:07:44 EST 2024
IsPeerReviewed true
IsScholarly true
Issue 1
Language English
LinkModel OpenURL
MergedId FETCHMERGED-LOGICAL-c310t-7608f96d6f3f0de9d8e32c83f1c051480891f409b07e55de1621a997b390eb8c3
ORCID 0000-0002-9719-415X
0000-0002-6705-202X
0000-0001-8711-1827
PageCount 19
ParticipantIDs crossref_primary_10_1080_0960085X_2020_1793696
crossref_citationtrail_10_1080_0960085X_2020_1793696
informaworld_taylorfrancis_310_1080_0960085X_2020_1793696
ProviderPackageCode CITATION
AAYXX
PublicationCentury 2000
PublicationDate 2021-01-02
PublicationDateYYYYMMDD 2021-01-02
PublicationDate_xml – month: 01
  year: 2021
  text: 2021-01-02
  day: 02
PublicationDecade 2020
PublicationTitle European journal of information systems
PublicationYear 2021
Publisher Taylor & Francis
Publisher_xml – name: Taylor & Francis
References cit0033
cit0077
cit0034
cit0078
Wall J. D. (cit0086) 2017; 41
cit0031
cit0075
cit0032
cit0076
cit0073
cit0030
cit0074
cit0072
cit0039
cit0037
cit0038
cit0035
cit0079
cit0036
cit0022
cit0023
cit0067
cit0064
cit0021
cit0065
cit0062
cit0063
cit0060
LaTour M. S. (cit0046) 1989; 9
cit0061
Rogers R. W. (cit0066) 1983
Mantel N. (cit0049) 1966; 50
Disparte D. (cit0020) 2017; 5
cit0028
cit0029
cit0026
cit0027
cit0024
cit0068
cit0025
cit0069
cit0011
cit0055
cit0012
cit0056
cit0053
cit0010
cit0054
cit0051
cit0052
cit0050
cit0091
cit0092
cit0090
cit0019
Sherif C. W. (cit0070) 1965
cit0017
cit0018
cit0015
cit0059
cit0016
cit0013
cit0057
cit0014
cit0058
cit0044
cit0088
cit0001
cit0045
cit0089
cit0042
cit0043
cit0087
cit0040
cit0084
cit0041
cit0085
cit0082
cit0083
Sherif M. (cit0071) 1961
cit0080
cit0081
cit0008
cit0009
cit0006
cit0007
cit0004
cit0048
cit0005
cit0002
cit0003
cit0047
References_xml – ident: cit0068
  doi: 10.1177/009365099026002006
– ident: cit0083
  doi: 10.25300/MISQ/2015/39.2.04
– ident: cit0041
  doi: 10.1016/S0268-4012(02)00105-6
– ident: cit0087
  doi: 10.17705/1jais.00424
– ident: cit0052
  doi: 10.1287/isre.2013.0502
– ident: cit0011
  doi: 10.2307/25750690
– ident: cit0015
– ident: cit0063
  doi: 10.1111/j.1529-1006.2006.00026.x
– ident: cit0067
– ident: cit0062
  doi: 10.2307/25750704
– ident: cit0001
  doi: 10.1007/1-4020-8090-5_13
– ident: cit0082
  doi: 10.17705/1jais.00375
– volume-title: Social judgment: Assimilation and contrast effects in communication and attitude change
  year: 1961
  ident: cit0071
– ident: cit0039
  doi: 10.1057/ejis.2015.15
– ident: cit0023
  doi: 10.1037/0021-9010.74.5.787
– ident: cit0054
– ident: cit0065
  doi: 10.1080/00223980.1975.9915803
– ident: cit0032
  doi: 10.1002/smj.582
– ident: cit0034
  doi: 10.17705/1jais.00232
– ident: cit0006
– ident: cit0029
  doi: 10.17705/1jais.00151
– ident: cit0025
– ident: cit0050
– ident: cit0061
  doi: 10.25300/MISQ/2013/37.4.09
– ident: cit0021
– ident: cit0058
  doi: 10.4018/978-1-5225-2604-9.ch006
– ident: cit0091
  doi: 10.1287/isre.2014.0522
– ident: cit0077
– ident: cit0031
  doi: 10.25300/MISQ/2014/38.2.08
– ident: cit0009
  doi: 10.25300/MISQ/2015/39.4.5
– ident: cit0019
  doi: 10.2307/20650303
– start-page: 153
  volume-title: Social psychophysiology: A source book
  year: 1983
  ident: cit0066
– ident: cit0081
  doi: 10.17705/1jais.00109
– volume-title: Attitude and attitude change: The social judgment-involvement approach
  year: 1965
  ident: cit0070
– ident: cit0079
  doi: 10.1037/0021-9010.90.4.692
– ident: cit0010
  doi: 10.1016/j.jclinepi.2003.08.009
– ident: cit0033
  doi: 10.1002/0471722146
– ident: cit0005
  doi: 10.17705/1jais.00506
– ident: cit0017
  doi: 10.2308/isys-50704
– ident: cit0084
  doi: 10.1111/j.1464-0597.2007.00327.x
– ident: cit0016
  doi: 10.1109/HICSS.2010.311
– ident: cit0045
  doi: 10.1145/1754393.1754396
– ident: cit0064
  doi: 10.1037/h0029832
– ident: cit0003
– ident: cit0076
– ident: cit0080
  doi: 10.1348/000712605X47431
– ident: cit0028
– ident: cit0007
– ident: cit0024
– ident: cit0056
  doi: 10.1109/HICSS.2007.206
– ident: cit0022
  doi: 10.1002/mar.4220120509
– ident: cit0055
  doi: 10.5465/AMR.2011.59330932
– ident: cit0078
  doi: 10.1177/002224299105500304
– ident: cit0092
  doi: 10.17705/1jais.00399
– ident: cit0030
  doi: 10.1057/ejis.2009.6
– ident: cit0014
  doi: 10.1111/1467-8721.ep10768783
– ident: cit0013
  doi: 10.25300/MISQ/2016/40.1.09
– ident: cit0038
  doi: 10.1111/deci.12328
– ident: cit0035
  doi: 10.1145/975817.975820
– ident: cit0072
  doi: 10.2307/25750688
– ident: cit0088
  doi: 10.17705/1jais.00524
– ident: cit0053
  doi: 10.25300/MISQ/2018/13853
– ident: cit0043
  doi: 10.17705/1jais.00274
– ident: cit0036
  doi: 10.1080/07421222.2017.1334499
– ident: cit0027
– ident: cit0012
  doi: 10.1016/j.ijresmar.2008.06.005
– ident: cit0047
  doi: 10.1037/h0100799
– ident: cit0004
– ident: cit0002
  doi: 10.2307/25750694
– ident: cit0090
  doi: 10.1080/03637759209376276
– volume: 5
  year: 2017
  ident: cit0020
  publication-title: Harvard Business Review
– ident: cit0075
  doi: 10.1111/j.1468-2885.2006.00009.x
– ident: cit0060
  doi: 10.1080/07421222.2015.1138374
– volume: 9
  start-page: 5
  issue: 3
  year: 1989
  ident: cit0046
  publication-title: Marketing Health Services
– ident: cit0069
  doi: 10.1080/14792772143000003
– ident: cit0059
  doi: 10.1037/h0027342
– ident: cit0008
  doi: 10.1016/j.jsis.2018.11.002
– ident: cit0073
  doi: 10.1207/s15327027hc2002_6
– ident: cit0074
  doi: 10.1002/cb.130
– volume: 41
  start-page: 13
  year: 2017
  ident: cit0086
  publication-title: Communications of the AIS
– ident: cit0040
  doi: 10.25300/MISQ/2015/39.1.06
– ident: cit0018
  doi: 10.1111/j.1467-9221.2008.00678.x
– ident: cit0085
– volume: 50
  start-page: 163
  issue: 3
  year: 1966
  ident: cit0049
  publication-title: Cancer Chemotherapy Reports. Part 1
– ident: cit0026
– ident: cit0089
  doi: 10.1111/isj.12129
– ident: cit0048
  doi: 10.2307/25148817
– ident: cit0037
  doi: 10.2307/25750691
– ident: cit0044
  doi: 10.1145/1572532.1572536
– ident: cit0051
  doi: 10.1080/07421222.2017.1394083
– ident: cit0057
– ident: cit0042
  doi: 10.1080/01621459.1958.10501452
SSID ssj0020941
Score 2.3877473
Snippet Organisations face growing IT security risks with substantial consequences for missteps in business continuity, data loss, reputational harm, and future...
SourceID crossref
informaworld
SourceType Enrichment Source
Index Database
Publisher
StartPage 27
SubjectTerms Anat Hovav
Dov Te'eni
fear appeal
field experiment
furtive attack
latitude of acceptability
latitude of rejection
overt attack
password
Phishing
social judgement theory
susceptibility
Title Using susceptibility claims to motivate behaviour change in IT security
URI https://www.tandfonline.com/doi/abs/10.1080/0960085X.2020.1793696
Volume 30
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwpV1La9wwEBZpckkPIU-a5oEOoZfFi23ZsnQMIY8tTQ7Fgb0ZW5ZhaeINu95C8uszetjWkkfT9mKMFlmL5vNoZjzzDUInNCgIj8rKA2OBeBEVgVeAZe9RUVYyD9WhoAqFr2_o1W30fRyP-9QhXV3SFEPx9Gpdyb9IFcZArqpK9i8k2z0UBuAe5AtXkDBcPyRj871_vpjr3BSd5vo4EHf55F7zNtyb3mWyrcVfzGydrwpyjNLB3PauezM631FKdCWOlvnZyTusbQjHNg4f_Bj2tvFMTH5Nf-dOIc2sPwW6sMDPR1gudcMPYaDDD72zmr7oBOKGGKnKlYvH5qwxCjZKqMeJ4XxsNbD9MuMizarTxDmYDe3kC5VvcyRhLbUUePwhDCa6T2F_xnWZh_aXT2gtBL9CKUbi33QeOvi6usVi-8fbki9Fxv7aAkvGzBLVrWOkpJtow3oX-NRAZQutyHobfXY4J7fRka1Uwd_wqJcrtjp-B11qUOFlUGEDKtxMcQsq3IEKG1DhSY1HKW5BtYtuL87TsyvPdtvwBJj4jZdQn1WclrQilV9KXjJJQsFIFQjFkc98xoMq8nnhJzKOSxnQMMg5T-Bd92XBBNlDq_W0ll8QThjPQ9VpLlYhRj9mJC84zUPJJFikZb6PonbbMmGp6FVHlLssaBlr7W5narczu9v7aNhNezBcLH-awF2ZZI0Ga2VwmpF35379j7kHaL1_VQ7RajNbyCOwXZviWOPtGQzqlDk
linkProvider Taylor & Francis
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwpV09T8MwED1BGYCBb0SBggfElpLEjWOPCAEtH52K1C1KHFuqaFPUpgP8enyJU7VIwNA10kWJfYnfnd69B3DFvISKVqodAxao02LScxKD7B0mU61iHw8FHBR-7bL2W-upH_QXZmGQVok1tC6FIop_NX7c2IyuKHE3CLsNVOib8s43l8LClG4dNgLBQsx16nbnRZcpXwrXPBPiYEw1xfPbbZbOpyX10oVz52EXZPXEJd3kvTnLk6b8-iHmuNor7cGOhaXktsyjfVhT2QFsL4gVHkDDjjiQa2JnmHBPif05HMJjwT4g09m0YMoUpNtPIofxYDQl-ZiMSic1RawywGxCyqljMshIp0em1knvCN4e7nt3bcfaNDjSYMPcCZnLtWAp01S7qRIpV9SXnGpPorg6d7nwtCkjEzdUQZAqj_leLERoksRVCZf0GGrZOFMnQEIuYh8tygLsTbkBp3EiWOwrrgyUSeM6tKrNiaTVMEcrjWHkVVKndh0jXMfIrmMdmvOwj1LE478AsbjzUV50T3RpdRLRP2NPV4i9hM127_Uleul0n89gy0f-DLZ7_HOo5ZOZahgAlCcXRYZ_A3Pl9rE
linkToPdf http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwpV3LT8IwGP-imBg9-ECNqGgPxttwz649GhXBB_EACbdl69qECIOw7aB_ve3WETBRD1yXfMvWduvva34PgGtsRQ51Y2FIsOAYLmaWEUlkb2AWCx7aalNQQuG3Hu4M3OehV7EJU02rVD20KI0iin-1-rhnsagYcbcKdUukMJTdnS0v-UUm3SZsYSW0VCoOs7fouWT3UoTmyRJD1VQint9us7I9rZiXLm077X2Iqgcu2SYfrTyLWuzrh5fjWm90AHsalKK7chUdwgZP6rC7ZFVYh6YWOKAbpBVMakaR_jUcwVPBPUBpnhY8mYJy-4nYOBxNUpRN0aTMUeNI-wLkc1RqjtEoQd0-SnWO3jEM2o_9-46hQxoMJpFhZvjYJILiGAtHmDGnMeGOzYgjLKas1YlJqCVkExmZPve8mFvYtkJKfblETB4R5pxALZkm_BSQT2hoq4AyT51MmR5xwoji0OaESyAThw1wq7kJmHYwV0Ea48CqjE71OAZqHAM9jg1oLcpmpYXHfwV0eeKDrDg7EWXQSeD8WXu2Ru0VbL8_tIPXbu_lHHZsRZ5RZz32BdSyec6bEv1k0WWxvr8BZZz1VQ
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Using+susceptibility+claims+to+motivate+behaviour+change+in+IT+security&rft.jtitle=European+journal+of+information+systems&rft.au=Jensen%2C+Matthew+L.&rft.au=Durcikova%2C+Alexandra&rft.au=Wright%2C+Ryan+T&rft.date=2021-01-02&rft.pub=Taylor+%26+Francis&rft.issn=0960-085X&rft.eissn=1476-9344&rft.volume=30&rft.issue=1&rft.spage=27&rft.epage=45&rft_id=info:doi/10.1080%2F0960085X.2020.1793696&rft.externalDocID=1793696
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=0960-085X&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=0960-085X&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=0960-085X&client=summon