Skip to main content
Log in

Protection motivation and deterrence: a framework for security policy compliance in organisations

  • Original Article
  • Published:
European Journal of Information Systems

Abstract

Enterprises establish computer security policies to ensure the security of information resources; however, if employees and end-users of organisational information systems (IS) are not keen or are unwilling to follow security policies, then these efforts are in vain. Our study is informed by the literature on IS adoption, protection-motivation theory, deterrence theory, and organisational behaviour, and is motivated by the fundamental premise that the adoption of information security practices and policies is affected by organisational, environmental, and behavioural factors. We develop an Integrated Protection Motivation and Deterrence model of security policy compliance under the umbrella of Taylor-Todd's Decomposed Theory of Planned Behaviour. Furthermore, we evaluate the effect of organisational commitment on employee security compliance intentions. Finally, we empirically test the theoretical model with a data set representing the survey responses of 312 employees from 78 organisations. Our results suggest that (a) threat perceptions about the severity of breaches and response perceptions of response efficacy, self-efficacy, and response costs are likely to affect policy attitudes; (b) organisational commitment and social influence have a significant impact on compliance intentions; and (c) resource availability is a significant factor in enhancing self-efficacy, which in turn, is a significant predictor of policy compliance intentions. We find that employees in our sample underestimate the probability of security breaches.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Figure 1
Figure 2
Figure 3

Similar content being viewed by others

References

  • Ajzen I (1991) Theory of planned behavior. Organizational Behavior and Human Decision Processes 50 (2), 179–211.

    Article  Google Scholar 

  • Ajzen I and Fishbein M (1980) Prediction of goal-directed behavior: attitudes, intentions, and perceived behavioral control. Journal of Experimental Social Psychology 22, 453–474.

    Article  Google Scholar 

  • Akers R (1990) Rational choice, deterrence, and social learning theory in criminology: the path not taken. The Journal of Criminal Law and Criminology 81 (3), 653–676.

    Article  Google Scholar 

  • Albrechtsen E (2007) A qualitative study of users’ view on information security. Computers & Security 26 (4), 276–289.

    Article  Google Scholar 

  • Anderson C (2005) Creating the conscientious cybercitizen: an examination of home computer user attitudes and intentions towards security. In Tenth INFORMS Conference on Information Systems and Technology (CIST) San Francisco, California, USA.

  • Armitage C and Conner M (2000) Social cognition models and health behaviour: a structured review. Psychology and Health 15 (2), 173–189.

    Article  Google Scholar 

  • Axelrod LJ and Newton JW (1991) Preventing nuclear war: beliefs and attitudes as predictors of disarmist and deterrentist behavior. Journal of Applied Social Psychology 21 (1), 29–40.

    Article  Google Scholar 

  • Bagozii RP (1992) The self-regulation of attitudes, intentions and behavior. Social Psychology Quarterly 55 (2), 178–204.

    Article  Google Scholar 

  • Bandura A, Adams NE, Hardy AB and Howell GN (1980) Tests of the generality of self-efficacy theory. Cognitive Theory And Research 4 (1), 39–66.

    Article  Google Scholar 

  • Barge JK and Schlueter D (1988) A critical evaluation of organizational commitment and identification. Management 2 (1), 116–133.

    Google Scholar 

  • Bollen K and Lennox R (1991) Conventional wisdom on measurement: a structural equation perspective. Psychological Bulletin 110 (2), 305–314.

    Article  Google Scholar 

  • CERT/CC (2004) 2004 e-Crime watch survey summary of findings. Computer Emergency Response Team Coordination Center (CERT/CC). Available at http://www.cert.org/archive/pdf/2004eCrimeWatchSummary.pdf. Accessed 15 January 2007.

  • Chan M, Woon I and Kankanhalli A (2005) Perceptions of information security at the workplace: linking information security climate to compliant behavior. Journal of Information Privacy and Security 1 (3), 18–41.

    Article  Google Scholar 

  • Cheng H, Sims R and Teegen H (1997) To purchase or to pirate software: an empirical study. Journal of Management Information Systems 13 (4), 49–60.

    Article  Google Scholar 

  • Chin WW and Marcolin B (1995) A holistic approach to construct validation in is research: examples of the interplay between theory and measurement. In Administrative Sciences Association of Canada – 23rd Conference (CAMPEAU D, Ed.), Windsor, Ontario.

  • Cialdini RB, Kallgren CA and Reno RR (1991) A focus theory of normative conduct: a theoretical refinement and reevaluation of the role of norms in human behavior. In Advances in Experimental Social Psychology (ZANNA MP, Ed.), pp 201–234, Academic Press, San Diego, CA.

    Google Scholar 

  • Compeau DR and Higgins CA (1995) Computer self-efficacy: development of a measure and initial test. MIS Quarterly 19 (2), 189–211.

    Article  Google Scholar 

  • Culnan M (2004) Bentley survey on consumers and internet security: summary of findings. [WWW document] http://www.bentley.edu/events/iscw2004/survey_findings.pdf (accessed on 31 January 2009).

  • D’arcy J and Hovav A (2004) The role of individual characteristics on the effectiveness of IS security countermeasures. In Tenth Americas Conference on Information Systems New York.

  • Dhillon G and Backhouse J (2001) Current directions in IS security research: towards socio-organizational perspectives. Information Systems Journal 11 (2), 127–153.

    Article  Google Scholar 

  • Dhillon G and Torkzadeh G (2006) Value-focused assessment of information system security in organizations. Information Systems Journal 16 (3), 293–314.

    Article  Google Scholar 

  • Ehrlich I (1996) Crime, punishment, and the market for offenses. Journal of Economic Perspectives 10 (1), 43–67.

    Article  Google Scholar 

  • Ellen PS, Wiener JL and Cobb-Walgren C (1991) The role of perceived consumer effectiveness in motivating environmentally conscious behaviors. Journal of Public Policy & Marketing 10 (2), 102–117.

    Google Scholar 

  • Finch J, Furnell S and Dowland P (2003) Assessing IT security culture: system administrator and end-user perspectives. In Proceedings of ISOneWorld 2003 Conference and Convention Las Vegas, Nevada, USA.

  • Floyd DL, Prentice-Dunn S and Rogers RW (2000) A meta-analysis of research on protection motivation theory. Journal of Applied Social Psychology 30 (2), 407–429.

    Article  Google Scholar 

  • Furnell SM, Bryant P and Phippen AD (2007) Assessing the security perceptions of personal internet users. Computers & Security 26 (5), 410–417.

    Article  Google Scholar 

  • Gefen D and Straub DW (2005) A practical guide to factorial validity using PLS-graph: tutorial and annotated example. Communications of the Association for Information Systems 16, 91–109.

    Google Scholar 

  • Gefen D, Straub DW and Boudreau M-C (2000) Structural equation modelling and regression: guidelines for research practice. Communications of the Association for Information Systems 4, 1–77.

    Google Scholar 

  • Gist M (1987) Self-efficacy: implications for organizational behavior and human resource management. Academy of Management, The Academy of Management Review 12 (3), 472–485.

    Google Scholar 

  • Gordon LA, Loeb MP, Lucyshyn W and Richardson R (2006) 2006 CSI/FBI computer crime and security survey. Computer Security Institute.

  • Grube JW, Morgan M and Mcgree ST (1986) Attitudes and normative beliefs as predictors of smoking intentions and behaviours: a test of three models. British Journal of Social Psychology 25, 81–93.

    Article  Google Scholar 

  • Igbaria M and Iivari J (1995) The effects of self-efficacy on computer usage. International Journal of Management Science 23 (6), 587–605.

    Google Scholar 

  • Kankanhalli A, Teo H-H, Tan BCY and Wei K-K (2003) An integrative study of information systems security effectiveness. International Journal of Information Management 23 (2), 139–154.

    Article  Google Scholar 

  • Karahanna E, Straub DW and Chervany NL (1999) Information technology adoption across time: a cross-sectional comparison of pre-adoption and post-adoption beliefs. MIS Quarterly 23 (2), 183–213.

    Article  Google Scholar 

  • Knapp KJ, Marshall TE, Rainer RK and Ford FN (2005) Managerial Dimensions in Information Security: A Theoretical Model of Organizational Effectiveness (ISC)2 Inc., Palm Harbor, Florida and Auburn University, Auburn, Alabama.

    Google Scholar 

  • Lee SM, Lee S-G and Yoo S (2004) An integrative model of computer abuse based on social control and general deterrence theories. Information and Management 41 (6), 707–718.

    Article  Google Scholar 

  • Loch KD, Carr HH and Warkentin ME (1992) Threats to information systems: today's reality, yesterday's understanding. MIS Quarterly 16 (2), 173.

    Article  Google Scholar 

  • Loch KD, Conger S and Oz E (1998) Ownership, privacy and monitoring in the workplace: a debate on technology and ethics. Journal of Business Ethics 17 (6), 653–663.

    Google Scholar 

  • Loch KD, Straub DW and Kamel S (2003) Diffusing the internet in the Arab world: the role of social norms and technological culturation. IEEE Transactions on Engineering Management 50 (1), 45–63.

    Article  Google Scholar 

  • Ma Q and Pearson JM (2005) ISO 17799: ‘Best practices’ in information security management? Communications of the Association for Information Systems 15, 577–591.

    Google Scholar 

  • Maddux JE and Rogers RW (1983) Protection motivation and self-efficacy: a revised theory of fear appeals and attitude change. Journal of Experimental Social Psychology 19 (5), 469–479.

    Article  Google Scholar 

  • Melamed S, Rabinowitz S, Feiner S, Weisberg E and Ribak J (1996) Usefulness of the protection motivation theory in explaining hearing protection device use among male industrial workers. Health Psychology 15 (3), 209–215.

    Article  Google Scholar 

  • Milne S, Sheeran P and Orbell S (2000) Prediction and intervention in health-related behavior: a meta-analytic review of protection motivation theory. Journal of Applied Social Psychology 10 (1), 106–143.

    Article  Google Scholar 

  • Mishra S and Dhillon G (2006) Information systems security governance research: a behavioral perspective. In 1st Annual Symposium on Information Assurance, Academic Track of 9th Annual NYS Cyber Security Conference pp 27–35 New York, USA.

  • Mowday R (1998) Reflections on the study and relevance of organizational commitment. Human Resources Management Review 8 (4), 387–401.

    Article  Google Scholar 

  • Neuwirth K, Dunwoody S and Griffin RJ (2000) Protection motivation and risk communication. Risk Analysis 20 (5), 721–734.

    Article  Google Scholar 

  • Pahnila S, Siponen M and Mahmood A (2007) Employees’ behavior towards IS security policy compliance. In 40th Hawaii International Conference on System Sciences (HICSS 07) Hawaii, USA.

  • Palardy N, Greening L, Ott J, Dolderby A and Atchison J (1998) Adolescents’ health attitudes and adherence to treatment for insulin-dependent diabetes mellitus. Developmental and Behavioral Pediatrics 19 (1), 31–37.

    Article  Google Scholar 

  • Peace AG, Galletta D and Thong J (2003) Software piracy in the workplace: a model and empirical test. Journal of Management Information Systems 20 (1), 153–177.

    Google Scholar 

  • Petter S, Straub D and Rai A (2007) Specifying formative constructs in information systems research. MIS Quarterly 31 (4), 623–656.

    Google Scholar 

  • Post GV and Kagan A (2007) Evaluating information security tradeoffs: restricting access can interfere with user tasks. Computers & Security 26 (3), 229–237.

    Article  Google Scholar 

  • Privacyrights.Org (2005) A chronology of data breaches. Available at http://www.privacyrights.org/ar/chronDataBreaches.htm, accessed 21 January 2007.

  • Privacyrights.Org (2006) 2006 disclosures of U.S. data incidents. Available at http://www.privacyrights.org/ar/chronDataBreaches.htm, accessed 21 January 2007.

  • Randall D (1987) Commitment and the organization: the organization man revisited. Academy of Management Review 12 (3), 460–471.

    Google Scholar 

  • Riemenschneider CK, Harrisson D and Mykytyn PP (2003) Understanding IT adoption decisions in small business: integrating current theories. Information and Management 40, 269–285.

    Article  Google Scholar 

  • Rivis A and Sheeran P (2003) Social influences and the theory of planned behavior: evidence for a direct relationship between prototypes and young people's exercise behavior. Psychology and Health 18 (5), 567–583.

    Article  Google Scholar 

  • Rogers RW (1975) A protection motivation theory of fear appeals and attitude change. The Journal of Psychology 91, 93–114.

    Article  Google Scholar 

  • Rogers RW (1983) Cognitive and physiological processes in fear appeals and attitude change: a revised theory of protected motivation. In Social Psychophysiology: A Sourcebook (CACIOPPO JT and PETTY RE, Eds), pp 153–176, The Guilford Press, New York.

    Google Scholar 

  • Saks A and Belcourt M (2006) An investigation of training activities and transfer of training in organizations. Human Resources Management 45 (4), 629–648.

    Article  Google Scholar 

  • Sheeran P and Orbell S (1999) Augmenting the theory of planned behavior: roles for anticipated regret and descriptive norms. Journal of Applied Social Psychology 29 (10), 2107–2142.

    Article  Google Scholar 

  • Shropshire J, Warkentin M, Johnston AC and Schmidt MB (2006) Personality and it security: an application of the five-factor model. In Proceedings of the Americas Conference on Information Systems pp 3443–3449.

  • Siponen MT (2000) A conceptual foundation for organizational information security awareness. Information Management and Computer Security 8 (1), 31–41.

    Article  Google Scholar 

  • Stajkovic A and Luthans F (1998) Self-efficacy and work-related performance: a meta analysis. Psychological Bulletin 124 (2), 240–261.

    Article  Google Scholar 

  • Stanley MA and Maddux JE (1986) Cognitive processes in health enhancement: investigation of a combined protection motivation and self-efficacy model. Basic and Applied Social Psychology 7 (2), 101–113.

    Article  Google Scholar 

  • Stanton JM, Stam K, Guzman I and Caldera C (2003) Examining the linkages between organizational commitment and information security. In IEEE Systems, Man, and Cybernetics Conference Washington DC, USA.

  • Stanton JM, Stam KR, Mastrangelo P and Jolton J (2005) Analysis of end user security behaviors. Computers & Security 24 (2), 124–133.

    Article  Google Scholar 

  • Steffen VJ (1990) Men's motivation to perform the testicle self-exam: effects of prior knowledge and an educational brochure. Journal of Applied Social Psychology 20 (8), 681–702.

    Article  Google Scholar 

  • Straub DW (1989) Validating instruments in MIS research. MIS Quarterly 13 (2), 147–169.

    Article  Google Scholar 

  • Straub DW (1990) Effective is security: an empirical study. Information Systems Research 1 (3), 255–276.

    Article  Google Scholar 

  • Straub DW and Collins RW (1990) Key information issues facing managers: software piracy, proprietary databases, and individual rights to privacy. MIS Quarterly 14 (2), 143–156.

    Article  Google Scholar 

  • Straub DW and Nance WD (1990) Discovering and disciplining computer abuse in organization. MIS Quarterly 14 (1), 45–60.

    Article  Google Scholar 

  • Tanner JF, Hunt JB and Eppright DR (1991) The protection motivation model: a normative model of fear appeals. Journal of Marketing 55 (3), 36–45.

    Article  Google Scholar 

  • Taylor S and Todd PA (1995) Understanding information technology usage – a test of competing models. Information Systems Research 6 (2), 144–176.

    Article  Google Scholar 

  • Thompson RL, Higgins CA and Howell JM (1991) Personal computing: toward a conceptual model of utilization. MIS Quarterly 15 (1), 124–143.

    Article  Google Scholar 

  • Thompson RL, Higgins CA and Howell JM (1994) Influence of experience on personal computer utilization. Journal of Management Information Systems 11 (1), 167–187.

    Article  Google Scholar 

  • Thomson KL and Von Solms R (1998) Information security awareness: educating your users effectively. Information Management & Computers Security 6 (4), 167–173.

    Article  Google Scholar 

  • Torkzadeh R, Pflughoeft K and Hall L (1999) Computer self-efficacy, training effectiveness and user attitudes: an empirical study. Behaviour and Information Technology 18 (4), 299–309.

    Article  Google Scholar 

  • Venkatesh V and Brown S (2001) A longitudinal investigation of personal computers in homes: adoption determinants and emerging challenges. MIS Quarterly 25 (1), 71–102.

    Article  Google Scholar 

  • Venkatesh V, Morris MG, Davis GB and Davis FD (2003) User acceptance of information technology: toward a unified view. MIS Quarterly 27 (3), 425–478.

    Google Scholar 

  • Von Solms B (2001) Information security – a multidimensional discipline. Computers & Security 20 (6), 504–508.

    Article  Google Scholar 

  • Von Solms R and Von Solms B (2004) From policies to culture. Computers & Security 23 (4), 275–279.

    Article  Google Scholar 

  • Vroom C and Von Solms R (2004) Towards information security behavioural compliance. Computers & Security 23 (3), 191–198.

    Article  Google Scholar 

  • Wiener Y (1982) Commitment in organizations: a normative view. Academy of Management Review 7 (3), 418.

    Google Scholar 

  • Williams K and Hawkins R (1986) Perceptual research on general deterrence: a critical review. Law and Society Review 20 (4), 545–572.

    Article  Google Scholar 

  • Witte K and Allen M (2000) A meta-analysis of fear appeals: implications for effective public health campaigns. Health Education & Behavior 27 (5), 591–615.

    Article  Google Scholar 

  • Woon IMY, Tan GW and Low RT (2005) A protection motivation theory approach to home wireless security. In International Conference on Information Systems pp 367–380 Las Vegas, USA.

  • Zhang X (2005) What do consumers really know about spyware. Communications of the ACM 48 (8), 44–48.

    Article  Google Scholar 

Download references

Acknowledgements

We appreciate the support and collaboration on this project by the Cyber Task Force, Buffalo Division, FBI. This research is funded in part by NSF under grant #0402388 and MDRF grant #F0630. The research of the second author is also supported in part by NSF under grant #0809186. The usual disclaimer applies.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Tejaswini Herath.

Appendix

Appendix

See Tables A1, A2, A3 and A4.

Table a1 Descriptive statistics
Table a2 Instrument, item loadings and item weights
Table a3 Cross loadings
Table a4 Inter-item and item-to-construct correlation matrix for formative constructs

Rights and permissions

Reprints and permissions

About this article

Cite this article

Herath, T., Rao, H. Protection motivation and deterrence: a framework for security policy compliance in organisations. Eur J Inf Syst 18, 106–125 (2009). https://doi.org/10.1057/ejis.2009.6

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1057/ejis.2009.6

Keywords

Navigation