Record Details

Impact of cyber security threat in the context of the explosive growth in mobile internet – An extended model of Protection Motivation Theory (PMT) for application to Information Security

Global Proceedings Repository

View Archive Info
 
 
Field Value
 
Title Impact of cyber security threat in the context of the explosive growth in mobile internet – An extended model of Protection Motivation Theory (PMT) for application to Information Security
 
Creator Shadi AlZraiqat
Joan Lu
Qiang Xu
 
Description Threats and Threat Perception have been studied and applied to health related risks first by Rogers DW in 1975 in his Protection Motivation Theory (PMT). This was enhanced and generalized when it was published in 1997, and later again in 2005. This theory has since served as a theoretical foundation for many studies in information security in the organizational context. Threat perceptions have changed and we need to redefine fear that forms the basis for the cognitive responses in the face of threat. Additional constructs need to be added to the Roger’s PMT model of 2005 to help understand the security behavior of individuals and organizations better in the face of the pervading internet access and the mobile transformation of communications. This Article puts forth six additional hypotheses with twelve additional constructs in the PMT model of 2005. The hypotheses seek to demonstrate that the fear appeals are altered by the current communications environment brought in by mobile internet and the resulting security behavior has a measurable impact on the social behavior brought upon by mobile internet communications and that further it has an impact on the economic behavior of a mobile user while responding to the perceived threat.
 
Publisher Int'l Conference on Change, Innovation, Informatics and Disrurptuive Technology
 
Contributor
 
Date 2016-12-19 18:12:43
 
Type Peer-reviewed Paper
 
Format application/pdf
 
Identifier http://proceedings.sriweb.org/repository/index.php/ICCIIDT/icciidtt_london/paper/view/33
 
Source Int'l Conference on Change, Innovation, Informatics and Disrurptuive Technology; ICCIIDT London - UK
 
Language en
 
Rights Authors who submit to this conference agree to the following terms:
a) Authors retain copyright over their work, while allowing the conference to place this unpublished work under a Creative Commons Attribution License, which allows others to freely access, use, and share the work, with an acknowledgement of the work's authorship and its initial presentation at this conference.
b) Authors are able to waive the terms of the CC license and enter into separate, additional contractual arrangements for the non-exclusive distribution and subsequent publication of this work (e.g., publish a revised version in a journal, post it to an institutional repository or publish it in a book), with an acknowledgement of its initial presentation at this conference.
c) In addition, authors are encouraged to post and share their work online (e.g., in institutional repositories or on their website) at any point before and after the conference.