You are here: Home Contents V8 N2 V8N2_Anandarajan.html
Personal tools

Online Identity Theft: A Longitudinal Study of Individual Threat-Response and Coping Behaviors

 

 

Full text
View
Purchase

Source
Journal of Information Systems Security
Volume 8, Number 2 (2012)
Pages 4369
ISSN 1551-0123 (Print)
ISSN 1551-0808 (Online)
Authors
Murugan Anandarajan — Drexel University, USA
Narasimha Paravastu — Metropolitan State University, USA
Bay Arinze — Drexel University, USA
Rob D’Ovidio — Drexel University, USA
Publisher
Information Institute Publishing, Washington DC, USA

 

 

Abstract

This study focuses on the threat-response and coping behaviors of individuals to fear appeals in the context of online identity theft, within the theoretical framework of Extended Parallel Process Model (EPPM). It also tests the adequacy of the model to predict an individual’s intention to engage in behaviors that reduce the risk of identity theft. The results indicate that users fully aware of threats of identity theft cope better than the users who are not adequately aware of a possible threat of identity theft. This study makes an important contribution to the theory about differences in application of fear appeals in the context of IS, in that even though users may perceive a threat, it probably fails to trigger fear arousal and therefore maladaptive intentions are not significantly related to fear arousal.

 

 

Keywords

Online Identity Theft; Fear Appeals Security; Protection Motivation Theory; Extended Parallel Process Model; Coping; Longitudinal Study

 

 

References

Abraham CS, et al. (1994) Exploring Teenagers' Adaptive and Maladaptive Thinking in Relation to the Threat of Hiv Infection. Psychology & Health 9(4), 253-272.

Allison SFH, et al. (2005) Exploring the Crime of Identity Theft: Prevalence, Clearance Rates, and Victim/Offender Characteristics. Journal of Criminal Justice 33, 19-29.

Bandura A (1977) Self-Efficacy: Toward a Unifying Theory of Behavioral Change. Psychological Review 84(2), 191-215.

Bandura A (1982) Self-Efficacy Mechanism in Human Agency. American Psychologist 37(2), 122-147.

Barron RM and Kenny DA (1986) The Moderator-Mediator Variable Distinction in Social Psychological Research: Conceptual, Strategic, and Statistical Considerations. Journal of Personality and Social Psychology 51(6), 1173-1182.

Baskerville R (1993) Information Systems Security Design Methods: Implications for Information Systems Development. ACM Computing Surveys 25(4), 375.

Baskerville RL and Portougal V (2003) A Possibility Theory Framework for Security Evaluation in National Infrastructure Protection. Journal of Database Management 14(2), 1.

Ben-Ahron V, et al. (1995) Encouraging Drinking at Safe Limits on Single Occasions: The Potential Contribution of Protection Motivation Theory. Alcohol And Alcoholism (Oxford, Oxfordshire) 30(5), 633-639.

Bengel Jr, et al. (1996) The Role of Risk Perception and Efficacy Cognitions in the Prediction of Hiv-Related Preventive Behavior and Condom Use. Psychology & Health 11(4), 505-525.

Boer H, et al. (1998) Psychosocial Factors and Mental Health in Cancer Patients: Opportunities for Health Promotion. Psychology, Health & Medicine 3(1), 71.

Boer H and Seydel ER (1996) Protection Motivation Theory. In Predicting Health Behaviour: Research and Practice with Social Cognition Models. (Connor M and Norman P, Eds), Open University Press, Buckingham.

Brehm JW (1966) A Theory of Psychological Reactance. Academic Press, Oxford, England.

Bureau of Justice Statistics (2007) Identity Theft, 2005. Washington, DC.

Castano S (1995) Database Security. ACM Press, New York.

Conner M and Armitage CJ (1998) Extending the Theory of Planned Behavior: A Review and Avenues for Further Research. Journal of Applied Social Psychology 28(15), 1429-1464.

Dale M (2007) Jet-Setters Charged with Identity Theft. Associated Press.

Dillard JP and Anderson JW (2004) The Role of Fear in Persuasion. Psychology & Marketing 21(11), 909-926.

Eppright DR, et al. (1994) Knowledge and the Ordered Protection Motivation Model: Tools for Preventing Aids. Journal of Business Research 30(1), 13-24.

Finch E and Fafinski S (2008) Identity Theft. Willan Publishing, Devon, UK.

Fishbein M and Ajzen I (1975) Belief, Attitude, Intention, and Behavior: An Introduction to Theory and Research. Addison-Wesley Pub. Co., Reading, Mass.

Ford L (2008) Morton Grove Man in Id Theft Case Used Phone, Internet to Obtain Credit Cards, Federal Prosecutor Says. Chicago Tribune.

Freud S (1963) The Problem of Anxiety. Psychoanalytic Quarterly Press, New York.

Frijda NH (1986) The Emotions. Cambridge University Press ; Editions de la Maison des sciences de l'homme, Cambridge ; New York.

Fruin DJ, et al. (1992) Protection Motivation Theory and Adolescents' Perceptions of Exercise. Journal of Applied Social Psychology 22(1), 55-69.

Fry RB and Prentice-Dunn S (2005) Effects of Coping Information and Value Affirmation on Responses to a Perceived Health Threat. Health Communication 17(2), 133-147.

Geissinger S (2008) Governor Creates Agency to Combat Identity Theft. San Jose Mercury News.

Hartocollis A (2007) Russian Used List of Richest Americans to Find Targets for Theft, Officials Say. New York Times.

Hodgkins S and Orbell S (1998) Can Protection Motivation Theory Predict Behaviour? A Longitudinal Test Exploring the Role of Previous Behaviour. Psychology and Health 13(2), 237-250.

Hoyle RH, et al. (2002) Research Methods in Social Relations. Wadsworth, Fort Worth, TX.

Kerlinger FN (1986) Foundations of Behavioral Research. Holt, Rinehart and Winston, New York.

Kim J-o and Mueller CW (1978) Factor Analysis: Statistical Methods and Practical Issues. Sage Publications, Beverly Hills, Calif.

Leventhal H (1970) Findings and Theory in the Study of Fear Communications. In Advances in Experimental Social Psychology (Berkowitz L, Ed), pp 119-186, Academic Press, New York.

Leventhal H (1971) Fear Appeals and Persuasion: The Differentiation of a Motivational Construct. American Journal Of Public Health 61(6), 1208-1224.

Mathieson K (1991) Predicting User Intentions: Comparing the Technology Acceptance Model with the Theory of Planned Behavior. Information Systems Research 2(3), 173-191.

Menezes AJ, et al. (1997) Handbook of Applied Cryptography. CRC Press, Boca Raton.

Miceli D and Kim R (2010) 2010 Identity Fraud Survey Report: Consumer Version. Javelin Strategy & Research, Pleasanton, CA.

Milne S, et al. (2000) Prediction and Intervention in Health-Related Behavior: A Meta-Analytic Review of Protection Motivation Theory. Journal of Applied Social Psychology 30(1), 106-143.

Murgraff V, et al. (1999) An Application of Protection Motivation Theory to Riskier Single-Occasion Drinking. Psychology & Health 14(2), 339-350.

Nunnally JC (1978) Psychometric Theory. McGraw-Hill, New York.

Orbell S and Sheeran P (1998) 'Inclined Abstainers': A Problem for Predicting Health-Related Behaviour. British Journal of Social Psychology 37(2), 151-165.

Plotnikoff RC and Higginbotham N (1995) Predicting Low-Fat Diet Intentions and Behaviors for the Prevention of Coronary Heart Disease: An Application of Protection Motivation Theory among an Australian Population. Psychology & Health 10(5), 397-408.

Plotnikoff RC and Higginbotham N (1998) Protection Motivation Theory and the Prediction of Exercise and Low-Fat Diet Behaviors among Australian Cardiac Patients. Psychology & Health 13(3), 411-429.

Prentice-Dunn S, et al. (2001) Effects of Persuasive Message Order on Coping with Breast Cancer Information. Health Education Research 16(1), 81-84.

Ray ML and Wilkie WL (1970) Fear: The Potential of an Appeal Neglected by Marketing. Journal of Marketing 34(1), 54-62.

Rimal RN and Real K (2003) Perceived Risk and Efficacy Beliefs as Motivators of Change. Human Communication Research 29(3), 370.

Rippetoe PA and Rogers RW (1987) Effects of Components of Protection-Motivation Theory on Adaptive and Maladaptive Coping with a Health Threat. Journal of Personality and Social Psychology 52(3), 596-604.

Rogers RW (1975) A Protection Motivation Theory of Fear Appeals and Attitude Change. Journal of Psychology 91(1), 93.

Rogers RW (1983) Cognitive and Physiological Processes in Attitude Change: A Revised Theory of Protection Motivation.

Ruiter RAC, et al. (2004) Danger and Fear Control in Response to Fear Appeals: The Role of Need for Cognition. Basic & Applied Social Psychology 26(1), 13-24.

Sandhu R and Samarati P (1996) Authentication, Access Control, and Audit. ACM Computing Surveys 28(1), 241-243.

Sandhu R, et al. (2006) Client-Side Access Control Enforcement Using Trusted Computing and Pei Models. Journal of High Speed Networks 15(3), 229-245.

Seydel ER, et al. (1994) Patient Education: Self-Efficacy and Self-Management Strategies. In Psychology and Promotion of Health., pp 94-101, Hogrefe & Huber Publishers, Ashland, OH, US.

Siponen M, et al. (2006) A Design Theory for Secure Information Systems Design Methods. Journal of the Association for Information Systems 7(11), 725-770.

Siponen MT and Oinas-Kukkonen H (2007) A Review of Information Security Issues and Respective Research Contributions. SIGMIS Database 38(1), 60-80.

Smith CA and Lazarus RS (1993) Appraisal Components, Core Relational Themes, and the Emotions. Cognition & Emotion 7(3), 233-269.

Spector PE (1981) Research Designs. Sage Publications, Beverly Hills.

Straub DW (1990) Effective Is Security: An Empirical Study. Information Systems Research 1(3), 255-276.

Straub DW and Welke RJ (1998) Coping with Systems Risk: Security Planning Models for Management Decision Making. MIS Quarterly 22(4), 441-469.

Straub JDW and Nance WD (1990) Discovering and Disciplining Computer Abuse in Organizations: A Field Study. MIS Quarterly 14(1), 45-60.

Tanner JF, et al. (1991) The Protection Motivation Model: A Normative Model of Fear Appeals. Journal of Marketing 55(3), 36-45.

Tanner JJF, et al. (1989) Protection Motivation Theory:An Extension of Fear Appeals Theory in Communication. Journal of Business Research 19(4), 267-276.

Taylor AH and May S (1996) Threat and Coping Appraisal as Determinants of Compliance with Sports Injury Rehabilitation: An Application of Protection Motivation Theory. Journal of Sports Sciences 14(6), 471-482.

Umeh K (2004) Cognitive Appraisals, Maladaptive Coping, and Past Behaviour in Protection Motivation. Psychology & Health 19(6), 719-735.

Van der Velde FW and Van der Pligt J (1991) Aids-Related Health Behavior: Coping, Protection Motivation, and Previous Behavior. Journal of Behavioral Medicine 14(5), 429-451.

Witte K (1992) Putting the Fear Back into Fear Appeals: The Extended Parallel Process Model. Communication Monographs 59(4), 329-349.

Witte K (1994) Fear Control and Danger Control: A Test of the Extended Parallel Process Model (Eppm). Communication Monographs 61(2), 113-134.

Witte K and Allen M (2000) A Meta-Analysis of Fear Appeals: Implications for Effective Public Health Campaigns. Health Education & Behavior: The Official Publication Of The Society For Public Health Education 27(5), 591-615.

Witte K, et al. (1998) Fear as Motivator, Fear as Inhibitor: Using the Extended Parallel Process Model to Explain Fear Appeal Successes and Failures. In Handbook of Communication and Emotion: Research, Theory, Applications, and Contexts., pp 423-450, Academic Press, San Diego, CA, US.

Wurtele SK and Maddux JE (1987) Relative Contributions of Protection Motivation Theory Components in Predicting Exercise Intentions and Behavior. Health Psychology: Official Journal Of The Division Of Health Psychology, American Psychological Association 6(5), 453-466.

Yzer MC, et al. (1998) The Effects of Information About Aids Risk and Self-Efficacy on Women's Intentions to Engage in Aids Prevention Behavior. Journal of Applied Social Psychology 28(20), 1837-1852.