Grin logo
de en es fr
Shop
GRIN Website
Publish your texts - enjoy our full service for authors
Go to shop › Computer Science - Commercial Information Technology

Behind the scenes of privacy. A quantitative research study to examine the influence of fear appeals on protection motivation

Title: Behind the scenes of privacy. A quantitative research study to examine the influence of fear appeals on protection motivation

Master's Thesis , 2018 , 131 Pages , Grade: 1,3

Autor:in: Anonym (Author)

Computer Science - Commercial Information Technology
Excerpt & Details   Look inside the ebook
Summary Excerpt Details

This paper deals with the observable and recently emerging concerns of privacy online, such as possible information theft due to data leaks, and methods to motivate people conducting a more adequate behavior. The lack of existing academic literature and research on this phenomenon, is addressed by generating profound results regarding fear appeals and their impact on the intention for people to protect their data. An exploratory, quantitative study design is used, adopted from the protection motivation theory to primarily investigate the components of this model and the modifications of these by means of two groups, one experiencing fear appeals. A set of 25 questions was developed and surveyed within the scope of an online questionnaire. Analysis implied the existence of a positive relationship between fear appeals and protection intention valid. Furthermore, the results support the understanding of connections among the items prompted. The study contributes to the field of research by providing in- depth insights on the influence of fear appeals on the protection motivation. Based on these findings, the thesis concludes with theoretical as well as practical recommendations for future research.

Excerpt


Table of Contents

1. Introduction

2. Theoretical Background

2.1 Privacy

2.2 Privacy Concerns – Actual Matters

2.3 Collection of Information – General Overview

2.4 Security Threats and Human Errors

2.5 Password Behavior of End Users

2.6 Fear Appeals

2.7 Development of Fear Appeal Theories and Models

2.8 Protection Motivation Theory

2.8.1 Design of the Protection Motivation Theory

2.8.2 Sources of Information

2.8.3 Cognitive Mediating Process

2.8.3.1 Threat Appraisal

2.8.3.2 Fear

2.8.3.3 Coping Appraisal

2.8.4 Coping Modes

2.9 Research done so far

3. Research Model

4. Research Method

4.1 Research Design

4.2 Development of a Measurement Scale

4.3 Questionnaire Design

4.4 Website “Have I been Pwned“

4.5 Survey: Fear-Appeal Manipulation

4.6 Data Collection

4.7 Participants

5. Results

5.1 Measurement Validity

5.2 Data Analysis

5.3 Group Results

6. Discussion

6.1 Theoretical Implications

6.2 Practical Implications

6.3 Limitations and Critical Review of Research

7. Conclusion

Research Objectives and Core Themes

The primary research objective is to examine whether fear appeals, specifically the notification of potential personal data breaches, influence the protection motivation and subsequent behavior of end users online. The central research question explores whether individuals are more likely to reconsider their security habits when confronted with empirical evidence of their personal data being compromised.

  • The intersection of online privacy concerns and human security behavior.
  • The application of the Protection Motivation Theory (PMT) in an information systems context.
  • The mechanism of fear appeals as a driver for psychological and behavioral change.
  • The influence of personal data leaks on individual risk perception and motivation.
  • Empirical evaluation of security intentions using quantitative survey methodology.

Auszug aus dem Buch

2.6 Fear Appeals

Fear appeals are persuasive messages designed to scare people by describing the terrible things that will happen to them if they do not do what the message recommends.

- Kim Witte (Johnston and Warkentin 2010, p.551)

In order to motivate individuals to behave in an adaptive way, fear appeals have been used for many years in convincing messages. These are not only used in research of information security, but derive much more from the research of the field of health awareness and health communication (Roskos‐Ewoldsen et al. 2004). They are persuasive messages designed to alarm people of potential threats by declaring the terrifying consequences of not acting in accordance with the message. The main goal of fear appeals is to create transformation through persuasiveness (Johnston and Warkentin 2010; Mwagwabi et al. 2018b). The importance of fear in fear arousing communication was already known as early as in 1992 when Witte published her work "Putting the fear back into fear appeals" in the same year (Han n.d.). The necessary elements of a fear appeal include the individual susceptibility to threats, assessments of the severity of threats, efficacy in terms of a suggested reaction and the individual's capacity to respond as recommended. A correctly designed fear appeal not only serves to provide information about the existence of a threat, but also to communicate the severity of the danger and the vulnerability of the affected target. Concluding, the main components of a fear appeal are: fear, threat and effectiveness (Johnston and Warkentin 2010; Witte 1992).

Summary of Chapters

1. Introduction: Outlines the rising online privacy concerns and defines the research question regarding the impact of data breach information on user behavior.

2. Theoretical Background: Provides the foundation on privacy concepts, security threats, password behavior, and the Protection Motivation Theory.

3. Research Model: Defines the hypotheses based on PMT dimensions like threat appraisal and coping appraisal to measure the effect of fear appeals.

4. Research Method: Describes the quantitative survey design, the use of the 'Have I Been Pwned' website, and the data collection process.

5. Results: Presents the statistical validation of the survey data and the regression analysis results for the two participant groups.

6. Discussion: Interprets the empirical findings, contrasts them with existing literature, and derives theoretical and practical implications.

7. Conclusion: Summarizes the thesis findings and confirms that while the model was partially supported, the research objectives were met.

Keywords

Information Security, Privacy, Data Breach, Protection Motivation Theory, Fear Appeals, Threat Appraisal, Coping Appraisal, Online Security, Password Behavior, Quantitative Research, User Behavior, Data Protection, Cyber Security, Risk Perception, Security Compliance

Frequently Asked Questions

What is the fundamental scope of this thesis?

The thesis investigates how information about personal data leaks, used as a 'fear appeal', impacts an individual's motivation to adopt safer online security behaviors.

What are the central research areas?

The work integrates privacy theory, human-computer interaction, and psychological models of fear-based persuasion to analyze user security compliance.

What is the primary research question?

The study seeks to answer whether people reconsider and change their online security behavior when informed that their personal credentials (e.g., email, passwords) are accessible to third parties.

Which scientific methodology is applied?

The author uses a quantitative, exploratory research design involving an online survey, a manipulation group (exposed to breach data) and a control group, analyzed through multiple linear regression.

What topics are discussed in the main body?

The main sections cover the evolution of privacy, the role of human error in security breaches, the mechanisms of the Protection Motivation Theory, and an empirical analysis of user survey responses.

How would you characterize this work through keywords?

The core characteristics are encapsulated by terms such as Information Security, Protection Motivation Theory, Fear Appeals, and Data Protection.

How was the fear appeal manipulated in the survey?

Participants were asked to check their email on the 'Have I Been Pwned' website; those who found a leak were categorized as being exposed to a fear appeal, while those who did not served as the control group.

What was the main finding regarding the model's validity?

While the study validated specific relationships like 'threat severity on fear' and 'fear on protection motivation', the complete PMT model showed mixed results, suggesting the intensity of the fear appeal may have been a limiting factor.

Excerpt out of 131 pages  - scroll top

Details

Title
Behind the scenes of privacy. A quantitative research study to examine the influence of fear appeals on protection motivation
Course
Lehrstuhl für Wirtschaftsinformatik, insb. Informationssysteme in Dienstleistungsbereichen
Grade
1,3
Author
Anonym (Author)
Publication Year
2018
Pages
131
Catalog Number
V457830
ISBN (eBook)
9783668901513
ISBN (Book)
9783668901520
Language
English
Tags
It Sicherheit Big data Protection motivation theory Privacy fear appeal Collection of information security threats password behaviour enduser human errors
Product Safety
GRIN Publishing GmbH
Quote paper
Anonym (Author), 2018, Behind the scenes of privacy. A quantitative research study to examine the influence of fear appeals on protection motivation, Munich, GRIN Verlag, https://www.grin.com/document/457830
Look inside the ebook
  • Depending on your browser, you might see this message in place of the failed image.
  • Depending on your browser, you might see this message in place of the failed image.
  • Depending on your browser, you might see this message in place of the failed image.
  • Depending on your browser, you might see this message in place of the failed image.
  • Depending on your browser, you might see this message in place of the failed image.
  • Depending on your browser, you might see this message in place of the failed image.
  • Depending on your browser, you might see this message in place of the failed image.
  • Depending on your browser, you might see this message in place of the failed image.
  • Depending on your browser, you might see this message in place of the failed image.
  • Depending on your browser, you might see this message in place of the failed image.
  • Depending on your browser, you might see this message in place of the failed image.
  • Depending on your browser, you might see this message in place of the failed image.
  • Depending on your browser, you might see this message in place of the failed image.
  • Depending on your browser, you might see this message in place of the failed image.
  • Depending on your browser, you might see this message in place of the failed image.
  • Depending on your browser, you might see this message in place of the failed image.
  • Depending on your browser, you might see this message in place of the failed image.
  • Depending on your browser, you might see this message in place of the failed image.
  • Depending on your browser, you might see this message in place of the failed image.
  • Depending on your browser, you might see this message in place of the failed image.
  • Depending on your browser, you might see this message in place of the failed image.
  • Depending on your browser, you might see this message in place of the failed image.
  • Depending on your browser, you might see this message in place of the failed image.
  • Depending on your browser, you might see this message in place of the failed image.
  • Depending on your browser, you might see this message in place of the failed image.
  • Depending on your browser, you might see this message in place of the failed image.
  • Depending on your browser, you might see this message in place of the failed image.
  • Depending on your browser, you might see this message in place of the failed image.
Excerpt from  131  pages
Grin logo
  • Grin.com
  • Shipping
  • Contact
  • Privacy
  • Terms
  • Imprint