Skip to main content

Individual’s Response to Security Messages: A Decision-Making Perspective

  • Chapter

Part of the book series: Annals of Information Systems ((AOIS,volume 2))

Abstract

Individual decision making determines critical outcomes for organizations in various domains including information security, where the increase of security incidents is causing great concern to organizations. Information security awareness programs are an important approach towards educating users to prevent such incidents. However, it is unclear how to effectively design security programs and messages such that they can inform and change user behavior. This paper attempts to investigate this problem by studying the effects of security message characteristics on users, using the decision-making theory of elaboration likelihood. A 2×2 factorial design experiment was conducted to determine the influence of message repetition and message comprehensibility on user’s elaboration likelihood towards a security message. Our findings indicate that message repetition enhances elaboration likelihood of users. Message comprehensibility interacts with message repetition in determining elaboration likelihood. The results have implications for designing effective security messages and for decision support systems for this purpose.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Ajzen, I.: Nature and Operation of Attitudes, Annual Review of Psychology, Vol. 52 (2001) 27–58

    Article  Google Scholar 

  2. Berlyne, D.E.: Motivational Problems Raised by Exploratory and Epistemic Behavior. In: Psychology: A Study of Science (5), New York: McGraw-Hill (1963) 284–364

    Google Scholar 

  3. Cacioppo, J.T., Petty, R.E., and Chuan, F.K.: The Efficient Assessment of Need for Cognition, Journal of Personality Assessment, Vol. 48:3 (1984) 306–307

    Article  Google Scholar 

  4. Cacioppo, J.T., Petty, R.E., and Morris, K.J.: Effects of Need for Cognition on Message Evaluation, Recall, and Persuasion, Journal of Personality and Social Psychology, Vol. 45 (1983) 805–818

    Article  Google Scholar 

  5. Chaiken, S.: The Heuristic Model of Persuasion. In: Social Influence: The Ontario Symposium, M.P. Zanna, J.M. Olson, and C.P. Herman (eds.), Vol. 5, Hillsdale: Erlbaum, (1987) 3–39

    Google Scholar 

  6. Chebat, J.C., Charlebois, M., and Gelinas-Chebat, C.: What Makes Open vs. Closed Conclusion Advertisements More Persuasive? The Moderating Role of Prior Knowledge and Involvement, Journal of Business Research, Vol. 53 (2001) 93–102

    Article  Google Scholar 

  7. Chebat, J.C., Laroche, M., Baddoura, D., and Filiatrault, P.: Effects of Source Likeability on Attitude Change through Message Repetition, Advances in Consumer Research, Vol. 19 (1992) 353–357

    Google Scholar 

  8. Eagly, A.H. and Himmelfarb, S.: Current Trends in Attitude Theory and Research. In: Readings in Attitude Change, S. Himmelfarb and A. Eagly (eds.), Wiley, New York (1974)

    Google Scholar 

  9. Gordon, L.A., Loeb, M.P., Lucyshyn, W., and Richardson, R.: 2005 CSI/FBI Computer Crime and Security Survey, Computer Security Institute, July 2005, Accessed 8 May 2006. http://www.gocsi.com/forms/fbi/csi_fbi_survey.jhtml.

    Google Scholar 

  10. Kankanhalli, A., Teo, H.H., Tan, B.C.Y., and Wei, K.K.: An Integrative Study of Information Systems Security Effectiveness, International Journal of Information Management, Vol. 23 (2003) 139–154

    Article  Google Scholar 

  11. Keen, P.G.W. and Scott Morton, M.S.: Decision Support Systems: An Organizational Perspective, Addison-Wesley, Reading, Mass. (1978)

    Google Scholar 

  12. Keppel, G.: Design and Analysis: A Researcher’s Handbook (3rd Ed.). Prentice Hall, New Jersey (1993)

    Google Scholar 

  13. Laroche, M., Cleveland, M., and Maravelakis, I.: Attitude Accessibility, Certainty and the Attitude-Behavior Relationship: An Empirical Study of Ad Repetition and Competitive Interference Effects, International Journal of Advertising, Vol. 21 (2002) 149–174

    Google Scholar 

  14. Moore, G.C. and Benbasat, I.: Development of an Instrument to Measure the Perceptions of Adopting an Information Technology Innovation, Information Systems Research, Vol. 2:3 (1991) 173–191

    Google Scholar 

  15. Petty, R.E., and Cacioppo, J.T.; Source Factors and the Elaboration Likelihood Model of Persuasion, Advances in Consumer Research, Vol. 11:1 (1984) 668–670

    Google Scholar 

  16. Petty, R.E., and Cacioppo, J.T.: Communication and Persuasion: Central and Peripheral Routes to Attitude Change, Springer-Verlag, New York (1986)

    Google Scholar 

  17. Power, D.J.: A Brief History of Decision Support Systems. DSSResources.COM, World Wide Web, http://DSSResources.COM/history/dsshistory.html, version 2.8, May 33, (2003)

    Google Scholar 

  18. Ratneshwar, S., and Chaiken, S.: Comprehension’s Role in Persuasion: The Case of Its Moderating Effect on the Persuasive Impact of Source Cues, Journal of Consumer Research, Vol. 38 (1993) 52–62

    Google Scholar 

  19. Sasse, M.A., Brostoff, S., and Weirich, D.: Transforming the ‘Weakest Link’: A Human/Computer Interaction Approach to Usable and Effective Security, BT Technology Journal, Vol. 19 (2001) 122–131

    Article  Google Scholar 

  20. Sharda, R., Barr, S., and McDonnell, J.: Decision Support Systems Effectiveness: A Review and an Empirical Test, Management Science, Vol. 34:2 (1988) 139–159

    Article  Google Scholar 

  21. Simon, H.A.: Administrative Behavior (4th Ed.). Free Press, New York (1997)

    Google Scholar 

  22. Siponen, M.T.: A Conceptual Foundation for Organizational Information Security Awareness, Information Management and Computer Security, Vol. 8:1 (2000) 31–41

    Article  Google Scholar 

  23. Siponen, M.T.: Critical Analysis of Different Approaches to Minimizing User-Related Faults in Information Systems Security: Implications for Research and Practice, Information Management and Computer Security, Vol. 8:5 (2000) 197–209

    Article  Google Scholar 

  24. Straub, D.: Effective IS Security: An Empirical Study, Information Systems Research, Vol. 1:3 (1990) 255–276

    Google Scholar 

  25. Straub, D., and Welke, R.: Coping with Systems Risk: Security Planning Models for Management Decision-Making, MIS Quarterly, Vol. 22:4 (1998) 441–469

    Article  Google Scholar 

  26. Thomson, M.E., and Solms, R.V.: Information Security Awareness: Educating Your Users Effectively, Information Management and Computer Security, Vol. 6:4 (1998) 167–173

    Article  Google Scholar 

  27. Todd, P., and Benbasat, I.: The Impact of Information Technology on Decision Making: A Cognitive Perspective. In: Framing the Domains of IT Management, R.W. Zmud (ed.), Pinnaflex Educational Resources (2000) 1–14

    Google Scholar 

  28. Wood, W., Kallgren, C., and Preisler, R.M.: Access to Attitude-Relevant Information in Memory as a Determinant of Persuasion: The Role of Message Attributes, Journal of Experimental Social Psychology, Vol. 21 (1985) 73–85

    Article  Google Scholar 

  29. Zaichkowsky, J.L.: Measuring the Involvement Construct, Journal of Consumer Research, Vol. 12 (1985) 341–352

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2007 Springer Science+Business Media, LLC

About this chapter

Cite this chapter

Qing, T., Ng, BY., Kankanhalli, A. (2007). Individual’s Response to Security Messages: A Decision-Making Perspective. In: Kulkarni, U., Power, D.J., Sharda, R. (eds) Decision Support for Global Enterprises. Annals of Information Systems, vol 2. Springer, Boston, MA. https://doi.org/10.1007/978-0-387-48137-1_10

Download citation

  • DOI: https://doi.org/10.1007/978-0-387-48137-1_10

  • Publisher Name: Springer, Boston, MA

  • Print ISBN: 978-0-387-48136-4

  • Online ISBN: 978-0-387-48137-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics