Abstract
Individual decision making determines critical outcomes for organizations in various domains including information security, where the increase of security incidents is causing great concern to organizations. Information security awareness programs are an important approach towards educating users to prevent such incidents. However, it is unclear how to effectively design security programs and messages such that they can inform and change user behavior. This paper attempts to investigate this problem by studying the effects of security message characteristics on users, using the decision-making theory of elaboration likelihood. A 2×2 factorial design experiment was conducted to determine the influence of message repetition and message comprehensibility on user’s elaboration likelihood towards a security message. Our findings indicate that message repetition enhances elaboration likelihood of users. Message comprehensibility interacts with message repetition in determining elaboration likelihood. The results have implications for designing effective security messages and for decision support systems for this purpose.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
Ajzen, I.: Nature and Operation of Attitudes, Annual Review of Psychology, Vol. 52 (2001) 27–58
Berlyne, D.E.: Motivational Problems Raised by Exploratory and Epistemic Behavior. In: Psychology: A Study of Science (5), New York: McGraw-Hill (1963) 284–364
Cacioppo, J.T., Petty, R.E., and Chuan, F.K.: The Efficient Assessment of Need for Cognition, Journal of Personality Assessment, Vol. 48:3 (1984) 306–307
Cacioppo, J.T., Petty, R.E., and Morris, K.J.: Effects of Need for Cognition on Message Evaluation, Recall, and Persuasion, Journal of Personality and Social Psychology, Vol. 45 (1983) 805–818
Chaiken, S.: The Heuristic Model of Persuasion. In: Social Influence: The Ontario Symposium, M.P. Zanna, J.M. Olson, and C.P. Herman (eds.), Vol. 5, Hillsdale: Erlbaum, (1987) 3–39
Chebat, J.C., Charlebois, M., and Gelinas-Chebat, C.: What Makes Open vs. Closed Conclusion Advertisements More Persuasive? The Moderating Role of Prior Knowledge and Involvement, Journal of Business Research, Vol. 53 (2001) 93–102
Chebat, J.C., Laroche, M., Baddoura, D., and Filiatrault, P.: Effects of Source Likeability on Attitude Change through Message Repetition, Advances in Consumer Research, Vol. 19 (1992) 353–357
Eagly, A.H. and Himmelfarb, S.: Current Trends in Attitude Theory and Research. In: Readings in Attitude Change, S. Himmelfarb and A. Eagly (eds.), Wiley, New York (1974)
Gordon, L.A., Loeb, M.P., Lucyshyn, W., and Richardson, R.: 2005 CSI/FBI Computer Crime and Security Survey, Computer Security Institute, July 2005, Accessed 8 May 2006. http://www.gocsi.com/forms/fbi/csi_fbi_survey.jhtml.
Kankanhalli, A., Teo, H.H., Tan, B.C.Y., and Wei, K.K.: An Integrative Study of Information Systems Security Effectiveness, International Journal of Information Management, Vol. 23 (2003) 139–154
Keen, P.G.W. and Scott Morton, M.S.: Decision Support Systems: An Organizational Perspective, Addison-Wesley, Reading, Mass. (1978)
Keppel, G.: Design and Analysis: A Researcher’s Handbook (3rd Ed.). Prentice Hall, New Jersey (1993)
Laroche, M., Cleveland, M., and Maravelakis, I.: Attitude Accessibility, Certainty and the Attitude-Behavior Relationship: An Empirical Study of Ad Repetition and Competitive Interference Effects, International Journal of Advertising, Vol. 21 (2002) 149–174
Moore, G.C. and Benbasat, I.: Development of an Instrument to Measure the Perceptions of Adopting an Information Technology Innovation, Information Systems Research, Vol. 2:3 (1991) 173–191
Petty, R.E., and Cacioppo, J.T.; Source Factors and the Elaboration Likelihood Model of Persuasion, Advances in Consumer Research, Vol. 11:1 (1984) 668–670
Petty, R.E., and Cacioppo, J.T.: Communication and Persuasion: Central and Peripheral Routes to Attitude Change, Springer-Verlag, New York (1986)
Power, D.J.: A Brief History of Decision Support Systems. DSSResources.COM, World Wide Web, http://DSSResources.COM/history/dsshistory.html, version 2.8, May 33, (2003)
Ratneshwar, S., and Chaiken, S.: Comprehension’s Role in Persuasion: The Case of Its Moderating Effect on the Persuasive Impact of Source Cues, Journal of Consumer Research, Vol. 38 (1993) 52–62
Sasse, M.A., Brostoff, S., and Weirich, D.: Transforming the ‘Weakest Link’: A Human/Computer Interaction Approach to Usable and Effective Security, BT Technology Journal, Vol. 19 (2001) 122–131
Sharda, R., Barr, S., and McDonnell, J.: Decision Support Systems Effectiveness: A Review and an Empirical Test, Management Science, Vol. 34:2 (1988) 139–159
Simon, H.A.: Administrative Behavior (4th Ed.). Free Press, New York (1997)
Siponen, M.T.: A Conceptual Foundation for Organizational Information Security Awareness, Information Management and Computer Security, Vol. 8:1 (2000) 31–41
Siponen, M.T.: Critical Analysis of Different Approaches to Minimizing User-Related Faults in Information Systems Security: Implications for Research and Practice, Information Management and Computer Security, Vol. 8:5 (2000) 197–209
Straub, D.: Effective IS Security: An Empirical Study, Information Systems Research, Vol. 1:3 (1990) 255–276
Straub, D., and Welke, R.: Coping with Systems Risk: Security Planning Models for Management Decision-Making, MIS Quarterly, Vol. 22:4 (1998) 441–469
Thomson, M.E., and Solms, R.V.: Information Security Awareness: Educating Your Users Effectively, Information Management and Computer Security, Vol. 6:4 (1998) 167–173
Todd, P., and Benbasat, I.: The Impact of Information Technology on Decision Making: A Cognitive Perspective. In: Framing the Domains of IT Management, R.W. Zmud (ed.), Pinnaflex Educational Resources (2000) 1–14
Wood, W., Kallgren, C., and Preisler, R.M.: Access to Attitude-Relevant Information in Memory as a Determinant of Persuasion: The Role of Message Attributes, Journal of Experimental Social Psychology, Vol. 21 (1985) 73–85
Zaichkowsky, J.L.: Measuring the Involvement Construct, Journal of Consumer Research, Vol. 12 (1985) 341–352
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2007 Springer Science+Business Media, LLC
About this chapter
Cite this chapter
Qing, T., Ng, BY., Kankanhalli, A. (2007). Individual’s Response to Security Messages: A Decision-Making Perspective. In: Kulkarni, U., Power, D.J., Sharda, R. (eds) Decision Support for Global Enterprises. Annals of Information Systems, vol 2. Springer, Boston, MA. https://doi.org/10.1007/978-0-387-48137-1_10
Download citation
DOI: https://doi.org/10.1007/978-0-387-48137-1_10
Publisher Name: Springer, Boston, MA
Print ISBN: 978-0-387-48136-4
Online ISBN: 978-0-387-48137-1
eBook Packages: Computer ScienceComputer Science (R0)