{"title":"Fear Appeals and Information Security Behaviors: An Empirical Study on Mechanical Turk","authors":"S. Samtani, Hongyi Zhu, Shuo Yu","doi":"10.17705/1ATRR.00037","DOIUrl":null,"url":null,"abstract":"This study aims to conduct a methodological replication of the information security study conducted by Johnston and Warkentin (2010). This study leveraged the use of the fear appeals model (FAM) in the context of information security as they pertain to the individual use of anti-spyware software. We adopt all measures, instruments, statistical tests, theory, and models from the original study, but apply them to the Amazon Mechanical Turk population. The results from this replication study are not consistent with the original study, in that two of the five posited hypotheses have opposite effects than those originally found; threat severity is shown to have a positive effect on both response efficacy and selfefficacy, where in the original study, this is shown to have a negative effect on both. The results imply that there may be differences in which populations the study was conducted, thus requiring additional samples and statistical tests.","PeriodicalId":146711,"journal":{"name":"AIS Trans. Replication Res.","volume":"30 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"5","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"AIS Trans. Replication Res.","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.17705/1ATRR.00037","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 5
Abstract
This study aims to conduct a methodological replication of the information security study conducted by Johnston and Warkentin (2010). This study leveraged the use of the fear appeals model (FAM) in the context of information security as they pertain to the individual use of anti-spyware software. We adopt all measures, instruments, statistical tests, theory, and models from the original study, but apply them to the Amazon Mechanical Turk population. The results from this replication study are not consistent with the original study, in that two of the five posited hypotheses have opposite effects than those originally found; threat severity is shown to have a positive effect on both response efficacy and selfefficacy, where in the original study, this is shown to have a negative effect on both. The results imply that there may be differences in which populations the study was conducted, thus requiring additional samples and statistical tests.