Heeding the Messenger: The Influence of Sender Characteristics on Security Message Compliance Intentions

IF 6.3 2区 管理学 Q1 INFORMATION SCIENCE & LIBRARY SCIENCE
Information Systems Journal Pub Date : 2026-04-15 Epub Date: 2025-09-22 DOI:10.1111/isj.70013
Sebastian Walter Schuetz, Gaurav Bansal, Qin Weng, Paul Benjamin Lowry, Jason Bennett Thatcher
{"title":"Heeding the Messenger: The Influence of Sender Characteristics on Security Message Compliance Intentions","authors":"Sebastian Walter Schuetz,&nbsp;Gaurav Bansal,&nbsp;Qin Weng,&nbsp;Paul Benjamin Lowry,&nbsp;Jason Bennett Thatcher","doi":"10.1111/isj.70013","DOIUrl":null,"url":null,"abstract":"<div>\n \n <p>How security messages can be used to motivate information technology (IT) users' security behaviour has been of keen interest to IS research. To that end, studies have focused on the content of security messages; however, few studies have examined the influence of message senders. In this article, we build on social influence theory and integrate it with the concept of inferences of manipulative intent (IMI) to develop a model that examines how perceptions of sender characteristics—cybersecurity expertise, coercive power, and similarity—can yield positive and negative influence on message outcomes, captured in recipients' message compliance intentions. We test our model in four different studies using field and scenario experiments across three target populations: the general public, students, and employees. Perceived expertise, power, and similarity had similar effects among the general public and students: Perceived expertise was positively associated with message outcomes, but perceived power and similarity were negatively associated. In contrast, employees reacted differently from the general public and students in that they responded positively to perceived power, with perceived expertise and similarity having negligible effects. Across these three target populations, we found that participants reacted to senders high in perceived power and similarity with IMI, which reduced their message compliance intentions. Our results suggest that senders must be chosen carefully, depending on the target population, because selecting the wrong sender can increase the likelihood of a message being rejected.</p>\n </div>","PeriodicalId":48049,"journal":{"name":"Information Systems Journal","volume":"36 3","pages":"410-434"},"PeriodicalIF":6.3000,"publicationDate":"2026-04-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Information Systems Journal","FirstCategoryId":"91","ListUrlMain":"https://onlinelibrary.wiley.com/doi/10.1111/isj.70013","RegionNum":2,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"2025/9/22 0:00:00","PubModel":"Epub","JCR":"Q1","JCRName":"INFORMATION SCIENCE & LIBRARY SCIENCE","Score":null,"Total":0}
引用次数: 0

Abstract

How security messages can be used to motivate information technology (IT) users' security behaviour has been of keen interest to IS research. To that end, studies have focused on the content of security messages; however, few studies have examined the influence of message senders. In this article, we build on social influence theory and integrate it with the concept of inferences of manipulative intent (IMI) to develop a model that examines how perceptions of sender characteristics—cybersecurity expertise, coercive power, and similarity—can yield positive and negative influence on message outcomes, captured in recipients' message compliance intentions. We test our model in four different studies using field and scenario experiments across three target populations: the general public, students, and employees. Perceived expertise, power, and similarity had similar effects among the general public and students: Perceived expertise was positively associated with message outcomes, but perceived power and similarity were negatively associated. In contrast, employees reacted differently from the general public and students in that they responded positively to perceived power, with perceived expertise and similarity having negligible effects. Across these three target populations, we found that participants reacted to senders high in perceived power and similarity with IMI, which reduced their message compliance intentions. Our results suggest that senders must be chosen carefully, depending on the target population, because selecting the wrong sender can increase the likelihood of a message being rejected.

关注信使:发送者特征对安全消息遵从意图的影响
如何利用安全讯息来激励资讯科技(IT)使用者的安全行为,一直是资讯科技研究的焦点。为此,研究集中在安全信息的内容上;然而,很少有研究调查了信息发送者的影响。在本文中,我们以社会影响理论为基础,并将其与操纵意图推理(IMI)的概念相结合,开发了一个模型,该模型研究了对发送者特征(网络安全专业知识、强制性权力和相似性)的感知如何对信息结果产生积极和消极的影响,这些影响体现在接收者的信息遵从意图中。我们在四个不同的研究中测试了我们的模型,使用了三个目标人群的现场和场景实验:普通公众、学生和员工。感知到的专业知识、权力和相似性在公众和学生中有相似的影响:感知到的专业知识与信息结果呈正相关,但感知到的权力和相似性呈负相关。相比之下,员工的反应与普通大众和学生不同,他们对感知到的权力反应积极,感知到的专业知识和相似性的影响可以忽略不计。在这三个目标人群中,我们发现参与者对具有高感知权力和与IMI相似度的发送者做出反应,这降低了他们的信息遵从意愿。我们的研究结果表明,必须根据目标人群仔细选择发送者,因为选择错误的发送者会增加信息被拒绝的可能性。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
Information Systems Journal
Information Systems Journal INFORMATION SCIENCE & LIBRARY SCIENCE-
CiteScore
14.60
自引率
7.80%
发文量
44
期刊介绍: The Information Systems Journal (ISJ) is an international journal promoting the study of, and interest in, information systems. Articles are welcome on research, practice, experience, current issues and debates. The ISJ encourages submissions that reflect the wide and interdisciplinary nature of the subject and articles that integrate technological disciplines with social, contextual and management issues, based on research using appropriate research methods.The ISJ has particularly built its reputation by publishing qualitative research and it continues to welcome such papers. Quantitative research papers are also welcome but they need to emphasise the context of the research and the theoretical and practical implications of their findings.The ISJ does not publish purely technical papers.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信
小红书