Chapter 2-Draft 2
Chapter 2-Draft 2
Chapter 2-Draft 2
Introduction
Security is a growing issue for all organizations with I.T. facilities (Dixit et al.,
2014; Vance et al., 2012). However, since the covid 19 pandemic, there has been a steep increase
in social engineering attacks (Siddiqi et al., 2022) (Hijji & Alam, 2021). Social engineering
attacks target the psychology of the user, unlike other network attacks. The reasons behind this
problem are a lack of employee awareness and employee compliance failures with information
security policies and procedures (Sulaiman et al., 2022; Li et al., 2022; Haag et al., 2021; Yeng
regression study aims to measure employee awareness and employees' cybersecurity protection
actions.
Search Strategy
Google Scholar, IEEE, ACM journals, Sage publications, and the University of
Cumberlands library will be used to gather the literature. Keywords used were "cyber attacks
across organizations" and "cyber attacks and protection motivation theory." First, review articles
were studied to find gaps in the existing research articles and then narrowed down to the specific
relevant articles. The article types that are included are peer-reviewed published papers from
journals. In addition to that, there are also some conference papers that are included.
Factors to Motivate Protection against Cyber Attacks across Organizations
Theoretical Framework
Several decades ago, Protection Motivation Theory was initially used in the research of
the health domain to create a model of disease prevention and health promotion (Floyd et al.,
2000). A meta-analysis that was done at that time on two decades of research revealed threat
severity, threat vulnerability, response efficacy, and self-efficacy resulted in adaptive behaviors.
It also indicated that a decrease in maladaptive response rewards and adaptive response costs
hold true
The author postulated three components of fear appeal (Rogers, 1975). They are the
magnitude of noxiousness of the depicted event, probability of occurrence of that event, and
cognitive process that can change attitudes. The below diagram explains the constructs and was
In 1983 the model was revisited by the authors (Maddux & Rogers, 1983). It was further
studied to understand the effect of fear appeals on persuasion behavior by combining protection
motivation theory with self-efficacy theory. It was found that the probability of threat occurrence
and effectiveness of coping response has a positive influence on adopting preventive health
behavior. It was also found that self-efficacy as a fourth component supports the protection
motivation theory. It can influence the intentions due to its direct influence and its interactions
with the other two variables of PMT. The interaction effect can be interpreted as two new
decision-making strategies that people use when confronted with fear which is a preventive
strategy and a hyper-defensive strategy. Finally, the resultant model combining self-efficacy
theory and protection motivation theory resulted in a general model for attitude change.
In another meta-analytic review, it was found that threat and coping appraisal
components are useful in predicting health behaviors (Milne et al., 2000). However, they could
only be concurrent behaviors but not future behaviors. It was also found that the coping appraisal
component has greater predictability than the threat appraisal component. The below diagram is
Protection Motivation Theory begins with the person receiving the information and
evaluating it to take protective action (Crossler & Bélanger, 2014). One of the external sources
from which this information is received can be prior experience based on which a user performs
an action. The cognitive mediation process that comprises threat and coping appraisal processes
has two coping modes. One is adaptive coping, which talks about protecting oneself and also
protecting others. Another one is maladaptive coping, which is about not protecting oneself and
others.
PMT propounds that threat appraisal is one determinant to specify whether a person
adopts coping behavior or not (Crossler & Bélanger, 2014). Thus the below model combines the
The below diagram was adopted from (Crossler & Bélanger, 2014)
Factors to Motivate Protection against Cyber Attacks across Organizations
Over decades the studies that are based on PMT ignored the full nomology of PMT and
considered only the core constructs of PMT (Boss et al., 2015). A fear appeal based on which
PMT is formed is ignored. Information security studies that used PMT did not model or measure
fear, and in addition to that, most of the predictions were based on the intentions rather than the
actual behavior.
Managers are concerned about motivating their employees to engage in secure behaviors.
Previous studies have used PMT to better understand users' performance toward secure behavior.
However, the adaption of PMT yielded inconsistent results. Below model adapted from (Menard
et al., 2017) integrated PMT and Self Determination Theory (SDT) to explain users' motivation
to comply with security policies. Motivation is a measurable construct of SDT, and through this
study, it was shown that motivation to engage in secure behaviors could be achieved through
intrinsic motivation rather than fear. Secure messages have been constructed that appeal to
intrinsic motivation rather than fear. While users exhibiting security measures might trigger a
threat, the primary focus of using fear may not be an effective way of eliciting motivational
behaviors. However, this model tested only the behavioral intentions but not the actual behavior.
Factors to Motivate Protection against Cyber Attacks across Organizations
employees' cybersecurity behavior rather than on their intentions (Li et al., 2019). The
investigated results proved that employees' awareness of cyber security policies made them
exhibit security behaviors. In addition to that, the study also indicated that organizational,
informational security policy environment positively influences their threat and coping appraisal
This study is an extension of the previous study and is the basis for the current study,
where it considers the effect of antecedents and mediating factors that contribute to the security
behaviors in addition to the core constructs of the PMT. The below diagram is adopted from (Li
et al., 2022) and is the current model of the study. It includes five core constructs of PMT that
Perceived Severity
Factors to Motivate Protection against Cyber Attacks across Organizations
It is when a user perceives a danger of a cyber attack, for example, the danger of getting
Perceived Vulnerability
phishing email.
vulnerability
It explains how well an employee or a user is confident in his abilities to perform the
Response Costs
It explains how well an employee can be compliant with security policies that help the
organization keep security breaches down. These five factors are the core constructs of PMT.
It also proved that coping factors are reliable predictors in predicting motivational
behavior. In addition to that, several practical implications are provided with respect to gender,
organization type, and also generation. For example, government organizations took good
measures in motivating sec security behavior than other businesses, etc. There is also a
training can be enhanced. Below diagram is adapted from (Li et al., 2022)
Factors to Motivate Protection against Cyber Attacks across Organizations
PMT model is rooted in literature and states that its constructs which are threat appeal
and coping appeal, can influence the motivational behavior of individuals. Disciplines like
psychology, information technology, health care, etc. validated the PMT model.28 publications
based on PMT and information security were reviewed, and it was found that some core
constructs were missing among 19 studies. Also, most of the studies did not consider the actual
behavior, but they only tested the intentions. Feal appeal messages have also been found to have
an impact on protection behavior. Overall this calls for an extended PMT model to reflect the
The extended PMT model has organization effort as an antecedent to promote cognitive
processes, which are threat and coping appeals, and they further promote employee protection
behavior. Employee awareness is also considered another antecedent that can result from the
organizational effort. Employee awareness can promote positive cognitive behavior, which will
motivate protection behavior. In addition to that, demographic factors are also considered in this
model
Factors to Motivate Protection against Cyber Attacks across Organizations
Literature Review
cyberattacks (Siddiqi et al., 2022). They exploit human factors to bypass technical measures, as it
is easy to compromise a human than to find a vulnerability in the security system. Social
engineering attacks are onerous to detect as they do not follow a specific pattern. There are many
kinds of cyber attacks that are based on social engineering attacks. For example, phishing
attacks, dumpster diving, scareware, waterhole, reverse social engineering, and deepfake.
Phishing
In this kind of attack, the attackers use deceitful communication to steal information
(Choudhary et al., 2022). Depending on the type of communication, they are further classified.
Email phishing is where the attacker uses email to send malicious links. Smishing is another
subtype where SMS is used to send phishing attacks and is often targeted at individuals. Vishing
is also another subcategory where phishing happens through voice via phone calls. Pharming is
another kind that does not need any communication mechanism. In this kind of attack, the victim
Extortion
In this kind of attack, the attacker morphs images of victims onto images and videos
using deep learning techniques like DeepFake, and the attacker exhorts money from the victims
Malware
Factors to Motivate Protection against Cyber Attacks across Organizations
This kind of attack is carried through malicious code called malware (Choudhary et al.,
2022). Malware is deployed through phishing attacks. Ransomware, spyware, adware, and
spyware are some of the types of malware. Social media platforms are often targeted to send
Spam
An unwanted email is time-consuming for the reader and is also a source of Java applets
that can execute automatically upon reading the message (Saravanan & Bama, 2019). A few
Many organizations have experienced a sharp increase in cyber attacks following covid
19 pandemic (Verma & Shri, 2022). Below are some examples of organizations that were
victims of cyber attacks. There are case studies that can be further expanded.
Various organizations and industries have been exploited by cybercriminals during the
pandemic (Hijji & Alam, 2021). They are hospitals, public and private sectors, government
institutions, banking, and finance. Among these, the top targets are healthcare companies and
Banking Sector
Online banking through computers and mobile apps helps in faster bank transactions to
customers from anywhere (Ashok, 2021). However, cybercriminals are applying different kinds
Health Organizations
Factors to Motivate Protection against Cyber Attacks across Organizations
Cyber threats against organizations have put not only patients' privacy at risk but also
their safety, and only very few studies have considered cyber threats against health care (Bhuyan
et al., 2020). Four major players in cybersecurity threats in health care are cyber attackers, cyber
defenders, developers, and end-users. In addition to that, there are four major types of cyber
There is an exponential increase in economic impact due to the rising number of attacks
(Hijji & Alam, 2021). Accenture's annual security report shows a 67% increase in security
breaches, and companies spent $110 billion worldwide for protection against cyber attacks.
University of California San Fransico Schoo of Medicine paid $1.14 million dollars to remove
ransomware. Russian malware that targeted Ukraine systems encrypted crucial data making it
useless. The damage cost is estimated to be 10 million. One of the predictions is that Global
Cybersecurity Market will total $152 billion USD by 2025 due to the growing number of cyber-
attacks.
In 2018 FBI received around 100 complaints regarding phishing attacks targeted at health
care, education, air travel, etc., that resulted in a net loss of 100 million dollars (Alabdan, 2020).
In 2010, the total number of complaints was 1,470,306, which increased to 5,737,265 in 2021,
where the growth rate spiked to 290.21% (Md Haris Uddin Sharif & Mehmood Ali Mohammed,
2022).
Factors to Motivate Protection against Cyber Attacks across Organizations
Although several studies have used theories such as PMT, Theory of Planned Behaviour,
Self Dettterance theory, etc., to understand user behavior in cyber security construct, PMT has
Research Questions
2. Is there a distinction between male and female protection motivation behavior against
cyber attacks?
behavior
Perceived Threat
Although there has been research related to identifying factors that contribute to
employee compliance with cybersecurity behavior, there are some limitations. A study was
conducted to understand the factors that contributed to compliance in teenagers. The results
indicated that teenagers are mostly influenced by personal norms, such as being guilty or being
embarrassed if their accounts are hacked will make them more compliant with security behaviors
(Mwagwabi & Jiow, 2021). However, the survey given to the teens was lengthy and tedious, and
research was only conducted in Singapore. Cultural differences might arise and might impact the
results when the survey gets conducted in other countries. One of the studies found that
perceived threat is directly related to cybersecurity behavior (Mat et al., 2021). This leads to the
hypothesis
Organization Effort
Being non-compliant with security policy is one of the issues with employees (Hai Goh
& Ping Teoh, 2021). Failure to comply can be because of the attitude, or it can be an
organizational factor. Employees may feel that policy is too stringent and hinders daily work,
which is unfair to comply with, and they might fail to comply. The results were, however,
theoretical and did not proven through statistics. It is proved in another study that measures
related to awareness improved users' privacy protection behavior (Gabel et al., n.d.)
Li et al. (2021) expounded some of the factors that can motivate employees to enhance
their protection behavior are cybersecurity culture and awareness programs that organizations
can develop (Lie et al., 2021). In addition to using advanced technologies for protection against
cyberattacks, organizations should also invest in the culture. The author provided only theoretical
insights; however, there are no statistics proving the theory. This leads to the hypothesis
Self Efficacy
Kalhoro et al. (2021) conducted an extensive review of published literature from 2010 to
20202 and identified several factors that can impact software engineers to exhibit cyber hygiene
behavior. Self-efficacy is found to be one of the positive factors, which then leads to the
hypothesis that
al., 2021).
Factors to Motivate Protection against Cyber Attacks across Organizations
Five main factors were identified by Hull et al. (2021) that can motivate employees to
take protection against cyber attacks. Knowledge, motivation, confidence, propensity to take
risks, and self-typed characteristics. Among all the five, knowledge was highly determinant.
However, the limitation of this research is participants recruited from CrowdFlower may not
A study conducted to identify the factors that motivated users to protect their privacy was
done under the lens of protection motivation theory (Boerman et al., 2021). Perceived threat is
found to be high and motivated users to adopt secure behavior. There is a mix of coping
appraisal variables; self-efficacy was low in users for protecting their privacy online. Perceived
Micro, small and medium enterprises are at risk of cyber threats, especially those
enterprises that are new to cybersecurity (Bisma et al., 2021). A quantitative study on those
enterprises indicates that perceived severity and self-efficacy have a significant impact on
Organization Culture
The author determines through him that organizational resiliency depends on the
Security awareness can be increased through the lens of cultural concepts. They both are good
factors to integrate as they both depend on expanding knowledge and enforcing good practices.
cognitive belief system can also influence their intentions to comply with security policies. It is
identified that security tools can be used to moderate employees' cognitive belief systems. It can
further extemporize their compliance behavior. The limitation of this study is the low sample
size.
In another study, the author explains that organizational culture and team culture
increases employees' cognitive abilities to deal with the threat and coping appraisals, which in
turn impacts their behavioral intentions to comply with information security policies (Sharma &
Aparicio, 2022). However, the survey respondents were self-selected as the survey was posted on
Mturk for financial benefit. In addition to involvement, consistency, adaptability, and mission,
there are other subcultures that are not considered under organizational culture.
PMT Extensions
A study was conducted to assess the awareness of cyber attacks in Palestinian learners.
Results indicated that internet users were careless against security measures, knowledge, and
practice. They did not even try to attend an awareness course to improvise their knowledge.
Among those users, some of them with knowledge of cyber-attacks acted in a more professional
way. The survey was conducted only among educational institutions (Salem et al., 2021).
antecedents to threat appraisal and coping appraisal (Li et al., 2022). The findings proved that
Factors to Motivate Protection against Cyber Attacks across Organizations
organizational effort increases employee awareness which further increases threat and coping
appraisals. The threat and coping appraisals of PMT are then found to significantly impact the
the author considered SETA programs as antecedents of threat and countermeasure awareness
and which are further mediated by threat and coping appraisal and finally lead to protection
In another study, the author extended PMT by considering perceived knowledge and
internet trust as antecedents and proved that users who tend to believe that they have knowledge
about cybercrime are more inclined to take protective measures (De Kimpe et al., 2022).
However, when the actual knowledge of respondents was considered, the results might vary.
Factors beyond psychological were not considered; for example, experience or technology
was considered an antecedent that led employees to take protection motivation behavior.
However problem with this research was the survey conducted in Malayasia was taken during
the movement control order (Humaidi & Abdallah Alghazo, 2022). One of the latest
technologies used in providing awareness is A.I. (Ansari, 2022). It was proven through the
survey results that A.I. based security training programs significantly impact employees' risk
scores. On a similar note, another author too mentioned that game-based approaches could
enhance the security awareness of the employees (Alqahtani & Kavakli-Thorne, 2020).
Factors to Motivate Protection against Cyber Attacks across Organizations
A qualitative study conducted in the healthcare domain revealed three key security
barriers (Coventry et al., 2020). The first one is security perceived as a barrier; the second is poor
awareness of consequences, and the third is lack of policies and reinforcement of secure
behavior.
A study that used TPB found that Psychological contract breach (PCB) negatively
impacts information security policy compliance (Lee et al., 2022). PCB is said to generate
Fear
The core constructs of PMT are threat and coping appraisal processes that can give rise
to attitude ambivalence (Ng et al., 2021). The attitude ambivalence negatively influences
protection behavior. By designing effective fear appeals, attitude ambivalence can be mitigated.
Fear appeals are dropped from other research as their effect is there temporary (Fischer-Preßler
et al., 2022). Fear appeals only work when they are combined with strong efficacy messages.
However, in a study, an author mentioned that the full nomology of PMT is not used in most of
the studies. Especially fear appeals are not considered (Boss et al., 2015)
At the same time, it is interesting to note that fear of cyber attacks dampens the
relationship between self-efficacy and protection motivation (Vrhovec & Mihelič, 2021). In the
presence of fear, self-efficacy cannot influence protection motivation behavior. Measures that
tend to raise protection motivation should tend to increase individual perceived vulnerability and
organization. However, the survey was conducted in an academic environment where the
Compliant/Non-Compliant Behavior
In another study, it was evident that security system anxiety and non-compliant peer
behavior negatively impact employees' compliance behavior toward security policies (Alzahrani,
2021). Security system anxiety might be the result of the employee's unwillingness to report
security incidents. One of the reasons is fear of punishment. It is also determined that security
education and security visibility positively impact compliant behavior. However, the study was
carried out among students and not in an actual organizational setting. Another study mentioned
that in addition to security-related stress, value conflicts and neutralization are also additional
It has been identified that internal factors significantly motivate compliance behavior
more than external factors (Alassaf & Alkhalifah, 2021). Internal factors include trust,
study on internal factors that motivate employees to comply to with security policies mentioned
that psychological ownership, perceived control, and self-efficacy increase employees' intent to
protect organizational data (Raddatz et al., 2019). In another study, the author too identified
some internal and external factors that motivated employees to exhibit compliance behavior (Ali
et al., 2021). They are culture, management behaviors, deterrence techniques, and information
security awareness.
The author came up with a completely different finding for employees' non-compliant
approach revealed that hospitals should effectively manage employees' workload so that they are
more compliant with security policies and refrain from clicking any phishing emails.
policies and procedures (Verkijika). In addition to that, carelessness and indifference are also
identified. Organizational culture is considered to be one of the factors that can make employees
BYOD
BYOD devices are also one of the top security risks experienced by companies (Ameen
et al., 2020). However, a study on this security policy compliance revealed that there is a lack of
awareness among employees regarding smartphone security policies, and there is also a gender
gap in complying with security policies. Females in the USA have difficulty complying with
their organization's BYOD security recommendations. However, the age group of participants is
Nudges
Nudges are proven to be another excellent tool for increasing motivational behavior
(Prange et al., 2022). The author conducted an experiment to investigate the motivating behavior
in the selection of smart home configurations and concluded that nudges fostered secure
behavior among the users. However, another study mentioned that there is little known about
how the content of warning messages changes the attitude, belief, and motivation that further
leads to secure behavior. Inspired by PMT constructs, the author conducted an online experiment
with a coping message and threat appeal, mentioning users to practice safety measures and the
consequences of not following that. Results indicated that the coping message alone and also
Factors to Motivate Protection against Cyber Attacks across Organizations
when combined with a threat has a significant impact on security behavior. However, the threat
Other Factors
Although behavior changes are observed after awareness programs, they have not lasted
sustain the behavioral changes. Fear appeals are used for password compliance, but since it is
also short-term, they may not be suitable as a method of increasing cybersecurity awareness.
The below diagram is adapted from Motivating security compliance through habit (Vance et al.,
2012).
Factors to Motivate Protection against Cyber Attacks across Organizations
Studies have shown that older women are more susceptible to phishing attacks (Alabdan,
2020)
Gaps
Moderating and meditating variables have received less attention in research studies that
used behavioral and organizational theories (Alassaf & Alkhalifah, 2021). Also, the population
in health care was also not considered frequently in these studies, and the majority of cyber
attacks took place in health care. External factors include the SETA program, corporate social
responsibility, supportive organization culture, and compliance audit. Another study also
mentioned that study of cyber security threats against health care was not much considered
In order to mitigate the security compliance problem, several gaps have to be addressed,
which are identified by reviewing theories and other relevant theories. The gaps are around the
geographical context of the studies, the role of gender in complying with CIS, roles of
In another study, the author mentions that there is a gap related to information security
models study as most of them were able to predict the security intentions but not the actual
behaviors (Lee et al., 2022). Future research should consider response appeals which are self-
Testing Review
Motivating protection behavior against cyber attacks has been considered across the
population that belongs to educational institutions, health care, finance, the government sector,
etc.
Student's Contribution
Some of the gaps have been identified in the literature, which will be addressed in the
current study. One is moderating and mediating variables were addressed less in the previous
studies and will be considered in this study. The second healthcare population was considered
less in past studies. Therefore healthcare population will be included in the current study. Third,
there is a need to consider external factors such as organizational effort or culture rather than
considering only the core constructs of PMT. Fourth, response appeals are considered in this
research as there is a need to consider more research in response appeals. Lastly, PMT
relationships are not considered linear or non-linear, which will be addressed in the current
study.
Conclusion
Increasing cyber-attacks are a threat to organizations and further to nations. Since the
pandemic, there is also a steep increase in social engineering attacks. This paper discusses cyber
attacks that target employees on a work computer. The problem of social engineering attacks
targeted at employees is observed through the lens of protection motivation theory. Based on the
extended PMT model, hypotheses were formed that helped to address the gaps found in the
literature. Addressing these gaps will further contribute to the body of the literature on employee
motivation.
Factors to Motivate Protection against Cyber Attacks across Organizations
References
Alabdan, R. (2020). Phishing Attacks Survey: Types, Vectors, and Technical Approaches.
Alassaf, M., & Alkhalifah, A. (2021). Exploring the Influence of Direct and Indirect Factors on
162687–162705. https://doi.org/10.1109/ACCESS.2021.3132574
Ali, R. F., Dominic, P. D. D., Ali, S. E. A., Rehman, M., & Sohail, A. (2021). Information
Alqahtani, H., & Kavakli-Thorne, M. (2020). Design and Evaluation of an Augmented Reality
https://doi.org/10.3390/info11020121
Alzahrani, L. (2021). Factors Impacting Users’ Compliance with Information Security Policies:
Ameen, N., Tarhini, A., Hussain Shah, M., & Madichie, N. O. (2020). Employees’ behavioural
Culture. 15.
Factors to Motivate Protection against Cyber Attacks across Organizations
Ansari, M. (2022). A Quantitative Study of Risk Scores and the Effectiveness of AI-Based
Bhuyan, S. S., Kabir, U. Y., Escareno, J. M., Ector, K., Palakodeti, S., Wyant, D., Kumar, S.,
Levy, M., Kedia, S., Dasgupta, D., & Dobalian, A. (2020). Transforming Healthcare
Bisma, R., Winarto, S. R., & Puspita, Y. C. (2021). Investigating Cyber Security Factors
Influencing The Perception Behavioral Intention of Small and Medium Enterprise. 2021
Boerman, S. C., Kruikemeier, S., & Zuiderveen Borgesius, F. J. (2021). Exploring Motivations
for Online Privacy Protection Behavior: Insights From Panel Data. Communication
Boss, S. R., Galletta, D. F., University of Pittsburgh, Lowry, P. B., City University of Hong
Kong, Moody, G. D., University of Nevada, Las Vegas, Polak, P., & Florida International
University. (2015). What Do Systems Users Have to Fear? Using Fear Appeals to
Engender Threats and Fear that Motivate Protective Security Behaviors. MIS Quarterly,
Choudhary, A., Choudhary, G., Pareek, K., Kunndra, C., Luthra, J., & Dragon, N. (2022).
https://doi.org/10.22667/JISIS.2022.05.31.021
Factors to Motivate Protection against Cyber Attacks across Organizations
Coventry, L., Branley-Bell, D., Sillence, E., Magalini, S., Mari, P., Magkanaraki, A., &
to Secure Behaviour. In A. Moallem (Ed.), HCI for Cybersecurity, Privacy and Trust
https://doi.org/10.1007/978-3-030-50309-3_8
Crossler, R., & Bélanger, F. (2014). An Extended Perspective on Individual Security Behaviors:
Protection Motivation Theory and a Unified Security Practices (USP) Instrument. ACM
SIGMIS Database: The DATABASE for Advances in Information Systems, 45(4), 51–71.
https://doi.org/10.1145/2691517.2691521
De Kimpe, L., Walrave, M., Verdegem, P., & Ponnet, K. (2022). What we think we know about
Ejigu, K., Siponen, M., & Muluneh, T. (n.d.). Influence of Organizational Culture on Employees
Etuh, E., S. Bakpo, F., & A.H, E. (2021). Social Media Network Attacks and their Preventive
https://doi.org/10.5121/csit.2021.112405
to Explain Intention to Use and Continue to Use Mobile Warning Systems. Business &
00704-0
Factors to Motivate Protection against Cyber Attacks across Organizations
https://doi.org/10.1111/j.1559-1816.2000.tb02323.x
Gabel, M., Foege, J. N., & Nã, S. (n.d.). Privacy Awareness under Scrutiny: Field Experimental
Hai Goh, C., & Ping Teoh, A. (2021). Determining Bring Your Own Device (Byod) Security
https://doi.org/10.1109/ICITISEE53823.2021.9655895
security awareness and intentions. In Cyber Influence and Cognitive Threats (pp. 129–
Hijji, M., & Alam, G. (2021). A Multivocal Literature Review on Growing Social Engineering
https://doi.org/10.1109/ACCESS.2020.3048839
https://doi.org/10.1109/ISDFS55398.2022.9800834
Factors to Motivate Protection against Cyber Attacks across Organizations
Jalali, M. S., Bruckes, M., Westmattelmann, D., & Schewe, G. (2020). Why Employees (Still)
Kalhoro, S., Rehman, M., Ponnusamy, V., & Shaikh, F. B. (2021). Extracting Key Factors of
Lee, D., Michaelides, N., & Lallie, H. (2022). The Impact of an Employee’s Psychological
Li, L., He, W., Xu, L., Ash, I., Anwar, M., & Yuan, X. (2019). Investigating the impact of
https://doi.org/10.1016/j.ijinfomgt.2018.10.017
Li, L., Xu, L., & He, W. (2022). The effects of antecedents and mediating factors on
https://doi.org/10.1016/j.chbr.2021.100165
Lie, L. B., Utomo, P., & Winarno, P. M. (2021). Investigating the Impact of Cybersecurity
Maddux, J. E., & Rogers, R. W. (1983). Protection motivation and self-efficacy: A revised
theory of fear appeals and attitude change. Journal of Experimental Social Psychology,
Mat, N. K. N., Sulaiman, Y., Perumal, S., & Ghazi, W. (2021). The Predictors of Cybersecurity
Behavior in E-Hailing Services: The Mediating Role of Perceived Threat. 27, 15.
Md Haris Uddin Sharif & Mehmood Ali Mohammed. (2022). A literature review of financial
losses statistics for cyber security and future trend. World Journal of Advanced Research
Menard, P., Bott, G. J., & Crossler, R. E. (2017). User Motivations in Protecting Information
https://doi.org/10.1080/07421222.2017.1394083
Milne, S., Sheeran, P., & Orbell, S. (2000). Prediction and Intervention in Health-Related
Mou, J., Pusan National University, Republic of Korea, Cohen, J., University of the
Witwatersrand, South Africa, Bhattacherjee, A., University of South Florida, USA, Kim,
J., & Pusan National University, Republic of Korea. (2022). A Test of Protection
Mwagwabi, F., & Jiow, J. H. (2021). Compliance with security guidelines in teenagers:
Ng, K. C., Zhang, X., Thong, J. Y. L., & Tam, K. Y. (2021). Protecting Against Threats to
Onumo, A., Ullah-Awan, I., & Cullen, A. (2021). Assessing the Moderating Effect of Security
https://doi.org/10.1145/3424282
Prange, S., Thiem, N., Fröhlich, M., & Alt, F. (2022). “Secure settings are quick and easy!” –
https://doi.org/10.1145/3531073.3531089
Raddatz, N., Coyne, J., & Trinkle, B. (2019). Internal Motivators for the Protection of
067
Rogers, R. W. (1975). A Protection Motivation Theory of Fear Appeals and Attitude Change1.
https://doi.org/10.1080/00223980.1975.9915803
Salem, Y., Moreb, M., & Rabayah, K. S. (2021). Evaluation of Information Security Awareness
Saravanan, A., & Bama, S. S. (2019). A Review on Cyber Security and the Fifth Generation
https://doi.org/10.13005/ojcst12.02.04
Sharma, S., & Aparicio, E. (2022). Organizational and team culture as antecedents of protection
https://doi.org/10.1016/j.cose.2022.102774
Siddiqi, M. A., Pak, W., & Siddiqi, M. A. (2022). A Study on the Psychology of Social
Sulaiman, N. S., Fauzi, M. A., Wider, W., Rajadurai, J., Hussain, S., & Harun, S. A. (2022).
Vance, A., Siponen, M., & Pahnila, S. (2012). Motivating IS security compliance: Insights from
Habit and Protection Motivation Theory. Information & Management, 49(3–4), 190–198.
https://doi.org/10.1016/j.im.2012.04.002
Verma, A., & Shri, C. (2022). Cyber Security: A Review of Cyber Crimes, Security Challenges
097226292210747. https://doi.org/10.1177/09722629221074760
Vrhovec, S., & Mihelič, A. (2021). Redefining threat appraisals of organizational insiders and
exploring the moderating role of fear in cyberattack protection motivation. Computers &