skip to main content
research-article

Secure Behavior over Time: Perspectives from the Theory of Process Memory

Published:25 April 2018Publication History
Skip Abstract Section

Abstract

Research has investigated the role of numerous influences on individual information security behaviors, including protection motivation, deterrence, and various dispositional and environmental factors. Various theories have been applied to study these influences on security behaviors. One major research stream has looked at threat and coping appraisals by IT users. However, users' beliefs, attitudes, appraisals, and intentions are not static, and there has been little attention to how these factors interact over time. When users (directly or vicariously) experience a security threat, they tend to engage in improved security hygiene, but often only for a limited time. A major theory that can provide comprehensive and unified insights into the phenomenon of continuous secure behavior is the Theory of Process Memory which explains the role of prior experience effects and the underlying mechanisms of continuous behavior, including feedback mechanism, sequential updating mechanism, behavioral automaticity (habit), and reason-based action. The application of this theory to behavioral information security research can foster a deep understanding about how each cognitive mechanism can influence IT users' continuous secure behavior, and through which type of human memory each mechanism can act. This rich theory, which is well-established in cognitive psychology, can help behavioral information security scholars to rigorously investigate the very important, yet understudied, phenomenon of continuance secure behavior.

References

  1. Anderson, B. B., Vance, A., Kirwan, C. B., Jenkins, J. L.,&Eargle, D. (2016). From warning to wallpaper: Why the brain habituates to security warnings and what can be done about it. Journal of Management Information Systems, 33(3), 713--743.Google ScholarGoogle ScholarCross RefCross Ref
  2. Anderson, C. L.,&Agarwal, R. (2010). Practicing safe computing: A multimedia empirical examination of home computer user security behavioral intentions. MIS Quarterly, 34(3), 613--643 Google ScholarGoogle ScholarCross RefCross Ref
  3. Atkinson, R. C.,&Shiffrin, R. M. (1968). Human memory: A proposed system and its control processes. In K. W. Spence&J. T. Spence (Eds.), The psychology of learning and motivation (volume 2) (pp. 89--195). New York: Academic Press.Google ScholarGoogle Scholar
  4. Bauer, S.,&Bernroider, E. W. (2017). From information security awareness to reasoned compliant action: Analyzing information security policy compliance in a large banking organization. The DATA BASE for Advances in Information Systems, 48(3), 1--24. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Bhattacherjee, A. (2001). Understanding information systems continuance: An expectationconfirmation model. MIS Quarterly, 25(3), 351--370. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. Bhattacherjee, A.,&Premkumar, G. (2004). Understanding changes in belief and attitude toward information technology usage: A theoretical model and longitudinal test. MIS Quarterly, 28(2), 229--254 Google ScholarGoogle ScholarCross RefCross Ref
  7. Bhattacherjee, A.,&Lin, C. P. (2015). A unified model of IT continuance: Three complementary perspectives and crossover effects. European Journal of Information Systems, 24(4), 364--373Google ScholarGoogle ScholarCross RefCross Ref
  8. Blair, E.,&Burton, S. (1987). Cognitive processes used by survey respondents to answer behavioral frequency questions. Journal of Consumer Research, 14(2), 280--288.Google ScholarGoogle ScholarCross RefCross Ref
  9. Bolton, R. N. (1998). A dynamic model of the duration of the customer's relationship with a continuous service provider: The role of satisfaction. Marketing Science, 17(1), 45--65. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. Boss, S. R., Galletta, D. F., Lowry, P. B., Moody, G. D.,&Polak, P. (2015). What do systems users have to fear? Using fear appeals to engender threats and fear that motivate protective security behaviors. MIS Quarterly, 39(4), 837--864. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. Bulgurcu, B., Cavusoglu, H.,&Benbasat, I. (2010). Information security policy compliance: An empirical study of rationality-based beliefs and information security awareness. MIS Quarterly, 34(3), 523--548. Google ScholarGoogle ScholarCross RefCross Ref
  12. Carver, C. S.,&Scheier, M. F. (1982). Control theory: A useful conceptual framework for personality-- social, clinical, and health psychology. Psychological Bulletin, 92(1),111--135.Google ScholarGoogle ScholarCross RefCross Ref
  13. Crossler, R. E., Johnston, A. C., Lowry, P. B., Hu, Q., Warkentin, M.,&Baskerville, R. (2013). Future directions for behavioral information security research. Computers&Security, 32, 90--101.Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. D'Arcy, J., Herath, T.,&Shoss, M. K. (2014). Understanding employee responses to stressful information security requirements: A coping perspective. Journal of Management Information Systems, 31(2),285--318.Google ScholarGoogle ScholarCross RefCross Ref
  15. Herath, T.,&Rao, H. R. (2009). Encouraging information security behaviors in organizations: role of penalties, pressures and perceived effectiveness. Decision Support Systems, 47(2) 154--165. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. Hogarth, R. M.,&Einhorn, H. J. (1992). Order effects in belief updating: The belief-adjustment model. Cognitive Psychology, 24(1), 1--55.Google ScholarGoogle ScholarCross RefCross Ref
  17. Ifinedo, P. (2012). Understanding information systems security policy compliance: An integration of the theory of planned behavior and the protection motivation theory. Computers&Security, 31(1),83--95. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. Johnston, A. C.,&Warkentin, M. (2010). Fear appeals and information security behaviors: An empirical study. MIS Quarterly, 34(3), 549--566. Google ScholarGoogle ScholarCross RefCross Ref
  19. Johnston, A. C., Warkentin, M.,&Siponen, M. (2015). An enhanced fear appeal framework: Leveraging threats to the human asset through sanctioning rhetoric. MIS Quarterly, 39(1),113--134. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. Kim, S. S.,&Malhotra, N. K. (2005). A longitudinal model of continued is use: An integrative view of four mechanisms underlying postadoption phenomena. Management Science, 51(5), 741- 755. Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. Liang, H.,&Xue, Y. (2009). Avoidance of information technology threats: A theoretical perspective. MIS Quarterly, 33(1), 71--90. Google ScholarGoogle ScholarCross RefCross Ref
  22. Limayem, M., Hirt, S. G.,&Cheung, C. M. (2007). How habit limits the predictive power of intention: The case of information systems continuance. MIS Quarterly, 31(4), 705--737. Google ScholarGoogle ScholarCross RefCross Ref
  23. Mutchler, L. A.,&Warkentin, M. (2015). How direct and vicarious experience promotes security hygiene. In 10th Annual Symposium on Information Assurance (ASIA'15) pp. 2--6.Google ScholarGoogle Scholar
  24. Myers, D. G. (2004). Psychology (7th ed.). New York: Worth Publishers.Google ScholarGoogle Scholar
  25. Oliver, R. L. (1980). A cognitive model of the antecedents and consequences of satisfaction decisions. Journal of Marketing Research, 17(4), 460--469.Google ScholarGoogle ScholarCross RefCross Ref
  26. De Guinea, A. O.,&Markus, M. L. (2009). Why break the habit of a lifetime? Rethinking the roles of intention, habit, and emotion in continuing information technology use. MIS Quarterly, 33(3), 433--444 Google ScholarGoogle ScholarCross RefCross Ref
  27. Ouellette, J. A.,&Wood, W. (1998). Habit and intention in everyday life: The multiple processes by which past behavior predicts future behavior. Psychological Bulletin, 124(1), 54--74.Google ScholarGoogle ScholarCross RefCross Ref
  28. Ponemon (2017). Ponemon 2017 cost of data breach study. Retrieved September 1, 2017 from https://www.ibm.com/security/data-breach/Google ScholarGoogle Scholar
  29. Posey, C., Roberts, T. L., Lowry, P. B., Bennett, R. J.,&Courtney, J. F. (2013). Insiders' protection of organizational information assets: Development of a systematics-based taxonomy and theory of diversity for protection-motivated behaviors. MIS Quarterly, 37(4), 1189--1210. Google ScholarGoogle ScholarDigital LibraryDigital Library
  30. PwC. (2014). Managing cyber risks in an interconnected world. The Global State of Information Security Survey 2015. Retrieved May 27, 2015 from http://www.pwc.com/ gsiss2015Google ScholarGoogle Scholar
  31. Rogers, R. W. (1975). A protection motivation theory of fear appeals and attitude change. The Journal of Psychology, 91(1), 93--114.Google ScholarGoogle ScholarCross RefCross Ref
  32. Rogers, R. W. (1983). Cognitive and physiological processes in fear appeals and attitude change: A Revised theory of protection motivation. In J. Cacioppo (Ed.), Social psychophysiology: A sourcebook (pp. 153--176). New York: Guilford Press.Google ScholarGoogle Scholar
  33. Shropshire, J., Warkentin, M. and Sharma, S. (2015). Personality, attitudes, and intentions: Predicting initial adoption of information security behavior. Computers&Security, 49,177--191. Google ScholarGoogle ScholarDigital LibraryDigital Library
  34. Sharp. (2017). Employee IT behavior highlights GDPR compliance risk. Retrieved September 1, 2017 from http://www.sharp.co.uk/cpw/rde/xchg/gb/hs.xls/- /html/employee-it-behaviour-highlights-gdprcompliance-risk.htmGoogle ScholarGoogle Scholar
  35. Siponen, M.,&Vance, A. (2010). Neutralization: New insights into the problem of employee information systems security policy violations. MIS Quarterly, 34(3), 487--502. Google ScholarGoogle ScholarDigital LibraryDigital Library
  36. Sophos, (2017). Don't take the bait: How to spot phishing and social engineering scams. Retrieved September 1, 2017 from https://www.sophos.com/lp/antiphishing/prevention.aspxGoogle ScholarGoogle Scholar
  37. Vance, A., Siponen, M.,&Pahnila, S. (2012). Motivating IS security compliance: Insights from habit and protection motivation theory. Information&Management, 49(3), 190--198. Google ScholarGoogle ScholarDigital LibraryDigital Library
  38. Vormetric. (2016). 2016 Vormetric data threat report. Retrieved September 1, 2017 from https:// dtr.thalesecurity.com/datathreat/2016Google ScholarGoogle Scholar
  39. Wansink, B., and Ray, M. L. (1996). Advertising strategies to increase usage frequency. Journal of Marketing, 60(1), 31--46.Google ScholarGoogle ScholarCross RefCross Ref
  40. Warkentin, M., Johnston, A. C., Shropshire, J.,&Barnett, W. D. (2016). Continuance of protective security behavior: A longitudinal study. Decision Support Systems, 92, 25--35. Google ScholarGoogle ScholarDigital LibraryDigital Library
  41. Wheeler, M. A., Stuss, D. T., and Tulving, E. (1997). Toward a theory of episodic memory: The frontal lobes and autonoetic consciousness. Psychological Bulletin, 121(3), 331--354.Google ScholarGoogle ScholarCross RefCross Ref
  42. Winn, W. (2004). Cognitive perspectives in psychology. In D. Jonassen (Ed.), Handbook of research for educational communications and technology (pp. 79--112). Manwah, NJ: Lawrence Erlbaum.Google ScholarGoogle Scholar
  43. Witte, K. (1992). Putting the fear back into fear appeals: the extended parallel process model.Google ScholarGoogle Scholar
  44. Communications Monographs, 59(4), 329--349. Witte, K. (1994). Fear control and danger control: A test of the extended parallel process model (EPPM). Communication Monographs, 61, 113- 134.Google ScholarGoogle ScholarCross RefCross Ref

Index Terms

  1. Secure Behavior over Time: Perspectives from the Theory of Process Memory

        Recommendations

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in

        Full Access

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader