Threat or coping appraisal: determinants of SMB executives' decision to adopt anti-malware software

نویسندگان

  • Younghwa Lee
  • Kai R. T. Larsen
چکیده

Received: 18 April 2008 Revised: 15 August 2008 2nd Revision: 27 January 2009 Accepted: 23 February 2009 Abstract This study presents an empirical investigation of factors affecting smalland medium-sized business (SMB) executives’ decision to adopt anti-malware software for their organizations. A research model was developed by adopting and expanding the protection motivation theory from health psychology, which has successfully been used to investigate the effect of threat and coping appraisal on protective actions. A questionnaire-based field survey with 239 U.S. SMB executives was conducted, and the data were analyzed using partial least squares (PLS). This study demonstrates that threat and coping appraisal successfully predict SMB executives’ anti-malware software adoption intention, leading to SMB adoption. In addition, considerable variance in adoption intention and actual SMB adoption is addressed by social influence from key stakeholders and situation-specific variables, such as IT budget and vendor support. Further, the generalizability of the model was tested using industry type and IS expertise. The adoption intention of IS experts and IT intensive industries was mainly affected by threat appraisal and social influence, while that of non-IS experts and non-IT intensive industries was significantly influenced by coping appraisal and IT budget. Vendor support was a key facilitator of the anti-malware adoption for IS experts and IT intensive industry groups, while IT budget was for non-IS expert and non-IT intensive industry groups. Key implications for theory and practice are discussed. European Journal of Information Systems (2009) 18, 177–187. doi:10.1057/ejis.2009.11; published online 31 March 2009

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

مقایسه فرایند های ارزیابی کنارآمدن و ارزیابی تهدید در پیش بینی قصد و رفتارتغذیه ای پیشگیری کننده از سرطان در مادران مراجعه کننده به مراکز بهداشتی- درمانی شهر یزد

  Background: Threat appraisal process in Protection Motivation Theory evaluates the factors associated with the behavior that potentially creates danger, including the intrinsic and extrinsic rewards accompanying the behavior, the severity of the danger, and ones vulnerability to it. Coping appraisal is a cognitive mediating process which evaluates one's ability to cope with or to avert threat...

متن کامل

Healthcare Information Technology Adoption and Protection Motivation: A Study of Computerized Physicial Order Entry Systems

In this study, considering medical errors causing significant patient safety risk as the major threat perceived by health care providers, we adopt the protection motivation theory (PMT) from health psychology and investigate factors affecting the decision of health care providers to adopt CPOE systems. This research examines the effect of two major PMT variables on the CPOE adoption such as thr...

متن کامل

Understanding anti-plagiarism software adoption: An extended protection motivation theory perspective

a r t i c l e i n f o This study investigates factors affecting the adoption of anti-plagiarism software. Using protection motivation theory as a basis, this research examines the influence of threat and coping appraisals, along with social influences, moral obligation, and actual control variables, on the adoption of anti-plagiarism software. A field survey of 218 faculty members working at U....

متن کامل

Mitigating denial of service attacks in hierarchical wireless sensor networks

It is easy to see how these functions work in unison with each other. For example, attackers often use email to send malicious URLs to users. These may be spotted by email protection functions within a unified threat management system or Internet security appliance. However, if they slip through, they will be caught by the web filtering mechanism, making it doubly hard for attackers to compromi...

متن کامل

Threat Analysis and Defense Strategies for Smb, Mid-size, and Enterprise Organizations

. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2 Overview of APTs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • EJIS

دوره 18  شماره 

صفحات  -

تاریخ انتشار 2009