ON NOT FALLING FOR PHISH: EXAMINING MULTIPLE STAGES OF PROTECTIVE BEHAVIOR OF INFORMATION SYSTEMS END-USERS

Size: px
Start display at page:

Download "ON NOT FALLING FOR PHISH: EXAMINING MULTIPLE STAGES OF PROTECTIVE BEHAVIOR OF INFORMATION SYSTEMS END-USERS"

Transcription

1 ON NOT FALLING FOR PHISH: EXAMINING MULTIPLE STAGES OF PROTECTIVE BEHAVIOR OF INFORMATION SYSTEMS END-USERS Mary B. Burns Augusta State University Augusta, GA Research-in-Progress Jeffrey L. Jenkins The University of Arizona Tucson, AZ Abstract Alexandra Durcikova The University of Oklahoma Norman, OK The adage, old habits die hard is especially relevant when humans learn new protective behaviors (i.e., dental flossing, IS security behaviors). The foundation that underlies many social-cognitive theories used in IS research is that intention to change predicts actual behavior change. Despite intentions to change, humans do not always change their habits due to actual or perceived obstacles, for example. In this study, user behavior, particularly with respect to vigilance over phishing attempts, will be investigated via the theoretical lens of a hybrid continuum-stage behavior change model adapted from health-related fields. The goal of this research will be to gain a better understanding of: a) whether there are distinct stages that distinguish end-users vigilance toward phishing attempts; b) if so, can this research study confirm three distinct stages; and, c) what characterizes these different stages. This paper describes how we will examine our research questions through a research program. Keywords: phishing, IS security, health behavior change model, stage model, intentionbehavior gap Thirty Third International Conference on Information Systems, Orlando

2 IS Security and Privacy Introduction Estimates on worldwide losses from phishing attacks stretch from tens of millions of dollars to billions of dollars (Hong 2012). Due to the prevalence and severity of these types of attacks that can fool even expert users, there is a need to understand why both expert and novice users persist in risky IS behavior despite good intentions. The foundation that underlies many social-cognitive theories used in IS research is that intention to change predicts actual behavior change. However, despite intention to change, humans do not always alter their habits due to actual or perceived obstacles, for example (Conner and Armitage 1998; Sheeran 2002). Although the intention-behavior gap has been examined in IT usage research (Bhattacherjee and Sanford 2009; Davis et al. 1989; Taylor and Todd 1995; Venkatesh et al. 2003) as well as in consumer marketing (Sheppard et al. 1988), it remains critical in the field of IS Security to look inside the black box in which users move from an intention to be more vigilant and self-protective toward phishing attempts to actual behavior change that is consistently more secure. There are two types of behavior change models: continuum and stage (Weinstein et al. 1998). Continuum models include constructs that can influence attitudes, intentions, and/or behavior in a prediction equation to provide a snapshot of the phenomena at a given point in time. In contrast, stage models acknowledge that a myriad of natural phenomena, including user behavior, passes through different phases that allow for the passage of time. A static model on its own cannot capture the various stages toward safer behavior that a user must progress through to attain a better understanding of why behavior must change, to develop good intentions for changed behavior, to develop a corresponding action plan for countering social engineering attempts, and, finally, to adopt the new behavior consistently. In stage models, different interventions are required to not only educate but also motivate a person to move from one stage to another (Prentice-Dunn et al. 2009). In contrast, the assumption underlying much research in IS training, for example, is that one size fits all, indiscriminate of the user s stage. This type of training can help users in the short-term (Baker and Wallace 2007; Jenkins et al. 2010; Siponen 2000). Training increases knowledge but may not change behavior if the user is not at the right stage or mindset to be motivated by the training content. Interventions, on the other hand, incorporate training or life experiences tailored to users at a particular stage. Thus, there is a gap in the IS literature with respect to how users move from a denial, or it can t happen to me, stage through an intention to modify behavior stage to the final stage of changed behavior through remaining vigilant over phishing consistently. Recently, IS researchers called for the use of multi-stage models to better understand various user behaviors over time (Benbasat and Barki 2007). In response to this call for multi-stage models and to address the discrepancy in the IS Security literature for exploring the intention-behavior gap, we propose that users move through a series of preintentional motivation and postintentional volition stages as they become more vigilant toward phishing attempts. A hybrid stage model, the Health Action Process Approach (HAPA) model (Schwarzer 1992; Schwarzer 1999; Schwarzer 2001), that incorporates both a predictive relationship among constructs and constructs that can measure progress through stages has been developed in the health-related fields. This type of hybrid model permits researchers to develop a research program that incorporates both longitudinal studies as well as continuum snapshot studies. Using the theoretical lens of the HAPA model, we developed a three-stage model that represents how the mindset of a user changes between forming an intention and subsequent behavior through action and coping planning. This paper describes the first two phases, a cross-sectional field study and a longitudinal field experiment, of a research program designed to investigate our model. We thereby will extend IS Security research by developing and empirically testing a theoretical model that not only represents the evolution of users protective behavior through stages but also includes predictive continuum-oriented constructs. The results of this research will have significant implications for cyber security job training processes. In the next section, we review the pertinent literature from IS Security and Health Behavior and propose our research questions. We then build on health behavior change models, particularly the HAPA model, to develop a research model for examining IS protective behavior. Finally, we discuss our proposed approach for the initial testing of our model using a field survey as well as a follow-up longitudinal field experiment. 2 Thirty Third International Conference on Information Systems, Orlando 2012

3 Burns et al. / On Not Falling For Phish Literature Review Given that phishing attacks are expensive to society, it is critical to understand why many people are hooked by phishing attacks when they believe that it could not happen to them. It is often human error or misjudgment that causes losses due to phishing. Thus, humans are considered the weakest link with respect to IS security efforts (Sasse et al. 2001; Schneier 2000). As a result, understanding user noncompliance to IS security policies and their susceptibility to phishing has been the focus of much research in both academia (e.g., Dodge Jr. et al. 2007; Parrish Jr. et al. 2009; Workman 2008; Wright and Marett 2010) and practice (e.g., Anti-Phishing Phil 2011). In the IS literature, many studies concerning the adoption of IS technologies by end-users have been based on social-cognitive theories, such as the Technology Acceptance Model (TAM) (Davis 1989) and the Theory of Planned Behavior (TPB) (Ajzen 1988; Ajzen 1991). However, few studies have identified differences between user adoption of positive technologies (i.e., those technologies designed for users primary responsibilities, such as an Enterprise Resource Planning (ERP) system) and user acceptance of protective technologies, such as single sign-on password technology (Dinev and Hu 2007; Ng et al. 2009). Recently, after Dinev and Hu (2007) found that in the context of using protective technologies, some of the previously-established important relationships between user behavior and positive technology no longer hold (p. 401), researchers turned to behavioral change theories from healthcare and safety in their studies of IS security (Davinson and Sillence 2010; Ng et al. 2009). Behavioral change models in healthrelated fields were developed to explore behaviors that protect health as well as the corresponding interventions that can encourage people to engage in safer health practices, such as practicing safe sex (the AIDS Risk Reduction Model (ARRM) developed by Catania et al. 1990) or using seat belts (the Health Belief Model (HBM) developed by Becker and Rosenstock 1987; Janz and Becker 1984; Rosenstock 1966). Research Questions The purpose of the initial studies in this research program is to examine the preintentional motivation and postintentional volition stages that a user goes through on the path to adhering to IS security guidelines for remaining vigilant toward phishing attempts. The results from the first phase will improve understanding of the different stages as well as inform the design of interventions for subsequent studies in our research program. Thus, our research questions for the first phase, a field survey, are: 1. Are there distinct stages that distinguish end-users no/low intention to actual behavior change for consistently higher vigilance toward phishing attempts? 2. If so, can this research study confirm three distinct stages? 3. What characterizes these qualitatively different stages? Once the number of stages have been determined and characterized, the next phase, a longitudinal field experiment, of our research program will be implemented to study the following research question: 4. To what degree do stage-specific interventions help end-users to move to higher stages? Previous Research in Phishing Proudfoot et al. (2011) categorized the extant phishing literature, a subset of IS security research, as follows: 1) methods that phishers use in their attacks, 2) anti-phishing technologies, and 3) human factors, or the user side of phishing. The third category informs this research program. Research that concentrates on how humans interact with phishing attempts includes the following: antecedents of users behavior with respect to phishing attempts (Ng et al. 2009; Parrish Jr. et al. 2009; Workman 2008), how training may be used to decrease user response to phishing attempts (Dodge Jr. et al. 2007; Ferguson 2005; Kumaraguru et al. 2008; Sheng et al. 2010), and how users may detect deception in phishing attempts (Kumaraguru et al. 2010; Vishwanath et al. 2011; Wright and Marett 2010). Antecedents: Perceived susceptibility, perceived benefits, and self-efficacy were uncovered as antecedents of users reactions to phishing attempts (Ng et al. 2009). In a different study (Workman 2008), three threat control factors were predictive of social engineering success: threat assessment, commitment, trust, Thirty Third International Conference on Information Systems, Orlando

4 IS Security and Privacy and obedience to authority. Since obedience to authority and normative commitment can vary with personality, Parrish Jr. et al. (2009) extended social engineering research by developing a framework that incorporates the Big-Five personality traits as antecedents of Phishing Susceptibility. Training: In a series of phishing exercises at the United States Military Academy, researchers (Dodge Jr. et al. 2007; Ferguson 2005) studied the impact of training upon the propensity of people to respond to phishing attacks. They found that training did reduce the propensity of a student to respond to phishing attacks and increase the number of students who reported that a phishing attack had occurred. Sheng et al. (2010) found that exposure to training materials lowered the tendency for users to enter information into phishing sites by 40%; however, the improved vigilance made users overly cautious and not click on non-phishing . This study supported earlier research that found that participants who received specialized phishing training, PhishGuru, were significantly less likely to respond to mock phishing attacks one week after training (Kumaraguru et al. 2008). Deception Detection: Phishing s are a subset of scams, or deceptive messages designed to gain something of value from users. In general, participants with more Web experience and security awareness were less likely to be deceived by phishing attempts (Wright and Marett 2010). Because handling phishing s is not a primary task for a user, users are often forced to make quick decisions about the based on straightforward cues found in the . However, cues about urgency in the and load may interfere with the user s ability to detect deception (Vishwanath et al. 2011). Users who receive training about recognizing the characteristics of phishing can leverage that knowledge on top of using advanced anti-phishing technologies to combat phishing (Kumaraguru et al. 2010). Adopting Behavior Change Models from Health-Related Fields Identifying and dealing with phishing according to IS security training and reminders can be a complex undertaking for many users, especially as they move from a low or no intention to consistent behavior changes. Importantly, there are parallels between changing people s intention to actual behavior that could proactively improve their health and/or safety and changing IS users intentions to engage in consistently protective behavior. Both types of behavior have serious consequences if not changed from intent to behavior applied on a consistent basis. Health- or safety-compromising behaviors have grave consequences, such as death. In the IS context, risky or lax behavior can result in identity theft or in computer viruses that can destroy data stored on computers. In extreme cases, identity theft can take long periods of time to resolve and recover (President's Identity Task Force 2007). Complying with complicated health, safety, or risk-reducing behaviors is a learned and acquired type of behavior that often progresses through several stages (e.g., ARRM, Catania et al. 1990). For example, with respect to flossing teeth as a protective health behavior, people have to learn not only the risks of not flossing properly and the costs (e.g., high dental bills) of non-compliance, but also the benefits and selfmastery (self-efficacy) of flossing. At the outset, people who first learn about dental flossing may not believe that they need to floss regularly because they have not progressed beyond an initial stage of denial. With public service messages (cues to action), a better understanding of the risks/benefits, and confidence in the ability to floss effectively, people can move to the next stage, or intention to floss. Finally, after encountering different public service messages/training, many people move to the final stage on the continuum of flossing/non-flossing in which they actually took the action to floss on a regular basis. However, even though people acknowledge the benefits of flossing, they may regress to not flossing when distracted by life events or breaks in routine. An user who has not advanced through all stages to engage in protective behavior consistently would agree that becoming a phishing victim is not good, but he may not remain vigilant at all times. As a result, he may click on a link that looks legitimate because it appears to link to a web site with low perceived risk, such as his bank. Phishing research (e.g., Vishwanath et al. 2011; Workman 2008) has been conducted under the assumption that all users are in the final stage of understanding and acceptance of how they need to be vigilant against phishing attempts but that research does not consider to which stage a user has progressed. A user in an earlier stage may not have absorbed the training, had the right type of experiences to understand the severity and consequences of the problem, nor gained the tools to cope with phishing attempts in the same way that a user who has moved forward to the final stage of the continuum of non-protective/protective behavior. Thus, using stage models to research phishing and IS 4 Thirty Third International Conference on Information Systems, Orlando 2012

5 Burns et al. / On Not Falling For Phish security offers a promising theoretical base. Recently, Myyry et al. (2009) examined compliance with IS security policies using Kohlburg s six-stage theory of moral cognitive development. In summary, the use of health behavior change models, empirically tested as successful in moving respondents from intention to behavior (Lippke et al. 2007; Velicer et al. 2007; Weinstein et al. 1998), is appropriate for our context of examining how IS users move from intention to protective behavior. Previous Research in Health Behavioral Change Models Continuum and stage theory behavioral change models in health-related fields have been developed to explore behaviors that protect health as well as the corresponding interventions that can encourage people to engage in safer health practices by moving from intention through behavior change. Continuum models include: the Theory of Reasoned Action (TRA) (Ajzen and Fishbein 1980; Fishbein and Ajzen 1975), TPB (Ajzen 1988; Ajzen 1991), HBM (Becker and Rosenstock 1987; Janz and Becker 1984; Rosenstock 1966), and the Protection Motivation Theory (PMT) (Maddux and Rogers 1983; Rogers 1975). In continuum models, there is an assumption that when people form the intention to change behavior, they will make the shift to actual behavior change. The intention predicts the behavior change in a static model. However, in a static model, it is difficult to capture the if, how, when, and reasons why a person moves from intention to actual behavior changes. This is referred to as the intention-behavior gap, or black box, that is difficult to study (Sheeran 2002). Therefore, a serious limitation of continuum models is that they provide a better explanation for changes in intention than for changes in behavior because they cannot account adequately for the shift from intention to behavior. Obstacles or distractions can derail the intention-behavior translation. Also, continuum models assume that interventions can occur in any order to move a person from denial to intention to behavior change (Schwarzer 2008). In contrast, ARRM (Catania et al. 1990), the Transtheoretical Model (TTM) (Prochaska et al. 1992), and the Precaution Adoption Process Model (PAPM) (Weinstein 1988) are examples of stage theory models. The term stage may be best understood as implying an important marker in the change process (Catania et al. 1990). A stage theory includes four defining properties: 1) a way to classify and define the stages, 2) a sequence for the stages, 3) common hurdles to overcome before moving to the next stage, and 4) different hurdles to overcome at each stage. In most stage theories, people have the opportunity to move from an initial stage, in which they do not plan to change their behavior because they do not see a problem with it, to later stages in which they are taking action toward safer behavior. One problem with stage theory models is that it can be difficult to delineate different qualitative stages: How many are needed? What are the differences between stages? Can a person regress from one stage to another? Is there a requisite length of time to move from one stage to another? In view of these types of questions, researchers point out that people may not move through stages but rather they may occupy points along a continuous process (Sutton 2000; Sutton 2005; Weinstein et al. 1998). Due to their inherent time-dependent sequence of phases, stage models can be challenging to assess. Nevertheless, recent empirical studies using stage models have provided support that intention to active protective behavior does change through stages (Lippke et al. 2007; Velicer et al. 2007; Weinstein et al. 1998). Health Action Process Approach (HAPA) Model To overcome the disadvantages of both types of models, a hybrid continuum-stage model, the Health Action Process Approach (HAPA) Model (Schwarzer 1992; Schwarzer 1999; Schwarzer 2001), was developed by building on: Social Cognitive Theory (SCT) (Bandura 1986), TPB (Ajzen 1988; Ajzen 1991), and the Stages of Change (SOC) Theory (Prochaska et al. 1992). HAPA resembles a continuum model except that it contains two phases: motivational (pre-intention) and volitional (post-intention). The two phases are comprised of three stages; the pre-intentional phase contains Stage 0 and the post-intentional phase contains Stages 1 and 2. Stage 0 includes those people, called Low Intenders, who have not formed even the intention to make behavioral changes. The post-intention phase is comprised of people in two distinct stages: Intenders (Stage 1), who have formed the intention to make behavioral changes and Actors (Stage 2), who have crossed the intention-behavior gap. A key strength of this model is in its simplicity of three stages, common to other health behavior stage models (e.g., the Model of Action Phases (MAP) (Heckhausen and Gollwitzer 1987), the Integrated Change (I-change) Model (de Vries et al. 2005; Thirty Third International Conference on Information Systems, Orlando

6 IS Security and Privacy de Vries et al. 2003), TTM (Prochaska et al. 1992), and PAPM (Weinstein 1988) that highlight the key differences among people who translate intention into behavioral change and those who do not. People in a pre-intentional phase are concerned with the continuum-oriented constructs including: Outcome Expectancies, Action Self-Efficacy, and Risk Perception. In contrast, the post-intentional participants can be influenced by the how to constructs, Planning and Recovery Self-Efficacy for behavior maintenance and recovery in case of a relapse. The HAPA model is depicted in Figure 1. Figure 1. The Hybrid Continuum-Stage Health Action Process Approach (HAPA) Model (Schwarzer, 1992, 1999, 2001) In the continuum part of the model, Outcome Expectancies are the personal consequences that can arise from adopting new health-promoting behaviors (Bandura 1997). Antecedents (not explicitly depicted in the model) of Outcome Expectancies include: Threat (Perceived Susceptibility x Perceived Severity) and Threat Appraisal overlap with other health behavior models, such as PMT and HBM (Armitage and Conner 2000). Risk Perception is what an individual perceives is the risk of not performing the new behaviors. Intention represents an individual s goals. Action/Coping Planning involve detailed plans to deal with moving from intention to action and dealing with barriers that could obstruct progress to less risky behavior. Outcome Expectancies and Risk Perception, along with Action Self-Efficacy, predict whether people can form good intentions toward behavior changes. HAPA shares the Self-Efficacy construct with several continuum theories: SCT (Bandura 1986), the revised version of TPB (which uses a similar construct of perceived behavioral control) (Ajzen 1991), and PMT (Maddux and Rogers 1983). A key difference is that HAPA breaks Self-Efficacy (Bandura 1997) into three parts, each of which corresponds to a stage in the model: Action Self-Efficacy, Maintenance Self- Efficacy, and Recovery Self-Efficacy. Action Self-Efficacy (aka Pre-action Self-Efficacy, Motivational Self- Efficacy, or Task Self-Efficacy), a construct of the pre-intention stage, refers to the ability of the individual to envision either success or failure at changing to less risky behavior. With high Action Self-Efficacy, the individual is more likely to move to the next stages because she believes that she has the ability not only to perform a specific behavior but also that she can control changing her behavior (Luszczynska and Schwarzer 2003). To move to the post-intention phase, a person needs not only high Action Self-Efficacy but also confidence in her ability to maintain the new behaviors when confronted by obstacles through high Maintenance (or Coping) Self-Efficacy. Thus, Maintenance Self-Efficacy predicts behavior change and is critical during the stage in which an individual moves from pre-intention to an intention to change behaviors. Finally, the ability to recover in case of a setback in the adoption of the new behaviors is a key factor in moving to the Action phase. High Recovery Self-Efficacy, in addition to high Action Self-Efficacy and high Maintenance Self-Efficacy, is essential in getting beyond a relapse via an action plan to continue the health-promoting behaviors. 6 Thirty Third International Conference on Information Systems, Orlando 2012

7 Burns et al. / On Not Falling For Phish The mediator, Planning, between intention and behavior permits an individual to cross the intentionbehavior gap. Planning makes sense only when one has formed an intention (Sheeran et al. 2005). Failure in translating intention into action occurs when a person does not know what to do in what sequence or how to deal with obstacles when adopting new behaviors. Planning is comprised of Action Planning and Coping Planning. Action Planning deals with what sequence of actions need to be used in what situations for the new behaviors. If a person spots a phishing attempt, he needs to know to whom to report it. Coping Planning permits an individual to prepare for inevitable problems in the way of new behaviors or routines. For example, a user needs to know what to do if he does get hooked by a phishing attempt. Planning predicts successful adoption of new behaviors. The stages in this model can be adapted to fit the phishing context: a user moves from an initial or baseline stage in which a person does not acknowledge that there is a problem, to recognition of risky IS behavior with intention to reduce high-risk user behavior, and, ultimately, to the final stage of taking action. The continuum part of the model will be adapted from HAPA and will incorporate individual and environmental characteristics as control variables. Research Model for Examining IS Protective Behavior Next, we introduce our proposed 3-stage research model (see Figure 2), the Security Action Stage Model (SASM), adapted from HAPA: Figure 2. Security Approach Stage Model (SASM) Stage 0 (Low Intender): At this stage, individuals may not exhibit protective behavior (e.g., not clicking on a link in an ) because their perception of being vulnerable to phishing attempts is low; thus, their intention to change behavior is non-existent or low. Although they may or may not have received training about phishing attempts, they do not intend to behave securely because they think that the probability of falling for a phishing attempt is close to zero. Stage 1 (Intender): Individuals who reach this stage will realize that they are indeed vulnerable to phishing attempts. Thus, the individual has a higher level of intention to make behavioral changes, such as actively learning about and being attentive to cues typically contained in phishing s. However, he may not apply the behavior consistently nor know how to cope with a successful phishing attempt. Stage 2 (Actor): At this stage, individuals take active steps to prevent any future phishing attempts and have moved to consistent behavior. These steps include developing an action or coping plan in case they click on a phishing attempt, taking an active role in learning about phishing precautions, using the recommendations from anti-phishing software, and remaining vigilant for potential phishing attempts. Thirty Third International Conference on Information Systems, Orlando

8 IS Security and Privacy Movement from stage to stage: An external motivator, such as an intervention that explains how to cope in case a person has been hooked by a phishing attempt, is needed for an individual to move to the next stage. Different interventions will lead to different movement along stages. If the same intervention would lead to movement from one stage to another, irrespective of a user s stage, then we could design one intervention that would be applicable to all users in all stages, and stages would be unnecessary (Weinstein et al. 1998). However, researchers in health-related fields have documented that different interventions are indeed required to move people to one stage to the next (Weinstein and Sandman 1992). Proposed Research Methodology First phase: In the first study in our research program, we will administer online survey questions and a short phishing quiz to participants in a cross-sectional study to examine the stages and predictive constructs in our model. The survey instrument will contain constructs/items identified by a literature review and will include established, reliable, and validated scales designed to measure the seven SASM variables (Outcome Expectancies, Risk Perception, Action Self-Efficacy, Intention, Coping Self-Efficacy, Action/Coping Planning, Coping Self-Efficacy, and Recovery Self-Efficacy) as well as questions related to experiential and individual control variables, such as previous phishing experience in Web and contexts. In this particular study, behavior (IS Secure Behavior) will not be captured because the intent is to classify respondents into stages according to the seven SASM variables. The short phishing quiz, adapted from OnGuardOnline.gov, tests knowledge about phishing in Web and contexts. Our goal is to include both students and non-students in an overall data sample that represents the population who encounter phishing attempts. While our subjects will be drawn mainly from the student population of a large university, the study will be open to the general public via the Internet using a snowball sampling plan. Undergraduate business students enrolled in an MIS class will be the initial contacts asked to participate in this survey. These participants will be asked to recruit 0-5 friends who are not enrolled in the same class to fill out the survey. Extra credit will be offered for participation and for referring snowball participants who complete the survey successfully. No identifying information will be collected from the subjects. The expected time to take the Likert-style survey will be a maximum of 45 minutes. Because we plan to collect data from approximately 400 participants, we will have a sample size which should be large enough to analyze the data in a statistical manner. To rule out potential bias and to ensure that the groups data can be combined for analyses, we will conduct ANOVA comparisons to confirm that there were no differences between subject groups. The data will be analyzed in SPSS using ANOVA, factor analysis, and exploratory cluster analysis. Standard tests of reliability, internal and external validity, and factor analyses for each scale and sub-scale will be conducted. After administration of the scales, descriptive statistics regarding size of sample, response ranges, and standard deviations for each scale will be provided. Following previous studies of HAPA (e.g., Schüz et al. 2009) and from the IS literature (Sabherwal and King 1995), exploratory cluster analysis techniques (hierarchical followed by K- means) will be used to analyze the SASM model to determine the number of discrete stages and what characterizes those stages. First, an agglomerative hierarchical cluster analysis using within-groups method of average linkage and Euclidean distance measures will be performed on the model s constructs. The number of clusters identified by this analysis will be the optimal number to be used in the subsequent K-means cluster analysis. Finally, after conducting analyses for stability and validity for the cluster solution, we will compare the means of the model s constructs to develop profiles for the distinct stages. Second phase: Once we have determined the number of stages in the first study, we will proceed to the next phase, a longitudinal field experiment, of our research program. The purpose of the role-playing phishing experiment patterned after earlier phishing experiments (e.g., Kumaraguru 2009; Sheng 2009) will be to examine over time the effects of stage-appropriate interventions designed to move users from one stage of the SASM model to a higher stage. Assuming that three clusters emerge from the first study, the two interventions designed for this particular experiment are separate single-page informative messages that use cartoon characters to convey simple messages. These interventions are re-fabrications of the landing page that was carefully created through several iterations with focus groups by Kumaraguru (2009) and that is now incorporated at the Anti-Phishing Working Group (APWG) web site. The current landing page at APWG contains a one-size-fits-all approach that had to be modified for research about 8 Thirty Third International Conference on Information Systems, Orlando 2012

9 Burns et al. / On Not Falling For Phish interventions for stages. Thus, the first intervention is designed to move IS end-users in the Low Intender stage to Intender; the second intervention has been reworked to move Intenders to Actors. To determine what stage a person is in before and after a treatment, we will administer pre- and postexperiment survey questions, including scales to measure the seven SASM constructs, to participants. The on-line survey instruments will be a subset of the survey used in initial research study that focuses on phishing in an context only. The pre-survey and experiment participation will be separated by a time of at least two weeks to avoid priming and/or recency biases. To avoid any form of education or training in the pre-experiment survey, the phishing quiz will not be included in the pre-experiment survey. The post-survey, administered one week after the experiment, will include: self-reported stage membership, the same seven SASM variables as in the pre-experiment survey, and the phishing quiz used in the first study. The one-week delay between the experiment and the post-survey is an attempt to capture stage changes that may not occur immediately after the experiment. One major drawback of splitting apart the pre-experiment survey, experiment, and post-experiment across several weeks is attrition of the participants; however, participants will be cautioned in the recruiting and disclosure material that they will not receive any incentives (e.g., extra credit) unless they complete the preexperiment survey, experiment, and post-experiment survey. In the online experiment, we will manipulate participants in a 3x3 experiment crossing stage membership (Stage 0, Stage 1, Stage 2) with intervention type (No intervention; Intervention #1; Intervention #2) design. Subjects will be randomly assigned to a treatment group. We will capture IS Secure Behavior before and after the treatment through respondents actions (e.g., choosing to click on a link or ignore ) in the role-play experiment in which respondent have to process pre-treatment s and posttreatment s (e.g., legitimate without links, spam with links, phishing ) set up in a counter-balanced design patterned after previous experiments (Kumaraguru 2009; Sheng 2009). Because we plan to collect data from approximately 600 participants, we will have a sample size with adequate statistical power. The goal of the data analyses will be to show that movement to higher stages occurs only when the appropriate intervention was administered. This will be demonstrated by running an ANOVA for a 3x3 experiment crossing stage membership (Stage 0, Stage 1, Stage 2) with intervention type (No intervention, Intervention #1, Intervention #2). The change in stage membership will be calculated based on centroid values for each stage. Kruskal-Wallis will be used to test for significance of effects by intervention type. Next steps: Future phases of the research program will include different and larger sample groups, longer-term longitudinal studies that capture actual user behavior and how it relates to the stage a user is in, and a focus on other Information Security behavior, such as compliance with password policies. Conclusion Before discussing the potential contributions of this research, we need to focus on limitations of these preliminary studies. First, limitations stem from the nature of the proposed model, a stage theory model. Our current model proposes three stages through which the user moves. It may be possible that there are more or fewer than three stages. Future studies need to investigate if there are a different number of stages for this type of behavioral change. Next, our samples are not going to be a random sample but rather convenience samples comprised mainly of student subjects. Future research should examine this model with users in different settings, such as employees of different types of organizations. Finally, the behavior data from a role-playing field experiment may differ from actual user behavior. This proposed research will contribute to the existing research stream on IS security and social engineering, specifically focused on phishing. First, the proposed model is a hybrid continuum-stage model adapted from health-behavior change models and applied to the phishing context. A key strength of this type of model closes the intention-behavior gap. Second, the longitudinal nature of the model will permit us in future studies to empirically test causal relationships that previously were only implied by cross-sectional research. Third, exploring and characterizing the various stages along which a user must progress toward secure IS behavior will help researchers identify to which stage a user has evolved. Studying vigilance or susceptibility with respect to phishing may not be relevant until a user reaches the final stage. Finally, the longitudinal design proposed for the second study of this research plan will permit researchers to track movement through stages over period of time; thus, causality can be established. Thirty Third International Conference on Information Systems, Orlando

10 IS Security and Privacy References Ajzen, I Attitudes, Personality, and Behavior. Buckingham, UK: Open University Press. Ajzen, I "The Theory of Planned Behavior," Organizational Behavior and Human Decision Processes (50), pp Ajzen, I., and Fishbein, M Understanding Attitudes and Predicting Social Behavior. Englewood Cliffs, NJ: Prentice-Hall. Anti-Phishing Phil from Armitage, C.J., and Conner, M "Social Cognition Models and Health Behaviour: A Structured Review," Psychology and Health (15), pp Baker, W.H., and Wallace, L "Is Information Security under Control?: Investigating Quality in Information Security Management," IEEE Security & Privacy (5:1), pp Bandura, A Social Foundations of Thought and Action: A Social Cognitive Theory. Englewood Cliffs, NJ: Prentice-Hall. Bandura, A Self-Efficacy: The Exercise of Control. New York: Freeman. Becker, M.H., and Rosenstock, I.M "Comparing Social Learning Theory and the Health Belief Model," in Advances in Health Education and Promotion, W.B. Ward (ed.). Greenwich, CT: JAI Press. Benbasat, I., and Barki, H "Quo Vadis, Tam?," Journal of the Association for Information Systems (8:4), pp Bhattacherjee, A., and Sanford, C "The Intention-Behaviour Gap in Technology Usage: The Moderating Role of Attitude Strength," Behaviour & Information Technology (28:4), pp Catania, J.A., Kegeles, S.M., and Coates, T.J "Towards an Understanding of Risk Behavior: An Aids Risk Reduction Model (ARRM)," Health Education Quarterly (17), pp Conner, M., and Armitage, C.J "The Theory of Planned Behavior: A Review and Avenues for Further Research," Journal of Applied Social Psychology (28), pp Davinson, N., and Sillence, E "It Won't Happen to Me: Promoting Secure Behavior among Internet Users," Computers in Human Behavior (26), pp Davis, F.D "Perceived Usefulness, Perceived Ease of Use, and User Acceptance of Information Technology," MIS Quarterly (13:3), pp Davis, F.D., Bagozzi, R.P., and Warshaw, P.R "User Acceptance of Computer Technology: A Comparison of Two Theoretical Models," Management Science (35), pp de Vries, H., Mesters, I., van de Steeg, H., and Honing, C "The General Public's Information Needs and Perceptions Regarding Hereditary Cancer: An Application of the Integrated Change Model," Patient Education and Counseling (56), pp de Vries, H., Mudde, A., Leijs, I., Charlton, A., Vartiainen, E., Buijs, G., Clemente, M.P., Storm, H., González Navarro, A., Nebot, M., Prins, T., and Kremers, S "The European Smoking Prevention Framework Approach (EFSA): An Example of Integral Prevention," Health Education Research (18), pp Dinev, T., and Hu, Q "The Centrality of Awareness in the Formation of User Behavioral Intention toward Protective Information Technologies," Journal of the Association for Information Systems (8:7), pp Dodge Jr., R.C., Carver, C., and Ferguson, A.J "Phishing for User Security Awareness," Computers & Security (26), pp Ferguson, A.J "Fostering Security Awareness: The West Point Carronade," in: EDUCAUSE Quarterly Magazine 28(1), pp Fishbein, M., and Ajzen, I Belief, Attitude, Intention and Behavior: An Introduction to Theory and Research. Reading, MA: Addison-Wesley. Heckhausen, H., and Gollwitzer, P.M "Thought Contents and Cognitive Function in Motivational Versus Volitional States of Mind," Motivation and Emotion (11:2), pp Hong, J "The State of Phishing Attacks," Communications of the ACM (55:1), pp Janz, N.K., and Becker, M.H "The Health Belief Model: A Decade Later," Heath Education Quarterly (11), pp Jenkins, J.L., Durcikova, A., Grayson, R., and Nunamaker Jr., J.F "Encouraging Users to Behave Securely: Examining the Influence of Technical, Managerial, and Educational Controls on Users' Secure Behavior," ICIS 2010 Conference Proceedings, St. Louis, Missouri. 10 Thirty Third International Conference on Information Systems, Orlando 2012

11 Burns et al. / On Not Falling For Phish Kumaraguru, P "Phishguru: A System for Educating Users About Semantic Attacks." Published Dissertation, UMI Number: , 164 pages Kumaraguru, P., Sheng, S., Acquisti, A., Cranor, L.F., and Hong, J "Lessons from a Real-World Evaluation of Anti-Phishing Training," ecrime Researchers Summit, Atlanta, Georgia. Kumaraguru, P., Sheng, S., Acquisti, A., Cranor, L.F., and Hong, J "Teaching Johnny Not to Fall for Phish," ACM Transactions on Internet Technology (10:2), pp. 7:1-7:31. Lippke, S., Nigg, C.R., and Maddock, J.E "The Theory of Planned Behavior within the Stages of the Transtheoretical Model -- Latent Structural Modeling of Stage-Specific Prediction Patterns in Physical Activity," Structural Equation Modeling: A Multidisciplinary Journal (14:4), pp Luszczynska, A., and Schwarzer, R "Planning and Self-Efficacy in the Adoption and Maintenance of Breast Self-Examination: A Longitudinal Study on Self-Regulatory Cognitions," Psychology and Health (18), pp Maddux, J.E., and Rogers, R.W "Protection Motivation and Self-Efficacy: A Revised Theory of Fear Appeals and Attitude Change," Journal of Experimental Social Psychology (19), pp Myyry, L., Siponen, M.T., Pahnila, S., Vartiainen, T., and Vance, A "What Levels of Moral Reasoning and Values Explain Adherence to Information Security Rules? An Empirical Study," European Journal of Information Systems (18:2), pp Ng, B.-Y., Kankanhalli, A., and Xu, Y "Studying Users' Computer Security Behavior: A Health Belief Perspective," Decision Support Systems (46:4), pp Parrish Jr., J.L., Bailey, J.L., and Courtney, J.F "A Personality Based Model for Determining Susceptibility to Phishing Attacks." from Prentice-Dunn, S., McMath, B.F., and Cramer, R.J "Protection Motivation Theory and Stages of Change in Sun Protective Behavior," Journal of Health Psychology (14:2), pp President's Identity Task Force "Combating Identity Theft. 2 Vols. (Vol. 1: A Strategic Plan; Vol. 2: Supplemental Information.) Prochaska, J.O., DiClemente, C.C., and Norcross, J.C "In Search of How People Change: Applications to Addictive Behaviors," American Psychologist (47), pp Proudfoot, J.G., Giboney, J.S., Schuetzler, R.M., and Durcikova, A "Trends in Phishing Attacks: Suggestions for Future Research." Seventeenth Americas Conference on Information Systems, Detroit, Michigan. Rogers, R.W "A Protection Motivation Theory of Fear Appeals and Attitude Change," Journal of Psychology (91:1), pp Rosenstock, I.M "Why People Use Health Services," Millbank Memorial Fund Quarterly (44), pp Sabherwal, R., and King, W.R "An Empirical Taxonomy of the Decision-Making Processes Concerning Strategic Applications of Information Systems," Journal of Management Information Systems (11:4), pp Sasse, M.A., Brostoff, S., and Weirich, D "Transforming the 'Weakest Link" -- a Human/Computer Interaction Approach to Usable and Effective Security," BT Technology Journal (19:3), pp Schneier, B Secrets and Lies: Digital Security in a Networked World. New York: John Wiley and Sons. Schüz, B., Sniehotta, F.F., Mallach, N., Wiedemann, A.U., and Schwarzer, R "Predicting Transitions from Preintentional, Intentional, and Actional Stages of Change," Health Education Research (24:1), pp Schwarzer, R "Self-Efficacy in the Adoption and Maintenance of Health Behaviors," in Self- Efficacy: Thought Control of Action, R. Schwarzer (ed.). Washington, DC: Hemisphere, pp Schwarzer, R "Self-Regulatory Processes in the Adoption and Maintenance of Health Behavior," Journal of Health Psychology (4:2), pp Schwarzer, R "Social-Cognitive Factors in Changing Health-Related Behaviors," Current Directions in Psychological Science (10:2), pp Schwarzer, R "Modeling Health Behavior Change: How to Predict and Modify the Adoption and Maintenance of Health Behaviors," Applied Psychology: An International Review (57:1), pp Sheeran, P "Intention-Behavior Relations: A Conceptual and Empirical Review," European Review of Social Psychology (12), pp Sheeran, P., Webb, T.L., and Gollwitzer, P.M "The Interplay between Goal Intentions and Implementation Intentions," Personality and Social Psychology Bulletin (31), pp Thirty Third International Conference on Information Systems, Orlando

12 IS Security and Privacy Sheng, S "A Policy Analysis of Phishing Countermeasures." Published Dissertation, ISBN: , 181 pages Sheng, S., Holbrook, M., Kumaraguru, P., Cranor, L.F., and Downs, J "Who Falls for Phish? A Demographic Analysis of Phishing Susceptibility and Effectiveness of Interventions," in: CHI 2010, April 10-15, Atlanta, Georgia. Sheppard, B.H., Hartwick, J., and Warshaw, P.R "The Theory of Reasoned Action: A Meta-Analysis of Past Research with Modifications and Future Research," Journal of Consumer Research (15), pp Siponen, M.T "A Conceptual Foundation for Organizational Information Security Awareness," Information Management & Computer Security (8:1), pp Sutton, S "Predicting and Explaining Intentions and Behavior: How Well Are We Doing?," Journal of Applied Social Psychology (28), pp Sutton, S "Stage Theories of Health Behaviour," in Predicting Health Behaviour: Research and Practice with Social Cognition Models, M. Conner and P. Norman (eds.). Buckingham, UK: Open University Press, pp Taylor, S., and Todd, P.A "Understanding Information Technology Usage: A Test of Competing Models," Information Systems Research (6), pp Velicer, W.F., Redding, C.A., Anatchkova, M.D., Fava, J.L., and Prochaska, J.O "Identifying Cluster Subtypes for the Prevention of Adolescent Smoking Acquisition," Addictive Behaviors (32:2), pp Venkatesh, V., Morris, M.G., Davis, G.B., and Davis, F.D "User Acceptance of Information Technology: Toward a Unifying View," MIS Quarterly (27), pp Vishwanath, A., Herath, T., Chen, R., Wang, J., and Rao, H.R "Why Do People Get Phished? Testing Individual Differences in Phishing Vulnerability within an Integrated, Information Processing Model," Decision Support Systems (51:3), pp Weinstein, N.D "The Precaution Adoption Process," Health Psychology (7), pp Weinstein, N.D., Rothman, A.J., and Sutton, S.R "Stage Theories of Health Behavior: Conceptual and Methodological Issues," Health Psychology (17:3), pp Weinstein, N.D., and Sandman, P.M "A Model of the Precaution Adoption Process: Evidence from Home Radon Testing," Health Psychology (11), pp Workman, M "A Test of Interventions for Security Threats from Social Engineering," Information Management & Computer Security (16:5), pp Wright, R., and Marett, K "The Influence of Experiential and Dispositional Factors in Phishing: An Empirical Investigation of the Deceived," Journal of Management Information Systems (27:1), pp Thirty Third International Conference on Information Systems, Orlando 2012

External Variables and the Technology Acceptance Model

External Variables and the Technology Acceptance Model Association for Information Systems AIS Electronic Library (AISeL) AMCIS 1995 Proceedings Americas Conference on Information Systems (AMCIS) 8-25-1995 External Variables and the Technology Acceptance Model

More information

Putting the Motivation in Protection Motivation Theory: An Examination of Persuasive Communication via Extrinsic and Intrinsic Means

Putting the Motivation in Protection Motivation Theory: An Examination of Persuasive Communication via Extrinsic and Intrinsic Means Putting the Motivation in Protection Motivation Theory Abstract Putting the Motivation in Protection Motivation Theory: An Examination of Persuasive Communication via Extrinsic and Intrinsic Means Research-in-Progress

More information

Who Subscribe to Identity Theft Protection Service

Who Subscribe to Identity Theft Protection Service DECISION SCIENCES INSTITUTE? An Exploration of Antecedent Factors Yuan Li University of Illinois at Springfield Email: yli295@uis.edu Jingguo Wang University of Texas at Arlington Email: jwang@uta.edu

More information

User Acceptance of E-Government Services

User Acceptance of E-Government Services User Acceptance of E-Government Services PACIS 2007 Track (Human Computer Interaction, Social and Cultural Aspects of IS) (Full Paper) Abstract In order to provide more accessible, accurate, real-time

More information

Modeling Health Behavior Change: How to Predict and Modify the Adoption and Maintenance of Health Behaviors

Modeling Health Behavior Change: How to Predict and Modify the Adoption and Maintenance of Health Behaviors Modeling Health Behavior Change, p. 1 To appear in: Applied Psychology: An International Review, 2007 Modeling Health Behavior Change: How to Predict and Modify the Adoption and Maintenance of Health Behaviors

More information

System and User Characteristics in the Adoption and Use of e-learning Management Systems: A Cross-Age Study

System and User Characteristics in the Adoption and Use of e-learning Management Systems: A Cross-Age Study System and User Characteristics in the Adoption and Use of e-learning Management Systems: A Cross-Age Study Oscar Lorenzo Dueñas-Rugnon, Santiago Iglesias-Pradas, and Ángel Hernández-García Grupo de Tecnologías

More information

Acceptance of E-Government Service: A Validation of the UTAUT

Acceptance of E-Government Service: A Validation of the UTAUT Proceedings of the 5th WSEAS International Conference on E-ACTIVITIES, Venice, Italy, November 20-22, 2006 165 Acceptance of E-Government Service: A Validation of the UTAUT YI-SHUN WANG Department of Information

More information

Behavior change in noise-producing activities a model

Behavior change in noise-producing activities a model Behavior change in noise-producing activities a model Irène SCHLACHTER a, Tommaso MELONI a, Elisabeth LAUPER b, Stephanie MOSER b a Federal office for the environment FOEN 3003 Berne, SWITZERLAND, e-mail:

More information

ADOPTION PROCESS FOR VoIP: THE UTAUT MODEL

ADOPTION PROCESS FOR VoIP: THE UTAUT MODEL ADOPTION PROCESS FOR VoIP: THE UTAUT MODEL Eduardo Esteva-Armida, Instituto Tecnológico y de Estudios Superiores de Monterrey Gral. Ramón Corona 2514, Zapopan, Jalisco, México 45120 Phone: (5233) 3669.3080

More information

An Empirical Study of the Roles of Affective Variables in User Adoption of Search Engines

An Empirical Study of the Roles of Affective Variables in User Adoption of Search Engines An Empirical Study of the Roles of Affective Variables in User Adoption of Search Engines ABSTRACT Heshan Sun Syracuse University hesun@syr.edu The current study is built upon prior research and is an

More information

Changing People s Behavior. Larry Wissow Professor Health, Behavior and Society Johns Hopkins School of Public Health

Changing People s Behavior. Larry Wissow Professor Health, Behavior and Society Johns Hopkins School of Public Health This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike License. Your use of this material constitutes acceptance of that license and the conditions of use of materials on this

More information

Deakin Research Online Deakin University s institutional research repository DDeakin Research Online Research Online This is the published version:

Deakin Research Online Deakin University s institutional research repository DDeakin Research Online Research Online This is the published version: Deakin Research Online Deakin University s institutional research repository DDeakin Research Online Research Online This is the published version: Taghian, Mehdi and D'Souza, Clare 2007, A cross-cultural

More information

Understanding Social Norms, Enjoyment, and the Moderating Effect of Gender on E-Commerce Adoption

Understanding Social Norms, Enjoyment, and the Moderating Effect of Gender on E-Commerce Adoption Association for Information Systems AIS Electronic Library (AISeL) SAIS 2010 Proceedings Southern (SAIS) 3-1-2010 Understanding Social Norms, Enjoyment, and the Moderating Effect of Gender on E-Commerce

More information

The Determinants of Preventive Health Behavior: Literature Review and Research Perspectives

The Determinants of Preventive Health Behavior: Literature Review and Research Perspectives The Determinants of Preventive Health Behavior: Literature Review and Research Perspectives Carolina Werle To cite this version: Carolina Werle. The Determinants of Preventive Health Behavior: Literature

More information

Examining the efficacy of the Theory of Planned Behavior (TPB) to understand pre-service teachers intention to use technology*

Examining the efficacy of the Theory of Planned Behavior (TPB) to understand pre-service teachers intention to use technology* Examining the efficacy of the Theory of Planned Behavior (TPB) to understand pre-service teachers intention to use technology* Timothy Teo & Chwee Beng Lee Nanyang Technology University Singapore This

More information

THEORY OF PLANNED BEHAVIOR: A PERSPECTIVE IN INDIA S INTERNET BANKING

THEORY OF PLANNED BEHAVIOR: A PERSPECTIVE IN INDIA S INTERNET BANKING THEORY OF PLANNED BEHAVIOR: A PERSPECTIVE IN INDIA S INTERNET BANKING Dr. Rajesh Bhatt Head, Department of Business Administration Bhavnagar University, Bhavnagar ABSTRACT The banking services in India

More information

5. Stages of health behaviour change and planning: RCT of stage-specific effects of planning on dental flossing

5. Stages of health behaviour change and planning: RCT of stage-specific effects of planning on dental flossing Chapter 5: Stage-specific effects of a planning intervention 75 5. Stages of health behaviour change and planning: RCT of stage-specific effects of planning on dental flossing 5 Schüz, B., Wiedemann, A.

More information

EPHE 575. Exercise Adherence. To Do. 8am Tuesday Presentations

EPHE 575. Exercise Adherence. To Do. 8am Tuesday Presentations EPHE 575 Exercise Adherence To Do 8am Tuesday Presentations Quiz Find an article on exercise adherence and do an article summary on it. (If you have already checked it off, I will have one for you to fill

More information

Factors Influencing the Use of Privacy Settings in Location-Based Social Networks

Factors Influencing the Use of Privacy Settings in Location-Based Social Networks Factors Influencing the Use of Privacy Settings in Location-Based Social Networks H. Oladimeji and J. Ophoff Dept. of Information Systems, University of Cape Town, Cape Town, South Africa e-mail: OLDHEN003@myuct.ac.za;

More information

Physicians' Acceptance of Web-Based Medical Assessment Systems: Findings from a National Survey

Physicians' Acceptance of Web-Based Medical Assessment Systems: Findings from a National Survey Association for Information Systems AIS Electronic Library (AISeL) AMCIS 2003 Proceedings Americas Conference on Information Systems (AMCIS) 12-31-2003 Physicians' Acceptance of Web-Based Medical Assessment

More information

ROLES OF ATTITUDES IN INITIAL AND CONTINUED ICT USE: A LONGITUDINAL STUDY

ROLES OF ATTITUDES IN INITIAL AND CONTINUED ICT USE: A LONGITUDINAL STUDY ROLES OF ATTITUDES IN INITIAL AND CONTINUED ICT USE: A LONGITUDINAL STUDY Ping Zhang Syracuse University pzhang@syr.edu Abstract. Attitude has been understudied in the information systems (IS) field. Research

More information

Health Behaviour Change: Applying Prochaska and DiClemente s Stages of Change Model

Health Behaviour Change: Applying Prochaska and DiClemente s Stages of Change Model Health Behaviour Change: Applying Prochaska and DiClemente s Stages of Change Model Image Sources http://www.clevelandseniors.com/forever/100 smoker.htm http://bacontoday.com/bacon flavored diet coke/

More information

Why We Don t Block 3rd Party Trackers: An Attributional Theory Perspective

Why We Don t Block 3rd Party Trackers: An Attributional Theory Perspective Association for Information Systems AIS Electronic Library (AISeL) WISP 2015 Proceedings Pre-ICIS Workshop on Information Security and Privacy (SIGSEC) Winter 12-13-2015 Why We Don t Block 3rd Party Trackers:

More information

The Ecological Perspective: A Multilevel, Interactive Approach

The Ecological Perspective: A Multilevel, Interactive Approach 10 The Ecological Perspective: A Multilevel, Interactive Approach Contemporary health promotion involves more than simply educating individuals about healthy practices. It includes efforts to change organizational

More information

Radon: A Behavioural as well as a Technical & Health Challenge.

Radon: A Behavioural as well as a Technical & Health Challenge. Radon: A Behavioural as well as a Technical & Health Challenge. Prof. David Hevey, Director of the Research Centre for Psychological Health, School of Psychology, Trinity College Dublin Consequences of

More information

Review of public information programmes to enhance home radon screening uptake and home remediation

Review of public information programmes to enhance home radon screening uptake and home remediation Review of public information programmes to enhance home radon screening uptake and home remediation Prof. David Hevey, Director of the Research Centre for Psychological Health, School of Psychology, Trinity

More information

Revision notes 7.5. Section 7.5 Health promotion

Revision notes 7.5. Section 7.5 Health promotion Revision notes 7.5 Section 7.5 Health promotion Learning outcomes Examine models and theories of health promotion. Discuss the effectiveness of health promotion strategies. For behaviour to change in any

More information

Behavioral science theory and principles for practice in health education

Behavioral science theory and principles for practice in health education HEALTH EDUCATION RESEARCH Theory & Practice Vol.12 no.l 1997 Pages 143-150 POINT OF VIEW Behavioral science theory and principles for practice in health education Christine Jackson Abstract The value of

More information

Why Is Theory Important?

Why Is Theory Important? Health Behavior Theories: Applying Theory to Practice Why Is Theory Important? Theory gives planners tools for moving beyond intuition. Consistent with the current emphasis on using evidence-based interventions

More information

a, Emre Sezgin a, Sevgi Özkan a, * Systems Ankara, Turkey

a, Emre Sezgin a, Sevgi Özkan a, * Systems Ankara, Turkey Available online at www.sciencedirect.com Procedia - Social and Behavioral Scien ce s 8 ( 0 ) nd World Conference on Educational Technology Researches WCETR0 The role of Gender in Pharmacists Attitudes

More information

Trust in E-Commerce Vendors: A Two-Stage Model

Trust in E-Commerce Vendors: A Two-Stage Model Association for Information Systems AIS Electronic Library (AISeL) ICIS 2000 Proceedings International Conference on Information Systems (ICIS) December 2000 Trust in E-Commerce Vendors: A Two-Stage Model

More information

Models for Involvement in Physical Activity

Models for Involvement in Physical Activity Models for Involvement in Physical Activity Why do people embrace or do not embrace a physical active lifestyle? 1 Typical Undergrad Complaints What s the point? Aren t these all the same? What does this

More information

Exploring the Influences of Implementation Intention on Information Security Behaviors

Exploring the Influences of Implementation Intention on Information Security Behaviors Association for Information Systems AIS Electronic Library (AISeL) AMCIS 2011 Proceedings - All Submissions 8-6-2011 Exploring the Influences of Implementation Intention on Information Security Behaviors

More information

Analysis of citizens' acceptance for e-government services: applying the utaut model

Analysis of citizens' acceptance for e-government services: applying the utaut model Analysis of citizens' acceptance for e-government services: applying the utaut model Author Alshehri, Mohammed, Drew, Steve, Al Ghamdi, Rayed Published 2012 Conference Title Proceedings of the IADIS Multi

More information

An Integrated Approach to Consumers Processing of Health Marketing Communication Messages

An Integrated Approach to Consumers Processing of Health Marketing Communication Messages An Integrated Approach to Consumers Processing of Health Marketing Communication Messages Today, our world is faced with public health issues on daily basis (e.g., cancer, obesity, H1N1 flu pandemic, HIV,

More information

CHANGING HEALTH BEHAVIOUR

CHANGING HEALTH BEHAVIOUR CHANGING HEALTH BEHAVIOUR Dr Sam Caton ScHARR s.caton@sheffield.ac.uk Learning objectives 1. Identify different types of heath behaviour 2. Identify the importance of understanding health behaviours 3.

More information

Sense-making Approach in Determining Health Situation, Information Seeking and Usage

Sense-making Approach in Determining Health Situation, Information Seeking and Usage DOI: 10.7763/IPEDR. 2013. V62. 16 Sense-making Approach in Determining Health Situation, Information Seeking and Usage Ismail Sualman 1 and Rosni Jaafar 1 Faculty of Communication and Media Studies, Universiti

More information

WE-INTENTION TO USE INSTANT MESSAGING FOR COLLABORATIVE WORK: THE MODERATING EFFECT OF EXPERIENCE

WE-INTENTION TO USE INSTANT MESSAGING FOR COLLABORATIVE WORK: THE MODERATING EFFECT OF EXPERIENCE WE-INTENTION TO USE INSTANT MESSAGING FOR COLLABORATIVE WORK: THE MODERATING EFFECT OF EXPERIENCE Aaron X.L. Shen Department of Information Systems, University of Science and Technology of China City University

More information

Psychological Experience of Attitudinal Ambivalence as a Function of Manipulated Source of Conflict and Individual Difference in Self-Construal

Psychological Experience of Attitudinal Ambivalence as a Function of Manipulated Source of Conflict and Individual Difference in Self-Construal Seoul Journal of Business Volume 11, Number 1 (June 2005) Psychological Experience of Attitudinal Ambivalence as a Function of Manipulated Source of Conflict and Individual Difference in Self-Construal

More information

A Model of Unethical Usage of Information Technology

A Model of Unethical Usage of Information Technology Association for Information Systems AIS Electronic Library (AISeL) AMCIS 2005 Proceedings Americas Conference on Information Systems (AMCIS) 2005 A Model of Unethical Usage of Information Technology Sutirtha

More information

Smoking and the Ø pattern; predictors of transitions through the stages of change

Smoking and the Ø pattern; predictors of transitions through the stages of change HEALTH EDUCATION RESEARCH Vol.21 no.3 2006 Theory & Practice Pages 305 314 Advance Access publication 8 June 2006 Smoking and the Ø pattern; predictors of transitions through the stages of change E. F.

More information

Adapting the Transtheoretical Model for the Design of Security Interventions

Adapting the Transtheoretical Model for the Design of Security Interventions Adapting the Transtheoretical Model for the Design of Security Interventions Cori Faklaris Carnegie Mellon University Pittsburgh, PA 15213, USA cfaklari@cs.cmu.edu Laura Dabbish Carnegie Mellon University

More information

User characteristics that influence judgment of social engineering attacks in social networks

User characteristics that influence judgment of social engineering attacks in social networks https://doi.org/10.1186/s13673-018-0128-7 RESEARCH Open Access User characteristics that influence judgment of social engineering attacks in social networks Samar Muslah Albladi * and George R. S. Weir

More information

An Empirical Study on Causal Relationships between Perceived Enjoyment and Perceived Ease of Use

An Empirical Study on Causal Relationships between Perceived Enjoyment and Perceived Ease of Use An Empirical Study on Causal Relationships between Perceived Enjoyment and Perceived Ease of Use Heshan Sun Syracuse University hesun@syr.edu Ping Zhang Syracuse University pzhang@syr.edu ABSTRACT Causality

More information

Attitude = Belief + Evaluation. TRA/TPB and HBM. Theory of Reasoned Action and Planned Behavior. TRA: Constructs TRA/TPB

Attitude = Belief + Evaluation. TRA/TPB and HBM. Theory of Reasoned Action and Planned Behavior. TRA: Constructs TRA/TPB and HBM Theory of Reasoned Action and Planned Behavior Both focus on rational, cognitive decision-making processes adds the social context to the basic ideas of the HBM 2 TRA: Constructs Behavioral Intention

More information

Assessing Readiness To Change

Assessing Readiness To Change Assessing Readiness To Change Transtheoretical Model The Transtheoretical Model describes the stages of behavior prior to change. It focuses on the individual s decision making. This model involves the

More information

PREDICTING THE USE OF WEB-BASED INFORMATION SYSTEMS: INTRINSIC MOTIVATION AND SELF-EFFICACY

PREDICTING THE USE OF WEB-BASED INFORMATION SYSTEMS: INTRINSIC MOTIVATION AND SELF-EFFICACY PREDICTING THE USE OF WEB-BASED INFORMATION SYSTEMS: INTRINSIC MOTIVATION AND SELF-EFFICACY Yujong Hwang and Mun Y. Yi University of South Carolina yujongh@yahoo.com myi@moore.sc.edu Abstract This study

More information

THE HEALTH BELIEF MODEL. Health Behavior CHAPTER 6

THE HEALTH BELIEF MODEL. Health Behavior CHAPTER 6 THE HEALTH BELIEF MODEL 1 DESCRIPTION This chapter will discuss The Health Belief Model, Protection Motivation Theory and how to use the model in the behavior case analysis 2 OBJECTIVES General The student

More information

STAGE MODELS OF BEHAVIOUR CHANGE

STAGE MODELS OF BEHAVIOUR CHANGE STAGE MODELS OF BEHAVIOUR CHANGE Falko F Sniehotta 1 & Robert Aunger 2 1 School of Psychology, University of Aberdeen, UK (f.sniehotta@abdn.ac.uk) 2 Disease Control and Vector Biology Unit, London School

More information

Behavior Change Theories

Behavior Change Theories Behavior Change Theories Abdul-Monaf Al-Jadiry, MD, FRCPsych Professor of Psychiatry Behavioral change theories These theories explain the reasons behind alterations in individuals' behavioral patterns.

More information

Research on Software Continuous Usage Based on Expectation-confirmation Theory

Research on Software Continuous Usage Based on Expectation-confirmation Theory Research on Software Continuous Usage Based on Expectation-confirmation Theory Daqing Zheng 1, Jincheng Wang 1, Jia Wang 2 (1. School of Information Management & Engineering, Shanghai University of Finance

More information

Featured Talk: Measuring Secure Behavior: A Research Commentary

Featured Talk: Measuring Secure Behavior: A Research Commentary Featured Talk: Measuring Secure Behavior: A Research Commentary Merrill Warkentin a, Detmar Straub b, and Kalana Malimage a a Mississippi State University b Georgia State University T HE expansion of and

More information

Using a social-ecological model in development of treatment programs that target behavior change

Using a social-ecological model in development of treatment programs that target behavior change This is the author s final manuscript of the presented paper. The publisher-formatted version may be available through the publisher s web site or your institution s library Using a social-ecological model

More information

Integrating Emotion and the Theory of Planned Behavior to Explain Consumers Activism in the Internet Web site

Integrating Emotion and the Theory of Planned Behavior to Explain Consumers Activism in the Internet Web site Integrating Emotion and the Theory of Planned Behavior to Explain Consumers Activism in the Internet Web site SEUNGHO CHO shcho72@gmail.com LAURA RICHARDSON WALTON lwalton@comm.msstate.edu Mississippi

More information

Lesson 1: Making and Continuing Change: A Personal Investment

Lesson 1: Making and Continuing Change: A Personal Investment Lesson 1: Making and Continuing Change: A Personal Investment Introduction This lesson is a review of the learning that took place in Grade 11 Active Healthy Lifestyles. Students spend some time reviewing

More information

User Acceptance of Mobile Internet Based on. Gender Differences

User Acceptance of Mobile Internet Based on. Gender Differences SOCIAL BEHAVIOR AND PERSONALITY, 2010, 38(3), 415-426 Society for Personality Research (Inc.) DOI 10.2224/sbp.2010.38.3.415 User Acceptance of Mobile Internet Based on THE UNIFIED THEORY OF ACCEPTANCE

More information

Developing Tailored Theory-based Educational Content for WEB Applications: Illustrations from the MI-HEART Project

Developing Tailored Theory-based Educational Content for WEB Applications: Illustrations from the MI-HEART Project MEDINFO 2001 V. Patel et al. (Eds) Amsterdam: IOS Press 2001 IMIA. All rights reserved Developing Tailored Theory-based Educational Content for WEB Applications: Illustrations from the MI-HEART Project

More information

Intention to consent to living organ donation: an exploratory study. Christina Browne B.A. and Deirdre M. Desmond PhD

Intention to consent to living organ donation: an exploratory study. Christina Browne B.A. and Deirdre M. Desmond PhD Intention to consent to living organ donation: an exploratory study Christina Browne B.A. and Deirdre M. Desmond PhD Department of Psychology, John Hume Building, National University of Ireland Maynooth,

More information

Investigating the Strategies to Cope with Resistance to Change in Implementing ICT : A Case Study of Allama Iqbal Open University

Investigating the Strategies to Cope with Resistance to Change in Implementing ICT : A Case Study of Allama Iqbal Open University Investigating the Strategies to Cope with Resistance to Change in Implementing ICT : A Case Study of Allama Iqbal Open University Adnan Riaz Department of Business Administration Allama Iqbal Open University

More information

Seminar Medical Informatics 2015

Seminar Medical Informatics 2015 Seminar Medical Informatics 2015 Meeting 11 March 20, 2015 Ronald Batenburg UU/NIVEL 1 Agenda for today Market and context research for medical apps Target audience, end-users, customers Laws, regulation,

More information

INVESTGATING THE EFFECT OF SOCIAL INFLUENCE ON INFORMATION TECHNOLOGY ACCEPTANCE

INVESTGATING THE EFFECT OF SOCIAL INFLUENCE ON INFORMATION TECHNOLOGY ACCEPTANCE INVESTGATING THE EFFECT OF SOCIAL INFLUENCE ON INFORMATION TECHNOLOGY ACCEPTANCE Jeoungkun Kim Graduate School of Management, Korea Advanced Institute Science and Technology, kimjk70@kgsm.kaist.ac.kr Heeseok

More information

EMOTIONAL ATTACHMENT TO IT BRANDS AND TECHNOLOGY ACCEPTANCE

EMOTIONAL ATTACHMENT TO IT BRANDS AND TECHNOLOGY ACCEPTANCE EMOTIONAL ATTACHMENT TO IT BRANDS AND TECHNOLOGY ACCEPTANCE Abstract Ben Liu University of Georgia benliu@uga.edu Elena Karahanna University of Georgia ekarah@terry.uga.edu Technology acceptance model

More information

VALUES AND ENTREPRENEURIAL ATTITUDE AS PREDICTORS OF NASCENT ENTREPRENEUR INTENTIONS

VALUES AND ENTREPRENEURIAL ATTITUDE AS PREDICTORS OF NASCENT ENTREPRENEUR INTENTIONS VALUES AND ENTREPRENEURIAL ATTITUDE AS PREDICTORS OF NASCENT ENTREPRENEUR INTENTIONS Noel J. Lindsay 1, Anton Jordaan, and Wendy A. Lindsay Centre for the Development of Entrepreneurs University of South

More information

Ability to link signs/symptoms of current patient to previous clinical encounters; allows filtering of info to produce broad. differential.

Ability to link signs/symptoms of current patient to previous clinical encounters; allows filtering of info to produce broad. differential. Patient Care Novice Advanced Information gathering Organization of responsibilities Transfer of Care Physical Examination Decision Making Development and execution of plans Gathers too much/little info;

More information

The Effect of Choice on Intention-Behavior Consistency

The Effect of Choice on Intention-Behavior Consistency The Effect of Choice on Intention-Behavior Consistency Robert Gillholm, Johan Erdeus and Tommy Gärling Department of Psychology Göteborg University Gillholm, R., Erdeus, J., & Gärling, T. The effect of

More information

GET A CUE ON IS SECURITY TRAINING: EXPLAINING THE DIFFERENCE BETWEEN HOW SECURITY CUES AND SECURITY ARGUMENTS IMPROVE SECURE BEHAVIOR

GET A CUE ON IS SECURITY TRAINING: EXPLAINING THE DIFFERENCE BETWEEN HOW SECURITY CUES AND SECURITY ARGUMENTS IMPROVE SECURE BEHAVIOR GET A CUE ON IS SECURITY TRAINING: EXPLAINING THE DIFFERENCE BETWEEN HOW SECURITY CUES AND SECURITY ARGUMENTS IMPROVE SECURE BEHAVIOR Research-in-Progress Jeffrey L. Jenkins University of Arizona Tucson,

More information

Persuading End Users to Act Cautiously Online: Initial Findings of a Fear Appeals Study on Phishing

Persuading End Users to Act Cautiously Online: Initial Findings of a Fear Appeals Study on Phishing Persuading End Users to Act Cautiously Online: Initial Findings of a Fear Appeals Study on Phishing Abstract J. Jansen 1,2 and P. van Schaik 3 1 Faculty of Humanities and Law, Open University of the Netherlands

More information

Using Behavioral Science: Applying Theory to Practice. New York City Department of Health and Mental Hygiene Program Evaluation Unit December 3, 2002

Using Behavioral Science: Applying Theory to Practice. New York City Department of Health and Mental Hygiene Program Evaluation Unit December 3, 2002 Using Behavioral Science: Applying Theory to Practice New York City Department of Health and Mental Hygiene Program Evaluation Unit December 3, 2002 Our Goals To increase awareness of behavioral science

More information

Mechanisms of Health Behavior Change in Persons With Chronic Illness or Disability: The Health Action Process Approach (HAPA)

Mechanisms of Health Behavior Change in Persons With Chronic Illness or Disability: The Health Action Process Approach (HAPA) Rehabilitation Psychology 2011, Vol. 56, No. 3, 161 170 2011 American Psychological Association 0090-5550/11/$12.00 DOI: 10.1037/a0024509 Mechanisms of Health Behavior Change in Persons With Chronic Illness

More information

Attitudes and Beliefs of Adolescent Experimental Smokers: A Smoking Prevention Perspective

Attitudes and Beliefs of Adolescent Experimental Smokers: A Smoking Prevention Perspective Attitudes and Beliefs of Adolescent Experimental Smokers: A Smoking Prevention Perspective By: Min Qi Wang, Eugene C. Fitzhugh, James M. Eddy, R. Carl Westerfield Wang, M.Q., Fitzhugh, E.C.*, Eddy, J.M.,

More information

Asking and answering research questions. What s it about?

Asking and answering research questions. What s it about? 2 Asking and answering research questions What s it about? (Social Psychology pp. 24 54) Social psychologists strive to reach general conclusions by developing scientific theories about why people behave

More information

Running head: THEORIES AND THEORISTS IN PUBLIC HEALTH RESPONSE T 1

Running head: THEORIES AND THEORISTS IN PUBLIC HEALTH RESPONSE T 1 Running head: THEORIES AND THEORISTS IN PUBLIC HEALTH RESPONSE T 1 Theories and Theorists in Public Health Response to Bioterrorism Patricia Bolivar Walden University Research Theory, Design, and Method

More information

Perceived usefulness. Intention Use E-filing. Attitude. Ease of use Perceived behavioral control. Subjective norm

Perceived usefulness. Intention Use E-filing. Attitude. Ease of use Perceived behavioral control. Subjective norm Project Guidelines Perceived usefulness Attitude Intention Use E-filing Ease of use Perceived behavioral control Subjective norm Introduction Introduction should include support/justification why the research

More information

How Self-Efficacy and Gender Issues Affect Software Adoption and Use

How Self-Efficacy and Gender Issues Affect Software Adoption and Use How Self-Efficacy and Gender Issues Affect Software Adoption and Use Kathleen Hartzel Today s computer software packages have potential to change how business is conducted, but only if organizations recognize

More information

Using the Technology Acceptance Model to assess the impact of decision difficulty on website revisit intentions

Using the Technology Acceptance Model to assess the impact of decision difficulty on website revisit intentions Using the Technology Acceptance Model to assess the impact of decision difficulty on website revisit intentions Introduction Technology enables consumers to undertake everything from relatively simple

More information

ADOPTION AND USE OF A UNIVERSITY REGISTRATION PORTAL BY UNDERGRADUATE STUDENTS OF BAYERO UNIVERSITY, KANO

ADOPTION AND USE OF A UNIVERSITY REGISTRATION PORTAL BY UNDERGRADUATE STUDENTS OF BAYERO UNIVERSITY, KANO Bayero Journal of Pure and Applied Sciences, 9(2): 179-185 Received: June, 2016 Accepted: November, 2016 ISSN 2006 6996 http://dx.doi.org/10.4314/bajopas.v9i2.33 ADOPTION AND USE OF A UNIVERSITY REGISTRATION

More information

Adaptive Aspirations in an American Financial Services Organization: A Field Study

Adaptive Aspirations in an American Financial Services Organization: A Field Study Adaptive Aspirations in an American Financial Services Organization: A Field Study Stephen J. Mezias Department of Management and Organizational Behavior Leonard N. Stern School of Business New York University

More information

Understanding Tourist Environmental Behavior An Application of the Theories on Reasoned Action Approach

Understanding Tourist Environmental Behavior An Application of the Theories on Reasoned Action Approach University of Massachusetts Amherst ScholarWorks@UMass Amherst Tourism Travel and Research Association: Advancing Tourism Research Globally 2012 ttra International Conference Understanding Tourist Environmental

More information

THE THEORY OF PLANNED BEHAVIOR TO DETERMINE THE SOCIAL NETWORK USAGE BEHAVIOR IN SAUDI ARABIA

THE THEORY OF PLANNED BEHAVIOR TO DETERMINE THE SOCIAL NETWORK USAGE BEHAVIOR IN SAUDI ARABIA 0F USING International Journal of Research in Computer Science eissn 2249-8265 Volume 5 Issue 1 (2015) pp. 1-8, A Unit of White Globe Publications THE THEORY OF PLANNED BEHAVIOR TO DETERMINE THE SOCIAL

More information

THE IMPACT OF TRAINING AND SOCIAL NORMS ON INFORMATION SECURITY COMPLIANCE: A PILOT STUDY

THE IMPACT OF TRAINING AND SOCIAL NORMS ON INFORMATION SECURITY COMPLIANCE: A PILOT STUDY THE IMPACT OF TRAINING AND SOCIAL NORMS ON INFORMATION SECURITY COMPLIANCE: A PILOT STUDY Research-in-Progress Mohammad I. Merhi Department of Computer Information Systems & Quantitative Methods College

More information

Issues in Information Systems

Issues in Information Systems ANALYZING THE ROLE OF SOME PERSONAL DETERMINANTS IN WEB 2.0 APPLICATIONS USAGE Adel M. Aladwani, Kuwait University, adel.aladwani@ku.edu.kw ABSTRACT This study examines the personal determinants of Web

More information

From Planning to Prospering: Does coping planning impact the Intention-Behavior Gap for academic behavior through self-efficacy?

From Planning to Prospering: Does coping planning impact the Intention-Behavior Gap for academic behavior through self-efficacy? From Planning to Prospering: Does coping planning impact the Intention-Behavior Gap for academic behavior through self-efficacy? Nadia de Jong University College Utrecht Spring 2015 Abstract Many individuals

More information

Behavioural Insights: Changing Behaviours, Not Minds

Behavioural Insights: Changing Behaviours, Not Minds Behavioural Insights: Changing Behaviours, Not Minds Saturday 17 th October 2015 Dr Tim Chadborn, PHE Behavioural Insights Team Proportion of total population New approach to behaviour change Our key behavioural

More information

Approach/Avoidance Motivation, Message Framing, and Health Behavior: Understanding the Congruency Effect. David K. Sherman

Approach/Avoidance Motivation, Message Framing, and Health Behavior: Understanding the Congruency Effect. David K. Sherman 1 Approach/Avoidance Motivation, Message Framing, and Health Behavior: Understanding the Congruency Effect David K. Sherman University of California, Santa Barbara Traci Mann University of California,

More information

Heavy Smokers', Light Smokers', and Nonsmokers' Beliefs About Cigarette Smoking

Heavy Smokers', Light Smokers', and Nonsmokers' Beliefs About Cigarette Smoking Journal of Applied Psychology 1982, Vol. 67, No. 5, 616-622 Copyright 1982 by the American Psychological Association, Inc. 002I-9010/82/6705-0616S00.75 ', ', and Nonsmokers' Beliefs About Cigarette Smoking

More information

How to enhance the Social Ecological Framework by incorporating Bronfenbrenner s Process, Person, Context and Time Model.

How to enhance the Social Ecological Framework by incorporating Bronfenbrenner s Process, Person, Context and Time Model. How to enhance the Social Ecological Framework by incorporating Bronfenbrenner s Process, Person, Context and Time Model. Introduction. Social marketing is a process designed to improve the welfare of

More information

Changing for Life: Using the Stages of Change to Support the Recovery Process

Changing for Life: Using the Stages of Change to Support the Recovery Process Changing for Life: Using the Stages of Change to Support the Recovery Process Sara S. Johnson, Ph.D. Senior Vice President, Research & Product Development sjohnson@prochange.com Assessing your Readiness.

More information

ACE Personal Trainer Manual, 4 th edition. Chapter 2: Principles of Adherence and Motivation

ACE Personal Trainer Manual, 4 th edition. Chapter 2: Principles of Adherence and Motivation ACE Personal Trainer Manual, 4 th edition Chapter 2: Principles of Adherence and Motivation 1 Learning Objectives Based on Chapter 2 of the ACE Personal Trainer Manual, 4 th ed., this session describes

More information

PLANNING THE RESEARCH PROJECT

PLANNING THE RESEARCH PROJECT Van Der Velde / Guide to Business Research Methods First Proof 6.11.2003 4:53pm page 1 Part I PLANNING THE RESEARCH PROJECT Van Der Velde / Guide to Business Research Methods First Proof 6.11.2003 4:53pm

More information

Journal of Health Psychology

Journal of Health Psychology Journal of Health Psychology http://hpq.sagepub.com Protection Motivation Theory and Stages of Change in Sun Protective Behavior Steven Prentice-Dunn, Ben F. Mcmath and Robert J. Cramer J Health Psychol

More information

Adolescents exposure to Internet-delivered interventions Dr. Rik Crutzen Maastricht University

Adolescents exposure to Internet-delivered interventions Dr. Rik Crutzen Maastricht University + Adolescents exposure to Internet-delivered interventions Dr. Rik Crutzen Maastricht University + Overview Part 1: Use & User Perceptions Crutzen, R., Cyr, D., & De Vries, N.K. (2012). The role of user

More information

Measurement of Constructs in Psychosocial Models of Health Behavior. March 26, 2012 Neil Steers, Ph.D.

Measurement of Constructs in Psychosocial Models of Health Behavior. March 26, 2012 Neil Steers, Ph.D. Measurement of Constructs in Psychosocial Models of Health Behavior March 26, 2012 Neil Steers, Ph.D. Importance of measurement in research testing psychosocial models Issues in measurement of psychosocial

More information

Research on the Transtheoretical Model: Where are we now, where are we going?

Research on the Transtheoretical Model: Where are we now, where are we going? S. Keller & W. F. Velicer (Eds.) Research on the Transtheoretical Model: Where are we now, where are we going? PABST SCIENCE PUBLISHERS Lengerich, Berlin, Bremen, Miami, Riga, Viemheim, Wien, Zagreb Contents

More information

September 14, 2018 James O. Prochaska, Ph.D.

September 14, 2018 James O. Prochaska, Ph.D. More Effective and Inclusive Care by Combining Practices for Individual Patients and Entire Populations September 14, 2018 James O. Prochaska, Ph.D. Director and Professor Cancer Prevention Research Center

More information

The relation of approach/avoidance motivation and message framing to the effectiveness of charitable appeals

The relation of approach/avoidance motivation and message framing to the effectiveness of charitable appeals SOCIAL INFLUENCE 2011, 6 (1), 15 21 The relation of approach/avoidance motivation and message framing to the effectiveness of charitable appeals Esther S. Jeong 1, Yue Shi 1, Anna Baazova 1, Christine

More information

PREDICTING Health Behaviour

PREDICTING Health Behaviour SECOND EDITION PREDICTING Health Behaviour Edited by Mark Conner and Paul Norman PREDICTING HEALTH BEHAVIOUR Second edition PREDICTING HEALTH BEHAVIOUR: RESEARCH AND PRACTICE WITH SOCIAL COGNITION MODELS

More information

Public Attitudes toward Nuclear Power

Public Attitudes toward Nuclear Power Public Attitudes toward Nuclear Power by Harry J. Otway An earlier article (Bulletin Vol. 17, no. 4, August 1975) outlined the research programme of the Joint IAEA/I I ASA Research Project on risk assessment

More information

Responding to negative health events: A test of the Bad News Response Model

Responding to negative health events: A test of the Bad News Response Model Psychology and Health Vol. 24, No. 8, October 2009, 895 907 Responding to negative health events: A test of the Bad News Response Model Kate Sweeny* and James Shepperd Department of Psychology, University

More information

When Attitudes Don't Predict Behavior: A Study of Attitude Strength

When Attitudes Don't Predict Behavior: A Study of Attitude Strength Association for Information Systems AIS Electronic Library (AISeL) AMCIS 2006 Proceedings Americas Conference on Information Systems (AMCIS) December 2006 When Attitudes Don't Predict Behavior: A Study

More information

Approach/Avoidance Motivation, Message Framing, and Health Behavior: Understanding the Congruency Effect

Approach/Avoidance Motivation, Message Framing, and Health Behavior: Understanding the Congruency Effect Motiv Emot (2006) 30:165 169 DOI 10.1007/s11031-006-9001-5 ORIGINAL PAPER Approach/Avoidance Motivation, Message Framing, and Health Behavior: Understanding the Congruency Effect David K. Sherman Traci

More information