Masterarbeit, 2018
131 Seiten, Note: 1,3
1. Introduction
2. Theoretical Background
2.1 Privacy
2.2 Privacy Concerns – Actual Matters
2.3 Collection of Information – General Overview
2.4 Security Threats and Human Errors
2.5 Password Behavior of End Users
2.6 Fear Appeals
2.7 Development of Fear Appeal Theories and Models
2.8 Protection Motivation Theory
2.8.1 Design of the Protection Motivation Theory
2.8.2 Sources of Information
2.8.3 Cognitive Mediating Process
2.8.3.1 Threat Appraisal
2.8.3.2 Fear
2.8.3.3 Coping Appraisal
2.8.4 Coping Modes
2.9 Research done so far
3. Research Model
4. Research Method
4.1 Research Design
4.2 Development of a Measurement Scale
4.3 Questionnaire Design
4.4 Website “Have I been Pwned“
4.5 Survey: Fear-Appeal Manipulation
4.6 Data Collection
4.7 Participants
5. Results
5.1 Measurement Validity
5.2 Data Analysis
5.3 Group Results
6. Discussion
6.1 Theoretical Implications
6.2 Practical Implications
6.3 Limitations and Critical Review of Research
7. Conclusion
The primary research objective is to examine whether fear appeals, specifically the notification of potential personal data breaches, influence the protection motivation and subsequent behavior of end users online. The central research question explores whether individuals are more likely to reconsider their security habits when confronted with empirical evidence of their personal data being compromised.
2.6 Fear Appeals
Fear appeals are persuasive messages designed to scare people by describing the terrible things that will happen to them if they do not do what the message recommends.
- Kim Witte (Johnston and Warkentin 2010, p.551)
In order to motivate individuals to behave in an adaptive way, fear appeals have been used for many years in convincing messages. These are not only used in research of information security, but derive much more from the research of the field of health awareness and health communication (Roskos‐Ewoldsen et al. 2004). They are persuasive messages designed to alarm people of potential threats by declaring the terrifying consequences of not acting in accordance with the message. The main goal of fear appeals is to create transformation through persuasiveness (Johnston and Warkentin 2010; Mwagwabi et al. 2018b). The importance of fear in fear arousing communication was already known as early as in 1992 when Witte published her work "Putting the fear back into fear appeals" in the same year (Han n.d.). The necessary elements of a fear appeal include the individual susceptibility to threats, assessments of the severity of threats, efficacy in terms of a suggested reaction and the individual's capacity to respond as recommended. A correctly designed fear appeal not only serves to provide information about the existence of a threat, but also to communicate the severity of the danger and the vulnerability of the affected target. Concluding, the main components of a fear appeal are: fear, threat and effectiveness (Johnston and Warkentin 2010; Witte 1992).
1. Introduction: Outlines the rising online privacy concerns and defines the research question regarding the impact of data breach information on user behavior.
2. Theoretical Background: Provides the foundation on privacy concepts, security threats, password behavior, and the Protection Motivation Theory.
3. Research Model: Defines the hypotheses based on PMT dimensions like threat appraisal and coping appraisal to measure the effect of fear appeals.
4. Research Method: Describes the quantitative survey design, the use of the 'Have I Been Pwned' website, and the data collection process.
5. Results: Presents the statistical validation of the survey data and the regression analysis results for the two participant groups.
6. Discussion: Interprets the empirical findings, contrasts them with existing literature, and derives theoretical and practical implications.
7. Conclusion: Summarizes the thesis findings and confirms that while the model was partially supported, the research objectives were met.
Information Security, Privacy, Data Breach, Protection Motivation Theory, Fear Appeals, Threat Appraisal, Coping Appraisal, Online Security, Password Behavior, Quantitative Research, User Behavior, Data Protection, Cyber Security, Risk Perception, Security Compliance
The thesis investigates how information about personal data leaks, used as a 'fear appeal', impacts an individual's motivation to adopt safer online security behaviors.
The work integrates privacy theory, human-computer interaction, and psychological models of fear-based persuasion to analyze user security compliance.
The study seeks to answer whether people reconsider and change their online security behavior when informed that their personal credentials (e.g., email, passwords) are accessible to third parties.
The author uses a quantitative, exploratory research design involving an online survey, a manipulation group (exposed to breach data) and a control group, analyzed through multiple linear regression.
The main sections cover the evolution of privacy, the role of human error in security breaches, the mechanisms of the Protection Motivation Theory, and an empirical analysis of user survey responses.
The core characteristics are encapsulated by terms such as Information Security, Protection Motivation Theory, Fear Appeals, and Data Protection.
Participants were asked to check their email on the 'Have I Been Pwned' website; those who found a leak were categorized as being exposed to a fear appeal, while those who did not served as the control group.
While the study validated specific relationships like 'threat severity on fear' and 'fear on protection motivation', the complete PMT model showed mixed results, suggesting the intensity of the fear appeal may have been a limiting factor.
Der GRIN Verlag hat sich seit 1998 auf die Veröffentlichung akademischer eBooks und Bücher spezialisiert. Der GRIN Verlag steht damit als erstes Unternehmen für User Generated Quality Content. Die Verlagsseiten GRIN.com, Hausarbeiten.de und Diplomarbeiten24 bieten für Hochschullehrer, Absolventen und Studenten die ideale Plattform, wissenschaftliche Texte wie Hausarbeiten, Referate, Bachelorarbeiten, Masterarbeiten, Diplomarbeiten, Dissertationen und wissenschaftliche Aufsätze einem breiten Publikum zu präsentieren.
Kostenfreie Veröffentlichung: Hausarbeit, Bachelorarbeit, Diplomarbeit, Dissertation, Masterarbeit, Interpretation oder Referat jetzt veröffentlichen!

