2009
DOI: 10.2307/20650279
|View full text |Cite
|
Sign up to set email alerts
|

Avoidance of Information Technology Threats: A Theoretical Perspective

Abstract: JSTOR is a not-for-profit service that helps scholars, researchers, and students discover, use, and build upon a wide range of content in a trusted digital archive. We use information technology and tools to increase productivity and facilitate new forms of scholarship. For more information about JSTOR, please contact support@jstor.org. This content downloaded from 144.82.Abstract This paper describes the development of the technology threat avoidance theory (TTAT), which explains individual IT users ' behavio… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

6
285
1
1

Year Published

2011
2011
2021
2021

Publication Types

Select...
4
4
1

Relationship

0
9

Authors

Journals

citations
Cited by 397 publications
(293 citation statements)
references
References 100 publications
6
285
1
1
Order By: Relevance
“…Drawing on Cybernetic and Coping theories, Liang and Xue (2009) proposed Technology Threat Avoidance Theory to explain users' cyber security motivations in terms of threat perceptions and coping ability. The theory posits that in a given context, an individuals' threat perception is formed based on their views regarding the severity associated with a given cyber threat and their own susceptibility to that threat.…”
Section: Research Model and Hypothesesmentioning
confidence: 99%
“…Drawing on Cybernetic and Coping theories, Liang and Xue (2009) proposed Technology Threat Avoidance Theory to explain users' cyber security motivations in terms of threat perceptions and coping ability. The theory posits that in a given context, an individuals' threat perception is formed based on their views regarding the severity associated with a given cyber threat and their own susceptibility to that threat.…”
Section: Research Model and Hypothesesmentioning
confidence: 99%
“…The results of these studies largely indicated that the same factors that influence an individual's response to health and environmental threats, such as response costs, efficacy, and vulnerability, can influence an individual's response to technology-related threats. Despite the fact that these studies focused primarily on behavioral intentions to adapt one's behavior in the face of security threats (Liang and Xue, 2009;Siponen et al, 2010), no studies have yet linked PMT to the risks associated with making one's personal information publicly available online. We believe that PMT has the potential to help explain the risk assessment and subsequent behavioral changes performed by social networking users.…”
Section: What Factors Influence An Individual To Post Personal Informmentioning
confidence: 99%
“…Additionally, this study provides insight into maladaptive responses, and has analyzed PMT data in a time-ordered sequence that, to our knowledge, has not been explored in IS research and has seldom been explored elsewhere. In a recent discussion about technology threat avoidance, Liang and Xue (2009) noted that a distinction must be made between the avoidance of malicious technology (a maladaptive behavior) and the adoption of safeguarding technology (an adaptive behavior); while the two behaviors may outwardly provide the same protective results, they are motivated by two different appraisals, an "avoidance-approach" mechanism. The current study provides supporting evidence that such a distinction exists, and the appraisal processes that lead to one behavior or the other need to be more fully understood by researchers and managers.…”
Section: Implications Limitations and Future Researchmentioning
confidence: 99%
“…The behaviour-change literature indicates the potential negative effects of risk appeals -they can lead to denial or avoidance [37]. The risk message articulates the threats that face Internet voting.…”
Section: A Study Hypothesesmentioning
confidence: 99%