Adaptive and Maladaptive Coping with an It Threat

Tim Chenoweth, Tom Gattiker, Karen Corral

Research output: Contribution to journalArticlepeer-review

18 Scopus citations

Abstract

Numerous studies have investigated employees’ decisions to adopt IS security measures by focusing on adaptive responses. Using the Extended Parallel Processing model (EPPM), this study evaluates subjects’ adaptive and maladaptive intentions with respect to antispyware software. Our results show that both adaptive and maladaptive coping occur, and we identify antecedents of each. We advance IS security theory by considering maladaptive coping along with adaptive coping and by modeling threat and efficacy as contingent effects.

Original languageAmerican English
Pages (from-to)24-39
Number of pages16
JournalInformation Systems Management
Volume36
Issue number1
DOIs
StatePublished - 2 Jan 2019

Keywords

  • Antispyware
  • extended parallel processing model
  • IT security threat
  • maladaptive coping
  • spyware
  • technology adoption

EGS Disciplines

  • Business
  • Management Information Systems

Fingerprint

Dive into the research topics of 'Adaptive and Maladaptive Coping with an It Threat'. Together they form a unique fingerprint.

Cite this