Using the ARCS model to improve undergraduates’ perceived information security protection motivation and behavior
Tsai C.-Y.; Shih W.-L.; Hsieh F.-P.; Chen Y.-A.; Lin C.-L.; Wu H.-J.
2022
Computers and Education
6
10.1016/j.compedu.2022.104449
The ARCS (attention, relevance, confidence, and satisfaction) model was used to design an information security (InfoSec) course, and its effects on students' perceived InfoSec protection motivation and their InfoSec behavior were explored. A quasi-experimental design was adopted in this research. The participants were 147 undergraduates who took liberal arts courses in a university in southern Taiwan. There were 68 students in the experimental group and 79 in the control group. The specific teaching strategies of the ARCS model based on the Protection Motivation Theory were used to explore students' learning outcomes. The results of the study revealed that after attending the course that applied the ARCS model, the experimental group students outperformed their counterparts in terms of perceived InfoSec protection motivation (perceived severity, vulnerability, response efficacy, self-efficacy, and response costs). Meanwhile, the experimental group students’ self-report frequencies of problematic InfoSec behavior were lower than those of the control group students. These findings imply that InfoSec education using the ARCS model in the liberal arts education courses of universities has potential. © 2022 Elsevier Ltd
Information literacy; Pedagogical issues; Teaching/learning strategies
Ahmad A., Maynard S., Teaching information security management: Reflections and experiences, Information Management & Computer Security, 22, 5, pp. 513-536, (2014); Ameen N., Tarhini A., Shah M.H., Madichie N., Paul J., Choudrie J., Keeping customers' data secure: A cross-cultural study of cybersecurity compliance among the gen-mobile workforce, Computers in Human Behavior, 114, (2020); Anderson C.L., Agarwal R., Practicing safe computing: A multimethod empirical examination of home computer user security behavioral intentions, MIS Quarterly, 34, 3, pp. 613-644, (2010); Anwar M., He W., Ash I., Yuan X., Li L., Xu L., Gender difference and employees' cybersecurity behaviors, Computers in Human Behavior, 69, pp. 437-443, (2017); Asiksoy G., Ozdaml F., Flipped classroom adapted to the ARCS model of motivation and applied to a physics course, Eurasia Journal of Mathematics, Science and Technology Education, 12, 6, pp. 1589-1603, (2016); van Bavel R., Rodriguez-Priego N., Vila J., Briggs P., Using Protection Motivation Theory in the design of nudges to improve online security behavior, International Journal of Human-Computer Studies, 123, pp. 29-39, (2019); Boehmer J., LaRose R., Rifon N., Alhabash S., Cotten S., Determinants of online safety behaviour: Towards an intervention strategy for college students, Behaviour & Information Technology, 34, 10, pp. 1022-1035, (2015); Chai S., Bagchi-Sen S., Morrell C., Rao H.R., Upadhyaya S.J., Internet and online information privacy: An exploratory study of preteens and early teens, IEEE Transactions on Professional Communications, 52, 2, pp. 167-182, (2009); ChanLin L.J., Applying motivational analysis in a Web-based course, Innovations in Education & Teaching International, 46, 1, pp. 91-103, (2009); Chen Y.T., Shih W.L., Lee C.H., Wu P.L., Tsai C.Y., Relationships among undergraduates’ problematic information security behavior, compulsive internet use, and mindful awareness in Taiwan, Computers & Education, 164, (2021); Chou H.-L., Chou C., An analysis of multiple factors relating to teachers' problematic information security behavior, Computers in Human Behavior, 65, pp. 334-345, (2016); Chou H.-L., Sun C.-Y.J., The moderating roles of gender and social norms on the relationship between protection motivation and risky online behavior among in-service teachers, Computers & Education, 112, pp. 83-96, (2017); Cohen J., Statistical power analysis for the behavioral sciences, (1988); Deci E.L., Ryan R.M., The empirical exploration of intrinsic motivational processes, Advances in experimental social psychology, pp. 39-80, (1980); Doane A.N., Boothe L.G., Pearson M.R., Kelley M.L., Risky electronic communication behaviors and cyberbullying victimization: An application of Protection Motivation Theory, Computers in Human Behavior, 60, pp. 508-513, (2016); Feng S.L., Tuan H.L., Using ARCS model to promote 11th graders' motivation and achievement in learning about acids and bases, International Journal of Science and Mathematics Education, 3, 3, pp. 463-484, (2005); Glendon A.I., Walker B.L., Can anti-speeding messages based on Protection Motivation Theory influence reported speeding intentions?, Accident Analysis & Prevention, 57, pp. 67-79, (2013); Glesne C., Becoming qualitative researchers: An introduction, (1992); Hadlington L., Human factors in cybersecurity; examining the link between Internet addiction, impulsivity, attitudes towards cybersecurity, and risky cybersecurity behaviours, Heliyon, 3, 7, (2017); Hadlington L., Popovac M., Janicke H., Yevseyeva I., Jones K., Exploring the role of work identity and work locus of control in information security awareness, Computers in Human Behavior, 94, pp. 154-175, (2019); Hanus B., Wu Y.A., Impact of users' security awareness on desktop security behavior: A protection motivation theory perspective, Information Systems Management, 33, 1, pp. 2-16, (2016); Hartwell E.E., Cole K., Donovan S.K., Greene R.L., Storms S.L.B., Williams T., Breaking down silos: Teaching for equity, diversity, and inclusion across disciplines, Humboldt Journal of Social Relations, 39, pp. 143-162, (2017); Herath T., Rao H.R., Protection motivation and deterrence: A framework for security policy compliance in organisations, European Journal of Information Systems, 18, 2, pp. 106-125, (2009); Hodges C.B., Kim C., Improving college students' attitudes toward mathematics, TechTrends, 57, 4, pp. 59-66, (2013); Jensen M.L., Dinger M., Wright R.T., Thatcher J.B., Training to mitigate phishing attacks using mindfulness techniques, Journal of Management Information Systems, 34, 2, pp. 597-626, (2017); Johnston A.C., Warkentin M., Fear appeals and information security behaviors: An empirical study, MIS Quarterly, 34, 3, pp. 549-566, (2010); Keller J.M., Motivational design of instruction, Instructional design theories and models: An overview of their current status, pp. 384-434, (1983); Keller J.M., The systematic process of motivational design, Performance & Instruction, 26, 9, pp. 1-8, (1987); Keller J.M., Motivational design for learning and performance: The ARCS model approach, (2010); Li K., Keller J.M., Use of the ARCS model in education: A literature review, Computers & Education, 122, pp. 54-62, (2018); Lu L., A research on college students' motivation of promoting the information literacy based on ARCS model, US-China Foreign Language, 18, 3, pp. 75-81, (2020); Maddux J.E., Rogers R.W., Protection motivation and self-efficacy: A revised theory of fear appeals and attitude change, Journal of Experimental Social Psychology, 19, 5, pp. 469-479, (1983); McCormac A., Zwaans T., Parsons K., Cali D., Butavicius M., Pattinson M., Individual differences and information security awareness, Computers in Human Behavior, 69, pp. 151-156, (2017); Menard P., Bott G.J., Crossler R.E., User motivations in protecting information security: Protection motivation theory versus self-determination theory, Journal of Management Information Systems, 34, 4, pp. 1203-1230, (2017); Milne S., Sheeran P., Orbell S., Prediction and intervention in health-related behavior: A meta-analytic review of protection motivation theory, Journal of Applied Social Psychology, 30, 1, pp. 106-143, (2000); Musuva P.M.W., Getao K.W., Chepken C.K., A new approach to modelling the effects of cognitive processing and threat detection on phishing susceptibility, Computers in Human Behavior, 94, pp. 154-175, (2019); Parsons K., McCormac A., Butavicius M., Pattinson M., Jerram C., Determining employee awareness using the human aspects of information security questionnaire (HAIS-Q), Computers & Security, 42, pp. 165-176, (2014); Rogers R.W., Cognitive and physiological processes in fear appeals and attitude change: A revised theory of protection motivation, Social psychophysiology: A sourcebook, (1983); Safa N.S., Sookhak M., Solms R.V., Furnell S., Ghani N.A., Herawan T., Information security conscious care behaviour formation in organizations, Computers & Security, 53, pp. 65-78, (2015); Schaffer D.R., Debb S.M., Validation of the online security behaviors and beliefs questionnaire with college students in the United States, Cyberpsychology, Behavior, and Social Networking, 22, 12, pp. 766-770, (2019); Tsai H.Y.S., Jiang M., Alhabash S., LaRose R., Rifon N.J., Cotten S.R., Understanding online safety behaviors: A protection motivation theory perspective, Computers & Security, 59, pp. 138-150, (2016); Turel Y.K., Sanal S.O., The effects of an ARCS based e-book on student's achievement, motivation and anxiety, Computers & Education, 127, pp. 130-140, (2018); Vance A., Siponen M., Pahnila S., Motivating IS security compliance: Insights from habit and protection motivation theory, Information & Management, 49, 3, pp. 190-198, (2012); Verkijika S.F., Understanding smartphone security behaviors: An extension of the Protection Motivation Theory with anticipated regret, Computers & Security, 77, pp. 860-870, (2018); Whitty M., Doodson J., Creese S., Hodges D., Individual differences in cyber security behaviors: An examination of who is sharing passwords, Cyberpsychology, Behavior, and Social Networking, 18, 1, pp. 3-7, (2015); Wu D., Empirical study of knowledge withholding in cyberspace: Integrating Protection Motivation Theory and theory of reasoned behavior, Computers in Human Behavior, 105, (2019); Yan Y., Jacques-Tiura A.J., Chen X., Xie N., Chen J., Yang N., Gong J., MacDonell K.K., Application of the Protection Motivation Theory in predicting cigarette smoking among adolescents in China, Addictive Behaviors, 39, 1, pp. 181-188, (2014); Yoon C., Hwang J.-W., Kim R., Exploring factors that influence students' behaviors in information security, Journal of Information Systems Education, 23, 4, (2012)
Elsevier Ltd
Article
Scopus