Protection motivation theory

Protection motivation theory (PMT) was originally created to help understand individual human responses to fear appeals. Protection motivation theory proposes that people protect themselves based on two factors: threat appraisal and coping appraisal. Threat appraisal assesses the severity of the situation and examines how serious the situation is, while coping appraisal is how one responds to the situation. Threat appraisal consists of the perceived severity of a threatening event and the perceived probability of the occurrence, or vulnerability. Coping appraisal consists of perceived response efficacy, or an individual's expectation that carrying out the recommended action will remove the threat, and perceived self efficacy, or the belief in one's ability to execute the recommended courses of action successfully.[1][2]

PMT is one model that explains why people engage in unhealthy practices and offers suggestions for changing those behaviors. Primary prevention involves taking measures to combat the risk of developing a health problem[3] (e.g., controlling weight to prevent high blood pressure). Secondary prevention involves taking steps to prevent a condition from becoming worse[4] (e.g., remembering to take daily medication to control blood pressure).

Another psychological model that describes self-preservation and processing of fear is terror management theory.

History

Protection motivation theory was developed by R.W. Rogers in 1975 in order to better understand fear appeals and how people cope with them.[1] However, Dr. Rogers would later expand on the theory in 1983 to a more general theory of persuasive communication. The theory was originally based on the work of Richard Lazarus, who researched how people behave and cope during stressful situations. In his book, Stress, Appraisal, and Coping, Richard Lazarus discusses the idea of the cognitive appraisal processes and how they relate to coping with stress. He states that people "differ in their sensitivity and vulnerability to certain types of events, as well as in their interpretations and reactions".[5] While Richard Lazarus came up with many of the fundamental ideas used in the protection motivation theory, Rogers was the first to apply the terminology when discussing fear appeals. In modern times, the protection motivation theory is mainly used when discussing health issues and how people react when diagnosed with health related illnesses.

Theory

Threat-appraisal process

The threat appraisal process consists of both the severity and vulnerability of the situation. It focuses on the source of the threat and factors that increase or decrease likelihood of maladaptive behaviours.[6] Severity refers to the degree of harm from the unhealthy behavior. Vulnerability is the probability that one will experience harm. Another aspect of the threat appraisal is rewards. Rewards refer to the positive aspects of starting or continuing the unhealthy behavior. To calculate the amount of threat experienced take the combination of both the severity and vulnerability, and then subtract the rewards. Threat appraisal refers to children's evaluation of the degree to which an event has significant implications for their well-being. Theoretically, threat appraisal is related to Lazaraus' concept of primary appraisal, particularly to the way in which the event threatens the child's commitments, goals, or values. Threat appraisal is differentiated from the evaluation of stressfulness or impact of the event in that is assesses what is threatened, rather than simply the degree of stress or negativity of an event. Threat appraisal is also differentiated from negative cognitive styles, because it assesses children's reported negative appraisals for specific events in their lives rather than their typical style of responding to stressful events. Theoretically, higher threat appraisals should lead to negative arousal and coping and to increased psychological symptomatology.

Coping-appraisal process

The coping appraisal consists of the response efficacy, self-efficacy, and the response costs. Response efficacy is the effectiveness of the recommended behavior in removing or preventing possible harm. Self-efficacy is the belief that one can successfully enact the recommended behavior. The response costs are the costs associated with the recommended behavior. The amount of coping ability that one experiences is the combination of response efficacy and self-efficacy, minus the response costs. The coping appraisal process focuses on the adaptive responses and one's ability to cope with and avert the threat. The coping appraisal is the sum of the appraisals of the responses efficacy and self-efficacy, minus any physical or psychological "costs" of adopting the recommended preventive response. Coping Appraisal involves the individual's assessment of the response efficacy of the recommended behavior (i.e. perceived effectiveness of sunscreen in preventing premature aging) as well as one's perceived self-efficacy in carrying out the recommended actions.[7] (i.e. confidence that one can use sunscreen consistently).

The Threat and coping appraisal variables combine in a fairly straightforward way, although the relative emphasis may vary from topic to topic and with target population.

In Stress, Appraisal, and Coping, Richard Lazarus states that, "studies of coping suggest that different styles of coping are related to specific health outcomes; control of anger, for example, has been implicated in hypertension. Three routes through which coping can affect health include the frequency, intensity, duration, and patterning of neurochemical stress reactions; using injurious substances or carrying out activities that put the person at risk; and impeding adaptive health/illness-related behavior.".[8]

Response efficacy

Response efficacy concerns beliefs that adopting a particular behavioral response will be effective in reducing the diseases' threat, and self-efficacy is the belief that one can successfully perform the coping response.[9] In line with the traditional way of measuring the consequences of behavior, response efficacy was operationalized by linking consequences to the recommended behavior as well as to whether the subject regarded the consequences as likely outcomes of the recommended behavior.[10] Among the 6 factors (vulnerability, severity, rewards, response efficacy, self-efficacy, and response costs), self-efficacy is the most correlated with protection motivation, according to meta-analysis studies.[11][12]

Cognitive process of protection motivation theory developed by Ronald W. Rogers in 1983

Applications

Measures

Each influential factor is generally measured by asking questions through a survey. For example, Boer (2005) studied on intention of condom use to prevent from getting AIDS guided by protection motivation theory. The study asked the following questions to individuals: "If I do not use condoms, I will run a high risk of getting HIV/AIDS." for vulnerability, "If I became infected with HIV or get AIDS, I would suffer from all kind of ailments." for severity, "Using condoms will protect me against becoming infected with HIV." for response efficacy, and "I am able to talk about safe sex with my boyfriend/girlfriend."[13]

Applied research areas

Protection motivation theory conventionally has been applied in the personal health contexts. A meta-analysis study on protection motivation theory categorized major six topics: cancer prevention (17%), exercise/diet/healthy lifestyle (17%), smoking (9%), AIDS prevention (9%), alcohol consumption (8%), and adherence to medical-treatment regimens (6%).[11] As the minority topics, the study presented prevention of nuclear war, wearing bicycle helmets, driving safety, child-abuse prevention, reducing caffeine consumption, seeking treatment for sexually transmitted diseases, inoculation against influenza, saving endangered species, improving dental hygiene, home radon testing, osteoporosis prevention, marijuana use, seeking emergency help via 911, pain management during and recovery after dental surgery, and safe use of pesticides.[11] All these topics were directly or indirectly related to personal physical health.

Aside from personal physical health research, the application of protection motivation theory has extended to other areas. Namely, researchers focusing on information security have applied protection motivation theory to their studies since the end of the 2000s. The general idea here has been to use threats or information security policies to encourage protection security behaviors in the workplace[14][15][16][17][18][19][20] and at home.[21] Accordingly, a more recent security application of protection motivation theory by Boss et al. (2015), returned to use of the full nomology and measurement of fear in an organizational security context with two studies. A process-variance model of protection motivation theory was strongly supported in this context, as depicted in Figure 1.[22]

See also

References

  1. ^ a b Rogers, R. W. (1975). "A protection motivation theory of fear appeals and attitude change". Journal of Psychology. 91 (1): 93–114. doi:10.1080/00223980.1975.9915803. PMID 28136248.
  2. ^ Rogers, R.W. (1983). Cognitive and physiological processes in fear appeals and attitude change: A Revised theory of protection motivation. In J. Cacioppo & R. Petty (Eds.), Social Psychophysiology. New York: Guilford Press.
  3. ^ Pechmann, C; Goldberg, M; Reibling, E (2003). "What to convey in antismoking advertisements for adolescents: The use of protection motivation theory to identify effective message themes". Journal of Marketing. 67 (2): 1–18. doi:10.1509/jmkg.67.2.1.18607.
  4. ^ Maddux, J.E.; Rogers, R. W. (1983). "Protection motivation theory and self-efficacy: A revised theory of fear appeals and attitude change". Journal of Experimental Social Psychology. 19 (5): 469–479. doi:10.1016/0022-1031(83)90023-9.
  5. ^ Monat, A, & Lazarus, R (1991). Stress and coping: an anthology .New York: Columbia University Press .
  6. ^ Plotnikoff, Ronald C.; Trinh, Linda (1 April 2010). "Protection Motivation Theory". Exercise and Sport Sciences Reviews. 38 (2): 91–98. doi:10.1097/JES.0b013e3181d49612. PMID 20335741.
  7. ^ Prentice-Dunn, S, Mcmath, B, & Cramer, R (2009). Protection motivation theory and stages of change in sun protective behavior. Journal of Health Psychology , 14.
  8. ^ Lazarus, R, & Folkman, S (1984). Stress, apprasisal, and coping.New York: Springer Publishing Company, Inc. .
  9. ^ Van der velde, F.W.; van der Plight, J. (1991). "AIDS-related health behavior: Coping, protection, motivation, and previous behavior" (PDF). Journal of Behavioral Medicine. 14 (5): 429–451. doi:10.1007/bf00845103. PMID 1744908.
  10. ^ Lwin, M, & Saw, S (2007). Protecting children from myopia: A PMT perspective for improving health marketing communications. Journal of Health Communication, 12.
  11. ^ a b c Floyd, D. L.; Prentice; Dunn, S.; Rogers, R. W. (2000). "A meta‐analysis of research on protection motivation theory". Journal of Applied Social Psychology. 30 (2): 407–429. doi:10.1111/j.1559-1816.2000.tb02323.x.
  12. ^ Milne, S.; Sheeran, P.; Orbell, S. (2000). "Prediction and intervention in health‐related behavior: A meta‐analytic review of protection motivation theory". Journal of Applied Social Psychology. 30 (1): 106–143. doi:10.1111/j.1559-1816.2000.tb02308.x.
  13. ^ Boer, H.; Mashamba, M. T. (2005). "Psychosocial correlates of HIV protection motivation among black adolescents in Venda, South Africa". AIDS Education and Prevention. 17 (6): 590–602. doi:10.1521/aeap.2005.17.6.590. PMID 16398579.
  14. ^ Herath, T.; Rao, H. R. (2009). "Protection motivation and deterrence: a framework for security policy compliance in organisations". European Journal of Information Systems. 18 (2): 106–125. doi:10.1057/ejis.2009.6.
  15. ^ Ifinedo, P (2012). "Understanding information systems security policy compliance: An integration of the theory of planned behavior and the protection motivation theory". Computers & Security. 31 (1): 83–95. doi:10.1016/j.cose.2011.10.007.
  16. ^ Johnston, A. C.; Warkentin, M. (2010). "Fear appeals and information security behaviors: an empirical study". MIS Quarterly. 34 (3): 549–566. doi:10.2307/25750691. JSTOR 25750691.
  17. ^ Lee, D.; Larose, R.; Rifon, N. (2008). "Keeping our network safe: a model of online protection behaviour". Behaviour & Information Technology. 27 (5): 445–454. doi:10.1080/01449290600879344.
  18. ^ Clay Posey, Tom L. Roberts, and Paul Benjamin Lowry (2015). "The impact of organizational commitment on insiders’ motivation to protect organizational information assets," Journal of Management Information Systems (JMIS) (forthcoming, accepted 06-Aug-2015).
  19. ^ Jenkins, Jeffrey L.; Grimes, Mark; Proudfoot, Jeff; Benjamin Lowry, Paul (2014). "Improving password cybersecurity through inexpensive and minimally invasive means: Detecting and deterring password reuse through keystroke-dynamics monitoring and just-in-time warnings". Information Technology for Development. 20 (2): 196–213. doi:10.1080/02681102.2013.814040.
  20. ^ Clay Posey, Tom L. Roberts, Paul Benjamin Lowry, James Courtney, and Rebecca J. Bennett (2011). "Motivating the insider to protect organizational information assets: Evidence from protection motivation theory and rival explanations," Proceedings of the Dewald Roode Workshop in Information Systems Security 2011, IFIP WG 8.11 / 11.13, Blacksburg, VA, September 22–23, pp. 1–51.
  21. ^ Nehme, Alaa; George, Joey F. (2022). "Approaching IT Security & Avoiding Threats in the Smart Home Context" (PDF). Journal of Management Information Systems. 39 (4): 1184–1214. doi:10.1080/07421222.2022.2127449.
  22. ^ Boss, Scott R.; Galletta, Dennis F.; Benjamin Lowry, Paul; Moody, Gregory D.; Polak, Peter (2015). "What do users have to fear? Using fear appeals to engender threats and fear that motivate protective behaviors in users". MIS Quarterly. 39 (4): 837–864. doi:10.25300/MISQ/2015/39.4.5. SSRN 2607190.

Read other articles:

Penyuntingan Artikel oleh pengguna baru atau anonim untuk saat ini tidak diizinkan.Lihat kebijakan pelindungan dan log pelindungan untuk informasi selengkapnya. Jika Anda tidak dapat menyunting Artikel ini dan Anda ingin melakukannya, Anda dapat memohon permintaan penyuntingan, diskusikan perubahan yang ingin dilakukan di halaman pembicaraan, memohon untuk melepaskan pelindungan, masuk, atau buatlah sebuah akun. Yandex N.V.Kantor utama Yandex di MoskwaNama asliЯндексJenisPerseroan terba...

 

 

Artikel ini memiliki beberapa masalah. Tolong bantu memperbaikinya atau diskusikan masalah-masalah ini di halaman pembicaraannya. (Pelajari bagaimana dan kapan saat yang tepat untuk menghapus templat pesan ini) Gaya atau nada penulisan artikel ini tidak mengikuti gaya dan nada penulisan ensiklopedis yang diberlakukan di Wikipedia. Bantulah memperbaikinya berdasarkan panduan penulisan artikel. (Pelajari cara dan kapan saatnya untuk menghapus pesan templat ini) Artikel biografi ini ditulis meny...

 

 

Fourth season of the AMC crime drama television series Season of television series Better Call SaulSeason 4Home media cover artStarring Bob Odenkirk Jonathan Banks Rhea Seehorn Patrick Fabian Michael Mando Giancarlo Esposito No. of episodes10ReleaseOriginal networkAMCOriginal releaseAugust 6 (2018-08-06) –October 8, 2018 (2018-10-08)Season chronology← PreviousSeason 3Next →Season 5List of episodes The fourth season of the American television drama series Better...

Silvio Rodríguez Nazionalità Cuba GenereNueva trova cubana Periodo di attività musicale1967 – in attività Strumentochitarra Sito ufficiale Modifica dati su Wikidata · Manuale Silvio Rodríguez Domínguez (San Antonio de los Baños, 29 novembre 1946) è un musicista cubano. Biografia Nato in un paese nei pressi dell'Avana, in una zona dove l'attività principale era la coltivazione di tabacco, Silvio crebbe in una famiglia di agricoltori. Suo nonno era un co...

 

 

Shanta Kumar Ketua Menteri Himachal PradeshMasa jabatan22 Juni 1977 – 14 Februari 1980PendahuluThakur Ram LalPenggantiThakur Ram LalMasa jabatan5 Maret 1990 – 15 Desember 1992PendahuluVirbhadra SinghPenggantiVirbhadra SinghMenteri Urusan Konsumen, Pangan dan Distribusi PublikMasa jabatan13 Okt. 1999 – 30 Juni 2002Menteri Pengembangan PedesaanMasa jabatan1 Juli 2002 – 6 April 2003 Informasi pribadiLahir12 September 1934 (umur 89)Garhjamula, Kang...

 

 

Victoria Newman Personnage de fiction apparaissant dansLes Feux de l'amour. Amelia Heinle, interprète de Victoria Newman en 2014. Alias Victoria Nicole Newman (nom de naissance) Sexe Féminin Activité PDG de Newman Entreprises Membre du Conseil d'Administration de Newman Entreprises Famille Parents : Victor Newman (père) Nikki Newman (mère) Fratrie : Nicholas Newman (frère) Adam Newman (demi-frère par Victor) Abby Newman (demi-sœur par Victor) John Abbott III † (demi-frèr...

温贝托·德·阿连卡尔·卡斯特洛·布兰科Humberto de Alencar Castelo Branco第26任巴西總統任期1964年4月15日—1967年3月15日副总统若澤·馬利亞·奥克明前任拉涅里·馬齐利继任阿图尔·达科斯塔·伊·席尔瓦 个人资料出生(1897-09-20)1897年9月20日 巴西塞阿腊州福塔雷萨逝世1967年7月18日(1967歲—07—18)(69歲) 巴西塞阿腊州梅塞雅納墓地 巴西福塔雷薩卡斯特洛·布兰科陵寢[1]...

 

 

لينداو    شعار الاسم الرسمي (بالألمانية: Lindau)‏    الإحداثيات 47°32′45″N 9°41′02″E / 47.545833333333°N 9.6838888888889°E / 47.545833333333; 9.6838888888889   [1] تقسيم إداري  البلد ألمانيا (1871–)[2][3]  خصائص جغرافية  المساحة 33.06 كيلومتر مربع (31 ديسمبر 2017)[4]  ارتفا�...

 

 

豪栄道 豪太郎 場所入りする豪栄道基礎情報四股名 澤井 豪太郎→豪栄道 豪太郎本名 澤井 豪太郎愛称 ゴウタロウ、豪ちゃん、GAD[1][2]生年月日 (1986-04-06) 1986年4月6日(38歳)出身 大阪府寝屋川市身長 183cm体重 160kgBMI 47.26所属部屋 境川部屋得意技 右四つ・出し投げ・切り返し・外掛け・首投げ・右下手投げ成績現在の番付 引退最高位 東大関生涯戦歴 696勝493敗...

2010s American professional wrestling TV series Lucha Libre USAAlso known asLucha Libre USA: Masked WarriorsStarringLucha Libre USA rosterCountry of originUnited StatesNo. of seasons2No. of episodes20 + 1 special (list of episodes)ProductionProducersSteven Ship, Louis Silverstein, and Alex AbrahantesCamera setupMulticamera setupRunning time42 minutesProduction companyLucha Libre USAOriginal releaseNetworkMTV2 (2010–2011)Hulu (2012)[1]ReleaseJuly 16, 2010 (2010-07-16) –Oc...

 

 

Speaker's stand in a church For other uses, see Pulpit (disambiguation). This article needs additional citations for verification. Please help improve this article by adding citations to reliable sources. Unsourced material may be challenged and removed.Find sources: Pulpit – news · newspapers · books · scholar · JSTOR (September 2010) (Learn how and when to remove this message) The pulpit of the Notre-Dame de Revel in Revel, Haute-Garonne, France Pulp...

 

 

  لمعانٍ أخرى، طالع قسطنطين الثاني (توضيح). قسطنطين الثاني معلومات شخصية الميلاد 7 نوفمبر 630 [1][2]  القسطنطينية  الوفاة 15 سبتمبر 668 (37 سنة) [1]  سرقوسة  سبب الوفاة إعدام غرقا  مواطنة الإمبراطورية البيزنطية  الزوجة فاوستا الأولاد قسطنطين الرابعهر�...

  لمعانٍ أخرى، طالع زينب (توضيح). زينب زينب  ملصق الفيلم الصنف دراما، رومانسي تاريخ الصدور 1 مايو 1952 مدة العرض 120 دقيقة البلد  المملكة المصرية اللغة الأصلية العربية الطاقم المخرج محمد كريم الإنتاج نحّاس فيلم قصة محمد حسين هيكل سيناريو وحوار محمد كريمعبد الوارث عسر ...

 

 

Другие фильмы с таким же или схожим названием: см. Крик (фильм). Крик азерб. Fəryadазерб. Fəryad Жанры военный фильм, драма Режиссёр Джейхун Мирзоев Авторсценария Вагиф Мустафаев В главныхролях Джейхун МирзоевГаджи ИсмаиловМелик Дадашев Оператор Кенан Азиз Композитор Джав�...

 

 

American cybersecurity researcher and hacker Cris ThomasNationalityAmericanOther namesSpace RogueAlma materUniversity of Massachusetts Lowell, Boston UniversityOccupation(s)Cyber Security Researcher, White hat hacker, AuthorYears active25Known forWhacked Mac Archives, Hacker News Network (HNN), CyberSquirrel1 (CS1), Cyber Security Cris Thomas (also known as Space Rogue) is an American cybersecurity researcher, white hat hacker, and award winning[1][2] best ...

1939 film by Busby Berkeley This article is about the 1939 film. For other uses, see The Fast and the Furious (disambiguation).Not to be confused with Fast & Furious (2009 film). Fast and FuriousTheatrical release posterDirected byBusby BerkeleyJohn E. Burch (assistant)Written byHarry KurnitzProduced byFrederick StephaniStarringFranchot ToneAnn SothernCinematographyRay JuneEdited byElmo VeronMusic byDaniele AmfitheatrofConstantin BakaleinikoffDistributed byMetro-Goldwyn-MayerRelease date ...

 

 

Mountain in Snowdonia, North Wales Cribin FawrCribin Fawr from Maesglase, with Craig Portas to the leftHighest pointElevation659 m (2,162 ft)Prominence93 m (305 ft)ListingHewitt, Nuttall, sub-HuMPCoordinates52°43′20″N 3°47′08″W / 52.7221°N 3.7855°W / 52.7221; -3.7855NamingLanguage of nameWelshGeographyLocationSnowdonia, WalesParent rangeCadair IdrisOS gridSH817150Topo mapOS Explorer OL23 Cribin Fawr is a mountain in Snowdonia, North...

 

 

Sporting event delegationKazakhstan at the1994 Asian GamesIOC codeKAZNOCNational Olympic Committee of the Republic of Kazakhstanin HiroshimaMedalsRanked 4th Gold 27 Silver 25 Bronze 27 Total 79 Asian Games appearances (overview)19941998200220062010201420182022 Kazakhstan participated in the 1994 Asian Games from October 2 to October 16, 1994 in Hiroshima, Japan, which was the country's first appearance at the Asian Games since gaining independence.[1][2] References ^ Past Asia...

Olaf MarschallMarschall nel 2005Nazionalità Germania Est Germania (dal 1990) Altezza186 cm Peso75 kg Calcio RuoloAttaccante Termine carriera2002 CarrieraGiovanili BSG Chemie Torgau Squadre di club1 1983-1990 Lokomotive Lipsia135 (43)1990-1993 Admira/Wacker99 (40)1993-1994 Dinamo Dresda32 (11)1994-2002 Kaiserslautern160 (59)2002 Al-Ittihad Doha? (?) Nazionale 1984-1989 Germania Est4 (0)1994-1999 Germania13 (3) Carriera da allenatore 2006-2007 Al-NasrAss...

 

 

Controlled detonation of nuclear weapons for scientific or political purposes The mushroom cloud from the Castle Bravo thermonuclear weapon test in 1954, the largest nuclear weapons test ever conducted by the United States Nuclear weapons Background Nuclear explosion History Warfare Design Testing Delivery Yield Effects Workers Ethics Arsenals Target selection Arms race Blackmail Espionage Proliferation Disarmament Terrorism Opposition Winter Nuclear-armed states NPT recognizedUnited States R...