Sunteți pe pagina 1din 41

RESEARCH ARTICLE

WHAT USERS DO BESIDES PROBLEM-FOCUSED COPING


WHEN FACING IT SECURITY THREATS: AN EMOTION-
FOCUSED COPING PERSPECTIVE1
Huigang Liang and Yajiong Xue
College of Business, East Carolina University,
Greenville, NC 27858 U.S.A. {huigang.liang@gmail.com} {xuey@ecu.edu}

Alain Pinsonneault
Desautels Faculty of Management, McGill University, 1001 Sherbrooke Street West,
Montréal, QC CANADA H3A 1G5 {alain.pinsonneault@mcgill.ca}

Yu “Andy” Wu
College of Business, University of North Texas,
Denton, TX 76203 U.S.A. {andy.wu@unt.edu}

This paper investigates how individuals cope with IT security threats by taking into account both problem-
focused and emotion-focused coping. While problem-focused coping (PFC) has been extensively studied in the
IT security literature, little is known about emotion-focused coping (EFC). We propose that individuals employ
both PFC and EFC to volitionally cope with IT security threats, and conceptually classify EFC into two cate-
gories: inward and outward. Our research model is tested by two studies: an experiment with 140 individuals
and a survey of 934 respondents. Our results indicate that both inward EFC and outward EFC are stimulated
by perceived threat, but that only inward EFC is reduced by perceived avoidability. Interestingly, inward EFC
and outward EFC are found to have opposite effects on PFC. While inward EFC impedes PFC, outward EFC
facilitates PFC. By integrating both EFC and PFC in a single model, we provide a more complete under-
standing of individual behavior under IT security threats. Moreover, by theorizing two categories of EFC and
showing their opposing effects on users’ security behaviors, we further examine the paradoxical relationship
between EFC and PFC, thus making an important contribution to IT security research and practice.

Keywords: Emotion focused coping, emotional support seeking, venting, denial, psychological distancing,
wishful thinking, IT security

Introduction 1 become pervasive. Security breaches often have serious


negative impacts on both individuals and organizations,
As information technology (IT) becomes ubiquitous and including financial, reputational, and privacy losses (Liang
indispensable to modern societies, IT security breaches also and Xue 2010). The current global cybersecurity cost is esti-
mated to be as high as $575 billion (Symantec 2016). Even
worse, cybercriminals continuously invent new ways to cir-
1
Sean Xu was the accepting senior editor for this paper. Yulin Fang served cumvent security safeguards and new derivatives of malware
as he associate editor. that cannot be screened or removed by the latest security
The appendices for this paper are located in the “Online Supplements”
software constantly emerge (Cisco 2016; Symantec 2016).
section of MIS Quarterly’s website (https://misq.org). Many high-profile security breaches incessantly ring alarms

DOI: 10.25300/MISQ/2019/14360 MIS Quarterly Vol. 43 No. 2, pp. 373-394/June 2019 373
Liang et al./An Emotion-Focused Coping Perspective

to remind us the gravity of IT security breaches (Duke 2014; information security behavioral change impinges on a sound
Hu 2014). The most recent mega breaches, which affected understanding of how users react to security threats (ISF
437 million MySpace passwords (Franceschi-Bicchierai 2016) 2014). With the knowledge of EFC, more targeted behavioral
and over one billion Yahoo accounts (Whittaker 2016), interventions can be developed to improve individuals’
resoundingly indicate that nobody is safe in this digital age. security behavior to create a safer IT environment. Without
taking EFC into account, it will be extremely difficult, if not
To reduce IT security risks, it is imperative to understand how impossible, to explain why individuals take or fail to take
individuals volitionally cope with IT security threats. Coping protective actions and resources could be wasted on ineffec-
theory (Lazarus and Folkman 1984) suggests that individuals tive interventions.
engage in two mechanisms when facing threats: problem-
focused coping (PFC) and emotion-focused coping (EFC). Although research on individuals’ IT security behaviors has
Individuals’ protection behavior scrutinized by prior IT secu- made great progress, there are several opportunities to further
rity research is essentially a type of PFC (Boss et al. 2015; Lai advance this field. First, the current literature on individuals’
et al. 2012). EFC is another important response to IT security volitional security behaviors has focused only on the analy-
threats, but it has never received proportionate attention since tical reasoning process that motivates individuals to take
it was introduced into the IT security research arena by Liang protective actions against security threats.2 The majority of
and Xue (2009). EFC regulates negative emotions caused by these studies (Anderson and Agarwal 2010; Johnston and
different types of threats and influences personal behaviors Warkentin 2010) use the protection motivation theory as their
and decisions (Lazarus 1991). While traditional wisdom theoretical foundation. Others (Lee and Kozar 2005; Ng et al.
emphasizes the importance of reasoning in evaluating risks, 2009) adopt the health belief model or the theory of planned
recent research demonstrates that intuitive feelings and heu- behavior. A summary of past studies on volitional IT security
ristics based on affects and emotions also play a salient role behaviors (see Appendix A) reveals that the common theme
in risk evaluations in general (Slovic et al. 2004) and in the IT of this literature is that individuals take a PFC approach to
security context in particular (Kim et al. 2016; Willison and cope with threats through the adoption of protective measures
Warkentin 2013). EFC provides a theory-based means to as a result of cognitive reasoning or cost–benefit analysis no
capture this irrational part of human behavior. The IT secu- matter which theory is applied. While significant insights
rity practitioner community has noticed that users often have been gained from the cognitive models, emotions have
behave emotionally beyond reasoning when facing IT security been largely ignored in studies of behavioral reactions to
threats. For example, most security attacks exploit old security threats until recently (Boss et al. 2015; Johnston and
methods and tricks well known to the public, but users take no Warkentin 2010; Liang and Xue 2009, 2010). IT security
protective actions even if they are aware of the danger (Pone- threats can give rise to an array of emotions. For example, a
mon Institute 2017). This suggests that reasoning and rational report reveals that cybercrimes can arouse strong emotions
thinking have limited explanatory power and implies the such as anger and annoyance (Symantec 2010). Emotions and
functioning of emotion-related heuristic mechanisms. The different emotion-based defense mechanisms play a powerful
limits of reasoning also appear at the organizational level. A and central role in our IT-related lives (Zhang 2013). They
report shows that 64% of organizational IT professionals are influence human beliefs and attitudes, guide cognitive
concerned about the risk of using mobile apps, but only 32% thinking, and often drive decision-making and actions
of them think it is urgent to secure mobile apps (Murphy (Lazarus and Folkman 1984; Lerner et al. 2007; Lerner and
2016). These observations from the field suggest that indi- Keltner 2000). If users rely too much on EFC, they may
viduals’ security behavior is also influenced by factors outside develop biased perceptions to mistakenly neglect IT security
the rational domain and likely related to EFC. In line with threats and end up not taking necessary protective measures
these observations, IT security researchers have increasingly (Liang and Xue 2009). Second, this literature has mixed
realized the importance of emotions and suggested that emo- findings regarding how the major antecedents influence PFC.
tions play an important role in influencing security behaviors The effects of response efficacy, self-efficacy, and perceived
(Kim et al. 2016; Willison and Warkentin 2013). For ex- costs are highly inconsistent across studies, varying from
ample, it is empirically demonstrated that fear as an emotion significant to insignificant, or positive to negative (e.g., Boss
can be aroused by malware threats and significantly enhance et al. 2015; Johnston and Warkentin 2010; Liang and Xue
users’ intention to use anti-malware software (Boss et al.
2015). Thus, the consideration of EFC could greatly enrich
our understanding of how individuals cope with IT security 2
Although protection motivation theory does not assume decision makers to
threats in the volitional context. The current security aware- be rational, it means to suggest that human beings are prone to biases and can
ness and training programs are seen as ineffective, failing to only be boundedly rational (Rogers 1983). The theory is still based on indi-
improve users’ security behaviors (ISF 2014). Successful viduals’ cognitive reasoning of threat and coping and does not explicitly
explain why people can be irrational.

374 MIS Quarterly Vol. 43 No. 2/June 2019


Liang et al./An Emotion-Focused Coping Perspective

2010). It is possible that the missing variable, EFC, has theory and practice. It suggests that when motivating users to
contributed to such inconsistency. Finally, the theorization of take security behaviors, fear appeals cannot be overly empha-
EFC is not thorough and clear. Liang and Xue (2009) theo- sized because perceived threat, despite its positive effect on
retically imply (without empirical verification) that EFC tends PFC, can indirectly reduce PFC by activating inward EFC. It
to produce negative effects on users’ security behavior. How- also suggests that security education programs should include
ever, the coping literature suggests that the effect of EFC content on EFC to help users understand what types of EFC
could be either positive or negative, depending on the context are beneficial and what types of EFC are detrimental. Such an
(Folkman et al. 1986a). It remains unclear what outcomes understanding is essential to increase users’ tendency to per-
EFC will produce in the IT security context. Hence, a com- form PFC actions so that they are protected from IT security
plete understanding of individuals’ security behavior cannot threats.
be obtained unless their emotion-based response, or EFC, is
taken into consideration.

To address the limitations of the current IT security literature, Theoretical Foundation: Key
this paper draws on coping theory that considers both cog- Elements of Coping
nitions and emotions to focus on users’ emotional reactions to
IT security threats, thus providing a more comprehensive Coping theory, widely accepted by psychology researchers,
understanding of users’ security behaviors. EFC provides a explains how people cope with stressful situations. Stress is
complementary angle from which we can observe drivers of “a relationship between the person and the environment that
behaviors that are invisible from a problem-focused perspec- is appraised by the person as relevant to his or her well-being
tive. We contend that EFC plays a critical role in shaping and in which the person’s resources are taxed or exceeded”
individuals’ reactions to security threats. Some recent studies (Folkman and Lazarus 1985, p. 152). A stressful situation in
treat IT security behaviors as acts of coping (Lai et al. 2012; essence represents a disturbed person–environment relation-
Lee and Larsen 2009; Liang and Xue 2010), but they focus ship and people can implement a number of coping mech-
only on PFC, failing to take EFC into account or empirically anisms to deal with it (Folkman and Lazarus 1985). The
study it (Liang and Xue 2009). In this paper, we propose that coping process consists of two stages: cognitive appraisal and
individuals take not only problem-focused approaches to coping. During the cognitive appraisal, individuals determine
handle a security threat, but also emotion-focused approaches whether the stressful situation impacts their well-being, and
to restore emotional balance disrupted by the threat. More- if so, how (Folkman et al. 1986a). It can be further divided
over, we contend that EFC can both facilitate PFC by into primary appraisal, in which individuals assess what may
retaining a balanced emotional state (Beaudry and Pinson- be at stake in the encounter, and secondary appraisal, in
neault 2010; Liang and Xue 2009) and impede PFC by which individuals determine what can be done to prevent or
producing distractions or biases (Rippetoe and Rogers 1987; reduce harm or improve benefits (Carver and Scheier 1994;
Scheier et al. 1986). We also reconcile this paradox by Carver et al. 1989; Folkman and Lazarus 1985; Folkman et al.
showing that the opposite effects are generated by two dif- 1986b). The appraisals form the basis of coping, defined as
ferent types of EFC. Two studies, an experiment and a field a person’s “cognitive and behavioral efforts to manage
survey, provide strong support to our hypotheses. (reduce, minimize, master, or tolerate) the internal and exter-
nal demands of the person-environment transaction that is
This paper makes three contributions to IS research. First, we appraised as taxing or exceeding the person’s resources”
provide a more complete and encompassing model of how (Folkman et al. 1986b, p. 572).
individuals react to IT security threats by taking both PFC and
EFC into account, thus offering an in-depth understanding of There exist two main types of coping: PFC and EFC. PFC
the complex and multifaceted IT security behavior. Second, refers to a function-oriented approach to identify and work on
we develop a theoretical categorization of EFC consisting of the cause of stress (Carver et al. 1989; Folkman and Lazarus
inward and outward EFC. This categorization helps to illu- 1985). In contrast, EFC refers to the approach people take to
minate the underlying mechanisms of different types of EFC pacify or control the emotions aroused by the stressful situa-
and is instrumental to future IT security research. Third, we tion or to dismiss the emotional discomforts (Carver et al.
contribute to technology threat avoidance theory (Liang and 1989; Folkman and Lazarus 1985). EFC does not address the
Xue 2009) and coping research by addressing the murky issue problem at hand; rather, it deals with the feelings and percep-
of how EFC is related to PFC. We do this by empirically tions associated with the stressful situation. Individuals can
demonstrating that inward EFC is negatively associated with rely on either or both coping approaches, and the particular
PFC while outward EFC is positively associated with PFC. mix of the two gives rise to various outcomes. Coping
This study has important implications for both IT security research not only acknowledges the coexistence of PFC and

MIS Quarterly Vol. 43 No. 2/June 2019 375


Liang et al./An Emotion-Focused Coping Perspective

EFC, but also implies that EFC can influence PFC. Lazarus know how EFC influences PFC in the IT security context.
and Folkman (1984) point out that individuals undertake EFC Yet, to date there is no systematic explanation of the para-
strategies before PFC strategies in a temporal sequence. They doxical effects of EFC on PFC. The IT security literature has
find that EFC can either facilitate or impede PFC (Folkman mainly focused on PFC and has provided limited knowledge
and Lazarus 1985; Lazarus and Folkman 1984). On the one about EFC. Further, the relationship between EFC and PFC
hand, EFC facilitates PFC possibly because EFC allows has not been empirically examined. The technology threat
individuals to restore emotional stability and to manage emo- avoidance theory (TTAT) posits that PFC and EFC can both
tions that would otherwise interfere with PFC (Lazarus and be applied to counter IT security threats at the theoretical
Folkman 1984). On the other hand, EFC can impede PFC level (Liang and Xue 2009), but it has not explored how the
because once emotional stability has been restored, the incen- two relate to each other. In this paper, we develop a classifi-
tives to perform PFC can diminish (Folkman and Lazarus cation for EFC so that we can better understand the relation-
1985; Scheier et al. 1986). In another word, EFC can reduce ship between EFC and PFC in the context of IT security
the saliency of a threat and therefore the impetus to take threats.
protective actions might not be as salient.

Two Types of Emotion Focused Coping


Research Model: A Coping Model Although the coping literature has identified a number of EFC
of IT Security Threats strategies and these strategies are found to be associated with
different outcomes (Carver et al. 1989; Folkman et al. 1986a),
Because coping theory examines how individuals cope with coping researchers have not attempted to theoretically cate-
personal threats, it offers a strong theoretical foundation for gorize different EFC constructs. In an effort to provide a
studying how individuals react to IT security threats. The two clearer understanding of the relationship between EFC and
types of coping mechanisms (EFC and PFC) are highly rele- PFC in an IT security context, we draw on the emotion regu-
vant in the context of IT security threats (Liang and Xue lation research (Gross 1998; Gross and Thompson 2007) to
2009). EFC includes efforts to regulate emotions, especially develop a categorization of EFC strategies. Because EFC is
in stressful situations like those involving IT security threats.3 conceptually similar to emotion regulation, using the latter to
Harmful IT artifacts and events can trigger loss emotions such extend coping research is theoretically justifiable. Both
as anger, disappointment, and frustration and deterrent coping researchers and emotion regulation researchers agree
emotions such as anxiety, fear, and distress (Beaudry and Pin- that EFC is essentially an emotion regulation endeavor (Folk-
sonneault 2010). These emotions can be either instrumental man and Moskowitz 2004; Gross 1999; Lazarus 1991).
or harmful, depending on whether they occur at the right time Folkman and Moskowitz (2004) state that EFC falls under the
and the right intensity level and on how individuals cope with rubric of emotion regulation. Gross (1999) admits that the
the situation (Beaudry and Pinsonneault 2010; Gross and emotion regulation research originated from coping research
Thompson 2007; Lazarus 1991). Intense emotions, especially and “it was EFC, in particular, that laid the groundwork for
intense negative emotions, are often dysfunctional and disrupt the study of emotion regulation” (p. 555). Coping researchers
rational decision processes (Austenfeld and Stanton 2004; acknowledge that “the work on emotion regulation adds to the
Beaudry and Pinsonneault 2010). By employing EFC strate- coping literature by providing an in-depth look at the effects
gies, users can placate negative emotions to reach a more of some forms of emotion-focused types of coping” (Folkman
balanced emotional state where rational decision making is and Moskowitz 2004, p. 763). Therefore, it is legitimate to
not interrupted (Beaudry and Pinsonneault 2010; Liang and draw upon the emotion regulation research to develop EFC
Xue 2009). Consequently, EFC will facilitate PFC. On the categorization.
other hand, when individuals perform EFC to mitigate nega-
tive emotions, they can develop false perception of the threat Gross (1998) posits that strategies to regulate emotions can be
or be distracted from PFC efforts (Rippetoe and Rogers 1987; classified into two categories, antecedent-focused and
Scheier et al. 1986). As a result, EFC impedes PFC. Given response-focused, based on the four elements of the emotion-
the possible mixed effects of EFC on PFC, it is important to generating process: situation, attention, appraisal, and
response. For emotions to be activated, a situation (e.g., oc-
currence of an event) that has particular meaning to a person
3
Depending on the severity of damage, IT security threats may cause different compels attention and gives rise to a coordinated multisystem
levels of stress among users. Users are inclined to cope with the threats not (cognitive, behavioral, and physiological) response to the
only when the stress is high, but also when the stress is low. This is sup-
situation (Gross and Thompson 2007). Antecedent-focused
ported by prior research showing that both major life events and daily minor
stressors lead to coping behaviors (Cicognani 2011; Pillow et al. 1996). strategies are concerned with the three antecedents of emotion

376 MIS Quarterly Vol. 43 No. 2/June 2019


Liang et al./An Emotion-Focused Coping Perspective

(situation, attention, and appraisal), whereas response-focused inward EFC strategies include psychological distancing,
strategies deal with the emotional response (Gross 1998; denial, and wishful thinking, and outward EFC strategies
Gross and Thompson 2007). To adapt this logic into EFC include venting out emotions and emotional support seeking.
categorization, we use attention, appraisal, and response as In the “Method” section, we will explain how we identify
the basis for categorization. We decide to leave out situation specific EFC strategies.
because emotion regulation strategies intended to change
situations can be confused with PFC given that both involve
actions to objectively modify the source causing stressful Model and Hypothesis Development
emotions. Specifically, in the IT security context, the threat
of security breaches can create a psychologically stressful To fully understand users’ IT security behaviors by con-
situation that draws users’ attention, and after an appraisal of sidering both EFC and PFC, we develop a research model
valence and value relevance of the situation, users will based on prior coping and IS research (Beaudry and Pinson-
produce emotional responses. Following the logic inspired by neault 2005; Liang and Xue 2009; Rippetoe and Rogers
the emotion regulation categorization, we propose that EFC 1987). As Figure 1 shows, each major coping component is
in the IT security context can be classified as inward EFC represented in the model: perceived threat represents the
(derived from antecedent-focused strategies) and outward primary appraisal, perceived avoidability represents the
EFC (derived from response-focused strategies). secondary appraisal, inward and outward EFC represent EFC,
and PFC behavior represents PFC. In threatening situations,
Inward EFC involves approaches internal to the self and one way to judge whether a coping approach is functional (or
unobservable to others. Similar to antecedent-focused emo- adaptive) is whether it can mitigate the threat (Rippetoe and
tion regulation, it tries to stop negative emotions before they Rogers 1987). When facing an IT security threat, PFC is
are generated (Gross and Thompson 2007). It achieves this considered the functional approach because without such
goal by applying attentional deployment and cognitive behaviors the threat will not dissolve automatically and
change.4 Attentional deployment refers to users’ directing possibly cause serious losses. Therefore, PFC behavior is
their attention away from IT security threats such as identity identified as the key dependent variable. Specifically, PFC
theft and loss of privacy. Users can choose to focus on a less behavior is defined as the extent to which users apply appro-
dreadful aspect of the IT security threat or distract themselves priate protective measures to counter IT threats. It reflects the
from the entire situation. Cognitive change refers to altering extent to which users actually act against the IT threat. The
how users appraise the IT security threat so that its emotional impact of EFC strategies is embodied by their effects on PFC
significance is changed. Users can reappraise the threat from behavior.
a different perspective so that the value relevance of the threat
is different or they can simply distort their appraisal of the
threat (Folkman et al. 1986a; Gross and Thompson 2007). In Antecedents of EFC
contrast, outward EFC refers to individuals’ direct adjustment
of emotional responses or outcome of the emotion-generating A person’s selection of EFC mechanisms is influenced by
process. It is applied after negative emotions are generated, various factors. Although individual differences such as age,
which is outward and observable to others. It involves com- gender, and personality traits can influence the coping process
municative strategies to regulate physiological and experi- (Carver et al. 1993; McCrae and Costa 1986; Scheier et al.
ential aspects of emotions so that the negative impact of the 1986), decades of research reveals that the selection of coping
emotions is alleviated. Based on the coping and IS literature mechanisms is contextual; that is, the selection is shaped by
(Beaudry and Pinsonneault 2010; Carver et al. 1989; Folkman the characteristics of the stressor and a person’s appraisal of
et al. 1986a; Liang and Xue 2009), in the IT security context, the situation and the available resources in the encounter
(Carver et al. 1989; Folkman et al. 1986a). Drawing on
4
Inward EFC and antecedent-based emotion regulation are not exactly the TTAT (Liang and Xue 2009), we propose that in the context
same. The latter incudes not only attentional deployment and cognitive of IT security, EFC is determined by two constructs:
change, but also situation selection and situation modification (Gross 1998). perceived threat and perceived avoidability.
We exclude situation selection and situation modification from inward EFC
due to the following concerns: (1) situation selection is not applicable in the
IT security context because nobody can choose a situation where no IT secu-
Perceived threat is defined as the extent to which an individ-
rity threats exist; and (2) situation modification is essentially PFC (i.e., ual perceives a particular IT event or artifact as dangerous or
protective behavior). For example, a user installed a spam filter to stop spam harmful (Liang and Xue 2010). The perception of IT security
emails. From the emotion regulation perspective, it is an antecedent-based threats creates a stressful situation where individuals are
strategy to prevent negative emotions caused by spam. From the coping per- concerned that they might become victims of IT threats and
spective, it is simply a PFC to counter spam. Since this research takes the
coping perspective, we do not consider it as part of inward EFC. tend to experience emotional disturbance (Liang and Xue

MIS Quarterly Vol. 43 No. 2/June 2019 377


Liang et al./An Emotion-Focused Coping Perspective

Figure 1. Research Model

2009). A prominent characteristic of IT security threats, By the same token, individuals could spontaneously apply
which sets them aside from other types of threats, is that they inward EFC to alleviate the negative emotions induced by IT
are ubiquitous and nondiscriminatory. Anybody could be af- security threats so that their emotional balance can be main-
fected anytime, anywhere. Hence, users not only perform tained. Inward EFC interferes with users’ appraisal process
PFC to counter the threat, but also employ EFC to mitigate in two ways. One is to direct attention away from the situa-
their emotional uneasiness and restore emotional stability tion, so that the threat perception is diluted. The other is to
(Beaudry and Pinsonneault 2005; Liang and Xue 2009). alter the perceptions produced by the appraisal process, so
Coping research suggests that individuals under threat experi- that the altered perceptions, usually distorted and biased, lead
ence psychological stress and use various EFC strategies to to a more desirable prospect. As a result of applying inward
maintain their psychological well-being (Carver and Scheier EFC, users will feel less stressed and retain their emotional
1982). Perceived threat triggers both inward and outward balance. Therefore, we propose that users will likely employ
EFC through different working mechanisms, and both types inward EFC to cope with IT security threats.
of EFC can regulate the emotional responses to IT security
threats. H1a: Perceived threat will be positively asso-
ciated with inward EFC.
First, the IT security threat induces negative emotions such as
fear, worry, and anxiety because users anticipate the threat
Individuals facing threatening situations can also rely on
might result in significant losses (Beaudry and Pinsonneault
outward EFC, cognitive strategies oriented toward handling
2010). For example, Boss et al. (2015) show that IT security
the emotions directly (Loewenstein 2007). Here, the stra-
threats can lead to a strong feeling of fear. These emotions
tegies are not oriented toward inhibition and prevention of the
make users doubt their competence to maintain the basic need
emotions before their activation (i.e., inward EFC), but rather
for personal safety (Maslow 1943), giving rise to emotional
they aim at expressing feelings to others (McCrae 1984) and
imbalance. It is common for human beings to spontaneously
performing emotional discharge (Moos and Billings 1982)
apply defense mechanisms to psychologically manipulate,
deny, or distort reality to protect their feelings of being safe through actions such as venting (letting off steam; Bushman
(Freud 1894). A variety of defense mechanisms can be uti- et al. 2001) and looking for sympathy, moral support, advice
lized to protect their safety perceptions such as blocking new and encouragement from colleagues, friends, and family
information related to that event (Scherer and Tran 2001), (Bagozzi et al. 1999; Carver et al. 1989; Yi and Baumgartner
psychological distancing and directing attention away from 2004). Individuals rely on social support to get assistance and
the stressor (Yi and Baumgartner 2004), mental disengage- get help in making sense of situations fraught with risk and
ment, escaping, denial, avoidance (Carver et al. 1989; Yi and uncertainty (Stets and Tsushima 2001). These response-
Baumgartner 2004), and wishful thinking (Fugate et al. 2002). focused strategies, often referred to as collective coping
Through these defense mechanisms, individuals manage to (Lazarus 1999), help to cognitively transform or reappraise
satisfy their basic need for feeling safe. situations and restore emotional stability (Loewenstein 2007).

378 MIS Quarterly Vol. 43 No. 2/June 2019


Liang et al./An Emotion-Focused Coping Perspective

Similarly, IS coping research (e.g., Beaudry and Pinsonneault likely to employ inward EFC to cope with security threats
2010) suggests that in the context of IT security threat, users when perceived avoidability is higher.
could regulate negative emotions directly by seeking emo-
tional support from their social networks and/or venting their H2a: Perceived avoidability will be negatively
emotions onto others. This is because negative emotions put associated with inward EFC.
users in a disturbed emotional state, which is an unpleasant
experience for them. Given that it is human nature to ap- Moreover, when users have a high level of avoidability per-
proach pleasure and avoid pain, users are motivated to ception, they are confident that they can apply the protective
circumvent the displeasure of emotional disturbance and try measures that are effective and affordable, which helps to
to restore emotional stability (Liang and Xue 2009). The ensure a feeling of safety and prevent emotional imbalance
outward EFC strategies help users release pressure and stay (Beaudry and Pinsonneault 2005; Liang and Xue 2009). As
mentally balanced. Therefore, we propose that when a result, users are unlikely to experience strong negative emo-
threatened by IT security problems users will likely employ tions, and will not employ outward EFC because there are no
outward EFC. negative emotions to be regulated. For example, for a user
who stores confidential data on her computer, if she uses a
H1b: Perceived threat will be positively asso- special encryption method to encrypt the data and runs a fire-
ciated with outward EFC. wall to screen all attempts to access her computer and she
believes that these two measures would effectively protect the
Perceived avoidability refers to users’ assessment of the data, she would not have emotional strain over the thought
likelihood they will be able to avoid the IT security threat that her data might be stolen and used for illegal purposes and
facing them by using available safeguarding measures, taking consequently she has no need to perform outward EFC. In
into account the safeguards’ effectiveness and costs as well as contrast, when the level of avoidability perception is low,
the users’ self-efficacy (Liang and Xue 2009).5 The avoid- users feel that they have little control over the threat. Strong
ability perception reflects how much control users think they negative emotions such as fear, stress, and frustration are
have over the security threat. A sense of being in control likely to emerge, leading to emotional imbalance. Due to the
helps users feel secure and stabilizes their emotional state. unpleasantness of emotional imbalance, users naturally desire
On the contrary, a sense of lacking control makes users feel to evade it and need outward EFC strategies to channel these
insecure and disturbs their emotional state. It has been shown emotions to regain emotional balance. This logic is supported
that in a threatening IT situation, users are unlikely to use by the psychology literature which shows that individuals
EFC when they perceive strong control over the situation with self-efficacy are less likely to experience emotional
(Beaudry and Pinsonneault 2010). When users feel that the strain than those with self-doubts (Bandura 1997). Thus,
security threat is avoidable, they do not anticipate severe when perceived avoidability is higher, users are less likely to
losses and therefore it is unnecessary for them to modify employ outward EFC to cope with security threats.
cognitive appraisals of the situation. The avoidability percep-
tion is related to the users’ confidence that they have adequate H2b: Perceived avoidability will be negatively
safeguarding resources and self-competence to fend off associated with outward EFC.
security threats and stay safe. If external threats cannot
endanger their basic need for safety, users will not be urged
to start psychological defense mechanisms to distort or deny Impact of EFC
reality. For instance, an online banking user who frequently
changes passwords, updates antivirus and antispyware soft- Liang and Xue (2009) suggest that EFC is both competitive
ware, and installs security patches for her operating system and complementary to PFC. They argue that EFC competes
will have a strong sense of control and not feel stressed by against PFC because when users take more EFC they are less
losing identity in online transactions. She would not perform likely to take PFC, and EFC complements PFC because when
inward EFC since she does not predict to have a stirred users take EFC to achieve emotional balance they can more
emotional state. Therefore, we propose that users are less rationally analyze the situation and engage in PFC. Inte-
grating this notion and our categorization of EFC, we further
5 explicate that it is inward EFC that competes against PFC and
Perceived avoidability is a composite construct that includes response effi-
cacy, response cost, and self-efficacy. It cannot be represented by a single it is outward EFC that complements PFC.
dimension. For example, a higher level of self-efficacy does not necessary
lead to high perceived avoidability. Consider a user who is very confident Inward EFC can be dysfunctional and lead to mal-adaptation
that she can use the security software installed on her computer (high self- (Billings and Moos 1984) because it impedes adaptive pro-
efficacy). If she does not believe that the security software is sufficient to
cesses and hinders resolution of problems (Folkman et al.
stop identity theft (low response efficacy), she would still think that identity
theft is unavoidable (low perceived avoidability). 1986a). Folkman and Lazarus (1985) long ago noticed that

MIS Quarterly Vol. 43 No. 2/June 2019 379


Liang et al./An Emotion-Focused Coping Perspective

“some forms of emotion-focused coping…impede problem- to eliminate the threat based on a more objective assessment
focused coping” (p. 168). In the IT security context, inward of the situation. Second, by definition, users are stressed
EFC can negatively influence users’ security behaviors because they feel that their resources are exceeded by the
because it subjectively manipulates users’ attention and cog- external demand of dealing with security threats (Folkman
nitive evaluations of the threat (Beaudry and Pinsonneault and Lazarus 1985). By seeking emotional support, users are
2005; Liang and Xue 2009). For example, inward EFC can reassured that their stress is a natural reaction to threats and
direct users’ attention away from the IT threat, leading users they are capable of actively protecting themselves (Carver et
to ignore the issue altogether and neglect the existence of the al. 1989). Users’ social networks can also enhance their
danger. It can also be used to create an unrealistic illusion confidence and empower them to implement coping behaviors
that a miracle will resolve the security problem, or to deny the (Beaudry and Pinsonneault 2010). With confidence and
consequences of the IT threat. As a result, users are not encouragement, users will be more motivated to take security
motivated to take PFC behaviors because they do not pay actions to counter the threat. Although the purpose of emo-
sufficient attention to the situation or they do not think it is tional support seeking is to regulate negative emotions, it
necessary for them to react. Little research has investigated sometimes alters the perception of threat after emotional
inward EFC’s effects in the IT security area. Outside the IT balance is regained. Different from the way inward EFC
security area, one study finds that psychological distancing is strategies distort threat perceptions, emotional support seeking
maladaptive and has a negative influence on IT use (Beaudry helps users develop a more realistic threat perception (e.g.,
and Pinsonneault 2010). Despite scarcity of empirical evi- discussing with others puts things in perspective) as the basis
dence in IS, the theoretical meanings of inward EFC and for rational decision making (Taylor 2011). Hence, emotional
studies in psychology (e.g., Billings and Moos 1984; Folkman support is unlikely to impede rational problem resolution
et al. 1986a) suggest that users will have a low likelihood to (Fugate et al. 2002; McCrae 1984), and tends to enable users
take security actions when they engage in inward EFC. to effectively address the issues they are facing.

H3: Inward EFC will be negatively associated with Another major outward EFC strategy, venting, is a typical
PFC behavior. form of expressing and disclosing negative emotions. Strong
evidence in coping research shows that emotional expression
Outward EFC regulates emotions directly. Although it shares has the adaptive benefits of improving both psychological and
with inward EFC the goal of restoring emotional stability, it physical health (Austenfeld and Stanton 2004; McCrae and
differs from inward EFC in terms of how this goal is Costa 1986). It is well known that negative emotions can
achieved. Inward EFC protects emotional stability by interfere with people’s decision making by distorting their
ignoring or distorting perceptions of the security threat and perceptions and judgments (Johnson and Tversky 1983).
consequently prevents the emergence of negative emotions. Therefore, venting negative emotions can potentially facilitate
In contrast, outward EFC is not intended to, although it could, rational decision making under IT security threats. Prior
alter perceptions of the threat. It regulates the emotions after research shows that emotional venting can lead to positive
they are induced by the threat to regain emotional stability. outcomes such as personal relationship maintenance (Wen-
Therefore, outward EFC helps to reduce stress without sacri- dorf and Yang 2015) and problem resolution (Stickney and
ficing objectivity in evaluating the situation. There is strong Geddes 2014). In contrast, suppression of emotions is found
evidence that stress can interfere with rational decision to associate with problem deterioration (Stickney and Geddes
making and lead to deficient behaviors (Dias-Ferreira et al. 2014) and lower psychological wellbeing (Gross and John
2009), which suggests that outward EFC could help to pro- 2003). Therefore, we contend that in the context of IT secu-
mote rational behaviors by reducing stress. Next, we explain rity, after venting negative emotions, users will be able to
how two typical outward EFC strategies, emotional support calm down and focus on how to use PFC strategies to address
seeking and venting, influence users’ PFC behavior. the IT threats.6 Since both emotional support seeking and

A great number of studies have found a positive effect of


emotional support on individuals’ psychological well being 6
Some research in psychology suggests that venting could intensify rather
and adaptive behaviors (Taylor 2011). Based on the litera- than reduce anger (Bushman 2002). That research stream is confined to
ture, we propose that emotional support seeking influences anger only and not conclusive. Recent research suggests that the failure of
venting is probably due to mistaken venting methods and if done correctly,
users in the IT security context in at least two ways. First, venting ought to mitigate anger (Scheff 2015). In addition, anger is a loss
when supporters provide emotional support to the users, they emotion which usually occurs after a security breach already caused harm to
empathize with, legitimize, and explore the users’ feelings the user. Our research is focused on IT security threats, which are potentially
and help the users understand why the security threat causes harmful, but do not necessarily turn into real harm. In this context, deterrence
their stress. This communicative process alleviates the users’ emotions are usually induced, such as fear, worry, distress, and anxiety
(Beaudry and Pinsonneaut, 2005). Hence, anger is unlikely to be a salient
stressful emotions and assists them to focus on taking actions emotion.

380 MIS Quarterly Vol. 43 No. 2/June 2019


Liang et al./An Emotion-Focused Coping Perspective

venting provide adaptive benefits by motivating users to take The more controllable the situation is, the more motivated
safeguarding actions, we propose that outward EFC will users will take safeguarding actions. If users feel that the IT
likely to enhance PFC behavior. threat is unavoidable regardless of what they do, they are
unlikely to fight against the threat.
H4: Outward EFC will be positively associated with
PFC behavior. H6: Perceived avoidability will be positively asso-
ciated with PFC behavior after controlling for
its indirect effects through EFC.
Supporting Hypotheses

The relationships among perceived threat, perceived avoid-


ability, and PFC behavior have been directly or indirectly Method
tested in prior research (e.g., Liang and Xue 2010; Ng et al.
2009; Workman et al. 2008). We include them in our model Identification of EFC Strategies
to create a nomological network and we therefore only present
the essence of the theoretical arguments put forth in the extant Given that EFC has never been investigated in the specific
literature. context of IT security, we followed MacKenzie et al.’s (2011)
recommended steps to first identify the major EFC strategies
Because IT threats can cause serious losses, users are moti- relevant to IT security threats. We decided to select EFC
vated to seek ways to remove the source of the threat once it strategies from the Ways of Coping Questionnaire (WCQ)
is noticed. This relationship between threat perceptions and (Folkman et al. 1986a) and the COPE inventory (Carver et al.
users’ motivation to take action and solve the problem at hand 1989) because these two instruments are most widely adopted
(PFC) has been supported by previous IS studies (Liang and by prior coping research and they contained a comprehensive
Xue 2010; Ng et al. 2009; Workman et al. 2008). Consistent list of EFC strategies. Since both instruments are intended to
with prior research, we propose that users, when facing IT measure general coping behaviors and many items do not fit
security threats, tend to take security actions to protect their the IT security context, to evaluate the relevance of the EFC
interests. strategies in the IT security context, we interviewed 20 under-
graduate students (mean age = 21.48) in a large university and
H5: Perceived threat will be positively associated 20 regular computer users (mean age = 46.23) in the United
with PFC behavior after controlling for its States. Each interviewee was shown all of the EFC strategies
indirect effects through EFC. of WCQ and COPE. Four factors from WCQ (psychological
distancing, self-control, seeking social support, and escape-
Coping research reveals that individuals engage in problem- avoidance) and four factors from COPE (seeking social sup-
solving when they perceive the situation as more controllable port for emotional reasons, venting of emotions, denial, and
(Carver et al. 1989; Scheier et al. 1986). IS research suggests mental disengagement) were the most frequently reported by
that users try to solve the problem at hand to the extent of the interviewees to cope with IT security threats and the other
their perceived control of the situation (Beaudry and Pinson- strategies were rarely reported. Next, two authors indepen-
neaut, 2005). IS research also shows that users form a dently evaluated the theoretical rationales of the eight user-
perception of avoidability based on the effectiveness and costs reported EFC strategies in the IT security context and com-
of the available safeguarding measures and their confidence pared their assessments. They agreed that the eight EFC stra-
in taking these measures (Liang and Xue 2010). Perceived tegies are theoretically meaningful. After collapsing similar
avoidability represents an overall assessment of how the IT factors, five EFC strategies were identified: denial, psycho-
threat is controllable in light of available resources that facili- logical distancing (merged with mental disengagement),
tate the user to counter the IT threat (Liang and Xue 2009).7 emotional support seeking, emotional venting (merged with
self-control), and wishful thinking (derived from escape-
avoidance).8 Appendix B shows all the coping factors drawn
7
Perceived avoidability is related to, but more than perceived controllability.
According to Bandura and Wood (1989), perceived controllability pertains
to generally how changeable or controllable the environment is. It does not cerns and can provide a more accurate representation of controllability from
take into account personal factors such as self-efficacy and costs. Thus, a a specific user’s perspective.
generally controllable threat may not be controllable for a specific person.
8
For example, a user may believe that, in general, online banking security is In WCQ, escape-avoidance contains both wishful thinking and behavioral
controllable if the most advanced protective technology is used. However, efforts to escape or avoid (Folkman et al. 1986a). However, interviews with
she may still think that hacking her online bank account is not avoidable the 40 users suggest that behavioral efforts to escape or avoid are not used to
because she does not know how to apply the technology or is unwilling to cope with IT security threats. Wishful thinking has been conceptualized and
pay for it. In this paper, perceived avoidability incorporates personal con- operationalized as a separate EFC construct (Folkman and Lazarus 1985, p.

MIS Quarterly Vol. 43 No. 2/June 2019 381


Liang et al./An Emotion-Focused Coping Perspective

from WCQ and COPE and explains our reasoning for keeping identified by the Identity Theft Resource Center (ITRC) was
the five factors and excluding other factors. We elaborate on the increase in the victims’ feeling of denial. Among the
the conceptualization of each EFC strategy in detail as respondents to the study, 49% reported denial as an emotional
follows. reaction. Although there has been substantial media coverage
and public education about this crime, people still considered
identity theft as something that only happens to others (ITRC
Inward EFC Strategies
2010).
Inward EFC strategies include psychological distancing,
Wishful thinking refers to escaping from the stressful situa-
denial, and wishful thinking. Psychological distancing is
tion by fantasizing that some intervening act or force will turn
concerned with attentional deployment because it directs
things around in a desirable direction (Folkman et al. 1986a).
one’s attention away from the IT threat. Psychological dis-
As a cognitive bias, it is deeply rooted in psychology research
tancing, also known as “mental disengagement” (Carver et al.
(Bastardi et al. 2011). Wishful thinking increases/decreases
1989), refers to efforts to psychologically detach oneself from
the subjective probability of a pending desirable/undesirable
the stressor (Folkman et al. 1986b). This is usually accom-
outcome. It leads to beliefs according to desirability rather
plished by engaging in activities that serve to distract oneself
than evidence and reality, which is conceptually similar to
from thinking about the stressful situation (Carver et al.
unrealistic optimism (Bastardi et al. 2011; Krizan and Wind-
1989). Past studies find that people usually employ psycho-
schitl 2007). Prior studies find a positive linkage between
logical distancing during the early and middle phases of a
wishful thinking and neuroticism, suggesting emotionally
stressful encounter (Carver and Scheier 1994; Folkman and
unstable individuals tend to have wishful thinking (Bolger
Lazarus 1985). It appears that people can experience a
1990; McCrae and Costa 1986). In addition, Folkman and
heightened amount of anxiety while they wait for the outcome
Lazarus (1985) find that wishful thinking is a primary coping
of an encounter and, as a result, they try to use psychological
style when the participants dealt with threat emotions. Wish-
distancing to distract themselves from their worries. As users
ful thinking is handy for users as an excuse not to take ade-
engage in prospective coping when facing IT security threats,
quate IT security measures (Liang and Xue 2009). For
they all are in a waiting mode before a security breach occurs.
example, a user may wish that nothing serious will happen
They do not need to be sure that they will be attacked to feel
when she opens a suspicious email attachment. An online
stressful; it is the uncertainty that creates stress. Uncertainty
bank user who uses an easy-to-guess password may wish that
has long been found to be a powerful stressor (Greco and
cybercriminals will never be interested in hacking her account
Roger 2003). Therefore, users are likely to use psychological
to commit identity theft. Their fallacy is that they believe it
distancing to cope with the stress associated with the potential
is true because they want it to be true. However, their odds of
outbreak of security problems.
having a security breach will not change due to such wishful
thinking.
The other two inward EFC (denial and wishful thinking)
intend to achieve cognitive change because they affect the
The commonality of the three inward EFC strategies is that
appraisal of the IT threat by either minimizing its probability
they are intended to regulate antecedents of emotions by
of existence (denial) or occurrence to the individual (wishful
diverting attention from or modifying cognitive evaluations of
thinking). Denial is the refusal to admit the reality of the IT security threats. Although they appear quite different, they
stressful situation (Carver et al. 1989; Liang and Xue 2009). share the same conceptual space and can be applied by a
The use of denial tends to correlate with the value relevance person concurrently (Gross and Thompson 2007). Ample evi-
of the negative consequences of IT security problems (Carver dence exists in the coping literature showing that individuals
et al. 1989). When the outlook of the situation is optimistic, can experience contradictory emotions and states of mind at
people are less likely to adopt the denial coping style (Scheier the same time and they often implement simultaneously
et al. 1986). Carver and Scheier (1994) found that people use multiple coping mechanisms which could conflict with each
denial to cope with threat and harm emotions once the out- other (Folkman and Lazarus 1985). Based on the criteria by
come of the stressor is known. In the IT security context, Jarvis et al. (2003), we treat psychological distancing, denial,
most users know the possible outcomes of security breaches and wishful thinking as three components that give rise to a
and they often use denial to feel less threatened. For example, formative second-order construct: inward EFC.
denial is a common emotional reaction of identity theft vic-
tims: “this is not happening.” One of the most notable trends
Outward EFC Strategies

157). Therefore, we identify wishful thinking as a relevant EFC in the IT Outward EFC strategies include venting and seeking emo-
security threat context. tional support because both are efforts to influence emotions

382 MIS Quarterly Vol. 43 No. 2/June 2019


Liang et al./An Emotion-Focused Coping Perspective

directly. Emotional support seeking means that a person research context, we performed Q-sort to purify and validate
reaches out to his or her social network to obtain moral sup- the items by following Moore and Benbasat (1991). We con-
port, sympathy, or understanding, in the presence of a stressor ducted four rounds of sorting. In each round, we recruited
(Carver et al. 1989; Folkman and Lazarus 1985). Carver and five judges (two business faculty members, two doctoral
Scheier (1994) find that emotional support seeking was students, and an information security professional). At the
significantly related to threat emotions throughout a stressful end of the four sorting rounds, the average inter-judge raw
encounter. Seeking emotional support is often used by IT agreement, average inter-judge Kappa, and the placement
users to cope with negative emotions such as anger and ratio were 0.921, 0.933, and 0.958, respectively. The EFC
anxiety related to disruptive IT events (Beaudry and measurement items are shown in Appendix D. The detailed
Pinsonneault 2010). The ITRC noted that many victims Q-sort procedures and results are presented in Appendix E.
sought emotional support from their social contacts to cope In short, the measures for EFC are firmly grounded in coping
with the stress. theory and the Q-sort results demonstrate that they have
strong content validity.
Venting refers to actions that ventilate the distress being
experienced by a person so that emotional stability is
achieved (Beaudry and Pinsonneault 2010; Carver et al. Development of Other Measures
1989). It is often shown as a vocal and open expression of
negative emotions to others. The higher the stakes involved Measures for perceived threat were adapted from a previous
in the stressful situation, the more likely individuals will rely study (Liang and Xue 2010). The measure for PFC behavior
on emotional venting (Carver et al. 1989). In the IT context, was developed based on the most recommended security
venting has been studied as a strategy used to express anger actions for consumers and home computer users by authori-
during disruptive IT events (Beaudry and Pinsonneault 2010). tative organizations (e.g., FBI 2014; FCC 2014; Kent and
It should be noted that venting as a means to express emotions Steiner 2012). The perceived avoidability measure was self-
is not limited to anger expression. It can be employed to developed for this study based on its theoretical and practical
express any negative emotions one is experiencing and can meanings. In addition, we measured PFC intention as an
involve various ways such as talking to self, expressive alternative representation of PFC by using items from Liang
writing, and posting comments to social media (Wendorf and and Xue (2010). PFC intention is defined as the degree to
Yang 2015). Under the pressure of severe IT security threats, which users intend to perform PFC behaviors. It reflects
it is not uncommon that users let their emotions out. users’ motivation and planning to act against the IT threat,
which may be used to predict future PFC behavior (Liang and
Both emotional support seeking and venting regulate emo- Xue 2009). These measures are shown in Appendix D.
tions directly by taking outward actions. They are theoreti-
cally homogeneous in that they express emotions in an We carried out a pilot test to evaluate the psychometric
outward and observable manner. Users desire to regain quality of our measures. Survey data were collected from 244
emotional stability after IT threats arouse negative emotions, undergraduate students at a major university in the United
and they can use both emotional support seeking and venting States. The analysis results provide preliminary evidence that
to regulate those emotions (Bushman et al. 2001). Again, the measures have strong reliability (greater than .80),
based on Jarvis et al. (2003), we propose that emotional convergent validity (factor loadings greater than .60), and
support seeking and venting are two components of a forma- discriminant validity (factor loadings greater than cross
tive second-order construct: outward EFC. Appendix C loadings). The pilot test results are shown in Appendix F.
provides a summary of these concepts.

Procedures
Development of EFC Measures
We carried out a multimethod research by conducting two
To develop measures for the five EFC strategies, four items studies to test the research model. First, an experiment was
were selected to measure each EFC strategy based on WCQ used to verify that the IT security threat situation can indeed
(Folkman et al. 1986a) and COPE (Carver et al. 1989). Thus, induce EFC responses. Given that EFC has never been
a set of 20 items was created. studied in the IT security domain, it is necessary to use a
rigorous experiment to demonstrate the causal relationship
Since these items were originally created to measure general between IT security threats and EFC so that its existence is
coping, they might not be appropriate for measuring coping squarely established. It is also important to eliminate the
with IT security threats. To make them applicable in our suspicion of reverse causation between perceived threat and

MIS Quarterly Vol. 43 No. 2/June 2019 383


Liang et al./An Emotion-Focused Coping Perspective

EFC. Second, a field survey was conducted to estimate the puters in nonwork settings in the United States. Respondents
full research model based on individuals’ real experiences were asked to recall a specific situation involving an IT
with IT security threats. Our research design fulfilled three security threat in the past month and answer each survey
purposes of multimethod research: expansion, corroboration, question based on their experience of that situation. The IT
and compensation (Venkatesh et al. 2013). First, by testing security threat was defined as any potential harm caused by
both antecedents and consequences of EFC, the survey study external IT-related entities such as malware and cyber-
expanded the experiment study which only examined EFC’s criminals. The respondents reported a variety of threats such
antecedents. Second, the two studies corroborated each other as virus, spyware, adware, phishing, spam email, hacking, and
by showing how the findings converged across methods. identity theft, which allowed us to observe a range of variance
Third, our design leveraged the strengths and compensated for in their threat perceptions.
the limitations of each approach: the experiment provides
evidence for causal inference, while the survey tests a breadth Of the 2,349 users who accessed the survey, 1,151 were
of relationships based on users’ real experience. screened out because they did not encounter an IT security
threat in the previous month. Of the remaining 1,198
respondents, 264 did not complete the survey. Finally, we
Study One: Experiment collected 934 valid responses. The survey software recorded
the time taken for completing each survey. The average time
The experiment employed a 2 × 2 (high versus low threat and is 11.81 minutes (SD = 9.48), suggesting that the respondents
high versus low avoidability) between-subjects factorial de- filled out the survey carefully. The respondents’ average age
sign. Sample size was set to 35 subjects per group to achieve is 44.39 (SD = 14.19). Over 63.5% of them are female. Most
power of 0.9, assuming a medium effect size and 0.05 signi- of them have received at least a high school education, with
ficance level. A total of 140 students (66 females, Mage = 8.2% having graduate degrees, 57.3% having college degrees,
22.81, SD = 2.44) at a large university in the United States 33.8% having high school diplomas, and only 0.6% below
were recruited. Using college students is widely practiced in high school. On average, they have 17.41 years of computer
the IT security research (see Table A1 in Appendix A for experience (SD = 5.95), and spend 6.62 hours per day (SD =
examples). More important, the goal of the experiment is to 6.29) on the Internet. Each respondent has experienced about
demonstrate potential causal relationships in theory rather 2.9 incidents of IT security problems (SD = 5.16).
than to generalize findings across settings and populations.
Following Compeau et al.’s (2012) recommendation, using To mitigate common method bias associated with single-
students as subjects is deemed appropriate in this study. source survey data, we implemented three procedural
remedies (Podsakoff et al. 2003). First, we methodologically
divided the survey into two parts. One part included the EFC
The participants were randomly assigned into each group.
measurements and the other part contained the measurements
Each participant was asked to read carefully a scenario of IT
for other constructs. A short video, the content of which was
security threat and assume that he/she is the person described
totally unrelated to IT security, was played after the first part
in the scenario. The scenario intended to manipulate their
was completed, so that the respondents’ short-term memory
perceptions of threat and avoidability so that either perception
could be cleared to help prevent biases. Second, respondents’
can be high or low. Specifically, the participants were asked anonymity was protected to reduce their evaluation appre-
to imagine that they downloaded a free movie and suspected hension. We also assured them that there are no right or
that malware was attached to it. Perceived threat was manipu- wrong answers and encouraged them to answer each question
lated by indicating that the malware could lead to either honestly. Finally, we followed rigorous procedures to im-
identity theft (high threat) or pop-up ads (low threat), and prove scale items. All measurements were pretested to ensure
perceived avoidability was manipulated by indicating whether content validity and understandability.
they have the means to protect themselves from the threat (see
Appendix G for details). Then we measured their inward and
outward EFC, perceived threat, and perceived avoidability.
Results
Study Two: Survey Study One: Experiment Results

A field survey was conducted to test the full research model. We conducted manipulation checks by comparing perceived
We hired a professional survey research company to collect threat between the high versus low threat conditions (6.59
data. The target population is personal IT users who use com- versus 2.07, t138 = 40.92, p <.01) and perceived avoidability

384 MIS Quarterly Vol. 43 No. 2/June 2019


Liang et al./An Emotion-Focused Coping Perspective

Table 1. MANOVA Results of the Experiment


Threat Avoidability
High Low High Low
Mean (SD) Mean (SD) F Mean (SD) Mean (SD) F
Distancing 3.15 (2.24) 2.00 (1.31) 14.93** 2.12 (2.00) 3.02 (1.74) 9.57**
Denial 3.39 (1.89) 1.96 (1.21) 29.04** 2.38 (1.88) 2.97 (1.53) 5.49*
Wishful Thinking 3.98 (2.13) 2.42 (1.38) 25.96** 2.88 (2.07) 3.53 (1.78) 4.65*
Emotional Support Seeking 4.54 (1.76) 2.64 (1.60) 42.91** 3.69 (2.04) 3.49 (1.82) .46
Venting 5.40 (1.64) 2.84 (1.73) 78.31** 4.00 (2.18) 4.24 (2.07) .69
**p < .01, *p < .05

Table 2. Effects of Control Variables


Computer Online Security Breach
Age Gender Education Experience Hours Experience
Inward EFC -0.19** -0.04 0.06 -0.22** 0.01 0.12*
Outward EFC 0.002 0.11* 0.003 -0.19** 0.01 0.16**
PFC behavior 0.09* -0.04 -0.02 0.09* 0.01 0.02
**p < 0.01, *p < 0.05

between the high versus low avoidability conditions (6.73 Study Two: Survey Results
versus 4.55, t138= 16.77, p < .01). The tests indicated that our
manipulation was effective. We also found no significant We first assessed two potential biases associated with survey
difference in age (F3, 136 = 1.66, p = .18) and gender (χ2 = 2.41, data, nonresponse bias and common method bias, and vali-
p = .49) across the four conditions, suggesting successful dated the measurement model with confirmatory factor
randomization. analysis. The results indicate that the biases are unlikely to
exist and the measurements have adequate reliability and
We employed MANOVA to test the difference in the five validity (see Appendix H for details). We then estimated the
EFC constructs across conditions. Both threat (F = 17.98, p research model by a structural equation modeling approach
< .01) and avoidability (F = 2.44, p < .05) were found to have using AMOS. As Figure 2 shows, all fit indices meet or
significant effects on the EFC constructs. As Table 1 shows, exceed the thresholds (Gefen et al. 2011). The model ex-
all five EFC constructs have a higher score in the high threat plains 17% of the variance in inward EFC, 24% of the
condition than in the low threat condition, suggesting that variance in outward EFC, and 28% of the variance in PFC
perceived threat has a positive effect on individuals’ tendency behavior. Perceived threat gives rise to both inward EFC (β
to take all EFC strategies. In contrast, the avoidability condi- = .13, p < .01) and outward EFC (β = .40, p < .01), supporting
tion has a negative effect on EFC and only influences inward H1a and H1b. Perceived avoidability is negatively related to
EFC. The scores of distancing, denial, and wishful thinking inward EFC (β = -.23, p < .01), but not significantly related to
outward EFC (β = -.04, p > .05), supporting H2a but not H2b.
are significantly lower in the high avoidability condition than
Inward EFC reduces PFC behavior (β = -.26, p < .01), sup-
in the low avoidability condition, while the scores of emo-
porting H3. In contrast, outward EFC enhances PFC behavior
tional support seeking and venting remain approximately the
(β = .15, p < .01), supporting H4. Both perceived threat (β =
same between the two conditions. Taken together, these
.20, p < .01) and perceived avoidability (β = .29, p < .01) are
results reveal that perceived threat and perceived avoidability
positively related to PFC behavior, supporting H5 and H6.
have opposite effects on inward EFC: threat increases both
inward and outward EFC, while avoidability reduces inward Demographic variables have been found to influence individ-
EFC only. Thus, H1a, H1b, and H2a are supported, but H2b uals’ IT behavior (Brown and Venkatesh 2005). To rule out
is not. alternative explanations, we control for the effects of six vari-

MIS Quarterly Vol. 43 No. 2/June 2019 385


Liang et al./An Emotion-Focused Coping Perspective

Notes: **p < .01; *p < .05


χ² = 717.94; df = 254; CFI = .96; TLI - .95; RMSEA = .04
Six control variables (Age, Gender, Education, Computer Experience, Online Hours, Security Breach, Experience) were included on the
three endogenous constructs. See Table 2 for their coefficients.
Double-bordered box: second-order construct. Single-bordered box: first-order construct.

Figure 2. Model Testing Results

ables: age, gender (1 = male, 2 = female), education level (1 Discussion


= under high school, 2 = high school, 3 = college, 4 = gradu-
ate), computer experience (in years), daily online hours, and This research aims to understand personal IT users’ safe-
security breach experience (number of breaches experienced) guarding behavior when facing IT security threats. Drawing
on each of the three endogenous constructs: inward EFC, on coping theory and IT security research (Beaudry and Pin-
outward EFC, and PFC behavior. As Table 2 shows, age is sonneault 2010; Lazarus and Folkman 1984; Liang and Xue
negatively related to inward EFC and positively related to 2009), we propose that individuals cope with security threats
PFC behavior, suggesting that older people are less likely to through both EFC and PFC efforts. The study results provide
engage in inward EFC and more likely to take security support to seven of the eight hypotheses. We find that both
behaviors. Gender is positively related to outward EFC, types of EFC were significantly related to PFC behavior.
implying that women are more likely to use outward EFC than Interestingly, inward EFC and outward EFC have opposing
men. Education level and daily online hours have no signi-fi- effects on PFC: while the former was negatively related to
cant effect on any of the four constructs. Computer experi- PFC behavior, the latter was positively related to PFC behav-
ence is negatively related to inward EFC and outward EFC ior. Therefore, the effect of EFC is more complicated than it
and positively to PFC behavior. Thus, computer novices are looks, and our classification of EFC helps to more precisely
more likely to use both inward and outward EFC and less delineate the role of different types of EFC: inward EFC
likely to take security actions. Security breach experience is tends to discourage, whereas outward EFC tends to encourage
positively related to both inward and outward EFC, sug- users to take safeguarding actions to counter IT security
gesting that victims of IT security threats are more likely to threats.
engage in inward and outward EFC than those who have not
been affected by IT security threats. Consistent with prior IS security research (Boss et al. 2015;
Johnston and Warkentin 2010; Liang and Xue 2009, 2010),
Finally, we performed a robustness test to examine whether both perceived threat and perceived avoidability are found to
our model is also able to explain PFC intention. Similar to the enhance PFC. More important, we find that perceived threat
effects on PFC behavior, the test shows that inward EFC increases both inward and outward EFC while perceived
reduces while outward EFC enhances PFC intention, veri- avoidability reduces inward EFC. This suggests that when
fying the robustness of our research model (see Appendix I). users notice the existence of IT security threats, they tend to

386 MIS Quarterly Vol. 43 No. 2/June 2019


Liang et al./An Emotion-Focused Coping Perspective

use both inward EFC and outward EFC to regain emotional application of the original PMT (Boss et al. 2015). It is ques-
stability. On the other hand, when users believe that they are tionable whether being faithful to PMT can gain any new
in control of the situation, they are unlikely to apply inward insights, given the innate narrow focus of PMT. The intro-
EFC to escape or create illusions. But they still need outward duction of EFC will help the IT security research stream
EFC to cope with the emotions emanating from the stressful switch focus from a pure reasoning-based approach to a
situation, and this emotional need is independent of their holistic approach incorporating both reasoning and emotions.
perception of controllability. These findings are confirmed by Such a holistic framework has been articulated in TTAT and
both the experiment and the survey studies, suggesting that the advancement of the EFC concept made in this paper will
EFC can indeed be engendered by perceived threat and help researchers further understand its value and boost its
application, thus moving the field forward.
avoidability.
Second, we propose a theoretically based approach to classify
different EFC strategies into inward EFC and outward EFC.
Contributions to Research Despite the plethora of research devoted to coping, parti-
cularly in psychology and health care, EFC has been treated
This article makes three contributions to research. First, this as a single concept. However, a number of EFC strategies
paper not only complements, but also extends the extant IT have been referred to in the literature and there is much
security literature by focusing on the much neglected user confusion about this umbrella concept (Austenfeld and
behavior: emotion-focused coping. Most existing security Stanton 2004). Our theoretical categorization clarifies differ-
studies investigate users’ problem-focused coping in the form ent types of EFC and lays a foundation for research into
of intention to adopt security safeguards or actual security coping with IT-related emotions. It also contributes to the
behaviors (Aytes and Terry 2004; Johnston and Warkentin coping literature by delineating the different theoretical
2010; Ng et al. 2009; Workman et al. 2008). Limited origins and outcomes of inward EFC and outward EFC. In
attention is paid to EFC in the context of IT security. addition, we identified specific inward and outward EFC
Although TTAT explicitly proposes that EFC is an important strategies that individuals use to cope with IT security threats
coping behavior parallel to problem-focused coping (Liang and developed measurements for them. The validity and
and Xue 2009), to date no efforts have been made to concep- reliability of these measurements are rigorously tested. They
tualize, categorize, and operationalize EFC and empirically can be easily adapted to fit different IT security contexts,
examine its effects on users’ security behaviors in nonwork providing useful instruments for IS researchers interested in
settings. A rare exception is the work of D’Arcy et al. (2014) studying EFC. For example, EFC can be measured for the
which finds EFC, conceptualized as moral disengagement, victims of the OPM and Yahoo breaches to investigate how
increases employees’ violation of security policies. Yet, they they cope with the aftermath of these serious events.
focus on EFC in work settings in which the stressor is organi-
zational requirement rather than the IT security threat itself, Third, we demonstrate nomological validity of inward and
and their conceptualization of EFC is quite different from outward EFC by testing their relationships with constructs
ours. EFC of personal users who are free from organizational relevant in the IT security context. The conventional expec-
policies remains an uncharted area. This paper fills the void tation is that EFC is dysfunctional and should be responsible
of the security literature by providing an in-depth under- for users’ lack of safeguarding behaviors in the face of IT
standing of EFC when users’ security behavior is volitional, security threats. Surprisingly, we found different effects of
thus making an important contribution to IT security research. EFC: whereas inward EFC shows dysfunctional (or maladap-
This work is particularly important to the research stream that tive) effects, outward EFC shows functional (or adaptive)
heavily relies on protection motivation theory (PMT). Al- effects. This finding supports Folkman et al.’s (1986a)
though PMT is derived from coping theory, EFC is rarely recomendation that consequences of the coping mechanisms
considered in the PMT framework. While IS security re- should not be assumed a priori. The effects of coping
searchers applied PMT, EFC has been completely neglected. mechanisms are not necessarily positive or negative. The
This omission could seriously limit the understanding of coping process is a dynamic one as contextual factors and
users’ security behavior. Our work draws attention to the characteristics of the situation largely determine how the
important role of EFC, thus greatly extending PMT-based individual copes and what consequences will result. This
security research. It would be interesting to examine how the research makes an important contribution to coping research
inclusion of EFC can improve the performance of PMT and by showing that EFC is not necessarily dysfunctional in the IT
help explain inconsistent findings. Some researchers criti- security context. Since EFC research is an uncharted territory
cized that the current application of PMT as being insufficient in the IS literature, more research is needed to further explore
in IT security research while recommending more faithful why the two types of EFC have opposite effects and to

MIS Quarterly Vol. 43 No. 2/June 2019 387


Liang et al./An Emotion-Focused Coping Perspective

identify the contextual characteristics that could moderate facing IT security threats and make necessary adjustments.
their effects. The nuanced understanding will make it pos- For example, potential victims of identity theft can learn from
sible not only to build stronger theory, but also to better the SETA programs about the counter-productiveness of
predict individuals’ security behavior and elevate the impact inward EFC strategies such as denial and distancing, as well
of IT security research. as the importance of gaining help from social networks, and
consequently will try to perform PFC and refrain from
performing inward EFC. In order to widely raise awareness
Contributions to Practice of EFC, security software vendors and governments can also
run public campaigns by using more conspicuous avenues
This research has significant implications for IT security such as nonprofit online ads and TV commercials.
practice. IT security is particularly problematic for individ-
uals such as home users and employees working offsite (e.g., This study also reveals the positive effect of perceived threats
at home or during travel), because these individuals are not and the negative effect of perceived avoidability on inward
protected by sophisticated company firewalls and security EFC. To reduce the counter-productive effect of inward EFC,
software and often do not strictly follow organizational public security education needs to not only draw attention to
security policies (Anderson and Agarwal 2010; Liang and IT security threats, but also be careful not to overdo it by
Xue 2010). As a result, they are more likely to become exaggerating the threats. This calls for caution regarding
victims. For home users, a security breach could lead to prior IT security research touting the importance of fear
computer malfunction, loss of personal information, or iden- appeals in motivating security behaviors (e.g., Boss et al.
tity theft. For offsite workers, a small or even unnoticeable 2015). While perceived threat can motivate PFC, it can
security crack on an individual computer could lead to a simultaneously demotivate PFC by activating inward EFC.
serious organizational data breach. An increasingly used Hence, it seems that the level of users’ threat perception
strategy by hackers is to attack companies indirectly through should be kept at a moderate level to reduce inward EFC. In
their employees who often work off-site, the weakest link in addition, educational efforts should help users build a proper
an organization’s security chain (Reisinger 2015). For degree of confidence in dealing with these threats. Prior IT
example, the seismic Target data breach started with an security studies repeatedly testify to the importance of self-
employee of a vendor of Target falling victim to a phishing efficacy (e.g., Lai et al. 2012; Liang and Xue 2010). Individ-
email that installed a password-stealing malware on his or her uals without confidence would feel hopeless, helpless, or
computer and the attacker later used the employee’s creden- powerless in the face of the threat. Naturally, inward EFC
tials to gain access to Target’s systems (Radichel 2014). Our would be exercised to get away from the problem. In prac-
findings can be applied to improve information security at tice, how-to video tutorials could be an effective way to teach
both the individual and organizational levels. users to fight against IT security threats and thus build their
confidence. With a higher level of confidence in avoiding IT
Our findings offer a new direction to the practice of infor- security threats, users will be less likely to resort to inward
mation security. Security education is a critical component of EFC strategies.
the defense system for the general public against security
threats (James et al. 2013). However, since the EFC is Moreover, although this research is conducted in nonwork
literally unknown to practitioners and the academic literature settings, the findings have implications for security manage-
offers little understanding about this new concept, current ment in organizations as well. Security policy compliance has
public security education programs completely neglect EFC. been a serious issue for organizations (Siponen and Vance
As users’ security action is significantly influenced by EFC, 2010), and SETA programs are considered essential for
to guide users toward proper action, public security education ensuring compliance. Typically, contents of SETA programs
efforts should include educational materials about EFC and have a strong focus on factual materials (e.g., policies, legal
make users aware of their EFC strategies. EFC is not an requirements, procedures, references and resources, etc.).
entirely foreign concept to most people, given that they often This study underscores the necessity of including EFC in
exercise EFC to deal with stressful life events such as set- SETA programs. Since a primary goal of the SETA program
backs, accidents, and illnesses. The problem is that users may is to ensure proper employee action when threats are detected
not be conscious that they also use EFC to cope with IT or suspected and, as shown in this study, EFC strategies may
security threats. Based on our study, security professionals encourage or inhibit PFC action, EFC should be addressed in
can develop an easy-to-use inventory of EFC strategies and SETA programs. The security manager would be able to help
include it into security education, training, and awareness employees become aware of the types of EFC strategies they
(SETA) programs. By taking this inventory, individuals can are prone to use and the differences between inward EFC and
gain a clear picture of the EFC strategies they use when outward EFC. They can use hypothetical scenarios during

388 MIS Quarterly Vol. 43 No. 2/June 2019


Liang et al./An Emotion-Focused Coping Perspective

SETA training to help employees understand the cons of In addition, we assume that users’ protective behavior is voli-
inward EFC and pros of PFC. This is consistent with D’Arcy tional, which makes our findings appropriate for home or
et al. (2014) who show that the coping perspective is helpful nonwork settings. It is also possible to apply it in work set-
in understanding employees’ response to organizational tings, but its boundary conditions need to be clarified because
security requirements. Siponen and Vance (2010) also sug- employees’ IT security behaviors are mostly mandatory
gest that if employees are made aware of the neutralization instead of volitional. IS researchers acknowledge the simi-
strategies and the associated consequences, they will unlikely larity between home users’ and employees’ IT security
look for excuses to violate IT security policies. A more behaviors, but also recognize contextual differences between
aggressive approach organizations can take is to monitor home and workplace (Anderson and Agarwal 2010; Li and
employees’ emotional stability on a regular basis. Those who Siponen 2011), suggesting that theories suitable for one
experience unstable emotional states are likely to be suspects context may not be applicable in another. As recommended
of security policy violations and there should be an inter- by Siponen and Vance (2014), boundary conditions for theory
vention to prevent violations from happening. in IT security research should be carefully delineated. For
example, in organizational settings, we expect EFC to have
similar effects on PFC behavior, but the relationship between
Limitations, Boundaries, and perceived threat and EFC might be different in organizational
Future Research settings because the threat perception will be based on poten-
tial harm to organizational benefits instead of personal
This research has two limitations. First, the fact that EFC benefits. It is unclear how employees will emotionally re-
strategies were studied retrospectively might have made our spond to such threat perceptions. Hence, it will be necessary
survey data vulnerable to recall bias. To minimize this poten- to examine the generation of EFC in the organizational
tial bias, we designed our study carefully by following how context to extend its generalizability.
Beaudry and Pinsonneault (2010) studied retrospective emo-
tions. First, in the survey, we asked respondents to describe This research suggests several avenues for future research.
a situation in which they encountered an IT security threat in First, given the importance of EFC in the IT security context,
the past month. The situation was unique for each respondent more research is needed to identify antecedents that lead users
and thus had high personal relevance. In addition, the process to choose EFC, particularly inward EFC, strategies. Although
of writing down the situation helped respondents recall the we find that perceived threat and perceived avoidability are
details. Second, we provided strong anchor points to the associated with inward EFC, only 14% of the variance of
respondents in the questionnaires by reminding them that their inward EFC is explained. More antecedents such as types of
answers to the survey questions should be based on the security threats and technological attributes of IT threats may
situation that they described earlier. Third, we methodo- be helpful to better predict what EFC strategies users would
logically separated the EFC questions from measures for other employ. Other antecedents of EFC that are more manageable
constructs by showing the respondents a video in between. should also be identified to inform IT security practice.
This was expected to clear the respondents’ short-term Based on these antecedents, it is possible to design behavioral
memory and help them base their responses on the situation interventions to help people use adaptive EFC strategies and
rather than the survey context or answers to other survey avoid maladaptive EFC strategies. This type of research is
questions. Additionally, our experiment results are highly scarce, but would make significant contributions to security
consistent with the survey results in terms of how perceived research. In addition, given that coping is a process, a survey
threat and avoid-ability influence inward and outward EFC, study cannot fully reveal the intricacies of the dynamics of
suggesting that recall bias is unlikely to be a serious concern. this process. It is desirable to use longitudinal experiments to
investigate how EFC leads to adaptive or maladaptive
Another limitation is that our U.S.-based sample makes it outcomes over time.
difficult to generalize our findings to the population of all
personal IT users in the world. Psychology research shows Second, although the results find that the effect of inward
that culture plays an important role in shaping how indi- EFC is largely maladpative and the effect of outward EFC is
viduals regulate emotions (Gross and Thompson 2007). adaptive in the IT security context, the outcomes might be
Coping researchers have long recognized that it is essential to different in other IT contexts. Coping theory posits that
consider the context in which coping outcomes are evaluated coping is a dynamic process and coping outcomes are not
(Lazarus and Folkman 1984). Given that the American cul- inherently adaptive or maladpative (Folkman et al. 1986a).
tural context is different from that of other countries, the An EFC strategy that is adaptive in one context could become
findings of this study should be interpreted with caution when maladaptive in another. For example, venting is proposed to
researchers try to apply them in other cultural contexts. be dysfunctional in the IT use context (Beaudry and

MIS Quarterly Vol. 43 No. 2/June 2019 389


Liang et al./An Emotion-Focused Coping Perspective

Pinsonneault 2010), yet it is found to be positively related to negatively moderates the relationship between perceived
users’ intention to take safeguarding actions in this study. threat and avoidance motivation (Liang and Xue 2010).
Thus, it is necessary to investigate the specific effects of Although it is beyond the scope of this research, it would be
inward EFC and outward EFC outside the IT security context. interesting to further investigate how perceived avoidability
In addition, users might take different EFC strategies to cope (including response efficacy, self-efficacy, and perceived
with different IT security threats. While we coined inward cost) can moderate the effect of perceived threat on EFC and
and outward EFC as two general categories and identified six PFC.
EFC strategies, this is not necessarily an exhaustive list.
More research is needed to identify and validate specific
relevant EFC strategies within each category for other IT Conclusion
security contexts.
This paper shows that users perform both PFC and EFC to
Third, it would be interesting to take cultural factors into cope with IT security threats and explicates how EFC influ-
account when studying EFC. Individuals are always em- ences PFC. It conceptualizes, categorizes, and operation-
bedded in social networks and their coping decisions and alizes EFC and investigates EFC’s impact on IT users’
choices are inevitably influenced by social values and cultural security behaviors. It finds that inward EFC leads to malad-
norms. The developmental psychology literature shows that aptive outcomes by decreasing users’ PFC behavior whereas
the development of children’s emotion-related appraisals is outward EFC gives rise to adaptive outcomes by enhancing
culturally constructed through socialization processes (Cole users’ PFC behavior. This paper complements and extends
et al. 2002). People in different cultures hold very different the existing IT security literature by focusing on EFC that has
beliefs about appropriate ways of emotional coping appro- not been empirically investigated in the IT security context.
priate (Gross and Thompson 2007). For example, expressing It also opens new avenues for future research concerned with
negative emotions is acceptable in the American culture but IT-related emotions and emotion-focused coping. As such,
deemed obscene in China. Hence, Chinese users may be less we hope that it will stimulate more research interest on this
likely to perform venting than American users when faced important topic.
with IT security threats. The IT security literature has shown
that cultural contexts can significantly moderate the relation-
ships between individuals’ perceptions and behaviors related Acknowledgments
to IT security (Chen and Zahedi 2016). For example, users in
a weak uncertainty avoidance culture will be more risk- This research was partially supported by the National Natural Sci-
tolerant than users in a strong uncertainty avoidance culture, ence Foundation of China (#71471080) and China (Xi’an) Silk Road
and as a result they would be less likely to cope with IT Research Institute (#2017SZ08). We are also grateful to the senior
security threats. Therefore, cultural factors ought to be editor, the associate editor, and the reviewers for their constructuve
examined to see how they predict or moderate the effects of feedback, thoughtful guidance, and support.
EFC on security behaviors.

Fourth, men and women have long been found to have differ-
References
ent reactions to emotions (Hyde 2014). More needs to be Anderson, C. L., and Agarwal, R. 2010. “Practicing Safe Com-
known about how gender difference will influence individ- puting: A Multimethod Empirical Examination of Home Com-
uals’ IT security behavior. This study shows that women puter User Security Behavioral Intentions,” MIS Quarterly
engage in more outward EFC than men. This finding is con- (34:3), pp. 613-643.
sistent with the psychology literature, which indicates that Austenfeld, J. L., and Stanton, A. L. 2004. “Coping Through Emo-
women are more emotionally expressive (Kring and Gordon tional Approach: A New Look at Emotion, Coping, and Health-
1998). Further research needs to examine EFC affects PFC Related Outcomes,” Journal of Personality (72:6), pp.
differently for men and women. Such investigation could 1335-1363.
provide a more precise understanding on individuals’ IT Aytes, K., and Terry, C. 2004. “Computer Security and Risky
security behavior. Computing Practices: A Rational Choice Perspective,” Journal
of Organizational and End User Computing (16:3), pp. 22-40.
Finally, as TTAT (Liang and Xue 2009) posits, perceived Bagozzi, R. P., Gopinanth, M., and Nyer, P. U. 1999. “The Role of
Emotions in Marketing,” Journal of the Academy of Marketing
threat and perceived avoidability could interact with each
Science (27:2), pp. 184-206.
other to influence both EFC and PFC. A previous study has
Bandura, A. 1997. Self-Efficacy: The Exercise of Control, New
shown that response efficacy (a component of avoidability) York: W. H. Freeman and Company.

390 MIS Quarterly Vol. 43 No. 2/June 2019


Liang et al./An Emotion-Focused Coping Perspective

Bandura, A., and Wood, R. 1989. “Effect of Perceived Control- and Psychological Well-Being,” Journal of Applied Social
lability and Performance Standards on Self-Regulation of Psychology (41:3), pp. 559-578.
Complex Decision Making,” Journal of Personality and Social Cisco. 2016. “Cisco 2016 Annual Security Report,” Cisco Systems,
Psychology (56:5), pp. 805-814. San Jose (https://www.cisco.com/c/dam/en_us/about/annual-
Bastardi, A., Uhlmann, E. L., and Ross, L. 2011. “Wishful report/2016-annual-report-full.pdf).
Thinking Belief, Desire, and the Motivated Evaluation of Scien- Cole, P. M., Bruschi, C. J., and Tamang, B. L. 2002. “Cultural
tific Evidence,” Psychological Science (22:6), pp. 731-732. Differences in Children’s Emotional Reactions to Difficult
Beaudry, A., and Pinsonneault, A. 2005. “Understanding User Situations,” Child Development (73), pp. 983-996.
Responses to Information Technology: A Coping Model of User Compeau, D., Marcolin, B., Kelley, H., and Higgins, C. 2012.
Adaptation,” MIS Quarterly (29:3), pp. 493-524. “Generalizability of Information Systems Research Using
Beaudry, A., and Pinsonneault, A. 2010. “The Other Side of Student Subjects—A Reflection on Our Practices and Recom-
Acceptance: Studying the Direct and Indirect Effects of Emo- mendations for Future Research,” Information Systems Research
tions on Information Technoloyg Use,” MIS Quarterly (34:4), pp. (23:4), pp. 1093-1109.
689-710. D’Arcy, J., Herath, T., and Shoss, M. K. 2014. “Understanding
Billings, A. G., and Moos, R. H. 1984. “Coping, Stress, and Social Employee Responses to Stressful Information Security
Resources Among Adults with Unipolar Depression,” Journal of Requirements: A Coping Perspective,” Journal of Management
Personality and Social Psychology (46), pp. 877-891. Information Systems (31:2), pp. 285-318.
Bolger, N. 1990. “Coping as a Personality Process: A Prospective Dias-Ferreira, E., Dias-Ferreira, E., Sousa, J. C., Melo, I.,
Study,” Journal of Personality and Social Psychology (59:3), pp. Morgado, P., Mesquita, A. R., Cerqueira, J. J., Costa, R. M., and
525-537. Sousa, N. 2009. “Chronic Stress Causes Frontostriatal Reorgani-
Boss, S. R., Galletta, D. F., Lowry, P. B., Moody, G. D., and zation and Affects Decision-Making,” Science (325:5940), pp.
Polak, P. 2015. “What Do Systems Users Have to Fear? Using 621-625.
Fear Appeals to Engender Threats and Fear That Motivate Pro- Duke, A. 2014. “Five Things to Know about the Celebrity Nude
tective Security Behaviors,” MIS Quarterly (39:4), pp. 837-864. Photo Hacking Scandal,” CNN Entertainment (http://www.cnn.
Brown, S., and Venkatesh, V. 2005. “Model of Adoption and com/2014/09/02/showbiz/hacked-nude-photos-five-things/).
Technology in Households: A Baseline Model Test and Exten- FBI. 2014. “How to Protect Your Computer,” Federal Bureau of
sion Incorporating Household Life Cycle,” MIS Quarterly (29:3), Investigation (https://www.fbi. gov/scams-and-safety/on-the-
pp. 399-436.
internet/how-to-protect-your-computer).
Bushman, B. J. 2002. “Does Venting Anger Feed or Extinguish the
FCC. 2014. “Secure Web Navigation and Transactions,” Federal
Flame? Catharsis, Rumination, Distraction, Anger, and Aggres-
Communications Commission (http://www.fcc.gov/guides/
sive Responding,” Personality and Social Psychology Bulletin
secure-web-navigation-and-transactions).
(28:6), pp. 724-731.
Folkman, S., and Lazarus, R. S. 1985. “If it Changes it must Be a
Bushman, B. J., Baumeister, R. F., and Phillips, C. M. 2001. “Do
Process: Study of Emotion and Coping During Three Stages of
People Aggress to Improve Their Mood? Catharsis Beliefs,
a College Examination,” Journal of Personality and Social
Affect Regulation Opportunity, and Aggressive Responding,”
Psychology (48:1), pp. 150-170.
Journal of Personality and Social Psychology (81:1), pp. 17-32.
Folkman, S., Lazarus, R. S., Dunkel-Schetter, C., DeLongis, A., and
Carver, C. S., Pozo, C., Harris, S. D., Noriega, V., Scheier, M. F.,
Gruen, R. J. 1986a. “Dynamics of a Stressful Encounter:
Robinson, D. S., Ketcham, A. S., Moffat Jr., F. L., and Clark,
Cognitive Appraisal, Coping, and Encounter Outcomes,” Journal
K. C. 1993. “How Coping Mediates the Effect of Optimism on
Distress: A Study of Women with Early Stage Breast Cancer,” of Personality and Social Psychology (50:5), pp. 992-1003.
Journal of Personality and Social Psychology (65:2), pp. Folkman, S., Lazarus, R. S., Gruen, R. J., and DeLongis, A. 1986b.
375-390. “Appraisal, Coping, Health Status, and Psychological Symp-
Carver, C. S., and Scheier, M. F. 1982. “Control Theory: A Useful toms,” Journal of Personality and Social Psychology (50:3), pp.
Conceptual Framework for Personality-Social, Clinical, and 571-579.
Health Psychology,” Psychological Bulletin (92:1), pp. 111-135. Folkman, S., and Moskowitz, J. T. 2004. “Coping: Pitfalls and
Carver, C. S., and Scheier, M. F. 1994. “Situational Coping and Promise,” Annual Review of Psychology (55), pp. 745-774.
Coping Dispositions in a Stressful Transaction,” Journal of Franceschi-Bicchierai, L. 2016. “Hacker Tries to Sell 427 Million
Personality and Social Psychology (66:1), pp. 184-195. Stolen MySpace Passwords for $2,800,” Motherboard, May 27
Carver, C. S., Scheier, M. F., and Weintraub, J. K. 1989. (http://motherboard.vice.com/read/427-million-myspace-
“Assessing Coping Strategies: A Theoretically Based Ap- passwords-emails-data-breach).
proach,” Journal of Personality and Social Psychology (56:2), Freud, S. 1894. The Neuro-Psychoses of Defence.
pp. 267-283. Fugate, M., Kinicki, A. J., and Scheck, C. L. 2002. “Coping with
Chen, Y., and Zahedi, F.M. 2016. “Individuals’ Internet Security an Organizational Merger Over Four Stages,” Personnel Psych-
Perceptions and Behaviors: Polycontextual Contrasts Between ology (55), pp. 905-928.
the United States and China,” MIS Quarterly (40:1), pp. 205-222. Gefen, D., Rigdon, E. E., and Straub, D. 2011. “An Update and
Cicognani, E. 2011. “Coping Strategies with Minor Stressors in Extension to SEM Guidelines for Administrative and Social
Adolescence: Relationships with Social Support, Self-Efficacy, Science Research,” MIS Quarterly (35:2), pp. iii-xiv.

MIS Quarterly Vol. 43 No. 2/June 2019 391


Liang et al./An Emotion-Focused Coping Perspective

Greco, V., and Roger, D. 2003. “Uncertainty, Stress, and Health,” Lazarus, R. 1999. Stress and Emotion: A New Synthesis, New
Personality and Individual Differences (34:6), pp. 1057-1068. York: Springer.
Gross, J. 1998. “Antecedent- and Response-Focused Emotion Lazarus, R., and Folkman, S. 1984. Stress, Appraisal, and Coping,
Regulation: Divergent Consequences for Experience, Expres- New York: Springer.
sion, and Physiology,” Journal of Personality and Social Lee, Y., and Kozar, K. A. 2005. “Investigating Factors Affecting
Psychology (74:1), pp. 224-237. the Adoption of Anti-Spyware Systems,” Communications of the
Gross, J. 1999. “Emotion Regulation: Past, Present, Future,” ACM (48:8), pp. 72-77.
Cognition and Emotion (13:5), pp. 551-573. Lee, Y., and Larsen, K. R. 2009. “Threats or Coping Appraisal:
Gross, J. J., and John, O. P. 2003. “Individual Differences in Two Determinants of Smb Executives’ Decision to Adopt Anti-
Emotion Regulation Processes: implications for Affect, Relation- malware Software,” European Journal of Information Systems
ships, and Well-Being,” Journal of Personality and Social (18), pp. 177-187.
Psychology (85:2), pp. 348-362. Lerner, J. S., Han, S., and Keltner, D. 2007. “Feelings and
Gross, J., and Thompson, R. A. 2007. “Emotion Regulation: Consumer Decision Making: Extending the Appraisal-Tendency
Conceptual Foundations,” in Handbook of Emotion Regulation, Framework,” Journal of Consumer Psychology (17:3), pp.
J. J. Gross (ed.), New York: Guilford Press, pp. 3-24. 181-187.
Hu, E. 2014. “I Feel Nothing: The Home Depot Hack and Data Lerner, J. S., and Keltner, D. 2000. “Beyond Valence: Toward a
Breach Fatigue,” National Public Radio, September 3 (https:// Model of Emotion-Specific Influences on Judgment and Choice,”
www.northcountrypublicradio.org/news/npr/345539074/i-feel- Cognition and Emotion (14:4), pp. 473-493.
nothing-the-home-depot-hack-and-data-breach-fatigue). Li, Y., and Siponen, M. T. 2011. “A Call for Research on Home
Hyde, J. S. 2014. “Gender Similarities and Differences,” Annual Users’ Information Security Behaviour,” in Proceedings of the
Review of Psychology (65), pp. 373-398. Pacific Asia Conference on Information Systems, p. 112.
ISF. 2014. “From Promoting Awareness to Embedding Behaviours: Liang, H., and Xue, Y. 2009. “Avoidance of Information
Secure by Choice, Not by Chance,” Information Security Forum. Technology Threats: A Theoretical Perspective,” MIS Quarterly
ITRC. 2010. “Identity Theft: The Aftermath 2009,” Identity Theft (33:1), pp. 71-90.
Resource Center, San Diego, CA. Liang, H., and Xue, Y. 2010. “Understanding Security Behaviors
James, T., Nottingham, Q., and Kim, B. C. 2013. “Determining the in Personal Computer Usage: A Threat Avoidance Perspective,”
Antecedents of Digital Security Practices in the General Public Journal of the Association for Information Systems (11:7), pp.
Dimension,” Information Technology Management (14), pp. 394-413.
69-89. Loewenstein, G. 2007. “Affect Regulation and Affective Fore-
Jarvis, C. B., MacKenzie, S. B., and Podsakoff, P. M. 2003. casting,” in Handbook of Emotion Regulation, J. Gross (ed.),
"Critical Review of Construct Indicators and Measurement New York: The Guilford Press, pp. 180-203.
Model Misspecification in Marketing and Consumer Research," MacKenzie, S. B., Podsakoff, M. P., and Podsakoff, N. P. 2011.
Journal of Consumer Research (30:2), pp. 199-218. “Construct Measurement and Validation Procedures in MIS and
Johnson, E. J., and Tversky, A. 1983. “Affect, Generalization, and Behavioral Research: Integrating New and Existing Tech-
the Perception of Risk,” Journal of Personality and Social niques,” MIS Quarterly (35:2), pp. 293-334.
Psychology (45), pp. 20-31. Maslow, A. H. 1943. “A Theory of Human Motivation,”
Johnston, A. C., and Warkentin, M. 2010. “Fear Appeals and Infor- Psychological Review (50:4), pp. 370-396.
mation Security Behaviors: An Empirical Study,” MIS Quarterly McCrae, R. R. 1984. “Situational Determinants of Coping
(34:3), pp. 549-566. Responses: Loss, Threat, and Challenge,” Journal of Personality
Kent, J., and Steiner, K. 2012. “Ten Ways to Improve the Security and Social Psychology (46:4), pp. 919-928.
of a New Computer,” US-CERT, Carnegie Mellon University McCrae, R. R., and Costa, P. T. 1986. “Personality, Coping, and
(http://www.athens.edu/pdfs/it/cyber-tips/Ten-Ways-to-Improv Coping Effectiveness in an Adult Sample,” Journal of Person-
e-New-Computer-Security.pdf?x75869). ality (54:2), pp. 385-405.
Kim, J. J., Park, E. H. E., and Baskerville, R. L. 2016. “A Model Moore, G. C., and Benbasat, I. 1991. “Development of an Instru-
of Emotion and Computer Abuse,” Information & Management ment to Measure the Perceptions of Adopting an Information
(53:1), pp. 91-108. Technology Innovation,” Information Systems Research (2:3),
Kring, A. M., and Gordon, A. H. 1998. “Sex Differences in pp. 192-222.
Emotion: Expression, Experience, and Physiology,” Journal of Moos, R. H., and Billings, A. G. 1982. “Conceptualizing and Mea-
Personality and Social Psychology (74:3), pp. 686-703. suring Coping Resources and Processes,” in Handbook of Stress,
Krizan, Z., and Windschitl, P. D. 2007. “The Influence of Outcome L. Goldberger and S. Breznitz (eds.), New York: The Free Press,
Desirability on Optimism,” Psychological Bulletin (133:1), pp. pp. 212-230.
95-121. Murphy, I. 2016. “Cyber Defence or More Wishful Thinking,”
Lai, F., Li, D., and Hsieh, C.-T. 2012. “Fighting Identity Theft: Enterprise Times, September 14 (https://www.enterprisetimes.
The Coping Perspective,” Decision Support System (52:2), pp. co.uk/2016/09/14/cyber-defence-wishful-thinking/).
353-363. Ng, B.-Y., Kankanhalli, A., and Xu, Y. C. 2009. “Studying Users’
Lazarus, R. 1991. Emotion and Adaptation, Oxford, UK: Oxford Computer Security Behavior: A Health Belief Perspective,”
University Press. Decision Support System (46:4), pp. 815-825.

392 MIS Quarterly Vol. 43 No. 2/June 2019


Liang et al./An Emotion-Focused Coping Perspective

Pillow, D. R., Zautra, A. J., and Sandler, I. 1996. “Major Life Symantec. 2010. “The Silent Epidemic: Cybercrime Strikes More
Events and Minor Stressors: Identifying Mediational Links in the Than Two-Thirds of Internet Users” (https://www.symantec.com/
Stress Process,” Journal of Personality and Social Psychology about/newsroom/press-releases/2010/symantec_0908_01).
(70:2), pp. 381-394. Symantec. 2016. “Internet Security Threat Report,” Symantec,
Podsakoff, P. M., MacKenzie, S. B., Lee, J. Y., and Podsakoff, N. Mountain View, CA.
P. 2003. “Common Method Biases in Behavioral Research: a Taylor, S. E. 2011. “Social Support: A Review,” in The Handbook
Critical Review of the Literature and Recommended Remedies,” of Health Psychology, H. S. Friedman (ed.), Oxford, UK: Oxford
Journal of Applied Psychology (88:5), pp. 879-903. University Press, pp. 189-214.
Ponemon Institute. 2017. “2017 Study on Mobile and IoT Venkatesh, V., Brown, S. A., and Bala, H. 2013. “Bridging the
Application Security,” Ponemon Institute Research Report Qualitative–Quantitative Divide: Guidelines for Conducting
sponsored by IBM and Axran. Mixed Nethods Research in Information Systems,” MIS
Radichel, T. 2014. “Case Study: Critical Controls that Could Have Quarterly (37:1), pp. 21-54.
Prevented Target Breach,” The SANS Institute. Wendorf, J. E., and Yang, F. 2015. “Benefits of a Negative Post:
Reisinger, D. 2015. “Why Employees Are Often the Weakest Link Effects of Computer-Mediated Venting on Relationship Main-
in Enterprise Security Chain,” eWeek, January 28 tenance,” Computers in Human Behavior (52), pp. 271-277.
(http://www.eweek.com/security/why-employees-are-often-the- Whittaker, Z. 2016. “Yahoo Hacked Again, More than One Billion
weakest-link-in-enterprise-security-chain). Accounts Stolen,” ZDNet, December 14 (https://www.zdnet.com/
Rippetoe, P. A., and Rogers, R. W. 1987. “Effects of Components article/yahoo-hacked-again-more-than-one-billion-accounts-
of Protection-Motivation Theory on Adaptive and Maladaptive stolen/).
Coping with a Health Threat,” Journal of Personality and Social Willison, R., and Warkentin, M. 2013. “Beyond Deterrence: An
Psychology (52:3), pp. 596-604. Expanded View of Employee Computer Abuse,” MIS Quarterly
Rogers, R. W. 1983. “Cognitive and Pysiological Process in Fear (37:1), pp. 1-20.
Appeals and Attitude Change: A Revised Theory of Protection Workman, M., Bommer, W. H., and Straub, D. 2008. “Security
Motivation,” in Social Psychophysiology: A Source Book, J. Lapses and the Omission of Information Security Measures: A
Cacioppo and R Petty (eds.), New York: Guilford Press, pp. Threat Control Model and Empirical Test,” Computers in Human
153-176. Behavior (24:6), pp. 2799-2816.
Scheff, T. 2015. “Three Scandals in Psychology: The Need for a Yi, S., and Baumgartner, H. 2004. “Coping with Negative Emo-
New Approach,” Review of General Psychology (19:2), pp. tions in Purchase-Related Situations,” Journal of Consumer
203-205. Psychology (14:3), pp. 303-317.
Scheier, M. F., Weintraub, J. K., and Carver, C. S. 1986. “Coping Zhang, P. 2013. “The Affective Response Model: A Theoretical
with Stress: Divergent Strategies of Optimists and Pessimists,” Framework of Affective Concepts and Their Relationships in the
Journal of Personality and Social Psychology (51:6), pp. ICT Context,” MIS Quarterly (37:1), pp. 247-274.
1257-1264.
Scherer, K. R., and Tran, V. 2001. “Effects of Emotion on the
Process of Organizational Learning,” in Handbook of Organi-
zational Learning and Knowledge, M. Dierkes, A. B. Antal,
About the Authors
J. Child, and I. Nonaka (eds.), Oxford, UK: Oxford University
Press, pp. 369-392. Huigang Liang is a professor of MIS and the Teer Endowed Chair
Siponen, M., and Vance, A. 2010. “Neutralization: New Insight at College of Business, East Carolina University. His research
into the Problem of Employee Information Systems Security focuses on socio-behavioral, managerial, and analytical IT issues at
Policy Violations,” MIS Quarterly (34:3), pp. 487-502. both individual and organizational levels in a variety of contexts.
Siponen, M., and Vance, A. 2014. “Guidelines for Improving the His work has appeared in MIS Quarterly, Information Systems
Contextual Relevance of Field Surveys: The Case of Information Research, Journal of MIS, Journal of the AIS, MIT Sloan Manage-
Security Policy Violations,” European Journal of Information ment Review, Communications of the ACM, Decision Support
Systems (23:3), pp. 289-305. Systems, Information Systems Journal, and Journal of Strategic
Slovic, P., Finucane, M. L., Peters, E., and MacGregor, D. G. 2004. Information Systems, among others. He served the editorial board
“Risk as Analysis and Risk as Feelings: Some Thoughts About of MIS Quarterly, and is currently serving on the editorial boards of
Affect, Reason, Risk, and Rationality,” Risk Analysis (24:2), pp. Information Systems Research, Journal of the AIS, and Information
311-322. and Management
Stets, J. E., and Tsushima, T. M. 2001. “Negative Emotion and
Coping Responses Within Identity Control Theory,” Social Yajiong Xue is a professor of MIS at East Carolina University. She
Psychology Quarterly (64:3), pp. 283-295. received her Ph.D. from Auburn University. Her research has ap-
Stickney, L. T., and Geddes, D. 2014. “Positive, Proactive, and peared in MIS Quarterly, Information Systems Research, Journal of
Committed: The Surprising Connection Between Good Citizens MIS, Journal of the AIS, Decision Support Systems, Communications
and Expressed (Vs. Suppressed) Anger at Work,” Negotiation of the ACM, and International Journal of Medical Informatics, and
and Conflict Management Research (7:4), pp. 243-264. others. Her research interests include IT governance, strategic man-

MIS Quarterly Vol. 43 No. 2/June 2019 393


Liang et al./An Emotion-Focused Coping Perspective

agement of information technology, and healthcare information mation Systems Research, Organization Science, and Journal of
systems. She teaches a data analytics project course and is the coor- MIS.
dinator of the data analytics certificate program at East Carolina
University. Yajiong served as the corresponding author for this Yu “Andy” Wu is an associate professor in the Department of
paper. Information Technology and Decision Sciences at the University of
North Texas. Andy obtained his Ph.D. (2007) and Master of
Alain Pinsonneault, Fellow-Royal Society of Canada and Fellow Science (2003) in Management Information Systems from the
of the Association for Information Systems, is a James McGill University of Central Florida. He also holds a Master’s and a
Professor and the Imasco Chair of information systems in the Bachelor’s in Finance. Andy’s primary research interest is infor-
Desautels Faculty of management at McGill University. His current mation security. His research papers appear in journals such as
research interests include the organizational and individual impacts Decision Support Systems, The Data Base for Advances in Infor-
of information technology, user adaptation, social networks, busi- mation Systems, IEEE Transactions on Professional Commu-
ness model in the digital economy, e-health, e-integration, strategic nication, and Information Systems Management, and in the
alignment of IT, and the business value of IT. His research has proceedings of a number of international conferences. Between his
appeared in numerous journals, including Management Science, MIS academic pursuits in finance and MIS, he had seven years of
Quarterly, Information Systems Research, Journal of MIS, Decision industry experience in various positions Andy is a Certified
Support Systems, and Organization Science. He has served on the Information Systems Auditor (CISA) and is CompTIA Security+
editorial boards of several journals including MIS Quarterly, Infor- certified.

394 MIS Quarterly Vol. 43 No. 2/June 2019


RESEARCH ARTICLE

WHAT USERS DO BESIDES PROBLEM-FOCUSED COPING


WHEN FACING IT SECURITY THREATS: AN EMOTION-
FOCUSED COPING PERSPECTIVE
Huigang Liang and Yajiong Xue
College of Business, East Carolina University,
Greenville, NC 27858 U.S.A. {huigang.liang@gmail.com} {xuey@ecu.edu}

Alain Pinsonneault
Desautels Faculty of Management, McGill University, 1001 Sherbrooke Street West,
Montréal, QC CANADA H3A 1G5 {alain.pinsonneault@mcgill.ca}

Yu “Andy” Wu
College of Business, University of North Texas,
Denton, TX 76203 U.S.A. {andy.wu@unt.edu}

Appendix A
Summary of Past IT Security Research on PFC and EFC

There is a large body of IS research on individuals’ IT security behavior. In the paper, we attempted to understand how individuals cope with
IT security threats when such behavior is volitional. In this appendix, we briefly review the past studies in this domain. The current literature
on individuals’ volitional security behaviors has focused primarily on the cognitive reasoning process that motivates individuals to take
protective actions against IT security threats. As shown in Table A1, this literature has extensively studied individuals’ security behavior in
a variety of threat contexts including malware, spyware, hacking, email spam, phishing, identity theft, and device theft. Major theories applied
include the protection motivation theory (PMT), the technology threat avoidance theory (TTAT), the health belief model (HBM) , and the
theory of planned behavior (TPB). Based on the major theory applied, we grouped the studies in Table A1. Regardless of the theory applied,
these studies share a clear commonality – the focal dependent variable is either the security behavior or intention to perform such behavior.
From the coping perspective, the action or intention to take protective measures to counter threats is essentially a PFC approach. Therefore,
it is conspicuous that the existing research has predominantly investigated PFC. As to EFC, none of the studies that applied PMT, HBM and
TPB has mentioned this concept. We have only found one article (Liang and Xue 2009) that discussed EFC in depth and developed formal
propositions to explain EFC’s relationship with other coping constructs. However, it is a pure theory building paper that offers no empirical
evidence to back up the propositions. Several empirical studies based on TTAT (Arachchilage and Love 2014; Herath et al. 2014; Lai et al.
2012; Liang and Xue 2010) allude to EFC, but it is limited to a brief mention in the literature review. Neither is EFC theoretically elaborated,
nor empirically tested in these studies. To date, in the IT security literature, we still know little about EFC. Questions such as “what EFC
strategies are relevant in the IT security context,” “why do people perform EFC when facing IT security threats,” and “what are the
consequences of EFC” have never been answered.

It should be noted that there is another stream of IT security research focused on employees’ compliance with IS security policies mandated
by organizations. We have conducted a comprehensive search within this stream by using the keyword “emotion-focused coping” and found
one article by D’Arcy et al. (2014) that examines how employees use EFC to cope with security-related stress. This is the only study that
explicitly used the term of EFC in this research stream. However, in this study, the research context is mandatory compliance with information

MIS Quarterly Vol. 43 No. 2–Appendices/June 2019 A1


Liang et al./An Emotion-Focused Coping Perspective

security policies. D’Arcy et al. explain that, in this context, stress is aroused by the overload, complexity, and uncertainty of security policy
compliance. This is in sharp contrast with the volitional context in which users’ stress is aroused by IT security threats. In addition, D’Arcy
et al. did not study EFC directly; instead, they used moral disengagement as a surrogate of EFC. While moral disengagement makes sense when
mandatory compliance is the target behavior, it is not as relevant when volitional security behavior is of interest, because individuals are
unlikely to think their lack of security behavior to be immoral. Therefore, D’Arcy et al.’s study cannot be readily extended to the context of
volitional security behavior. The role of EFC in the volitional context remains unknown.

Table A1. Summary of IS Research on Volitional IT Security Behaviors


Threat Theory Dependent Research
Study Context Applied Variable Sample Design Major Findings EFC PFC
Chen and Internet PMT Protective 480 U.S. home Survey Security concern, response effi- No Yes
Zahedi security action, users and 235 cacy, and self-efficacy influence
(2016) attacks knowledge Chinese home protective action, and their
seeking, users effects are moderated by
avoidance espoused culture.
Tsai et al. Online PMT Security 988 MTurk Survey Coping appraisals increase No Yes
(2016) security intention users security intention, but threat
threat appraisals have no effect.
Boss et al. Data PMT Security Study 1: 104 1: Survey Besides traditional threat and No Yes
(2015) backup, behavior MBA students 2: Experiment coping appraisal variables, fear
Malware Study 2: 327 and maladaptive rewards influ-
college ence behavioral intention, which
students leads to security behavior.
Tu et al. Mobile PMT Coping 339 mobile Survey Response efficacy, self-efficacy, No Yes
(2015) device intention device users perceived threat, and social
theft influence increase coping
intention.
Boehmer et Online PMT Safe online 1: 565 college 1: Survey Personal responsibility, self- No Yes
al. (2015) security behavior students 2: Experiment efficacy and response efficacy
breach 2: 206 college are found to enhance behav-
students ioral intention.
Crossler and General PMT Unified 279 employees Survey Perceived severity, vulnerability, No Yes
Bélanger IT security response efficacy, and self-
(2014) security behaviors efficacy increases unified
threats security behavior.
Herath et al. Email PMT, TTAT Intention to 134 college Survey Risk perception, email No Yes
(2014) spam adopt email students screening self-efficacy, and
authentica- overall appraisal of coping
tion mechanisms increase users’
coping motivation.
Jenkins et al. Hacking PMT Creation of 135 college Experiment Just-in-time fear appeals No Yes
(2014) unique students decrease password reuse.
passwords
Anderson Internet PMT, goal Intention to Study 1: 594 1: survey Behavioral intention is influ- No Yes
and Agarwal security framing perform home users 2: experiment enced by a combination of
(2010) breaches security Study 2: 101 cognitive, social, and psycho-
behavior college logical components. Message
students framing influences the drivers of
intention.
Gurung et al. Spyware PMT Use of anti- 232 college Survey All threat and coping appraisal No Yes
(2008) spyware students variables significantly affect
tool adoption decision.
Johnston Spyware PMT Intention to 275 college Experiment Response efficacy, self-efficacy, No Yes
and adopt anti- faculty, staff, and social influence increase
Warkentin spyware and students adoption intention.
(2010) software

A2 MIS Quarterly Vol. 43 No. 2–Appendices/June 2019


Liang et al./An Emotion-Focused Coping Perspective

Table A1. Summary of IS Research on Volitional IT Security Behaviors (Continued)


Threat Theory Dependent Research
Study Context Applied Variable Sample Design Major Findings EFC PFC
Lee and Malware PMT Adoption 239 SMB Survey All threat and coping appraisal No Yes
Larsen intention executives variables significantly affect
(2009) adoption decision.
Workman et System PMT, social Omissive 588 employees Survey Threat and coping assessment, No Yes
al. (2008) breaches cognitive behavior self-efficacy, and locus of
theory control affect omissive
behaviors.
Arachchilage Phishing TTAT Avoidance 161 college Survey Procedural and conceptual No Yes
and Love motivation students knowledge jointly influence elf-
(2014) and efficacy which in turn increases
behavior avoidance motivation and
behavior.
Lai et al. Identity TTAT Protective 117 college Survey Both technological and conven- No Yes
(2012) theft behavior students tional coping are effective in
reducing identity theft.
Liang and Spyware TTAT Use of anti- 152 college Survey Threat appraisal variables affect No Yes
Xue (2010) spyware students perceived threat. All coping
software variables affect avoidance moti-
vation, which in turn influence
behavior.
Liang and General TTAT PFC and n/a Theory Individuals engage in both PFC Yes Yes
Xue (2009) IT EFC building and EFC. Perceived threat and
security avoidability interactively deter-
threats mine PFC and EFC.
Ng et al. Email HBM Precaution 134 part-time Survey Perceived susceptibility, No Yes
(2009) virus in reading college perceived benefits, and self-
emails students efficacy are determinants of
computer security behavior.
Lee and Spyware TPB, Intention to 212 Internet Survey Attitude (relative advantage and No Yes
Kozar (2005) innovation adopt anti- users moral compatibility), social
diffusion spyware influence (visibility of others’
theory software use and image) and perceived
behavioral control (computing
capacity and trialability) influ-
ence behavioral intention.

MIS Quarterly Vol. 43 No. 2–Appendices/June 2019 A3


Liang et al./An Emotion-Focused Coping Perspective

Appendix B
Coping Factors from WCQ and COPE

Coping
Type Coping Factor Definition Source Include Justification for Inclusion/Exclusion
Distancing Efforts to detach oneself or WCQ Yes Most users we interviewed reported that they tried to
create a positive outlook. forget the existence of the threat.
Self-control Efforts to regulate one’s own WCQ Yes Security threats can provoke emotions and users need to
feelings and actions. regulate these emotions. Merged with venting.
Seeking social Efforts to seek informational WCQ Yes Social support is widely used by people to cope with
support support, tangible support, stress. In our research, we are only interested in emo-
and emotional support tional support. Merged with emotional support seeking.
Accepting Acknowledging one’s own WCQ No Conceptually it is more in line with problem-focused
responsibility role in the problem with a coping because when a user accepts his/her responsi-
concomitant theme of trying bility when facing IT security threats, he/she would take
to put things right. security behaviors.
Escape- Wishful thinking and WCQ Yes Users are often unrealistically optimistic and wishfully
avoidance behavioral efforts to escape believe they are safer than others. Merged with wishful
or avoid. thinking.
Positive Efforts to create positive WCQ No It is rare for users to positively reappraise the IT security
reappraisal meaning by focusing on threat.
personal growth.
Seeking social Getting moral support, COPE Yes Merged with emotional support seeking.
support for sympathy, or understanding.
emotional
reasons
Focusing on The tendency to focus on COPE Yes Many users we interviewed reported that they expressed
and venting of whatever distress or upset their emotions when they felt the pressure of security
emotions one is experiencing and to threats.
EFC
ventilate those feelings.
Behavioral Reducing one’s effort to COPE No It is an EFC strategy when the behavior causes stress.
disengagement deal with the stressor. For example, when a child is stressed out by practicing
piano, she can disengage herself from piano playing to
reduce stress. In the IT security context, this cannot be
considered as a type of EFC, because the disengage-
ment of security behaviors does not help to regulate
emotions.
Mental dis- Distracting the person from COPE Yes The rationale is the same as for distancing.
engagement thinking about the behav-
ioral dimension or goal with
which the stressor is
interfering.
Positive Construing a stressful trans- COPE No Same as positive reappraisal. Irrelevant for the IT
reinterpretation action in positive terms. security context.
Denial Denying the reality of the COPE Yes Users deny that they are under the threat of security
event. breaches in order to mitigate stress.
Acceptance Acceptance of a stressor as COPE Yes Users develop a perception that IT security threats cannot
real. be completely eliminated and their existence have to be
accepted. This is conceptually the opposite of denial.
Turning to The tendency to turn to COPE No It is very rare for users to turn to religion when facing IT
religion religion in times of stress. security threats. It is usually used when facing major
disasters or life events. IT security threats are not severe
enough to drive people to pray for God’s help.

A4 MIS Quarterly Vol. 43 No. 2–Appendices/June 2019


Liang et al./An Emotion-Focused Coping Perspective

Coping
Type Coping Factor Definition Source Include Justification for Inclusion/Exclusion
Planful problem Deliberate problem-focused WCQ Yes Users undertake specific actions to solve IT security
solving efforts to alter the situation problems. Some of the actions require appropriate
coupled with an analytical planning and scheduling such as update of security
approach to solving the software, hard disc scan, system backup, and security
problem patching. In the research, the concept of PFC behavior
overlaps with planful problem solving.
Confrontive Aggressive efforts to alter WCQ No It is an “aggressive form of problem-focused coping that
coping the situation. is largely interpersonal” (Folkman et al 1986a, p. 995).
An example item is “I tried to get the person responsible
to change his or her mind.” It is not relevant when
dealing with IT security threats because IT security threat
is intangible.
Active coping Taking active steps to try to COPE Yes Users often actively take protective measures to reduce
remove or circumvent the IT security threats. We included it as PFC behavior.
stressor or to ameliorate its
effects.
Planning Thinking about how to cope COPE Yes It indicates users’ intention to cope with threats.
with a stressor. Consistent with PFC intention, which is considered in our
PFC
robustness test.
Suppression of Putting other projects aside, COPE No This form of coping is most appropriate when the activity
competing trying to avoid becoming to deal with the stressor is complicated and time con-
activities distracted by other events, suming. For example, a Ph.D. candidate preparing for
even letting other things her thesis defense would suppress all other competing
slide, if necessary, in order activities and focus only on her presentation. In the IT
to deal with the stressor. security context, security action is not highly complicated
and doesn’t need a lot of time to complete. Hence, it is
farfetched to claim that one has to suppress other
activities to engage in security action.
Restraint Waiting until an appropriate COPE No Makes little sense in the IT security context. When facing
coping opportunity to act presents IT security threats, it is necessary to act immediately
itself, holding oneself back, rather than wait.
and not acting prematurely.
Seeking social Seeking advice, assistance, COPE No It is an auxiliary PFC behavior because it does not
support for or information. resolve security threats directly. It reduces the threat by
instrumental influencing PFC behavior.
reasons

Note: WCQ = Ways of Coping Questionnaire (Folkman et al. 1986a); COPE = COPE inventory (Carver et al. 1989). The inclusion/exclusion
justifications are based on our deductive reasoning and interviews with 40 IT users.

MIS Quarterly Vol. 43 No. 2–Appendices/June 2019 A5


Liang et al./An Emotion-Focused Coping Perspective

Appendix C
Definitions of EFC Concepts

Concept Definition/Description Source


Emotion-focused A type of coping in which individuals try to pacify or control the emotions Carver et al. 1989; Folkman
coping (EFC) aroused by the stressful situation or to dismiss the emotional and Lazarus 1985; Liang
discomforts. It includes inward and outward EFC. and Xue 2009
Inward EFC A type of EFC that deals with attention and appraisal of the emotion- Folkman et al. 1986a; Gross
arousing situation. It relies on attentional deployment and cognitive and Thompson 2007
change to achieve emotional stability. Three specific inward EFC are
selected in our research context: denial, distancing, and wishful
thinking.
Distancing Psychological distancing, also known as “mental disengagement,” Carver et al. 1989; Folkman
refers to efforts to psychologically detach oneself from the stressor. et al. 1986b
Denial Denial is defined as refusal to admit the reality of the stressful situation. Carver et al. 1989; Liang
and Xue 2009
Wishful thinking Wishful thinking refers to a person’s escaping from the stressful Folkman et al. 1986a
situation by fantasizing that some intervening act or forth will turn things
around in a desirable direction.
Outward EFC It refers to individuals’ direct modulation of emotional responses or Gross and Thompson 2007
outcome of the emotion-generating process. Two specific outward EFC
are selected in our research context: emotional support seeking and
venting.
Emotional Emotional support seeking means that a person reaches out to his or et al. 1989; Folkman and
support seeking her social network to obtain moral support, sympathy, or understanding, Lazarus 1985
in the presence of a stressor.
Venting Venting is the engagement in actions that ventilate whatever the Beaudry and Pinsonneault
distress that a person is experiencing so that emotional stability is 2010; Carver et al. 1989
achieved.

A6 MIS Quarterly Vol. 43 No. 2–Appendices/June 2019


Liang et al./An Emotion-Focused Coping Perspective

Appendix D
Measurements

For each question, please indicate the extent to which you agree with the statement: 1 = strongly disagree, 2 = disagree, 3 = slightly disagree,
4 = neutral, 5 = slightly agree, 6 = agree, 7 = strongly agree.

Perceived Threat
Please describe how you thought about the IT security threat after you noticed it?
1. The malicious nature of the problem threatened me
2. The threat was fearful
3. The threat made me anxious

Perceived Avoidability
Taking everything into consideration (e.g., effectiveness of countermeasures, costs, and my confidence in employing countermeasures), I
thought …
1. The threat could be prevented
2. I could protect my computer from the threat
3. The threat was avoidable

Please answer the following questions based on what you have done after you noticed the IT security threat.

Emotional Support Seeking


1. I talked to someone about how I feel
2. I tried to get emotional support from friends or relatives.
3. I discussed my feelings with someone.
4. I got sympathy and understanding from someone.

Emotional Venting
1. I got upset and let my emotions out.
2. I let my feelings out.
3. I felt a lot of emotional distress and I found myself expressing those feelings a lot.
4. I got upset, and was really aware of it.

Denial
1. I refused to believe that it could happen.
2. I persuaded myself that it wouldn’t really happen.
3. I acted as though it wouldn’t really happen.
4. I said to myself, “This isn’t real.”

Psychological Distancing
1. I tried not to get too serious about it.
2. I went on as if it has nothing to do with me.
3. I tried not to think about it too much.
4. I tried to forget it as much as I can.

Wishful Thinking
1. I fantasized that it would go away or somehow be over with.
2. I fantasized that I would somehow come across a magical solution for it.
3. I fantasized that all of a sudden it disappears by itself.
4. I fantasized that everything turns out just fine as if nothing happened.

MIS Quarterly Vol. 43 No. 2–Appendices/June 2019 A7


Liang et al./An Emotion-Focused Coping Perspective

PFC Intention (for Robustness Test)


1. I intended to take safeguarding actions to counter the threat immediately.
2. I predicted I would take safeguarding actions to counter the threat immediately.
3. I planned to take safeguarding actions to counter the threat immediately.

PFC Behavior
1. I installed/updated anti-virus software.
2. I installed/updated anti-spyware software.
3. I updated my operating system with the latest security patch.
4. I turned on the Internet firewall.

Appendix E
Q-Sort Procedures and Results
We validated the items with the Q-sort method, largely following the practices by Moore and Benbasat (1991). We performed four rounds of
sorting. In each round, we recruited five judges: two business faculty members, two doctoral students, and an information security professional
who worked in the local area. When selecting the judges, we paid particular attention to their gender, nationality, and educational and profes-
sional background, so that a variety of perspectives could be offered.

We printed each of the candidate items on one 3 × 5 inch index card. In addition, we created 10 test cards for a test run with the judges. These
cards contained 10 statements about automobiles. Some of them were ambiguously worded so that they might appear equally good for two
or more categories to the judges. Before the sorting started, a set of standard instructions were read to the judges and we answered their ques-
tions about the sorting process. Then the judges sorted the 10 test cards by following the instructions. Afterward, we discussed with the judges
the sorting results and resolved problems caused by ambiguous statements. After the judges familiarized themselves with the sorting method
through this test run, we asked them to sort the emotion-focused coping items.

In Round 1, we did not provide the labels or definitions of the constructs to the judges. Each judge was asked to group the items into any
number of categories and to label and define each category with their own language. As a result, two judges came up with seven categories
and the other three came up with eight. A judge might not come up with an equivalent for every construct in our study. Similarly, some of
the categories they identified did not have equivalents in our set of constructs. A judge might also determine that a particular item did not
belong to any constructs. The inter-judge raw agreement scores averaged 0.588 and the Kappa scores averaged 0.532 (Table E1). The overall
placement ratio was 66.72% (Table E2). We examined the off-diagonal entries and found cross-loading between Denial and Psychological
Distancing. Based on this observation as well as comments from the judges, we revised the wording in two items for Denial and two items
for Wishful Thinking. We also added a new item into Wishful Thinking.

In Round 2, the revised items were sorted by another group of five judges. This time, we provided the judges with the labels and definitions
for the constructs. Other than this, the entire process, including the test run, was identical to that of Round 1. As shown in Table E1, the
average inter-judge raw agreement increased to 0.836 and the inter-judge Kappa was 0.813. All Kappa coefficients were above the recommend
threshold of 0.65 (Moore and Benbasat 1991). The overall placement ratio improved to 91.00% (Table E2).

In Round 3, we asked another five judges to participate. To test whether the improvement in inter-judge agreement and placement ratios in
Round 2 were due to the fact that Round 2 judges had the construct labels and definitions, we used the exact same items from Round 2.
However, this time the judges were told to decide by themselves how many categories should be created, how they were to be labeled, and what
their definitions would be. Four judges identified eight constructs and the remaining one found seven. All the identified constructs matched
well with the constructs in this study. Despite not having construct labels and definitions, the placement ratio continued to rise to 91.83%
(Table E2). The average inter-judge raw agreement and Kappa also showed improvement to 0.882 and 0.865, respectively (Table E1). This
assured us that the items had desirable construct validity and that the improvement from the first to the second round was not due to the judges
having construct labels and definitions. In addition, based on comments from the Round 3 judges, we modified the wording of one item for
Psychological Distancing. We also made slight changes to two items for Wishful Thinking. Each of the five constructs had four items. Overall,
we had a set of 20 items.

In Round 4, the 20 items were sorted by another five judges. Similar to Round 2, the judges had the construct labels and definitions when they
started. The sorting results showed further improvement. The average inter-judge raw agreement, average inter-judge Kappa, and the place-
ment ratio increased to 0.921, 0.933, and 95.83%, respectively.

A8 MIS Quarterly Vol. 43 No. 2–Appendices/June 2019


Liang et al./An Emotion-Focused Coping Perspective

Table E1. Inter-Judge Raw Agreement and Inter-Judge Kappa


Raw Agreement Kappa
Round 1 Round 2 Round 3 Round 4 Round 1 Round 2 Round 3 Round 4
J1-J2 0.594 0.879 0.909 0.909 0.537 0.862 0.896 0.933
J1-J3 0.656 0.697 0.818 0.939 0.605 0.653 0.793 0.966
J1-J4 0.500 0.909 0.939 0.909 0.427 0.896 0.931 0.933
J1-J5 0.625 0.909 0.939 1.000 0.565 0.896 0.931 1.000
J2-J3 0.719 0.727 0.818 0.909 0.682 0.688 0.793 0.899
J2-J4 0.438 0.909 0.909 0.879 0.386 0.896 0.896 0.866
J2-J5 0.562 0.909 0.909 0.909 0.508 0.896 0.896 0.933
J3-J4 0.625 0.727 0.818 0.909 0.576 0.692 0.793 0.899
J3-J5 0.656 0.758 0.818 0.939 0.608 0.723 0.793 0.966
J4-J5 0.500 0.939 0.939 0.909 0.422 0.930 0.931 0.933
Average 0.588 0.836 0.882 0.921 0.532 0.813 0.865 0.933

Table E2. Placement Ratio Summary


Round 1 Round 2 Round 3 Round 4
Emotional support seeking 100.00% 100.00% 95.00% 100.00%
Venting 80.00% 100.00% 90.00% 95.00%
Denial 55.00% 85.00% 90.00% 100.00%
Psychological distancing 60.00% 70.00% 90.00% 80.00%
Wishful thinking 33.33% 95.00% 90.00% 100.00%
Average 66.72% 91.00% 91.83% 95.83%

MIS Quarterly Vol. 43 No. 2–Appendices/June 2019 A9


Liang et al./An Emotion-Focused Coping Perspective

Appendix F
Cross Loadings Generated by the Pilot Study

DIS DNY WT ESS V THR PA INT ACT


Chronbach’s alpha 0.92 0.97 0.96 0.99 0.99 0.88 0.89 0.94 0.91
DIS1 0.80 0.09 0.14 0.08 0.09 -0.16 -0.06 -0.17 -0.001
DIS2 0.80 0.29 0.30 0.06 0.13 -0.01 -0.07 -0.28 -0.05
DIS3 0.82 -0.01 -0.05 -0.02 -0.14 -0.15 -0.18 -0.07 -0.04
DIS4 0.82 0.23 0.24 0.10 0.10 0.02 -0.07 -0.07 0.003
DNY1 0.18 0.91 0.15 0.14 0.06 -0.03 -0.07 -0.06 0.09
DNY2 0.15 0.92 0.05 0.17 0.07 0.02 -0.09 -0.13 0.15
DNY3 0.17 0.91 0.09 0.17 0.08 0.00 -0.16 -0.09 -0.17
DNY4 0.12 0.87 0.13 0.22 0.16 0.01 -0.09 -0.20 0.09
WT1 0.28 0.17 0.83 0.18 0.06 0.07 -0.14 -0.05 0.03
WT2 0.16 0.10 0.90 0.08 0.04 0.05 0.00 -0.12 -0.13
WT3 0.22 0.05 0.89 0.08 0.12 -0.05 -0.05 -0.02 0.03
WT4 0.08 0.12 0.88 0.07 0.12 0.03 0.11 -0.14 -0.10
ESS1 0.10 0.21 0.15 0.81 0.33 0.01 -0.04 -0.06 0.03
ESS2 0.06 0.21 0.13 0.83 0.33 0.01 -0.03 -0.04 0.05
ESS3 0.15 0.22 0.08 0.85 0.23 0.09 -0.04 -0.09 0.06
ESS4 0.12 0.23 0.13 0.88 0.20 0.03 -0.08 -0.12 0.001
V1 0.08 0.11 0.08 0.23 0.89 0.07 -0.03 -0.10 -0.02
V2 0.08 0.06 0.08 0.21 0.91 0.06 -0.08 -0.09 -0.002
V3 0.12 0.14 0.14 0.23 0.86 -0.01 -0.05 -0.15 -0.06
V4 0.07 0.06 0.07 0.21 0.91 0.07 -0.10 -0.08 -0.02
THR1 -0.04 -0.01 0.09 -0.04 -0.13 0.74 -0.16 0.05 0.18
THR2 -0.07 -0.03 -0.04 -0.02 0.14 0.91 -0.05 0.07 0.23
THR3 0.01 0.04 0.06 0.15 0.10 0.86 0.01 0.10 0.10
PA1 -0.03 -0.12 0.01 -0.10 0.01 -0.04 0.90 0.12 0.09
PA2 -0.18 -0.07 -0.06 -0.09 -0.20 -0.05 0.83 0.15 -0.01
PA3 -0.12 -0.15 0.00 0.05 -0.04 -0.06 0.85 0.25 -0.03
INT1 -0.16 -0.09 -0.15 -0.06 -0.15 0.14 0.23 0.87 0.18
INT2 -0.17 -0.13 -0.18 -0.07 -0.13 0.02 0.20 0.88 0.13
INT3 -0.18 -0.26 0.01 -0.16 -0.11 0.01 0.19 0.80 0.06
ACT1 -0.30 -0.05 -0.06 0.37 0.03 0.02 0.03 0.37 0.88
ACT2 -0.48 -0.03 -0.14 0.10 -0.11 -0.01 0.25 0.23 0.88
ACT3 -0.08 -0.03 -0.002 0.22 0.04 -0.07 -0.01 0.43 0.77
ACT4 0.05 -0.07 -0.05 -0.08 -0.04 0.09 0.01 0.08 0.60
Note: DNY = denial; DIS = psychological distancing; WT = wishful thinking; ESS = emotional support seeking; V = venting; THR =
perceived threat; PA = perceived avoidability; INT = PFC intention; ACT = PFC behavior.

A10 MIS Quarterly Vol. 43 No. 2–Appendices/June 2019


Liang et al./An Emotion-Focused Coping Perspective

Appendix G
Experiment Scenarios
Scenario 1 (High threat, high avoidability):
After you downloaded a free movie from a website that you have never visited before, you suspected that malware could be downloaded onto
your computer along with the movie. The malware could steal your personal information and make you a victim of identity theft and suffer
from serious losses. This is a serious threat. You know that you have firewall and anti-virus and anti-spyware software running on your com-
puter. You trust these protective tools and believe that they can effectively protect your computer from security breaches. You are confident
that you can easily run a scan to find and remove the malware.

Scenario 2 (High threat, low avoidability):


After you downloaded a free movie from a website that you have never visited before, you suspected that malware could be downloaded onto
your computer along with the movie. The malware could steal your personal information and make you a victim of identity theft and suffer
from serious losses. This is a serious threat. You know that you have firewall and anti-virus and anti-spyware software running on your
computer. But you are not sure these tools can protect your computer from the malware, because hackers keep finding new ways to outsmart
the security tools. You feel that there is not much you can do about the malware.

Scenario 3 (Low threat and high avoidability):


After you downloaded a free movie from a website that you have never visited before, you suspected that adware could be downloaded onto
your computer along with the movie. The adware creates pop-up ads whenever you open a new page in the browser. It can be annoying, but
nothing threatening. You know that you have firewall and anti-virus and anti-spyware software running on your computer. You trust these
protective tools and believe that they can effectively protect your computer from security breaches. You are confident that you can easily run
a scan to find and remove the adware.

Scenario 4 (Low threat and low avoidability):


After you downloaded a free movie from a website that you have never visited before, you suspected that adware could be downloaded onto
your computer along with the movie. The adware creates pop-up ads whenever you open a new page in the browser. It can be annoying, but
nothing threatening. You know that you have firewall and anti-virus and anti-spyware software running on your computer to protect your
computer from security breaches. But you are not sure these tools can protect your computer from the adware, because hackers keep finding
new ways to outsmart the security tools. You feel that there is not much you can do about the adware.

Appendix H
Measurement Validation for Study Two
Before validating the measurements, we assessed two potential biases associated with survey data: nonresponse bias and common method bias
(CMB). Following Armstrong and Overton (1977), we compared the demographic variables between the first 100 and last 100 respondents.
T-tests show that the two groups do not differ in age (p = .06), computer experience (p = .86), number of security problems experienced (p =
.59) and Internet hours per day (p = .85). Chi-square tests show that the two groups do not differ in gender (p = .49) and education (p = .41).
These results suggest that nonresponse bias is not likely to exist.

In addition to procedural remedies to reduce CMB, we conducted three statistical tests to evaluate CMB. First, we carried out the Harmon’s
one factor test by following Podsakoff et al. (2003). The items of the 10 first-order theoretical constructs were entered into a principal
component analysis. Nine factors were identified and the first factor of the unrotated solution explains only 23.63% of the total variance,
showing no indication of the existence of CMB. Second, we employed the correlational marker variable technique to assess CMB. Following
Lindell and Whitney (2001), the second smallest positive correlation amongst measurement items (r = .002) was selected as a conservative
estimate of CMB. All of the between-item correlations were adjusted by partialling out the CMB estimate. Results revealed that the
correlations only changed slightly in magnitude and remained unchanged in significance, suggesting that CMB is unlikely a concern. Third,
following Podsakoff et al., we took the single latent method factor approach to testing CMB. A confirmatory factor analysis model including
the 10 first-order constructs was created in AMOS. A latent method factor was added which took all of the construct items as its indicators.

MIS Quarterly Vol. 43 No. 2–Appendices/June 2019 A11


Liang et al./An Emotion-Focused Coping Perspective

Thus, each item was determined by both its theoretical construct and the latent method factor. The results show that the method factor only
explains on average 0.56% variance in the items whereas the theoretical constructs explain on average 64.57% (see Table H1). Variances
explain by common method only accounts for 1.03% of theoretically explained variances, indicating that CMB has no significant influence
on our data.

Table H1. Latent Common Factor Test for Common Method Bias
Factor Method
Item Loading (R1) R1² Loading (R2) R² R2² /R1²
DNY1 0.78 60.06% 0.07 0.46% 0.77%
DNY2 0.87 76.21% 0.05 0.29% 0.38%
DNY3 0.86 73.62% 0.06 0.32% 0.44%
DNY4 0.69 48.02% 0.08 0.58% 1.20%
DIS1 0.78 61.00% 0.05 0.27% 0.44%
DIS2 0.86 73.27% 0.05 0.23% 0.31%
DIS3 0.88 77.26% 0.05 0.28% 0.36%
DIS4 0.79 63.04% 0.06 0.38% 0.61%
WT1 0.84 70.39% 0.06 0.30% 0.43%
WT2 0.85 72.08% 0.05 0.25% 0.35%
WT3 0.90 81.18% 0.04 0.18% 0.22%
WT4 0.87 76.39% 0.05 0.21% 0.28%
ESS1 0.77 58.98% 0.05 0.28% 0.48%
ESS2 0.78 61.00% 0.06 0.37% 0.61%
ESS3 0.90 80.82% 0.04 0.17% 0.21%
ESS4 0.79 62.88% 0.05 0.27% 0.43%
V1 0.87 76.39% 0.05 0.25% 0.33%
V2 0.88 77.62% 0.05 0.28% 0.36%
V3 0.82 67.08% 0.06 0.32% 0.48%
V4 0.79 62.57% 0.05 0.28% 0.45%
THR1 0.74 54.61% 0.08 0.61% 1.11%
THR2 0.86 74.48% 0.07 0.50% 0.68%
THR3 0.81 65.12% 0.06 0.37% 0.57%
PA1 0.72 51.27% 0.16 2.56% 4.99%
PA2 0.80 64.00% 0.15 2.25% 3.52%
PA3 0.52 26.73% 0.13 1.72% 6.42%
INT1 0.82 67.40% 0.09 0.88% 1.31%
INT2 0.72 51.98% 0.11 1.23% 2.37%
INT3 0.78 60.53% 0.11 1.25% 2.07%
BEH1 0.87 80.10% 0.04 0.15% 0.39%
BEH2 0.85 83.36% 0.06 0.35% 0.42%
BEH3 0.79 73.27% 0.08 0.66% 0.48%
BEH4 0.72 63.68% 0.07 0.50% 0.64%
Average 0.81 66.56% 0.07 0.58% 1.03%

We then validated the measurement model with confirmatory factor analysis (CFA) using AMOS 22. For both inward EFC and outward EFC,
we respectively estimated three models: (1) the first-order model, (2) the second-order reflective model, and (3) the second-order formative
model. In covariance-based SEM, it is necessary for a formative construct to have two emitting paths to achieve model identification
(Diamantopoulos 2011; Jarvis et al. 2003). The emitting paths point to two reflective indicators of the formative construct or two other
endogenous constructs (the so-called MIMIC model). Because we did not have any reflective indicators for inward EFC and outward EFC,
we included PFC intention and PFC behavior in the CFA model.

A12 MIS Quarterly Vol. 43 No. 2–Appendices/June 2019


Liang et al./An Emotion-Focused Coping Perspective

Table H2. Confirmatory Factor Analysis for Measurement Models


Inward EFC Outward EFC
Second-Order Second-Order Second-Order Second-Order
Fit Index Cutoff First-Order Reflective Formative First-Order Reflective Formative
χ 2/df <3 3.013 2.995 2.677 3.13 2.581 2.581
CFIs > 0.90 0.982 0.982 0.985 0.984 0.988 0.988
TLI > 0.90 0.975 0.975 0.979 0.976 0.982 0.982
RMSEA < 0.08 0.046 0.046 0.042 0.048 0.041 0.041

Note: The cutoffs are based on Hu and Bentler (1999) and Gefen et al. (2011). Gefen et al. noted that the the χ²/df ratio can only be used as a
simplifying heuristic and should not be relied on to affirm acceptable model fit. GFI and AGFI are biased by sample size and degrees of freedom
and there is consensus against using these indexes to assess model fit (Sharma et al. 2005). Therefore, we focus on using CFI, TLI, and RMSEA.

As Table H2 shows, for inward EFC, the second-order formative model fits better than the first-order model and the second-order reflective
model, and for outward EFC, the second-order formative and second-order reflective models have identical fit indices and both are better than
the first-order model. However, the differences are marginal, suggesting that all three models could be valid. We selected the second-order
formative model over the first-order model because (1) it is theoretically parsimonious (Cenfetelli and Bassellier 2009; Gerbing and Anderson
1984; Law et al. 1999), and (2) it avoids the muliticollinearity issue if the first-order constructs are used as independent variables (Koufterosa
et al. 2009). We preferred the second-order formative model to the second-order reflective model because the subconstructs conceptually differ
from each other, are not exchangeable, and do not necessarily covary (Jarvis et al. 2003; Petter et al. 2007). Therefore, the formative model
is more theoretically justifiable than the reflective model.

Following Petter et al. (2007), construct validity and reliability of the second-order formative measures were assessed by examining path
weights and the VIF (variance inflation factor) statistics. As Figure H1 shows, each first-order subconstruct has a significant path pointing to
inward or outward EFC, suggesting satisfactory construct validity. The VIF values of the five first-order subconstruct are under the
recommended threshold, 3.3 (see Table H2), indicating acceptable reliability (Diamantopoulos and Siguaw 2006).

Finally, following Gefen et al. (2000), validity of all of the first-order construct measures was tested using two procedures. First, the square
root of each construct’s average variance extracted (AVE) is much greater than the construct’s correlations with all other constructs, suggesting
sufficient discriminant validity (Table H3). Second, factor loadings and cross loadings (Table H4) were generated by conducting a principal
component analysis. All factor loadings on the substantive constructs are over 0.70, suggesting sufficient convergent validity. In addition,
each item’s factor loading is much higher than its cross-loadings on other constructs, confirming the sufficiency of discriminant validity (Hair
et al. 1998). We assessed the internal consistency of each construct by examining Cronbach’s alpha and AVE. As Table 3 shows, all alpha
coefficients exceed Nunnally’s (1978) recommended .70, indicating acceptable internal consistency, and all AVEs are above the .50 level
(Fornell and Larcker 1981).

**p < .01


*p < .05

Figure H1. Second-Order Formative Models for Inward and Outward Emotion-Focused Coping

MIS Quarterly Vol. 43 No. 2–Appendices/June 2019 A13


Liang et al./An Emotion-Focused Coping Perspective

Table H3. Construct Reliability, Variance, and Correlations


Mean
(SD) VIF alpha AVE DN DIS WT ESS V THR PA PFC
DN 2.95 2.09 0.93 0.59 0.77
(1.64)
DIS 2.77 1.39 0.96 0.74 0.52** 0.86
(1.66)
WT 3.34 1.80 0.95 0.69 0.67** 0.39** 0.83
(1.87)
ESS 3.67 1.61 0.92 0.68 0.22** 0.17** 0.19** 0.82
(1.76)
V 3.85 1.65 0.94 0.70 0.26** 0.13** 0.25** 0.62** 0.83
(1.74)
THR 4.82 – 0.89 0.74 0.06 0.11* 0.11* 0.29** 0.34** 0.86
(1.21)
PA 5.38 – 0.86 0.65 -0.09* -0.22** -0.04 0.05 0.02 0.18** 0.81
(1.10)
PFC 5.45 – 0.90 0.67 -0.20* -0.27** -0.20** 0.18** 0.12** 0.29** 0.41** 0.82
(1.15)
Note: alpha = Cronbach’s alpha, DN = denial; DIS = psychological distancing; WT = wishful thinking; ESS = emotional support
seeking; V = venting; THR = perceived threat; PA = perceived avoidability; PFC = PFC behavior. Square roots of AVE are on
diagonal.

A14 MIS Quarterly Vol. 43 No. 2–Appendices/June 2019


Liang et al./An Emotion-Focused Coping Perspective

Table H4. Loadings and Cross-Loadings of the Formal Study (N = 934)


Mean SD DNY DIS WT ESS V THR PA INT BEH
DNY1 2.79 1.79 .771 .271 .291 .105 .102 .056 -.058 -.043 -.101
DNY2 2.92 1.78 .790 .365 .267 .074 .082 .057 -.084 -.033 -.092
DNY3 3.05 1.85 .769 .375 .295 .044 .080 .064 -.021 -.033 -.134
DNY4 3.08 1.92 .738 .196 .299 .106 .147 .156 -.002 -.005 -.043
DIS1 3.50 1.93 .123 .761 .124 .032 -.091 -.104 -.012 -.038 -.184
DIS2 3.05 1.91 .222 .817 .213 -.027 -.006 -.087 -.043 -.066 -.128
DIS3 3.54 1.94 .164 .876 .178 -.046 -.048 -.048 -.015 -.053 -.097
DIS4 3.38 1.93 .207 .874 .178 -.013 -.023 -.002 -.015 -.034 -.107
WT1 3.19 1.96 .301 .338 .781 .057 .113 .103 -.048 -.017 -.106
WT2 3.34 2.03 .251 .222 .840 .118 .129 .092 .002 -.049 -.067
WT3 3.37 2.08 .250 .277 .856 .077 .120 .086 -.013 -.012 -.062
WT4 3.52 2.09 .254 .315 .832 .042 .057 .092 .018 .003 -.094
ESS1 4.06 2.09 -.031 -.075 .091 .809 .234 .157 .016 .113 .141
ESS2 3.20 1.89 .200 .061 .088 .818 .198 .142 -.003 .091 -.036
ESS3 3.85 2.02 .048 .010 .037 .865 .306 .131 .007 .047 .062
ESS4 3.65 1.98 .056 .048 .041 .817 .298 .123 .030 .021 .030
V1 3.86 1.95 .093 -.021 .092 .280 .862 .186 .011 .060 -.001
V2 4.02 1.90 .042 -.018 .056 .309 .866 .178 .019 .070 .029
V3 3.61 1.90 .152 -.005 .139 .319 .803 .199 -.050 .080 -.001
V4 4.13 1.96 .088 -.091 .111 .233 .824 .239 -.002 .065 .065
THR1 4.97 1.65 -.048 -.074 .063 .073 .061 .832 .049 .088 .111
THR2 4.76 1.72 .078 -.064 .090 .085 .091 .898 .065 .058 .067
THR3 4.30 1.76 .158 -.018 .057 .192 .152 .843 .028 .080 -.016
PA1 5.66 1.17 -.113 -.054 .010 .024 -.028 .154 .799 .137 .188
PA2 5.72 1.16 -.145 -.070 .038 -.002 -.015 .111 .816 .141 .224
PA3 5.33 1.44 -.061 -.018 .079 -.008 -.002 .044 .804 -.014 .121
INT1 5.46 1.41 -.078 -.106 -.042 .098 .091 .135 .251 .818 .260
INT2 5.19 1.42 .036 -.029 -.002 .074 .094 .055 .196 .866 .194
INT3 5.46 1.38 -.066 -.096 -.024 .111 .071 .120 .281 .814 .251
BEH1 5.74 1.48 -.062 -.177 -.052 .070 .001 .102 .153 .210 .859
BEH2 5.68 1.49 -.041 -.180 -.073 .072 .007 .097 .153 .230 .869
BEH3 5.57 1.50 .006 -.186 -.111 .021 -.001 .049 .229 .152 .793
BEH4 5.87 1.37 -.183 -.069 -.053 .027 .071 .044 .164 .080 .744
Note: DNY = denial; DIS = psychological distancing; WT = wishful thinking; ESS = emotional support seeking; V = venting; THR =
perceived threat; PA = perceived avoidability; INT = PFC intention; BEH = PFC behavior.

MIS Quarterly Vol. 43 No. 2–Appendices/June 2019 A15


Liang et al./An Emotion-Focused Coping Perspective

Appendix I
Robustness Test

While PFC behavior is the most central to improve security because it directly counters IT threats, behavioral intention has been widely used
by IT security researchers to infer users’ future security behavior (e.g., Anderson and Agarwal 2010; Johnston and Warkentin 2010). To relate
this research to the broad IT security literature, we estimated an alternative research model in which PFC behavior was replaced by PFC
intention while all the other parts remained unchanged. As Figure I1 shows, the model fit is satisfactory. The left side of the model remains
virtually the same. On the right side of the model, PFC intention is reduced by inward EFC decreases (β = -.23, p < .01), but increased by
outward EFC (β = .27, p < .01), perceived threat (β = .20, p < .01), and perceived avoidability (β = .42, p < .01). Therefore, it is confirmed
that the effects of EFC are consistent, despite some changes in magnitude, on both PFC behavior and PFC intention.

Notes: **p < .01; *p < .05


χ² = 662.48; df = 231; CFI = .96; TLI = .95; RMSEA = .04
Six control variables (Age, Gender, Education, Computer Experience, Online Hours, Security Breach Experience) were included
on the endogenous constructs.

Figure I1. Robustness Test with PFC Intention as the Dependent Variable

References

Anderson, C. L., and Agarwal, R. 2010. “Practicing Safe Computing: A Multimethod Empirical Examination of Home Computer User
Security Behavioral Intentions,” MIS Quarterly (34:3), pp. 613-643.
Arachchilage, N. A. G., and Love, S. 2014. “Security Awareness of Computer Users: A Phishing Threat Avoidance Perspective,” Computers
in Human Behavior (38), pp. 304-312.
Armstrong, J. S., and Overton, T. 1977. “Estimating Nonresponse Bias in Mail Surveys,” Journal of Marketing Research (14), pp. 396-402.
Beaudry, A., and Pinsonneault, A. 2010. “The Other Side of Acceptance: Studying the Direct and Indirect Effects of Emotions on Information
Technoloyg Use “ MIS Quarterly (34:4), pp. 689-710.
Boehmer, J., LaRose, R., Rifon, N., Alhabash, S., and Cotten, S. 2015. “Determinants of Online Safety Behaviour: Towards an Intervention
Strategy for College Students,” Behaviour & Information Technology (34:10), pp. 1022-1035.
Boss, S. R., Galletta, D. F., Lowry, P. B., Moody, G. D., and Polak, P. 2015. “What Do Systems Users Have to Fear? Using Fear Appeals
to Engender Threats and Fear That Motivate Protective Security Behaviors,” MIS Quarterly (39:4), pp. 837-864.
Carver, C. S., Scheier, M. F., and Weintraub, J. K. 1989. “Assessing Coping Strategies: A Theoretically Based Approach,” Journal of
Personality and Social Psychology (56:2), pp. 267-283.
Cenfetelli, R. T., and Bassellier, G. 2009. “Interpretation of Formative Measurement in Information Systems Research,” MIS Quarterly (33:4),
pp. 689-707.

A16 MIS Quarterly Vol. 43 No. 2–Appendices/June 2019


Liang et al./An Emotion-Focused Coping Perspective

Chen, Y., and Zahedi, F.M. 2016. “Individuals’ Internet Security Perceptions and Behaviors: Polycontextual Contrasts Between the United
States and China,” MIS Quarterly (40:1), pp. 205-222.
Crossler, R., and Bélanger, F. 2014. “An Extended Perspective on Individual Security Behaviors: Protection Motivation Theory and a Unified
Security Practices (USP) Instrument,” ACM SIGMIS Database (45:4), pp. 51-71.
D’Arcy, J., Hovav, A., and Galletta, D. F. 2009. “User Awareness of Security Countermeasures and Its Impact on Information Systems
Misuse: A Deterrence Approach,” Information Systems Research (20:1), pp. 285-318.
Diamantopoulos, A. 2011. “Incorporating Formative Measures into Covariance-Based Structural Equation Models,” MIS Quarterly (35:2),
pp. 335-358.
Diamantopoulos, A., and Siguaw, J. A. 2006. “Formative Versus Reflective Indicators in Organizational Measure Development: A
Comparison and Empirical Illustration,” British Journal of Management (17:4), pp. 263-282.
Folkman, S., and Lazarus, R. S. 1985. “If it Changes it Must be a Process: Study of Emotion and Coping During Three Stages of a College
Examination,” Journal of Personality and Social Psychology (48:1), pp. 150-170.
Folkman, S., Lazarus, R. S., Dunkel-Schetter, C., DeLongis, A., and Gruen, R. J. 1986a. “Dynamics of a Stressful Encounter: Cognitive
Appraisal, Coping, and Encounter Outcomes,” Journal of Personality and Social Psychology (50:5), pp. 992-1003.
Folkman, S., Lazarus, R. S., Gruen, R. J., and DeLongis, A. 1986b. “Appraisal, Coping, Health Status, and Psychological Symptoms,” Journal
of Personality and Social Psychology (50:3), pp. 571-579.
Fornell, C., and Larcker, D. F. 1981. “Evaluating Structural Equation Models with Unobservable Variables and Measurement Error,” Journal
of Marketing Research (18:1), pp. 39-50.
Gefen, D., Rigdon, E. E., and Straub, D. 2011. “An Update and Extension to SEM Guidelines for Administrative and Social Science
Research,” MIS Quarterly (35:2), pp. iii-xiv.
Gefen, D., Straub, D., and Boudreau, M. 2000. “Structural Equation Modeling and Regression: Guidelines for Research Practice,”
Communications of the AIS (4:7).
Gerbing, D. W., and Anderson, J. C. 1984. “On the Meaning of Within-Factor Correlated Measurement Errors,” Journal of Consumer
Research (11:1), pp. 572-580.
Gross, J., and Thompson, R. A. 2007. “Emotion Regulation: Conceptual Foundations,” in Handbook of emotion regulation, J. J. Gross (ed.),
New York: Guilford Press, pp. 3-24.
Hair, J., Anderson, R., Tatham, R., and Black, W. 1998. Multivariate Data Analysis (5th ed.), Englewood Cliffs, NJ: Prentice Hall.
Herath, T., Chen, R., Wang, J., Banjara, K., Wilbur, J., and Rao, H. R. 2014. “Security Services as Coping Mechanisms: An Investigation
into User Intention to Adopt an Email Authentication Service,” Information systems journal (24:1), pp. 61-84.
Hu, L., and Bentler, P. M. 1999. “Cutoff Criteria for Fit Indexes in Covariance Structure Analysis: Conventional Criteria Versus New
Alternatives,” Structural Equation Modeling: A Multidisciplinary Journal (6:1), pp. 1-55.
Jarvis, C. B., MacKenzie, S. B., and Podsakoff, P. M. 2003. “Critical Review of Construct Indicators and Measurement Model
Misspecification in Marketing and Consumer Research,” Journal of Consumer Research (30:2), pp. 199-218.
Jenkins, J. L., Grimes, M., Proudfoot, J. G., and Lowry, P. B. 2014. “Improving Password Cybersecurity Through Inexpensive and Minimally
Invasive Means: Detecting and Deterring Password Reuse Through Keystroke-Dynamics Monitoring and Just-in-Time Fear Appeals,”
Information Technology for Development (20:2), pp. 196-213.
Johnston, A. C., and Warkentin, M. 2010. “Fear Appeals and Information Security Behaviors: An Empirical Study,” MIS Quarterly (34:3),
pp. 549-566.
Koufterosa, X., Babbar, S., and Kaighobadi, M. 2009. “A Paradigm for Examining Second-Order Factor Models Employing Structural
Equation Modeling,” Structural Equation Modeling: A Multidisciplinary Journal (120:2), pp. 633-652.
Lai, F., Li, D., and Hsieh, C.-T. 2012. “Fighting Identity Theft: The Coping Perspective,” Decision Support System (52:2), pp. 353-363.
Law, K. S., Wong, C., and Mobley, W. H. 1999. “Toward a Taxonomy of Multidimensional Constructs,” Academy of Management Review
(23:4), pp. 741-755.
Lee, Y., and Kozar, K. 2005. “Investigating Factors Affecting the Adoption of Anti-Spyware Systems,” Communications of the ACM (48:8),
pp. 72-77.
Lee, Y., and Larsen, K. R. 2009. “Threats or Coping Appraisal? Determinants of SMB Executives’ Decision to Adopt Anti-Malware
Software,” European Journal of Information Systems Research (18), pp. 177-187.
Liang, H., and Xue, Y. 2009. “Avoidance of Information Technology Threats: A Theoretical Perspective,” MIS Quarterly (33:1), pp. 71-90.
Liang, H., and Xue, Y. 2010. “Understanding Security Behaviors in Personal Computer Usage: A Threat Avoidance Perspective,” Journal
of the Association for Information Systems (11:7), pp. 394-413.
Lindell, M. K., and Whitney, D. J. 2001. “Accounting for Common Method Variance in Cross-Sectional Research Designs,” Journal of
Applied Psychology (86:1), pp. 114-121.
Moore, G. C., and Benbasat, I. 1991. “Development of an Instrument to Measure the Perceptions of Adopting an Information Technology
Innovation,” Information Systems Research (2:3), pp. 192-222.
Ng, B.-Y., Kankanhalli, A., and Xu, Y. C. 2009. “Studying Users’ Computer Security Behavior: A Health Belief Perspective,” Decision
Support System (46:4), pp. 815-825.

MIS Quarterly Vol. 43 No. 2–Appendices/June 2019 A17


Liang et al./An Emotion-Focused Coping Perspective

Nunnally, J. 1978. Psychometric Theory (2nd ed.), New York: McGraw-Hill.


Petter, S., Straub, D., and Rai, A. 2007. “Specifying Formative Constructs in Information Systems Research,” MIS Quarterly (31:4), pp.
623-656.
Podsakoff, P. M., MacKenzie, S. B., Lee, J. Y., and Podsakoff, N. P. 2003. “Common Method Biases in Behavioral Research: A Critical
Review of the Literature and Recommended Remedies,” Journal of Applied Psychology (88:5), pp. 879-903.
Sharma, S., Mukherjee, S., Kumar, A., and Dillon, W. R. 2005. “A Simulation Study to Investigate the Use of Cutoff Values for Assessing
Model Fit in Covariance Structure Models,” Journal of Business Research (58), pp. 935-943.
Tsai, H.-Y. S., Jiang, M., Alhabash, S., LaRose, R., Rifon, N. J., and Cotten, S. R. 2016. “Understanding Online Safety Behaviors: A
Protection Motivation Theory Perspective,” Computers & Security (59), pp. 138-150.
Tu, Z., Turel, O., Yuan, Y., and Archer, N. 2015. “Learning to Cope with Information Security Risks Regarding Mobile Device Loss or Theft:
An Empirical Examination,” Information & Management (52:4), pp. 506-517.
Workman, M., Bommer, W. H., and Straub, D. 2008. “Security Lapses and the Omission of Information Security Measures: A Threat Control
Model and Empirical Test,” Computers in Human Behavior (24:6), pp. 2799-2816.

A18 MIS Quarterly Vol. 43 No. 2–Appendices/June 2019


Copyright of MIS Quarterly is the property of MIS Quarterly and its content may not be
copied or emailed to multiple sites or posted to a listserv without the copyright holder's
express written permission. However, users may print, download, or email articles for
individual use.

S-ar putea să vă placă și