Through a prime lens: a review of the extension of protection motivation theory to study user information security behaviours within organisations

dc.contributor.advisorvan Eck, Daneel
dc.contributor.emailichelp@gibs.co.za
dc.contributor.postgraduateWilliams, Alfred
dc.date.accessioned2026-04-21T08:46:26Z
dc.date.available2026-04-21T08:46:26Z
dc.date.created2026-05-05
dc.date.issued2025
dc.descriptionMini Dissertation (MPhil (Evidence-Based Management))--University of Pretoria, 2025
dc.description.abstractInformation security breaches have become more prevalent and severe for organisations, with users often being labelled as both the cause of such breaches and, lately, the first line of defence against such breaches. The dual role of users in information security has led to the study of user information security behaviour, especially in understanding the factors that influence users' motivation to behave in a manner that enhances or exposes organisational information security. Behavioural Information Security, a field dedicated to the study of user information security behaviour, has emerged and grown to provide a sturdy foundation for scholarly advancements in the field; however, the literature has remained contradictory and divergent. Although reviews have been conducted to address the disjointed literature, this review employs Protection Motivation Theory as a primary theory to synthesise the literature, examining how it has been extended in specific contexts. In doing so, it highlights how the theory is integrated with others to understand user behaviour in organisational information security, using a common base. This paper reviews existing literature using the PRISMA framework, identifying and analysing prominent academic research papers in Behavioural Information Security. Eight dimensions that share commonalities with the Protection Motivation Theory in Behavioural Information Security were highlighted. These eight dimensions are examined, gaps identified, and a roadmap for future research is provided.
dc.description.availabilityUnrestricted
dc.description.degreeMPhil (Evidence-Based Management)
dc.description.departmentGordon Institute of Business Science (GIBS)
dc.description.facultyGordon Institute of Business Science (GIBS)
dc.description.sdgSDG-16: Peace, justice and strong institutions
dc.identifier.citation*
dc.identifier.otherA2025
dc.identifier.urihttp://hdl.handle.net/2263/109654
dc.language.isoen
dc.publisherUniversity of Pretoria
dc.rights© 2025 University of Pretoria. All rights reserved. The copyright in this work vests in the University of Pretoria. No part of this work may be reproduced or transmitted in any form or by any means, without the prior written permission of the University of Pretoria.
dc.subjectUCTD
dc.subjectBehavioural information security
dc.subjectProtection motivation theory
dc.subjectCybersecurity
dc.titleThrough a prime lens: a review of the extension of protection motivation theory to study user information security behaviours within organisations
dc.typeMini Dissertation

Files

Original bundle

Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
Williams_Through_2025.pdf
Size:
2.74 MB
Format:
Adobe Portable Document Format

License bundle

Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
license.txt
Size:
1.71 KB
Format:
Item-specific license agreed upon to submission
Description: