1 Introduction

Banks’ information systems are threatened by a huge variety of risks that arise from employees using information technology in their daily work. Actually, bank industry reports highlight the problematic situation by presenting a total number of 45.050 operational loss events with an average gross loss size of € 285.277 reported by 60 international banking groups [23]. Incidents associated with the interaction of employees and information systems occur because of a toxic combination of reasons, often related to employees’ non-compliance with banks’ information security policy (ISP) [24]. Especially for banks, much is at risk, because an information security breach can lead to enormous reputational and operational damages [10].

To mitigate these risks, banks have implemented employee centric information security awareness (ISA) programs to actively protect their information assets [5]. An increased awareness concerning information security risks and threats is by many considered as the most cost-effective control of an organization [11]. ISA programs make employees sensitive to foster security of organizations’ information systems and be aware of information security risks [8]. Actual topics for ISA programs are, among others, phishing attacks, social engineering, passwords security, secure internet use and clear screen policy [5].

In general, Protection Motivation Theory (PMT) is used to discover motivational influences on the intention for a compliant security behavior [17, 28]. Until now, scientific research has largely neglected analyzing the effects of ISA programs on employees’ protection motivation and its subsequent effects on the individual intention to comply with the ISP. We seek to fill this gap and also expect that the variables of PMT will act as mediators governing the relationship between the perception of the ISA programs and the individual’s intention to comply with the ISP. Additionally, we assume that employees actually behave in a more desirable way when they know that their actions are monitored by the bank. Previous research on monitoring confirmed that vulnerability or severity may affect individual attitudes toward monitoring [35]. Hence, we also aim at unraveling the influence on monitoring on the actual behavioral outcomes of these behavioral intentions in the ISP context of our study.

The paper has five sections. The next section provides theoretical foundations of ISA programs and PMT, develops the research hypotheses and the research model. Next, the research methodology is presented followed by the evaluation of the measurement and structural models. Then, we briefly discuss the main findings and finally conclude the paper with a short summary and directions for further research.

2 Research Background and Hypotheses

A recent literature review on behavioral information security research highlights the emphasis of prior research on four major theories, namely Theory of Planned Behavior, General Deterrence Theory, Technology Acceptance Model and the PMT [20]. The PMT addresses the determination of fear appeals and how individuals cope with the danger brought about by information security risks and threats [17, 28]. PMT has been considered as one the most powerful theories explaining individuals’ intentions to engage in compliant actions [9, 20]. In the context of information security compliance, prior studies reported positive effects of all constructs of PMT on self-reported behavioral intentions [20, 21, 30, 36]. Our research aim is to extend these studies by focusing on the evaluation of the impact of ISA programs on employees’ protection motivation, which should in turn impact the intention to comply, thereby conceptualizing protection motivation as mediator. Figure 1 visualizes the research model including all hypotheses, which will be developed in the next sub-sections.

2.1 The Role of Protection Motivation Theory

PMT has been repeatedly examined and discussed in the extant behavioral information security literature [14, 15, 17, 21, 30, 34, 36]. The original theory builds upon threat and coping appraisal. Threat appraisal consists of the constructs perceived vulnerability and perceived severity of an event [30]. Perceived vulnerability is defined as an individual’s perception of the probability of an information security incident, which in our context is caused by behavioral non-compliance with the ISP [17]. In contrast, perceived severity reflects the impact of an information security incident caused by non-compliance with the ISP [17, 31]. Previous research has shown mixed results concerning significant effects of perceived vulnerability and perceived severity on intention for compliant security behavior [15, 17, 25, 30]. Nonetheless, meta studies showed significant low positive effects [9, 20], hence we assume similar outcomes.

Fig. 1.
figure 1

Research model and hypotheses

Response efficacy and self-efficacy together constitute coping appraisal, which has a significant impact on behavioral intentions according to meta-studies on PMT [9, 22]. Response efficacy is the expectancy of the employee that the threat or risk can be mitigated by conducting the ISP compliant security behavior [20], while self-efficacy is the belief that one is able to conduct the requested behavior for compliance. In particular, self-efficacy has a positive effect on behavioral intention for a compliant security behavior [17, 25, 30]. In terms of, response efficacy previous research provides mixed results with no or marginally significant impacts [18, 25, 31] and positive impacts on compliant security behavior [17]. To conclude, we propose the following:

H1: Perceived vulnerability has a positive effect on the intention for compliant security behavior.

H2: Perceived severity has a positive effect on the intention for compliant security behavior.

H3: Response efficacy has a positive effect on the intention for complaint security behavior.

H4: Self-efficacy has a positive effect on the intention for compliant security behavior.

2.2 The Effects of ISA Programs on Employees’ Protection Motivation

The aim of ISA programs is to increase employees’ ISA concerning current information security threats and risks by delivering the content of the ISP to banks’ employees [5, 33]. In practice, ISA programs vary from bank to bank and different methods are used to make their employees more aware [4, 5]. ISA programs can be structured as intense and coordinated campaigns or simply consist of several isolated initiatives [5, 19]. An increased ISA through such programs can lead to improvements of employees’ security compliance behavior [8]. Hence, we generally assume that ISA programs positively affect the intention for compliant security behavior [3]. More specifically, we posit that ISA programs have positive direct and indirect effects on the intention for compliant security behavior. The indirect effects should be delivered via the PMT constructs as mediators. We therefore suggest:

H5 (direct effects): ISA programs have a positive effect on the intention for compliant security behavior.

H5a–d (indirect effects): The positive effects of ISA programs on the intention for compliant security behavior are mediated by perceived vulnerability (H5a), by perceived severity (H5b), by response efficacy (H5c), and by self-efficacy (H5d).

ISA programs usually highlight current information systems risks and threats, such as those related to phishing or other social engineering attacks [5]. Consequently, employees should benefit from getting a realistic picture of threat scenarios. Thus, we assume that ISA programs increase employees’ perceptions on vulnerabilities and threat severity. Moreover, employees’ response efficacy and self-efficacy should benefit from ISA programs, because employees usually also receive more knowledge about rules and work practices and information on how to conduct compliant security behavior [5]. We assume that employees’ ISA is an important precondition for employees’ protection motivation, hence we propose:

H6: ISA programs have a positive effect on perceived vulnerability.

H7: ISA programs have a positive effect on perceived severity.

H8: ISA programs have a positive effect on response efficacy.

H9: ISA programs have a positive effect on self-efficacy.

2.3 The Role of Perceived Monitoring

Behavioral theories basing on self-reported data often examine the relationship between behavioral intent and actual behavior [20]. The correlation of these two constructs is assumed in the Theory of Planned Behavior as well as in PMT [20]. Hence, a variety of studies have already confirmed the significance of this relationship in behavioral information security context [25, 30, 31]. But recent research calls for more research on the behavioral contingencies of intention, i.e., the variables which possibly moderate the effects of intention on actual behavior [20]. Especially in the banking context, money is data in the information systems and banks need to monitor how employees are acting [5]. We assume that the employees’ perception of monitoring will enhance his or her actual compliant security behavior. Hence, we conclude:

H10: The intention for compliant security behavior has a positive effect on actual compliant security behavior.

H11: Perceived monitoring has a positive moderation effect on the positive relationship between intention and actual complaint security behavior.

3 Research Methodology

A positivistic research approach was applied to test the developed research hypotheses with a quantitative survey. All constructs of our research model were adopted from supporting empirical research in the context of behavioral information security [7, 16, 17, 31]. The questionnaire was pre-tested and afterwards improved according to pre-testers’ comments.

Finally, we utilized a crowdsourcing platform to contact bank employees from German banks. The platform has a user base of 70,000 active members from all regions in Germany, which were all invited to participate. The respondents first had to qualify as valid target persons before they were invited to assess the questionnaire. This multistage selection process finally led to 183 valid responses from bank employees working in Germany and allowed for covering a range of different banks which differ in the frequency and quality of their ISA programs. A recent study suggested that respondents from crowdsourcing platforms have advantages over other sampling procedures commonly used in behavioral survey research. While their response behavior seems to be equal to traditional participants pools, they, e.g., offer more diversity in particular in terms of work experience when compared to student samples [6]. However, our sample seems to be biased towards younger male professionals. It consists of 135 men and 48 women, and the majority of the respondents is below 30 years old. 85 % of the respondents have between one and ten years work experience in the banking sector.

The collected data was analyzed by conducting a partial least squares structural equation modeling (PLS-SEM) analysis [12] with SmartPLS [27]. We carefully considered all quality and validity criteria following current recommendations [12, 13, 29].

4 Validation of the Measurement Model

The measurement model was tested with all quality and validity criteria required by contemporary recommendations [12, 13, 29]. Table 1 summarizes the goodness-of-fit criteria. First, all relevant values of Cronbach’s α and composite reliability are above the critical value (0.70), which is evidence for internal consistency reliability of the results. Second, all assessed loadings exhibit above the required value of 0.70, hence indicator reliability is adequate. Third, regarding convergent validity, the recommended threshold of 0.50 for the criteria AVE was exceeded by all values, hence more than the half of the variance of the indicators is explained by the constructs [12]. Overall, all considered quality and validity criteria meet the contemporary recommendations.

Table 1. Measurement model validity and reliability (all constructs are reflective)

5 Evaluation of the Structural Model

We firstly conducted a PLS-SEM analysis to test the direct effects of PMT’s latent constructs and examine the proposed hypotheses. As Fig. 2 illustrates, the research models’ predictive accuracy for the variables intention for compliant security behavior and actual compliant security behavior seems to be acceptable, because the values of R2 are high compared with the results of prior research [20, 30] and recommendations from scholarly research [12]. In contrast, R2 values of perceived vulnerability and perceived severity are low. Furthermore, the achieved level of R2 for response efficacy and self-efficacy is adequate and indicates that ISA is an important precondition for the constructs. It is also necessary to consider the effect sizes (f2) to discuss the strength of the direct effects on the paths between the latent constructs.

Fig. 2.
figure 2

Empirical results

Table 2. Verdict on structural relationships of the research model

Next, bootstrapping with 5,000 subsamples was conducted to calculate t-statistics and further to evaluate the significance of the path coefficients [12]. Table 2 illustrates path coefficients, t-values and f2 effect sizes, which were used to quantify the size of an effect of an endogenous on an exogenous factor [12].

Finally, we conducted the mediation analysis. Contemporary mediation analysis suggests firstly focusing on the significance of the indirect variable (IV) for predicting the mediators, which is the case for all four PMT constructs. Secondly, the mediators should affect the dependent variable (DV), which is not the case for perceived vulnerability. Thirdly, the direct path between these variables (IV->DV) needs to be assessed. When removing the mediator, the path coefficient on this direct path should increase and be significant [2]. The later condition holds for our remaining three mediation hypotheses (H5b: p < .10, H5c–d: p < .01). Finally, the Sobel test [32] confirmed these significant mediation effects after performing bootstrapping with replacement (H5b: p < .10, H5c–d: p < .01).

6 Discussion of the Results

Overall, our findings confirm the import roles of protection motivation and monitoring in establishing ISA programs that affect the employees’ intentions for compliant security behavior. While we can also confirm that ISA programs have a positive weak direct effect on the intention for compliant security behavior, thereby supporting hypothesis H5, three constructs of protection motivation and especially coping appraisal act as a mediators allowing for indirect effects. We will discuss these results now in more detail.

In terms of coping appraisal, we detected moderate positive effects of ISA programs on response efficacy and self-efficacy, thereby supporting hypotheses H8 and H9. The results therefore confirm that coping appraisal is effectively improved by ISA programs. This can be explained by the common use of ISA programs to provide guidelines for employees on how to act and also information about the effectiveness of the actions to comply with the ISP [5]. In addition, both coping appraisals are important variables in terms of mediating the effects of ISA programs on the intention to comply, thereby supporting hypotheses H5c and H5d. This means that improved response efficacy and self-efficacy are conditions which increase the positive effects of ISP programs on the intention for compliant security behavior. Subsequently, both constructs of coping appraisal have weak positive effects on the intention for a compliant security behavior, thereby supporting H3 and H4. This finding corresponds with [17, 21] and contradicts prior research [30]. Our results clearly indicate that employees, which belief that they can mitigate information security risks with their compliant behavior, have a higher intention to act according to the ISP.

With regard to threat appraisal, our results indicate that ISA programs have a weak positive effect on perceived severity, hence hypothesis H7 is supported. In fact, the ISA programs may utilize frightening fear-based communication as well as information to clarify the potential impacts, and therefore successfully highlight the possible negative impact of an information security threat [19]. However, contrary to our expectations, ISA programs have negative effects on the other threat appraisals construct, perceived vulnerability, thereby contradicting hypothesis H6. We therefore assume that employees’ consummation of an ISA programs help employees to deal with information security threats and risks, and, consequently, this leads to a decrease of the perceived probability of a security incident. This is also potentially dangerous and may lead to a false sense of security as employees may underestimate the possibility that their information system could be threatened [1]. Further, perceived vulnerability has no direct effect on the intention for a compliant security behavior, thereby not supporting H1. Previous results showed positive effects [17, 30]. An explanation may refer to other environmental or contextual factors to explain this result [16, 24, 33]. Besides, perceived severity has a significant positive effect on intention, thereby supporting H2. While this result supports our theorization, it adds empirical evidence to mixed results reported in literature in terms of positive or negative effects of perceived severity on intention [17, 30]. It terms of mediating effects of ISA programs on the intention to comply, threat appraisals are not as important as coping appraisals. Only hypothesis H5b is weakly supported, while hypothesis H5a is rejected. It seems that ISA programs are more successful in terms of offering coping actions and relatively less effective it terms of actually increasing awareness about threats and risks. Employees may often miss connecting ISP content with the likelihood of a real danger [5]. We need to recommend that future research should explore these relationships in more detail.

Finally, we confirm that perceived monitoring positively moderates the positive effects of intention to actual compliant security behavior, therefore supporting hypotheses H10 and H11. Our data analysis confirms a partial positive moderation effect of organizational monitoring on the intention-behavior link. However, we can assume that also other contextual factors influence this relationship [16, 24, 33] and future research should address further contingencies.

The findings have also several implications for practice. First, ISA programs are currently well designed to increase employees’ coping appraisal in terms of both, response efficacy and self-efficacy. This means that they are already effective in convincing employees about the value of the behavior and about how to behave, respectively. Second, in terms of threat appraisals, ISA programs seem to have adverse effects on perceived vulnerability based on our sample. In other words, ISA programs seem to lower the perception of the probability of an information security threat, maybe due to the fact that employees tend to protect themselves better after consuming ISA programs. We still recommend that ISA programs should communicate more the occurrence of real threats from media or inside the company and the concept of residual risks in order to increase the perceptions of vulnerability [26]. Nonetheless, the findings indicate that ISA programs eventually increase the intention for compliant security behavior. Third, ISA programs should communicate that employees are monitored, which strengthens the relationship between intention and actual compliant information security behavior.

7 Conclusion

Our study points to important theoretical implications with regard to PMT as prior literature has largely neglected to investigate the role of ISA programs and organizational monitoring to ultimately improve information security behavior. Our main findings illustrate that ISA programs affect employees’ coping appraisals in terms of response and self-efficacy. Both variables are also mediators adding to the positive direct effects of ISA programs on the intention for compliant security behavior. Similarly, ISA programs have positive effects on employees’ perceived severity, which positively affects the intention to comply with the ISP. However, ISA programs may have adverse effects on the perceived vulnerability possibly signaling a false sense of security. Especially these initial findings merit more attention in future research. Finally, perceived organizational monitoring is important as it partially positively moderates the well-established intention to actual behavior connection.