History
Protection motivation theory was developed by R.W. Rogers in 1975 in order to better understand fear appeals and how people cope with them. However, Dr. Rogers would later expand on the theory in 1983 to a more general theory of persuasive communication. The theory was originally based on the work ofTheory
Threat-appraisal process
The threat appraisal process consists of both the severity and vulnerability of the situation. It focuses on the source of the threat and factors that increase or decrease likelihood of maladaptive behaviours. Severity refers to the degree of harm from the unhealthy behavior. Vulnerability is the probability that one will experience harm. Another aspect of the threat appraisal is rewards. Rewards refer to the positive aspects of starting or continuing the unhealthy behavior. To calculate the amount of threat experienced take the combination of both the severity and vulnerability, and then subtract the rewards. Threat appraisal refers to children's evaluation of the degree to which an event has significant implications for their well-being. Theoretically, threat appraisal is related to Lazaraus' concept of primary appraisal, particularly to the way in which the event threatens the child's commitments, goals, or values. Threat appraisal is differentiated from the evaluation of stressfulness or impact of the event in that is assesses what is threatened, rather than simply the degree of stress or negativity of an event. Threat appraisal is also differentiated from negative cognitive styles, because it assesses children's reported negative appraisals for specific events in their lives rather than their typical style of responding to stressful events. Theoretically, higher threat appraisals should lead to negative arousal and coping and to increased psychological symptomatology.Coping-appraisal process
The coping appraisal consists of the response efficacy, self-efficacy, and the response costs. Response efficacy is the effectiveness of the recommended behavior in removing or preventing possible harm. Self-efficacy is the belief that one can successfully enact the recommended behavior. The response costs are the costs associated with the recommended behavior. The amount of coping ability that one experiences is the combination of response efficacy and self-efficacy, minus the response costs. The coping appraisal process focuses on the adaptive responses and one's ability to cope with and avert the threat. The coping appraisal is the sum of the appraisals of the responses efficacy and self-efficacy, minus any physical or psychological "costs" of adopting the recommended preventive response. Coping Appraisal involves the individual's assessment of the response efficacy of the recommended behavior (i.e. perceived effectiveness of sunscreen in preventing premature aging) as well as one's perceived self-efficacy in carrying out the recommended actions. (i.e. confidence that one can use sunscreen consistently). The Threat and coping appraisal variables combine in a fairly straightforward way, although the relative emphasis may vary from topic to topic and with target population. In ''Stress, Appraisal, and Coping'',Response efficacy
Response efficacy concerns beliefs that adopting a particular behavioral response will be effective in reducing the diseases' threat, and self-efficacy is the belief that one can successfully perform the coping response. In line with the traditional way of measuring the consequences of behavior, response efficacy was operationalized by linking consequences to the recommended behavior as well as to whether the subject regarded the consequences as likely outcomes of the recommended behavior. Among the 6 factors (vulnerability, severity, rewards, response efficacy, self-efficacy, and response costs), self-efficacy is the most correlated with protection motivation, according to meta-analysis studies.Applications
Measures
Each influential factor is generally measured by asking questions through a survey. For example, Boer (2005) studied on intention of condom use to prevent from getting AIDS guided by protection motivation theory. The study asked the following questions to individuals: "If I do not use condoms, I will run a high risk of getting HIV/AIDS." for vulnerability, "If I became infected with HIV or get AIDS, I would suffer from all kind of ailments." for severity, "Using condoms will protect me against becoming infected with HIV." for response efficacy, and "I am able to talk about safe sex with my boyfriend/girlfriend."Applied research areas
Protection motivation theory conventionally has been applied in the personal health contexts. A meta-analysis study on protection motivation theory categorized major six topics: cancer prevention (17%), exercise/diet/healthy lifestyle (17%), smoking (9%), AIDS prevention (9%), alcohol consumption (8%), and adherence to medical-treatment regimens (6%). As the minority topics, the study presented prevention of nuclear war, wearing bicycle helmets, driving safety, child-abuse prevention, reducing caffeine consumption, seeking treatment for sexually transmitted diseases, inoculation against influenza, saving endangered species, improving dental hygiene, home radon testing, osteoporosis prevention, marijuana use, seeking emergency help via 911, pain management during and recovery after dental surgery, and safe use of pesticides. All these topics were directly or indirectly related to personal physical health. Aside from personal physical health research, the application of protection motivation theory has extended to other areas. Namely, researchers focusing on information security have applied protection motivation theory to their studies since the end of the 2000s. The general idea here has been to use threats or information security policies to encourage protection security behaviors in the workplace. Accordingly, a more recent security application of protection motivation theory by Boss et al. (2015), returned to use of the full nomology and measurement of fear in an organizational security context with two studies. A process-variance model of protection motivation theory was strongly supported in this context, as depicted in Figure 1.{{cite journal , last1 = Boss , first1 = Scott R. , last2 = Galletta , first2 = Dennis F. , last3 = Benjamin Lowry , first3 = Paul , last4 = Moody , first4 = Gregory D. , last5 = Polak , first5 = Peter , year = 2015 , title = What do users have to fear? Using fear appeals to engender threats and fear that motivate protective behaviors in users , ssrn = 2607190 , journal = MIS Quarterly , volume = 39 , issue = 4, pages = 837–864 , doi = 10.25300/MISQ/2015/39.4.5See also
* Terror management theoryReferences