Skip to main content

Fear appeals on commercial web pages: a qualitative study

  • Chapter
  • 639 Accesses

Part of the book series: Europäische Kulturen in der Wirtschaftskommunikation ((EKW,volume 4))

Abstract

ThunderStore BV, a Dutch software creator and distributor specializing in content security software for corporations, was in the final stages of completing its newest product called X-Tra Secure in May 2001. X-Tra Secure is a corporate content security solution, designed to prevent undesired, inaccurate, illegal, and unknown data usage. While current security measures taken by organizations allow for determining who is authorized to access business critical data and where they are authorized to access it, X-Tra Secure additionally allows for the monitoring and regulating of what data is in use, when and how it is used, who uses it and where it is stored. The program analyzes data on file content, file properties, location and the application opening it even before it reaches the operating system, and reacts according to the X-Tra Secure policies set by the organization, e.g. by (not) allowing the requested file to be opened, read, saved, copied, deleted, etc.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   69.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   84.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  • Gronroos, Christian (1990): Relationship Approach to Marketing in Service Context: The Marketing and Organizational Behavior Interface. In: Journal of Business Research 20, 3–11.

    Article  Google Scholar 

  • Herzberg, Frederick (1966): Work and the Nature of Man. New York: World Publishing.

    Google Scholar 

  • Herzberg, Frederick (1968): One more time: How do you motivate employees? In: Harvard Business Review, January-February, 53–62.

    Google Scholar 

  • Herzberg, Frederick (1987): One more time: How do you motivate employees? In: Harvard Business Review, September-October, 109–120.

    Google Scholar 

  • Hoffman, Donna L./ Novak, Thomas P./ Chatterjee, Patrali (1995): Commercial Scenarios for the Web: Opportunities and Challenges. http://www.ascusc.org/jcmc/vol1/issue3/hoffman. html

    Google Scholar 

  • Korzilius, Hubert (2000): De kern van survey-onderzoek. Assen: van Gorcum.

    Google Scholar 

  • Looff, Aart-Jan de (2000): www.farmasites.nl. Een kwaliteitsonderzoek naar Nederlandse farmaceutische websites. Not in print.

    Google Scholar 

  • Parker, Roger C. (2000): Relationship Marketing on the Internet. http://www.businesstown. com/internet/basic-types.asp

    Google Scholar 

  • Ruiter, Rob/ Verplanken, Bas/ de Cremer, David/ Kok, Gerjo (2001a): Danger Control and Fear Control in Response to Fear Appeals: The Role of Need for Cognition. Under review.

    Google Scholar 

  • Ruiter, Rob/ Kok, Gerjo/ Verpianken, Bas/ Werrij, Marieke (2001b): Evoked Fear and the Moderating versus Additive Role of Efficacy Beliefs in Processes of Fear Control and Danger Control. Submitted for publication.

    Google Scholar 

  • Strauss, Judy/ Frost, Raymond D. (1999): Marketing on the Internet: Principles of online marketing. Upper Saddle River, New Jersey: Prentice Hall, Inc.

    Google Scholar 

  • Witte, Kim (1992): Putting the Fear Back Into Fear Appeals: The Extended Parallel Process Model. In: Communication Monographs, 59, 329-349. Also: http://www.msu.edu/~wittek/ fearback.htm

    Article  Google Scholar 

  • Witte, Kim (1993): Message and Conceptual Confounds in Fear Appeals: The Role of Threat, Fear, and Efficacy. In: Southern Communication Journal, 58, 147–155.

    Google Scholar 

  • Witte, Kim (1994a): Fear Control and Danger Control: A Test of the Extended Parallel Process Model ( EPPM ). Communication Monographs, 61, 113–134.

    Article  Google Scholar 

  • Witte, Kim (1994b): Generating Effective Risk Messages: How Scary Should Your Risk Communication Be? In: Communication Yearbook, 18, 229–254.

    Google Scholar 

  • Witte, Kim (1998): Fear as Motivator, Fear as Inhibitor: Using the Extended Parallel Process Model to Explain Fear Appeal Successes and Failures. In: Andersen, Peter A./ Guerrero, Laura K. (Eds.), Communication and Emotion: Theory, Research, and Applications. Academic Press.

    Google Scholar 

  • Witte, Kim/ Berkowitz, Judy M./ Cameron, Kenzie A./ McKeon, Janet K. (1998): Preventing the Spread of Genital Warts: Using Fear Appeals to promote Self-Protective Behaviors. In: Health & Education Behavior, 25 (5), 571–585.

    Google Scholar 

  • Zhang, Phing/ von Dran, Gisela M. (2000): Satisfiers and Dissatisfiers: A Two-Factor Model for Website Design and Evaluation. In: Journal of the American Society for Information Science. 51 (14), 1253–1268.

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Dagmar Neuendorff Christopher M. Schmidt Martin Nielsen

Rights and permissions

Reprints and permissions

Copyright information

© 2004 Deutscher Universitäts-Verlag/GWV Fachverlage GmbH, Wiesbaden

About this chapter

Cite this chapter

Kroese, D.A. (2004). Fear appeals on commercial web pages: a qualitative study. In: Neuendorff, D., Schmidt, C.M., Nielsen, M. (eds) Marktkommunikation in Theorie und Praxis. Europäische Kulturen in der Wirtschaftskommunikation, vol 4. Deutscher Universitätsverlag. https://doi.org/10.1007/978-3-322-81329-9_3

Download citation

  • DOI: https://doi.org/10.1007/978-3-322-81329-9_3

  • Publisher Name: Deutscher Universitätsverlag

  • Print ISBN: 978-3-8244-4563-9

  • Online ISBN: 978-3-322-81329-9

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics