Woon et al. 2005, Siponen et al. 2006, Chenoweth et al. 2009, Workman et al. 2008). For example, LaRose and Rifon (2007) apply PMT in the privacy realm in exactly the same manner it is studied in health. They analyze how to encourage individuals to protect themselves on the Internet. Other studies (i.e.Chenoweth et al. 2009, Siponen et al. 2006) study compliance with IS security measures. Most noteworthy is Workman et al.‟s (2008) study that investigates individuals‟ attempts to circumvent security measures deliberately. Their study draws on PMT, but fails to incorporate maladaptive behavior which is an important predictor of behavior in PMT research