1. Introduction
The work environment’s demands and challenges can hugely affect employees’ behaviors and their work efficiency and output (Turnbull, 2016). One of the most essential workplace elements is the sense of security. Organizations can achieve high work performance when employees feel secure, satisfied, and self-respected (Potter et al., 2019). Though security is embedded in all aspects of the workplace environment, it is also equally intertwined into personal and social interactions. Employee’s interactions affect behaviors in one or another way. Interpersonal trust, friendliness, and manners may result in the organization’s progress or decline (Jenkins et al., 2014). According to Naveed and Alwani (2010), if workers are not healthy and happy, both the organization and the worker suffer, and the organization’s credibility is affected.
In this study, we explored harassment as a determinant of employee protection behavior. In a diverse workplace, a person may be harassed unexpectedly based on gender, religion, politics, ethnicity, and lingual biases (Khan et al., 2018), so a person may be likewise motivated to appraise and cope with the arising threatening situations at the workplace (Aubé et al., 2014). Workplace harassment is described as any act or threat of physical attack, harassment, intimidation, or other threatening disruptive behavior at work. Workplace harassment can take many forms, including workplace bullying, workplace mobbing, workplace incivility, workplace sabotage, workplace stalking, and others (Ferris et al., 2017).
According to Ramsaroop and Parumasur (2007) harassment, is sexual advancement, demands for sexual favors, and sexually verbal or physical activity that is unwelcome. There are two forms of sexual assault; firstly, Employees are subjected to sexual harassment by colleagues other than managers and supervisors. Secondly, workplace sexual harassment when the boss or supervisor demands or requests sexual favors returns for some job gain. Harassment in the workplace refers to the cruel and abusive treatment of workers and any risk that poses a threat to their health and safety (Vijayasiri, 2008). Because of the victims’ silence and indifference, it’s difficult to note this problem, making it less of a concern for academics (Kim & Kim, 2020). Workplace violence is an environmental factor that undermines victims’ sense of security, and as a result, it has an undeniable impact on their health (Rasool et al., 2020).
The protection motivation theory is concerned with how people deal with and make choices in the presence of potentially harmful or stressful life events. These choices are taken as a means of defending oneself against potential threats (Cornish & Clarke, 2014). The theory seeks to clarify and predict what causes people to change their behaviors. The Protection Motivation Theory (PMT) uses a person’s fear experience in response to assault threats. The aim of introducing fear is to inspire or encourage people to participate in or adopt certain prescribed behaviors (Norman et al., 2005).
Harassment in the workplace happens regularly all over the world (Krieger et al., 2006). The estimates shows, 50% of U.S. employees face abuse at some point during their careers (Das, 2009), but only a small percentage of victims report it (Feldblum & Lipnic, 2016). The findings of this study will show the impact of protection motivation on workplace harassment. Employees’ ability to perform their duties and feel safe and protected physically allows them to perform their duties and provide services to the best of their ability, thus benefiting the organization’s overall development (Chiaburu et al., 2013).
The Protection Motivation Theory (PMT) may be exceptionally well suited for understanding and addressing this behavior among the numerous theories commonly used to direct behavior study (Floyd et al., 2000). Rogers (1975) proposed two closely related pathways that connect environmental influences on behavior through a series of cognitive processes. The probability of a risk activity, such as smoking, is determined by the balance between the two assessment pathways (SEYDEL, 2005). The threat assessment pathway weighs the perceived advantages (intrinsic and extrinsic) of maladaptive conduct (e.g., workplace harassment) against the perceived risks (severity and vulnerability).
Individuals should defend themselves from workplace harassment based on four factors, according to the protection motivation theory: the perceived severity of a threatening incident, the perceived probability of occurrence, or vulnerability, the efficacy of the recommended preventive conduct, and an individual’s willingness to engage in the recommended preventive behavior (Jenkins et al., 2014). This study aims to examine the impact of protection motivation theory (PMT) on employee intention and behavior and investigate the effect of the antecedent of PMT, that is, physical harassment, on employee’s intention and behavior. This research also fills the gap by contributing to and extending the awareness of how PMT can face workplace harassment. This study aims to show how PMT, an empirically validated behavioral theory, can help us better understand a maladjusted workplace.
2. Literature Review
2.1. Protection Motivation Theory
The PMT model was created to predict behavioral change through fear appeals, a type of persuasive communication (Maddux & Rogers, 1983). Consequently, Rogers (1975) devised a sophisticated fear appeals scheme and established main trigger variables that aid in behavior modification. Following Bandura’s work on self-efficacy (Bandura, 1982), Maddux and Rogers (1983) investigated the possibility of incorporating self-efficacy into PMT. Rogers collaborated with Maddux (Maddux & Rogers, 1983) to assess the function of self-efficacy by manipulating self-efficacy with fear appeals. They discovered that self-efficacy influenced behavioral intentions significantly. As a result, self-efficacy was added as a key component of the PMT. Besides, the revised PMT (Maddux & Rogers, 1983) was structured to be a more robust model, with additional variables such as perceived benefits and costs associated with the suggested response.
2.2. Threat Appraisal
Two distinct mechanisms that predict protective actions are threat appraisal and coping appraisal. Threat evaluation refers to an individual’s assessment of the degree of noxiousness and probability of threat occurrence following fear appeals contact, which contributes to shaping attitudes about the threat’s consequences, interpreted as perceived severity, and ideas about the likelihood of occurrence, characterized as perceived vulnerability (Maddux & Rogers, 1983).
2.3. Coping Appraisal
The coping assessment method examines adaptive responses as well as one’s ability to deal with and escape threats. The cumulative number of the response’s effectiveness and self-efficacy appraisals is the coping appraisal (Rogers, 1975). The individual’s assessment of the effectiveness of the prescribed behavior’s response (i.e., perceived effectiveness of sunscreen in preventing premature aging). The Coping Appraisal often considers perceived self-efficacy in carrying out the prescribed actions (for example, trust in one’s ability to use sunscreen consistently) (Kaljee et al., 2005).
2.4. Workplace Harassment
The musculoskeletal injuries and disorders result in higher cardiovascular risk scores among flight logisticians and flight attendants (Gale et al., 2019; Lee, 2018; Pai & Lee, 2011). The new method has proved unsuccessful in preventing workplace harassment (Burke, 2018). Harassment can damage companies by impacting employee morale, efficiency, absenteeism, turnover, organizational engagement, and the employer’s external credibility (McDonald et al., 2015).
Employees should have the safety to protect themselves from abusive treatment in the workplace without any gender discrimination, ethnicity, or other distinguishing characteristics (Ehrenreich, 1999). Any kind of discomfort or prejudice in the workplace is branded as an act of harassment now that freedom from violence has been established as a fundamental human right (Zippel, 2006). Second, the problems that arise because of workplace harassment harm the victims. Harassment makes it impossible for victims to succeed in their professions, restricting their skills (Ehrenreich, 1999). As a result, workplace discrimination is a broader term that includes sexual harassment (Medlin, 2012). Victims are exposed to a wide variety of classified into two categories: (1) physical abuse and (2) emotional abuse. (Medlin, 2012).
2.5. Workplace Harassment and Protection Motivation Theory
Rogers (1975) and Maddux and Rogers (1983) Protection Motivation Theory has been a viable theoretical paradigm in health and social psychology, offering an essential social cognitive account of complex protective behavior. Protection motivation derives from a cognitive evaluation of a threatening event as severe and likely to occur, combined with the assumption that a prescribed coping response will effectively prevent the event from occurring according to this theory’s fundamental postulate (Milne et al., 2000).
Protection motivation theory has been applied to a variety of fields other than personal physical health science. Since the end of the 2000s, information security researchers have been using protection motivation theory in their study (Anderson & Agarwal, 2010). Therefore, Boss et al. (2015) recently argued the security implementation of protection motivation theory and fear in two experiments in an organizational security context. Employee’s protection motivation is triggered when the threat appraisal and coping appraisal mechanisms are combined, resulting in the required adaptive responses. Protection motivation theory has been demonstrated in various contexts, including health risks, protective behaviors, environmental hazards, other people’s wellbeing, and adherence to medical care regimens (Choi, 2020; Floyd et al., 2000).
2.6. Physical Abuse Severity and Intention and Behavior
The degree of physical damage, psychological harm, social risks, economic harm, hazards to others other than oneself, and even threats to other species” are all terms used to describe severity (Rogers, 1975). The more serious a person perceives the severity of the effects of maintaining maladaptive behaviors, the more likely they are likely to adopt prescribed adaptive behaviors. The magnitude of the hazard has substantially impacted following the suggested behaviors (Woon et al., 2005). Workers are likely to view physical violence as a severe threat because it lowers personal expectations, weakening how employees respect integrity, trustworthiness, morality, personal ethics, and civility, all of which affect their conduct.
H1: Physical abuse severity positively affects the intentions/behavior of an individual.
2.7. Physical Abuse Vulnerability and Intention and Behavior
Vulnerability is described as the conditional likelihood that threatened any event that will occur if no adaptive action is performed or any established behavioral disposition is not changed (Rogers, 1975). Individuals’ assessments of their likelihood of becoming subjected to an unfavorable danger are linked to their vulnerability expectations (Woon et al., 2005). Similarly, this study claims that employees will seriously consider creating a safe workplace if they feel they are being targeted by a substantial amount of workplace abuse perpetrated by their supervisor, subordinates, or others.
H2: Physical abuse vulnerability positively affects the intentions/behavior of an individual.
2.8. Response Efficacy to Physical Abuse
The expectation that the adaptive solution will work and that taking the recommended preventive action successfully in physically averting an unwanted threat is Physical abuse response efficacy (Floyd et al., 2000; Rogers, 1975). For example, if a person believes a smoking cessation class is a successful way to quit smoking, they will enroll. Response effectiveness has been shown to have a substantial impact on both self-protective and other-protective intentions (Jocoy & DiBiase, 2006).
H3: Physical abuse response efficacy positively affects the intentions/behavior of an individual.
2.9. Self-Efficacy against Physical Abuse
Powerful, threatening messages have an independent, critical impact on an individual’s behaviors, according to reviews of studies on physical violence self-efficacy (Durkin et al., 2012); on cigarette packets, as well as pictorial HWLs Smoking cessation habits are also predicted by higher self-efficacy to quit smoking (Lichtenstein et al., 1986; Sperry & Nicki, 1991), though this association is attenuated when smoking addiction is considered (Borrelli et al., 2002; Lichtenstein et al., 1986; Schnoll et al., 2003; Shiffman et al., 2009).
H4: Self-Efficacy physical abuse positively affects the intentions/behavior of an individual.
2.10. Threat Appraisal
Threat Appraisal Increased fear of potential events is one of the essential antisocial behavior effects (Barling et al., 2009; Leather et al., 1998). Employees’ subjective assessments of the level of danger associated with the various antisocial activity are referred to as fears or hazard appraisals. Researchers are interested in threat appraisal processes for many reasons. First, influences a wide range of mental, attitude, and health responses (Barling et al., 2009). Employees who feel they are at risk of occupational accidents are more likely to engage in workplace safety activities, despite individual variations (Rogers & Kelloway, 1997). Second, threat appraisal is subjective, so they may or may not adhere to objective risk levels.
Furthermore, risk analysis reveals that laypeople’s risk assessments of the same risks often differ from expert assessments of the same risks (Slovic et al., 1980). Employees may downplay common but less serious threats, such as workplace homicide, or they may overreact to extreme threats with low base rates, such as workplace homicide. Third, the threat-appraisal perspective opens new avenues for thinking about the consequences of antisocial activity exposure. Even though antisocial activity is episodic, the risk can be viewed as a long-term stressor (Barling et al., 2009).
H5: Harassment threat appraisal positively affects the intentions/behavior of an individual.
2.11. Coping Appraisal
The coping appraisal process examines adaptive responses as well as one’s ability to deal with and escape threats. The coping assessment is the amount of the prescribed preventive response’s effectiveness and self-efficacy, minus any physical or psychological “costs.” The coping appraisal is the individual’s assessment of the proposed behavior’s efficacy as a remedy (Li et al., 2014). Figure 1 shows the conceptual model of this study.
Figure 1: Conceptual Framework
H6: Harassment coping appraisal positively affects the intentions/behavior of an individual.
3. Research Methods
3.1. Research Approach and Procedure
This study used a quantitative approach to investigate the maladjusted behaviors of individuals working in a specific workplace and how these behaviors can be appraised as a threat to avoid an inconvenient and uncomfortable work environment and to know how an individual copes with it carefully. Data analysis included the partial least square (PLS) approach which purpose is to predict and understand the role and formation of individual constructs and their relationships among each other” (Chin, 2010).
A survey methodology using a questionnaire has been adopted/adapted to gather the information about the underlying latent constructs suggested in the model. The instruments used in this study to collect the data were divided into two parts; demographics information related to respondents and intended constructs. Validating the questionnaire’s clarity, pre-testing and pilot testing were conducted before collecting the final data. Pre-testing helps determine the questionnaire’s face validity and helps identify the problems in the questionnaire’s language. The data was collected from across the globe through a google form, and 241 respondents have filled the questionnaire. Overall, 563 respondents have filled the questionnaire, of which 322 respondents were across Pakistan.
3.2. Measures and Instrument Development
The data is collected from participants’ demographic information’s and initial levels of study variables will be measured. Phase II will be undertaken to determine whether the effects of fear appeals are maintained in different career stages. 26-item PMT questionnaire adapted from an existing PMT scale to measure the threat appraisals and coping appraisals and seven items for intention and behavior at workplace harassment. Perceived Vulnerability (PV) and Perceived Severity (PS) by (Sinclair et al., 2002; Wright & Fitzgerald, 2007), Response Efficacy (RE), and Self-Efficacy (SE) by (Witte, 1996; Zhang et al., 2017). The items were tested for factor structure and composition. Perceived Vulnerability (PV) and Perceived Severity (PS) further measure threat appraisal of the employees, and Response Efficacy (RE) and Self-Efficacy (SE) were further measures copping appraisal.
3.3. Partial Least Square Structural Equation Modeling
The Data analysis is performed using SPSS latest version (SPSS-26) to handle the data and analyze preliminary issues in the data, such as descriptive analysis, mean, standard deviation, frequency analysis, and common method biases. Further partial least square structural equation (PLS-SEM) is used to analyze the outer model (Measurement model) assessment for validity and reliability of the sample data and inner model (Structural model) assessment for the hypothesized relationships (Hair et al., 2019; Sarstedt et al., 2014). PLS-SEM is used to test the social sciences hypothesis (BILAL et al., 2021; SYED et al., 2021). This study presented harassment with the perceived severity, perceived vulnerability, threat appraisal and response efficacy, self-efficacy, as coping appraisal increases employee intentions and behavior to comply with harassment.
4. Results
4.1. Data Screening
Data screening is required to ensure that information is submitted accurately, free of outliers, and ensure normal distribution (Hair et al., 2006). When the respondents did not address one or more items in the sample, there will be missing data. The provision of missing data research indicates that an Expected Maximization is a useful option for treating missing values compared to other methods with other approaches like one-by-one deletion and mean substitution (Hair Jr & Sarstedt, 2019). Data analysis showed that the data set was free from missing values.
4.2. Descriptive Analysis
The demographic statistics of respondents have been done to get a fundamental examination of the current study. The descriptive analysis aims to provide the interactive pattern of demographic variables provided for the study. A descriptive table (Table 1) is designed for Country name, gender, age, job type, experience, and qualification to better represent responses. The country name construct shows that 241 employees filled the online survey from foreign countries (other than Pakistan), and 322 employees filled the survey from Pakistan.
Table 1: Validity and Reliability (First Order)
Note: CR: Composite Reliability; AVE: Average Variance Extracted.
The gender variable shows 60.2% of the respondents were male, and 39.8 % were female. Of the 51.2 % of respondents’ having a permanent job, 31.2% were on a contract basis, and the remaining were 17.6% from another category. The experience variable shows that most of the respondents have work experience between 11 to 15 years (36.6%), and 23.5% have experienced more than 15 years. 60% of respondents have more than ten years of experience, and the other 40% have experienced less than ten years. Final demographic variables (Qualification) show that the master/MPhil level of respondents is more than 75%, which is 160. The overall demographic indicators present very experienced and highly qualified sample respondents.
4.3. Partial Least Square Structural Equation Modeling (PLS-SEM)
Tabachnick et al. (2007) suggested before proceeding to reliability and validity specific assumptions about multicollinearity, common bias, and normality assessment while moving to check reliability, validity, and structure directions. This study measurement and structural model were used to assess, evaluate, and report PLS-SEM results (Hair & Ringle, 2011; Sarstedt et al., 2014).
4.4. Measurement Model
In the validation of the measurement model, as shown by Sarstedt et al. (2014) and Henseler et al. (2009), the researcher must test reliability for individual items, internal consistency, content validity, convergent validity, and discriminant validity (ANJUM et al., 2021).
4.5. Reliability of Individual Items
The reliability of individual items can be calculated by evaluating each variable’s items (Sarstedt et al., 2014). Studies presented the cutoff for maintaining items by which they recommended that items be retained in the middle of 0.40 and 0.70 (Joseph et al., 2014). Therefore, the outer loadings for the construct perceived severity at first order ranged from 0.739 to 0.937, perceived vulnerability ranges from 0.917 to 0.937, response efficacy ranges from 0.691 to 0.865, and self-efficacy ranges from 0.821 to 0.877.
4.6. Internal Consistency
Measuring the coefficient of composite reliability of latent constructs, Hair and Ringle (2011) indicated a threshold of 0.7 or beyond for measuring the coefficient of composite reliability. Table 2 demonstrates the coefficients of the composite reliability for latent constructs. Perceived severity has a composite reliability coefficient of 0.879, and perceived vulnerability has a composite reliability coefficient of 0.924. The composite reliability for threat appraisal was 0.866.
Table 2: Validity and Reliability (Higher Order)
Note: CR: Composite Reliability; AVE: Average Variance Extracted.
At second-order threat appraisal, two dimensions having factor loadings of 0.597 and 0.750, coping appraisal ranges from 0.857 to 0.891, and finally PMT as a composite variable ranged from 0.836 to 0.909. furthermore, intention and behavior were measured in the first order, so these constructs range from 0.865 to 0.924 and 0.912 to 0.937, respectively (see Table 2). These results full fill the minimum criteria for individual item reliability.
The construct response efficacy has 0.860, and self-efficacy shows a 0.884 composite reliability coefficient at first order (Table 3). In the second-order, these two constructs measure coping appraisal, which shows a composite reliability coefficient of 0.742. The PMT construct’s composite reliability after the two dimensions of threat appraisal and coping appraisal has 0.865 (Table 4). Finally, the behavior and intention are having composite reliability of 0.927 and 0.961.
Table 3: Discriminant Validity (First Order)
Table 4: Discriminant Validity (Higher Order)
4.7. Convergent Validity
Convergent validity was evaluated with the value of the average variance extracted (AVE) proposed by (Fornell & Larcker, 1981). Moreover, AVE’s threshold value must be 0.5 or above to demonstrate the cutoff for the convergent validity of a variable (Chin, 1998). The values of AVE have shown in Table 1 illustrate that at the first order and second-order level of analysis, a minimum of 0.50 AVE was reached for all constructs of the present study, this concludes that there is no issue of convergent validity in the analysis (Table 1 & Table 2).
4.8. Discriminant Validity
Umrani et al. (2018) tested discriminant validity on subsequent benchmarks of (Fornell & Larcker, 1981). They proposed that the AVE square root should be greater than the correlation between the variables. Nonetheless, the AVE square root is greater than the correlations between variables at the first order of analysis, as shown in Tables 3 and 4. Therefore, it can be assumed that the analysis indicators have a significant degree of discriminant validity.
Henseler et al. (2009) recommended estimating the discriminant validity by Heterotrait-Monotrait Ratio (HTMT). They indicated that the HTMT ratio of less than 0.85 or .90 is deemed acceptable. Tables 3 and 4 show that the latent variables have HTMT scores ranged from 0.062 to 0.88. All the values are less than 0.90, so there is no issue of discriminant validity (Figure 2).
Figure 2: Measurement Model (First Order)
4.9. Assessment of Structural Model
The structure model analysis as the 5,000-sample re- sample bootstrapping procedure with 563 cases was testified as recommended by Hair et al. (2019). Table 5 provide complete evaluations of the structural model. Results demonstrated a significant relationship between PS and intention by β = 0.178, t = 5.18, p = 0.000.
Table 5: Structural Model
Note: β: path coefficients; S. E: Standard Error, and decision report the decision rules for acceptance of an alternative hypothesis.
Therefore, this is supporting the H1 to H6 of the study and mediation analysis of intention. The results have shown a positive association between PV and intention by β = 0.056, t = 1.55, p < 0.06 as proposed in H2. The p-value indicates the significant partial relationship among the variables, so H2 is also supported at a 10% significance level. All the hypothesis relationships show a significant positive relationship with intention and mediating role of intention between protection motivation theory dimensions and employees’ behavior (Table 5).
4.10. Model Prediction
For the assessment of the PLS structural model, Henseler et al. (2009) suggested considering the value of R2. In PLS Structure equation modeling, the R2 value of 0.60 is viewed as significant, the value of 0.33 as reasonable, and the value of 0.19 is considered weak (Chin, 1998).
The value for the R2 was 0.462 for intention and 0.196 for behavior, as shown in Table 6. Following Hair et al. (2013) and Chin (2010), considering the nature of the outcome variable, the present study employed a cross-validated redundancy test Q2 to assess the predictive validity of the model. Henseler et al. (2009) stated that the research model is deemed to have a predictive relevance in research where the value of Q2 is greater than zero. Table 6 shows the Q2 value of 0.394 for intention and 0.154 for behavior, which is greater than zero as stated by the author, indicates that the model has predictive relevance (Figure 3).
Table 6: Model Fit
Figure 3: Protection Motivation Theory Model
Finally, effect size (f 2) shows that PMT is a robust predictor to change the employee’s intention in general. Copping appraisal is the second most important predictor to predict the employee’s intention compared to threat appraisal. In first-order among the four dimensions of PMT, self-efficacy has 0.264 effect size, which most prominent among the four dimensions, and perceived vulnerability has 0.005 effect size smallest effect size among the dour dimensions.
5. Discussion
To begin, we discovered that all components of the defense motivation theory (threat appraisal and coping appraisal) had a significant effect on employee intention and conduct. Physical Harassment has strong predictive power for changing employee purpose, as well as a mediation impact on changing conduct. According to the findings, all protective motivational variables, such as perceived severity, perceived vulnerability, response effectiveness, and self-efficacy, positively influence behavior, according to the findings (Anderson & Agarwal, 2010). While this result is in line with theory (Vance et al., 2012), we were unable to locate any empirical research that investigated the relationship between Physical Harassment, PMT, and the workplace. This suggests that physical abuse has a significant impact on the purpose and actions of employees. It also had a substantial effect on threat perception, self-efficacy, and response efficacy. (Floyd et al., 2000).
Second, the threat’s severity had a positive effect on employees’ intentions and actions. This is supported by PMT as well as empirical evidence. Herath and Rao (2009) had previously discovered that response efficacy clarified attitude in a related study. Third, employees’ purpose and actions were unaffected by vulnerability, meaning that vulnerability does not improve one’s willingness to comply. Fourth, employees’ purpose and actions are positively influenced by self-efficacy. The seventh finding was that response effectiveness harmed intention.
Furthermore, intention not only mediates the relationship between threat assessment (perceived seriousness, perceived vulnerability) behavior but also between coping appraisal (response efficacy, self-efficacy) intention and behavior (Wu, 2020). Threat assessment is associated with a maladjusted response influenced by perceptions of the threat’s intensity and vulnerability. People are more likely to adjust their responses when their perceptions of seriousness and vulnerability are high. On the other hand, coping assessment is related to suggested guidelines. The ability to deal with and prevent threatening behavior is assessed through the coping evaluation process.
Security motivation is often influenced by danger and coping assessments (Putri & Hovav, 2014). The seriousness of the situation and its severity will be determined by the hazard assessment. The coping assessment refers to how one responds to a situation (Mwagwabi, 2015). The coping assessment considers both effectiveness and self-efficacy. The belief that following advice will eliminate a danger is referred to as efficacy (Woon et al., 2005). Self-efficacy is the belief in one’s ability to carry out the prescribed actions effectively.
6. Conclusion and Limitations
The demanding work environment is a vital issue that affects the employees’ work efficiency and output. This study identifies how workplace harassment triggers protection motivation in various organizational environments to achieve their individual as well as overall organizational goals. It has to do with the individual’s evaluation of the suggested behavior’s effectiveness in averting the threat (i.e., response efficacy) and their perceived capacity to carry out the advocated behavior (i.e., self-efficacy). When high levels of efficacy variables are expected, the probability of enacting adaptive behavior increases.
The person’s protection motivation is triggered when the threat appraisal and coping appraisal mechanisms are combined, resulting in the required adaptive responses. Employees are likely to view physical violence as a serious threat because it lowers personal expectations, weakening how employees respect integrity, trustworthiness, morality, personal ethics, and civility, all of which affect their conduct. Employees are worried about their inadequate capacity to detect workplace abuse, which could seriously harm their reputation in society if the harassment were reported. Physical abuse severity positively and significantly affects the intentions/behavior of an individual.
The current study would promote the use of PMT in guiding behavioral research in a variety of workplaces in two dimensions: one is practical, and the other is theoretical. However, further research is required. Individuals should defend themselves from workplace harassment based on four factors, according to the protection motivation theory: the PS of a threatening incident, the PV, the efficacy of the recommended preventive conduct, and an individual’s willingness to engage in the recommended preventive behavior (Jenkins et al., 2012).
This research will also shed light on the usefulness of screening methods for identifying unhealthy behavior in the workplace. This research would also suggest that the topics discussed in this study be further explored to fully comprehend the relationships and their effect on employee actions. Self-efficacy and perceived severity, the current study will provide some initial insight into harassing behavior, primarily to raise awareness of such maladjusted manners of employees working in diverse workplaces.
This investigation aims to learn more about the employees’ motivations and motives regarding workplace harassment. Staff will benefit because each delegate will have the opportunity to inspire protection and express their recognitions. The inquiry would also benefit the government, as the investigation will be made available to them along with recommendations from the respondents. It would also help them to be more aware of what their employees might be going through. Following that, the inquiry would aid the administration in their efforts and attempts to manage the workers.
Also, components for enhancing self-efficacy will be incorporated into protective behavior experiences in this analysis. This research would help organizations set a concrete target for their workers to discourage harassing behaviors in a variety of settings, including monitoring both physical and emotional actions and providing input on which behaviors should be avoided. The current research will also demonstrate how threat appraisal differentiates behavior with higher perceived intensity associated with harassment.
While this study has many novel results as well as important theoretical and practical implications, its limitations should be highlighted to aid future studies. First, some PMT constructs, such as response cost, were not investigated in this report. Second, to obtain appropriate samples quickly, this study used online survey questionnaires to collect data. While this method has its benefits, the findings could be skewed due to the lack of supervision and respondents’ subjectivity. As a result, reliable data should be collected through supervised surveys, interviews, or experiments. Third, we have collected data from the employees working in the service sector only to easily fill the online questionnaire based on harassment topics. Still, in future research, we can include or expand our research to the employees working in other sectors if we collect data by other means like filling questionnaires under our supervision or taking interviews, etc.
References
- Anderson, C. L., & Agarwal, R. (2010). Practising safe computing: A multimethod empirical examination of home computer user security behavioral intentions. MIS Quarterly, 613-643. https://doi.org/https://doi.org/10.2307/25750694
- Anjum, R., Khan, H. H., Bano, S., Nazir, S., Gulraiz, H., & Ahmed, W. (2021). A Latent Factor (PLS-SEM) Approach: Assessing the Determinants of Effective Knowledge Transfer. The Journal of Asian Finance, Economics, and Business, 8(2), 851-860. https://doi.org/10.13106/jafeb.2021.vol8.no2.0851
- Aube, C., Brunelle, E., & Rousseau, V. (2014). Flow experience and team performance: The role of team goal commitment and information exchange. Motivation and Emotion, 38(1), 120-130. htpps://10.1007/s11031-013-9365-2
- Bandura, A. (1982). Self-efficacy mechanism in human agency. American Psychologist, 37(2), 122. https://doi.org/10.1037/0003-066X.37.2.122
- Barling, J., Dupre, K. E., & Kelloway, E. K. (2009). Predicting workplace aggression and violence. Annual Review of Psychology, 60, 671-692. https://doi.org/10.1146/annurev.psych.60.110707.163629
- Bilal, M. A., Khan, H. H., Irfan, M., Haq, S., Ali, M., Kakar, A., Ahmed, W., & Rauf, A. (2021). Influence of Financial Literacy and Educational Skills on Entrepreneurial Intent: Empirical Evidence from Young Entrepreneurs of Pakistan. The Journal of Asian Finance, Economics, and Business, 8(1), 697-710. https://doi.org/10.13106/jafeb.2021.vol8.no1.697
- Borrelli, B., Hogan, J. W., Bock, B., Pinto, B., Roberts, M., & Marcus, B. (2002). Predictors of quitting and dropout among women in a clinic-based smoking cessation program. Psychology of Addictive Behaviors, 16(1), 22. https://doi.org/10.1037/0893-164X.16.1.22
- Boss, S. R., Galletta, D. F., Lowry, P. B., Moody, G. D., & Polak, P. (2015). What do systems users have to fear? Using fear appeals to engender threats and fear that motivate protective security behaviors. MIS quarterly, 39(4), 837-864. https://www.jstor.org/stable/26628654 https://doi.org/10.25300/MISQ/2015/39.4.5
- Burke, R. J. (2018). Reducing sexual harassment at workplace. Effective Executive, 21(2), 51-56.
- Chiaburu, D. S., Peng, A. C., Oh, I.-S., Banks, G. C., & Lomeli, L. C. (2013). Antecedents and consequences of employee organizational cynicism: A meta-analysis. Journal of Vocational Behavior, 83(2), 181-197. https://doi.org/10.1016/j.jvb.2013.03.007
- Chin, W. W. (1998). The partial least squares approach to structural equation modeling. Modern Methods for Business Research, 295(2), 295-336.
- Chin, W. W. (2010). How to write up and report PLS analyses. In: Handbook of partial least squares (pp. 655-690). Springer. https://doi.org/10.1007/978-3-540-32827-8_29
- Choi, Y. (2020). A study of role of perceived organizational support among sexual harassment and employees' attitudes. The Journal of Asian Finance, Economics, and Business, 7(2), 229-236. https://doi.org/10.13106/jafeb.2020.vol7.no2.229
- Cornish, D. B., & Clarke, R. V. (2014). The reasoning criminal: Rational choice perspectives on offending. Routledge.
- Scott, M. (2014). The Reasoning Criminal: Rational Choice Perspectives on Offending (1st ed.). London: Routledge. https://doi.org/10.4324/9781315134482
- Das, A. (2009). Sexual harassment at work in the United States. Archives of Sexual Behavior, 38(6), 909-921. https://doi.org/10.1007/s10508-008-9354-9
- Durkin, S., Brennan, E., & Wakefield, M. (2012). Mass media campaigns to promote smoking cessation among adults: an integrative review. Tobacco Control, 21(2), 127-138. http://dx.doi.org/10.1136/tobaccocontrol-2011-050345
- Ehrenreich, R. (1999). Dignity and discrimination: Toward a pluralistic understanding of workplace harassment. Geo. LJ, 88, 1. https://heinonline.org/HOL/LandingPage?handle=hein.journals/glj88&div=12&id=&page=
- Feldblum, C. R., & Lipnic, V. A. (2016). Select task force on the study of harassment in the workplace. Washington: US Equal Employment Opportunity Commission. https://www.kutakrock.com/files/Uploads/Images/KCCLE2018_Washkuhn_Handouts.pdf
- Ferris, D. L., Chen, M., & Lim, S. (2017). Comparing and contrasting workplace ostracism and incivility. Annual Review of Organizational Psychology and Organizational Behavior, 4, 315-338. https://doi.org/10.1146/annurev-orgpsych-032516-113223
- Floyd, D. L., Prentice-Dunn, S., & Rogers, R. W. (2000). A meta-analysis of research on protection motivation theory. Journal of Applied Social Psychology, 30(2), 407-429. https://doi.org/10.1111/j.1559-1816.2000.tb02323.x
- Fornell, C., & Larcker, D. F. (1981). Evaluating structural equation models with unobservable variables and measurement error. Journal of Marketing Research, 18(1), 39-50. https://doi.org/10.1177/002224378101800104
- Gale, S., Mordukhovich, I., Newlan, S., & McNeely, E. (2019). The impact of workplace harassment on health in a working cohort. Frontiers in Psychology, 10, 1181. https://doi.org/10.3389/fpsyg.2019.01181
- Hair, J. F., Black, W. C., Babin, B. J., Anderson, R. E., & Tatham, R. (2006). Multivariate data analysis. Upper Saddle River, NJ: Pearson Prentice Hall.
- Hair, J. F., , Miller, K.E., Bush, R. P., Ortinau, D. J., Roberts, K., & Lukas, S.-L.. (2014). Marketing research (4th ed.). New York: McGraw-Hill Education
- Hair, J. F., & Ringle, C. M. (2011). CM, & Sarstedt, M.(2011). PLS-SEM: Indeed a silver bullet. Journal of Marketing Theory and Practice, 19(2), 139-151. https://doi.org/10.2753/MTP1069-6679190202
- Hair, J. F., Ringle, C. M., & Sarstedt, M. (2013). Partial least squares structural equation modeling: Rigorous applications, better results and higher acceptance. Long Range Planning, 46(1-2), 1-12. https://ssrn.com/abstract=2233795 https://doi.org/10.1016/j.lrp.2013.01.001
- Hair, J. F., Risher, J. J., Sarstedt, M., & Ringle, C. M. (2019). When to use and how to report the results of PLS-SEM. European Business Review. https://doi.org/10.1108/EBR-11-2018-0203
- Hair, J. F., & Sarstedt, M. (2019). Factors versus composites: guidelines for choosing the right structural equation modeling method. Project Management Journal, 50(6), 619-624. https://doi.org/10.1177/8756972819882132
- Henseler, J., Ringle, C. M., & Sinkovics, R. R. (2009). The use of partial least squares path modeling in international marketing. In: New challenges to international marketing (pp. 277-319). Emerald Group Publishing Limited.
- Herath, T., & Rao, H. R. (2009). Protection motivation and deterrence: a framework for security policy compliance in organisations. European Journal of Information Systems, 18(2), 106-125. https://doi.org/10.1057/ejis.2009.6
- Jenkins, J., Durcikova, A., & Burns, M. (2012). Forget the Fluff: Examining How Media Richness Influences the Impact of Information Security Training on Secure Behavior. 2012 45th Hawaii International Conference on System Sciences, 3288-3296.
- Jenkins, J. L., Grimes, M., Proudfoot, J. G., & Lowry, P. B. (2014). Improving password cybersecurity through inexpensive and minimally invasive means: Detecting and deterring password reuse through keystroke-dynamics monitoring and just-in-time fear appeals. Information Technology for Development, 20(2), 196-213. https://doi.org/10.1080/02681102.2013.814040
- Jocoy, C. L., & DiBiase, D. (2006). Plagiarism by adult learners online: A case study in detection and remediation. The International Review of Research in Open and Distributed Learning, 7(1). https://doi.org/10.19173/irrodl.v7i1.242
- Kaljee, L. M., Genberg, B., Riel, R., Cole, M., Tho, L. H., Thoa, L. T. K., Stanton, B., Li, X., & Minh, T. T. (2005). Effectiveness of a theory-based risk reduction HIV prevention program for rural Vietnamese adolescents. AIDS Education & Prevention, 17(3), 185-199. https://doi.org/10.1521/aeap.17.4.185.66534
- Khan, G., Naveed, R. T., & Jantan, A. H. B. (2018). Status of wonder women: Challenges for young future women entrepreneurs in Pakistan. International Journal of Experiential Learning & Case Studies, 3(1), 97-109. http://dx.doi.org/10.22555/ijelcs.v3i1.1838
- Kim, Y. J., & Kim, J. (2020). Does negative feedback benefit (or harm) recipient creativity? The role of the direction of feedback flow. Academy of Management Journal, 63(2), 584-612. https://doi.org/10.5465/amj.2016.1196
- Krieger, N., Waterman, P. D., Hartman, C., Bates, L. M., Stoddard, A. M., Quinn, M. M., Sorensen, G., & Barbeau, E. M. (2006). Social hazards on the job: workplace abuse, sexual harassment, and racial discrimination-a study of black, Latino, and white low-income women and men workers in the United States. International Journal of Health Services, 36(1), 51-85. https://doi.org/10.2190/3EMB-YKRH-EDJ2-0H19
- Leather, P., Lawrence, C., Beale, D., Cox, T., & Dickson, R. (1998). Exposure to occupational violence and the buffering effects of intra-oranizational support. Work & Stress, 12(2), 161-178. https://doi.org/10.1080/02678379808256857
- Lee, J. (2018). Passive leadership and sexual harassment. Personnel Review. https://doi.org/10.1108/PR-07-2016-0169
- Li, R., Cooper, C., Barber, J., Rapaport, P., Griffin, M., & Livingston, G. (2014). Coping strategies as mediators of the effect of the START (strategies for RelaTives) intervention on psychological morbidity for family carers of people with dementia in a randomised controlled trial. Journal of Affective Disorders, 168, 298-305. https://doi.org/10.1016/j.jad.2014.07.008
- Lichtenstein, E., Glasgow, R. E., & Abrams, D. B. (1986). Social support in smoking cessation: In search of effective interventions. Behavior Therapy, 17(5), 607-619. https://doi.org/10.1016/S0005-7894(86)80098-3
- Maddux, J. E., & Rogers, R. W. (1983). Protection motivation and self-efficacy: A revised theory of fear appeals and attitude change. Journal of Experimental Social Psychology, 19(5), 469-479. https://doi.org/10.1016/0022-1031(83)90023-9
- McDonald, L., Hitzig, S. L., Pillemer, K. A., Lachs, M. S., Beaulieu, M., Brownell, P., Burnes, D., Caspi, E., Mont, J. D., & Gadsby, R. (2015). Developing a research agenda on resident-to-resident aggression: recommendations from a consensus conference. Journal of Elder Abuse & Neglect, 27(2), 146-167. https://doi.org/10.1080/08946566.2014.995869
- Medlin, J. A. (2012). Domestic violence and working women: The relationship between employment status and women who seek assistance. Capella University. https://search.proquest.com/dissertations-theses/domestic-violence-working-women-relationship/docview/1033334620/se-2?accountid=135034
- Milne, S., Sheeran, P., & Orbell, S. (2000). Prediction and intervention in health-related behavior: A meta-analytic review of protection motivation theory. Journal of Applied Social Psychology, 30(1), 106-143. https://doi.org/10.1111/j.1559-1816.2000.tb02308.x
- Mwagwabi, F. (2015). A Protection Motivation Theory approach to improving compliance with password guidelines. Murdoch University. http://researchrepository.murdoch.edu.au/id/eprint/27070
- Naveed, A., & Alwani, N. (2010). Sexual harassment at work place: are you safe? Journal of Ayub Medical College, 22(3), 222.
- Norman, P., Boer, H., & Seydel, E. R. (2005). Protection motivation theory. In: M. Conner, & P. Norman (Eds.), Predicting Health Behaviour: Research and Practice with Social Cognition Models (pp. 81-126). Open University Press.
- Pai, H. C., & Lee, S. (2011). Risk factors for workplace violence in clinical registered nurses in Taiwan. Journal of Clinical Nursing, 20(9-10), 1405-1412. https://doi.org/10.1111/j.1365-2702.2010.03650.x
- Potter, R., O'Keeffe, V., Leka, S., Webber, M., & Dollard, M. (2019). Analytical review of the Australian policy context for work-related psychological health and psychosocial risks. Safety Science, 111, 37-48. https://doi.org/10.1016/j.ssci.2018.09.012
- Putri, F. F., & Hovav, A. (2014). Employees' Compliance with BYOD Security Policy: Insights from Reactance, Organizational Justice, and Protection Motivation Theory. ECIS.
- Ramsaroop, A., & Parumasur, S. B. (2007). The prevalence and nature of sexual harassment in the workplace: A model for early identification and effective management thereof. SA Journal of Industrial Psychology, 33(2), 25-33. https://sajip.co.za/index.php/sajip/article/view/374/0
- Rasool, S. F., Wang, M., Zhang, Y., & Samma, M. (2020). Sustainable work performance: the roles of workplace violence and occupational stress. International Journal of Environmental Research and Public Health, 17(3), 912. https://doi.org/10.3390/ijerph17030912
- Rogers, K. -A., & Kelloway, E. K. (1997). Violence at work: personal and organizational outcomes. Journal of Occupational Health Psychology, 2(1), 63. https://doi.org/10.1037/1076-8998.2.1.63
- Rogers, R. W. (1975). A protection motivation theory of fear appeals and attitude change1. The Journal of Psychology, 91(1), 93-114. https://doi.org/10.1080/00223980.1975.9915803
- Sarstedt, M., Ringle, C. M., Smith, D., Reams, R., & Hair Jr, J. F. (2014). Partial least squares structural equation modeling (PLS-SEM): A useful tool for family business researchers. Journal of Family Business Strategy, 5(1), 105-115. https://doi.org/10.1016/j.jfbs.2014.01.002
- Schnoll, R. A., Calvin, J., Malstrom, M., Rothman, R. L., Wang, H., Babb, J., Miller, S. M., Ridge, J. A., Movsas, B., & Langer, C. (2003). Longitudinal predictors of continued tobacco use among patients diagnosed with cancer. Annals of Behavioral Medicine, 25(3), 214-221. https://doi.org/10.1207/S15324796ABM2503_07
- Shiffman, S., Gwaltney, C. J., Balabanis, M. H., Liu, K. S., Paty, J. A., Kassel, J. D., Hickcox, M., & Gnys, M. (2009). Immediate antecedents of cigarette smoking: An analysis from ecological momentary assessment. In: G. A. Marlatt & K. Witkiewitz (Eds.), Addictive behaviors: New readings on etiology, prevention, and treatment (pp. 367-399). American Psychological Association. https://doi.org/10.1037/11855-015
- Sinclair, R. R., Martin, J. E., & Croll, L. W. (2002). A threat-appraisal perspective on employees' fears about antisocial workplace behavior. Journal of Occupational Health Psychology, 7(1), 37. https://doi.org/10.1037/1076-8998.7.1.37
- Slovic, P., Fischhoff, B., & Lichtenstein, S. (1980). Facts and fears: Understanding perceived risk. In: Societal risk assessment (pp. 181-216). Springer. https://doi.org/10.1007/978-1-4899-0445-4_9
- Sperry, J. M., & Nicki, R. M. (1991). Cognitive appraisal, self-efficacy, and cigarette smoking behavior. Addictive Behaviors, 16(6), 381-388. https://doi.org/10.1016/0306-4603(91)90046-K
- Syed, A., Gul, N., Khan, H. H., Danish, M., Haq, S., Sarwar, B., Azhar, U., & Ahmed, W. (2021). The Impact of Knowledge Management Processes on Knowledge Sharing Attitude: The Role of Subjective Norms. The Journal of Asian Finance, Economics, and Business, 8(1), 1017-1030. https://doi.org/10.13106/jafeb.2021.vol8.no1.1017
- Tabachnick, B. G., Fidell, L. S., & Ullman, J. B. (2007). Using multivariate statistics (Vol. 5). Boston, MA: Pearson.
- Turnbull, A. (2016). An Analysis of the Organizational Structure of Redstone Test Centers Environmental and Components Test Directorate With Regard to Instrumentation Design Capabilities. https://apps.dtic.mil/sti/citations/AD1030102
- Umrani, W. A., Kura, K. M., & Ahmed, U. (2018). Corporate entrepreneurship and business performance. PSU Research Review. https://doi.org/10.1108/PRR-12-2016-0011
- Vance, A., Siponen, M., & Pahnila, S. (2012). Motivating IS security compliance: insights from habit and protection motivation theory. Information & Management, 49(3-4), 190-198. https://doi.org/10.1016/j.im.2012.04.002
- Vijayasiri, G. (2008). Reporting sexual harassment: The importance of organizational culture and trust. Gender Issues, 25(1), 43-61. https://doi.org/10.1007/s12147-008-9049-5
- Witte, K. (1996). Predicting risk behaviors: Development and validation of a diagnostic scale. Journal of Health Communication, 1(4), 317-342. https://doi.org/10.1080/108107396127988
- Woon, I., Tan, G., & Low, R. (2005). A Protection Motivation Theory Approach to Home Wireless Security. ICIS. https://aisel.aisnet.org/icis2005/31
- Wright, C. V., & Fitzgerald, L. F. (2007). Angry and afraid: Women's appraisal of sexual harassment during litigation. Psychology of Women Quarterly, 31(1), 73-84. https://doi.org/10.1111/j.1471-6402.2007.00332.x
- Wu, D. (2020). Empirical study of knowledge withholding in cyberspace: Integrating protection motivation theory and theory of reasoned behavior. Computers in Human Behavior, 105, 106229. https://doi.org/10.1016/j.chb.2019.106229
- Zhang, X., Han, X., Dang, Y., Meng, F., Guo, X., & Lin, J. (2017). User acceptance of mobile health services from users' perspectives: The role of self-efficacy and response-efficacy in technology acceptance. Informatics for Health and Social Care, 42(2), 194-206. https://doi.org/10.1080/17538157.2016.1200053
- Zippel, K. S. (2006). The politics of sexual harassment: A comparative study of the United States, the European Union, and Germany. Cambridge University Press.