Identifying Protection Motivation Theory Factors that Influence Smartphone Security Measures

被引:0
|
作者
Schneider, Marvin [1 ]
Rahman, Shawon [2 ]
机构
[1] DeVry Univ, Dept Comp Informat Syst CIS, New York, NY 10016 USA
[2] Univ Hawaii, Dept Comp Sci & Engn, Hilo, HI 96720 USA
关键词
Protection Motivation Theory; Avoidance Motivation; Smartphone Security; Antivirus; Self-efficacy; FEAR APPEALS; INTENTION;
D O I
10.1109/BigData52589.2021.9671882
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Because smartphones are ubiquitous in our society, and undergraduate students use smartphones extensively, it is necessary to understand how undergraduates can be protected from malicious hacker attacks, viruses, and malware. This quantitative study explores the influence of Protection Motivation Theory (PMT) constructs on security behaviors of undergraduate students. The primary focus of this quantitative study is to answer our primary research question: to what extent do the independent PMT variables (perceived threat severity, perceived threat vulnerability, self-efficacy, response efficacy, and response cost) explain undergraduate students' employment of smartphone security measures? The findings suggest that although all hypotheses were not supported by the analysis; however, self-efficacy and perceived threat vulnerability showed a statistically positive association with several smartphone security measures. However, none of the constructs showed a statistically significant association with using unsecured Wi-Fi in public places. The practical implications of the findings are for industry to focus on better design of smartphone hardware and software (such as antivirus apps) to protect users, and to increase self-efficacy among smartphone undergraduate users through training and education.
引用
收藏
页码:3353 / 3359
页数:7
相关论文
共 50 条
  • [1] Smartphone Security and Privacy - A Gamified Persuasive Approach with Protection Motivation Theory
    Ganesh, Anirudh
    Ndulue, Chinenye
    Orji, Rita
    PERSUASIVE TECHNOLOGY (PERSUASIVE 2022), 2022, 13213 : 89 - 100
  • [2] Understanding smartphone security behaviors: An extension of the protection motivation theory with anticipated regret
    Verkijika, Silas Formunyuy
    COMPUTERS & SECURITY, 2018, 77 : 860 - 870
  • [3] Explanatory and predictive analysis of smartphone security using protection motivation theory: a hybrid SEM-AI approach
    Khan, Naurin Farooq
    Murtaza, Hajra
    Malik, Komal
    Mahmood, Muzammil
    Asadi, Muhammad Aslam
    INFORMATION TECHNOLOGY & PEOPLE, 2024,
  • [4] Factors Affecting Security Behavior of Kenyan Students: An Integration of Protection Motivation Theory and Theory of Planned Behavior
    Farooq, Ali
    Ndiege, Joshua Rumo A.
    Isoaho, Jouni
    2019 IEEE AFRICON, 2019,
  • [5] Factors influencing protection motivation and IS security policy compliance
    Siponen, Mikko
    Pahnila, Seppo
    Mahmood, Adam
    2006 INNOVATIONS IN INFORMATION TECHNOLOGY, 2006, : 166 - 170
  • [6] Smartphone: Security and Privacy Protection
    Li, Xiu-Ting
    Ren, Shuo
    Cheng, Wei
    Xiang, Lai-Sheng
    Liu, Xi-Yu
    PERVASIVE COMPUTING AND THE NETWORKED WORLD, 2014, 8351 : 289 - +
  • [7] Impact of Users' Security Awareness on Desktop Security Behavior: A Protection Motivation Theory Perspective
    Hanus, Bartlomiej
    Wu, Yu Andy
    INFORMATION SYSTEMS MANAGEMENT, 2016, 33 (01) : 2 - 16
  • [8] Protection motivation theory as a theoretical framework for understanding the use of protective measures
    Clubb, Audrey C.
    Hinkle, Joshua C.
    CRIMINAL JUSTICE STUDIES, 2015, 28 (03) : 336 - 355
  • [9] Motivating IS security compliance: Insights from Habit and Protection Motivation Theory
    Vance, Anthony
    Siponen, Mikko
    Pahnila, Seppo
    INFORMATION & MANAGEMENT, 2012, 49 (3-4) : 190 - 198
  • [10] Practical Approach of Security Enhancement Method based on the Protection Motivation Theory
    Choi, Heeyoung
    Young, Kang Ju
    2021 21ST ACIS INTERNATIONAL WINTER CONFERENCE ON SOFTWARE ENGINEERING, ARTIFICIAL INTELLIGENCE, NETWORKING AND PARALLEL/DISTRIBUTED COMPUTING (SNPD-WINTER 2021), 2021, : 96 - 97