Identifying Protection Motivation Theory Factors that Influence Smartphone Security Measures

被引:0
|
作者
Schneider, Marvin [1 ]
Rahman, Shawon [2 ]
机构
[1] DeVry Univ, Dept Comp Informat Syst CIS, New York, NY 10016 USA
[2] Univ Hawaii, Dept Comp Sci & Engn, Hilo, HI 96720 USA
关键词
Protection Motivation Theory; Avoidance Motivation; Smartphone Security; Antivirus; Self-efficacy; FEAR APPEALS; INTENTION;
D O I
10.1109/BigData52589.2021.9671882
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Because smartphones are ubiquitous in our society, and undergraduate students use smartphones extensively, it is necessary to understand how undergraduates can be protected from malicious hacker attacks, viruses, and malware. This quantitative study explores the influence of Protection Motivation Theory (PMT) constructs on security behaviors of undergraduate students. The primary focus of this quantitative study is to answer our primary research question: to what extent do the independent PMT variables (perceived threat severity, perceived threat vulnerability, self-efficacy, response efficacy, and response cost) explain undergraduate students' employment of smartphone security measures? The findings suggest that although all hypotheses were not supported by the analysis; however, self-efficacy and perceived threat vulnerability showed a statistically positive association with several smartphone security measures. However, none of the constructs showed a statistically significant association with using unsecured Wi-Fi in public places. The practical implications of the findings are for industry to focus on better design of smartphone hardware and software (such as antivirus apps) to protect users, and to increase self-efficacy among smartphone undergraduate users through training and education.
引用
收藏
页码:3353 / 3359
页数:7
相关论文
共 50 条
  • [11] A students' behaviors in information security: Extension of Protection Motivation Theory (PMT)
    Alam, Syed Shah
    Ahsan, Nilufar
    Kokash, Husam Ahmad
    Alam, Shafiul
    Ahmed, Saif
    INFORMATION SECURITY JOURNAL, 2024,
  • [12] Protection Motivation Theory in Information Security Behavior Research: Reconsidering the Fundamentals
    Siponen, Mikko
    Ronkko, Mikko
    Fufan, Liu
    Haag, Steffi
    Laatikainen, Gabriella
    COMMUNICATIONS OF THE ASSOCIATION FOR INFORMATION SYSTEMS, 2023, 53
  • [13] Protection Motivation Theory in Information Security Behavior Research: Reconsidering the Fundamentals
    Siponen M.
    Rönkkö M.
    Haag S.
    Fufan L.
    Laatikainen G.
    Communications of the Association for Information Systems, 2024, 53 : 1136 - 1165
  • [14] The influence of protection motivation factors and social norms on child safety
    Simon, M. Rok
    Korosec, A.
    Bilban, M.
    EUROPEAN JOURNAL OF PUBLIC HEALTH, 2018, 28 : 92 - 92
  • [15] Using protection motivation theory in the design of nudges to improve online security behavior
    van Bavel, Rene
    Rodriguez-Priego, Nuria
    Vila, Jose
    Briggs, Pam
    INTERNATIONAL JOURNAL OF HUMAN-COMPUTER STUDIES, 2019, 123 : 29 - 39
  • [16] A Meta-Analysis of Studies on Protection Motivation Theory and Information Security Behaviour
    Sommestad, Teodor
    Karlzen, Henrik
    Hallberg, Jonas
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY AND PRIVACY, 2015, 9 (01) : 26 - 46
  • [17] Protection Motivation Driven Security Learning
    Ding, Yi
    Meso, Peter
    Xu, Shuting
    AMCIS 2014 PROCEEDINGS, 2014,
  • [18] An Extended Perspective on Individual Security Behaviors: Protection Motivation Theory and a Unified Security Practices (USP) Instrument
    Crossler, Robert
    Belanger, France
    DATA BASE FOR ADVANCES IN INFORMATION SYSTEMS, 2014, 45 (04): : 51 - 71
  • [19] Understanding information systems security policy compliance: An integration of the theory of planned behavior and the protection motivation theory
    Ifinedo, Princely
    COMPUTERS & SECURITY, 2012, 31 (01) : 83 - 95
  • [20] User Motivations in Protecting Information Security: Protection Motivation Theory Versus Self-Determination Theory
    Menard, Philip
    Bott, Gregory J.
    Crossler, Robert E.
    JOURNAL OF MANAGEMENT INFORMATION SYSTEMS, 2017, 34 (04) : 1203 - 1230