Identifying Protection Motivation Theory Factors that Influence Smartphone Security Measures

被引:0
|
作者
Schneider, Marvin [1 ]
Rahman, Shawon [2 ]
机构
[1] DeVry Univ, Dept Comp Informat Syst CIS, New York, NY 10016 USA
[2] Univ Hawaii, Dept Comp Sci & Engn, Hilo, HI 96720 USA
关键词
Protection Motivation Theory; Avoidance Motivation; Smartphone Security; Antivirus; Self-efficacy; FEAR APPEALS; INTENTION;
D O I
10.1109/BigData52589.2021.9671882
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Because smartphones are ubiquitous in our society, and undergraduate students use smartphones extensively, it is necessary to understand how undergraduates can be protected from malicious hacker attacks, viruses, and malware. This quantitative study explores the influence of Protection Motivation Theory (PMT) constructs on security behaviors of undergraduate students. The primary focus of this quantitative study is to answer our primary research question: to what extent do the independent PMT variables (perceived threat severity, perceived threat vulnerability, self-efficacy, response efficacy, and response cost) explain undergraduate students' employment of smartphone security measures? The findings suggest that although all hypotheses were not supported by the analysis; however, self-efficacy and perceived threat vulnerability showed a statistically positive association with several smartphone security measures. However, none of the constructs showed a statistically significant association with using unsecured Wi-Fi in public places. The practical implications of the findings are for industry to focus on better design of smartphone hardware and software (such as antivirus apps) to protect users, and to increase self-efficacy among smartphone undergraduate users through training and education.
引用
收藏
页码:3353 / 3359
页数:7
相关论文
共 50 条
  • [21] Study on Persuasion Effect of Computer Virus Measures Based on Collective Protection Motivation Theory
    Yoshikai, Noriaki
    Shimbo, Kana
    Stavrakakis, John
    Takahashi, Toshio
    ADVANCES IN NETWORK-BASED INFORMATION SYSTEMS, NBIS-2017, 2018, 7 : 518 - 528
  • [22] Structural Model of the Healthcare Information Security Behavior of Nurses Applying Protection Motivation Theory
    Lee, EunWon
    Seomun, GyeongAe
    INTERNATIONAL JOURNAL OF ENVIRONMENTAL RESEARCH AND PUBLIC HEALTH, 2021, 18 (04) : 1 - 13
  • [23] Personal Motivation Measures for Personal IT Security Behavior
    Marshall, Byron
    Curry, Michael
    Correia, John
    Crossler, Robert E.
    AMCIS 2017 PROCEEDINGS, 2017,
  • [24] The influence factors and protection measures of flying stone in demolition blast
    Guo, XB
    Xiao, ZX
    Zhang, JT
    PROGRESS IN SAFETY SCIENCE AND TECHNOLOGY, VOL III, PTS A AND B, 2002, 3 : 1470 - 1473
  • [25] Identifying Factors that Influence Employees' Security Behavior for Enhancing ISP Compliance
    Topa, Ioanna
    Karyda, Maria
    TRUST, PRIVACY AND SECURITY IN DIGITAL BUSINESS, 2015, 9264 : 169 - 179
  • [26] Human-centric cyber security: Applying protection motivation theory to analyse micro business owners' security behaviours
    Jamil, Hassan
    Zia, Tanveer
    Nayeem, Tahmid
    Whitty, Monica T.
    D'Alessandro, Steven
    INFORMATION AND COMPUTER SECURITY, 2025, 33 (01) : 49 - 76
  • [27] Protection Motivation Theory in Information Systems Security Research: A Review of the Past and a Road Map for the Future
    Haag, Steffi
    Siponen, Mikko
    Liu, Fufan
    DATA BASE FOR ADVANCES IN INFORMATION SYSTEMS, 2021, 52 (02): : 25 - 67
  • [28] Factors associated with the quitting intention among Chinese adults: Application of protection motivation theory
    Lin, Hao-xiang
    Chang, Chun
    CURRENT PSYCHOLOGY, 2023, 42 (02) : 1083 - 1091
  • [29] Factors associated with the quitting intention among Chinese adults: Application of protection motivation theory
    Hao-xiang Lin
    Chun Chang
    Current Psychology, 2023, 42 : 1083 - 1091
  • [30] Factors Associated with Tobacco Use among Iranian Adolescents: An Application of Protection Motivation Theory
    Sabzmakan, Leila
    Ghasemi, Mahmood
    Asghari Jafarabadi, Mohammad
    Kamalikhah, Tahereh
    Chaleshgar Kordasiabi, Mosharafeh
    SUBSTANCE USE & MISUSE, 2018, 53 (09) : 1511 - 1518