Identifying Protection Motivation Theory Factors that Influence Smartphone Security Measures

被引:0
|
作者
Schneider, Marvin [1 ]
Rahman, Shawon [2 ]
机构
[1] DeVry Univ, Dept Comp Informat Syst CIS, New York, NY 10016 USA
[2] Univ Hawaii, Dept Comp Sci & Engn, Hilo, HI 96720 USA
关键词
Protection Motivation Theory; Avoidance Motivation; Smartphone Security; Antivirus; Self-efficacy; FEAR APPEALS; INTENTION;
D O I
10.1109/BigData52589.2021.9671882
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Because smartphones are ubiquitous in our society, and undergraduate students use smartphones extensively, it is necessary to understand how undergraduates can be protected from malicious hacker attacks, viruses, and malware. This quantitative study explores the influence of Protection Motivation Theory (PMT) constructs on security behaviors of undergraduate students. The primary focus of this quantitative study is to answer our primary research question: to what extent do the independent PMT variables (perceived threat severity, perceived threat vulnerability, self-efficacy, response efficacy, and response cost) explain undergraduate students' employment of smartphone security measures? The findings suggest that although all hypotheses were not supported by the analysis; however, self-efficacy and perceived threat vulnerability showed a statistically positive association with several smartphone security measures. However, none of the constructs showed a statistically significant association with using unsecured Wi-Fi in public places. The practical implications of the findings are for industry to focus on better design of smartphone hardware and software (such as antivirus apps) to protect users, and to increase self-efficacy among smartphone undergraduate users through training and education.
引用
收藏
页码:3353 / 3359
页数:7
相关论文
共 50 条
  • [31] Modeling the Impact of Biometric Security on Millennials' Protection Motivation
    Ngugi, Benjamin
    Kamis, Arnold
    JOURNAL OF ORGANIZATIONAL AND END USER COMPUTING, 2013, 25 (04) : 27 - 49
  • [32] Factors That Influence Employees' Security Policy Compliance: An Awareness-Motivation-Capability Perspective
    Chen, Xiaofeng
    Chen, Liqiang
    Wu, Dazhong
    JOURNAL OF COMPUTER INFORMATION SYSTEMS, 2018, 58 (04) : 312 - 324
  • [33] Adoption of Individual Flood Damage Mitigation Measures in New York City: An Extension of Protection Motivation Theory
    Botzen, W. J. Wouter
    Kunreuther, Howard
    Czajkowski, Jeffrey
    de Moel, Hans
    RISK ANALYSIS, 2019, 39 (10) : 2143 - 2159
  • [34] Determinants of adherence to COVID-19 measures among the Belgian population: an application of the protection motivation theory
    van Loenhout, Joris Adriaan Frank
    Vanderplanken, Kirsten
    Scheen, Benedicte
    Van den Broucke, Stephan
    Aujoulat, Isabelle
    ARCHIVES OF PUBLIC HEALTH, 2021, 79 (01)
  • [35] Determinants of adherence to COVID-19 measures among the Belgian population: an application of the protection motivation theory
    Joris Adriaan Frank van Loenhout
    Kirsten Vanderplanken
    Bénédicte Scheen
    Stephan Van den Broucke
    Isabelle Aujoulat
    Archives of Public Health, 79
  • [36] Computer Network Information Security and Protection Measures
    Meng, Qingbao
    PROCEEDINGS OF THE 2017 7TH INTERNATIONAL CONFERENCE ON MECHATRONICS, COMPUTER AND EDUCATION INFORMATIONIZATION (MCEI 2017), 2017, 75 : 903 - 905
  • [37] Research on the Measures of the Computer Network Security Protection
    Fu, Longsheng
    Wu, Mingzhu
    2016 ISSGBM INTERNATIONAL CONFERENCE ON INFORMATION, COMMUNICATION AND SOCIAL SCIENCES (ISSGBM-ICS 2016), PT 3, 2016, 68 : 341 - 345
  • [38] Smart4Gap: Factors that Influence Smartphone Security Decisions in Developing and Developed Countries
    Ndibwile, Jema David
    Luhanga, Edith Talina
    Fall, Doudou
    Miyamoto, Daisuke
    Kadobayashi, Youki
    ICIME 2018: PROCEEDINGS OF THE 2018 10TH INTERNATIONAL CONFERENCE ON INFORMATION MANAGEMENT AND ENGINEERING, 2018, : 5 - 15
  • [39] FACTORS THAT INFLUENCE CONTINUING MOTIVATION
    STORY, NO
    SULLIVAN, HJ
    JOURNAL OF EDUCATIONAL RESEARCH, 1986, 80 (02): : 86 - 92
  • [40] Understanding security behaviour among healthcare professionals by comparing results from technology threat avoidance theory and protection motivation theory
    Sreenath, Sanjana Sundara Raj
    Hewitt, Barbara
    Sreenath, Sahana
    BEHAVIOUR & INFORMATION TECHNOLOGY, 2025, 44 (02) : 181 - 196