The role of security notices and online consumer behaviour: An empirical study of social networking users

被引:26
作者
Vladlena, Benson [1 ]
Saridakis, George [1 ]
Tennakoon, Hemamali [2 ]
Ezingeard, Jean Noel [3 ]
机构
[1] Univ Kingston, Kingston Upon Thames, Surrey, England
[2] Asia Pacific Inst Informat Technol, Colombo, Sri Lanka
[3] Manchester Metropolitan Univ, Manchester M15 6BH, Lancs, England
关键词
Social media; Security notices; Security seals; Personal information privacy; Information security; Cybercrime victimisation; Social learning; INFORMATION SECURITY; ELECTRONIC COMMERCE; PRIVACY SEALS; TRUST; MEDIA; WEB; BUSINESS; FACEBOOK; RISK; INTENTION;
D O I
10.1016/j.ijhcs.2015.03.004
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
This paper uses a survey of social networking users to empirically explore their perceptions of security notices - independently verified artefacts informing internet site users that security measures are taken by the site owner. We investigate such factors as purchase experience, purchase intention, risk propensity, usage of various social network categories and user victimisation. The results suggest a strong positive link between purchase intention and paying attention to security notices/features on social networks. We find that higher use of narrow-purpose social networking services has a negative association with paying attention to security notices. We also show that users with higher risk propensity pay less attention to security notices/features. Finally, we find no association between purchase experience, user victimisation and perception of security notices/features. Our results provide new, and possibly more refined, evidence of the factors that influence the attention paid to security notices/features by social media users. The results have important implications for theory development, policy and practice. (C) 2015 Elsevier Ltd. All rights reserved.
引用
收藏
页码:36 / 44
页数:9
相关论文
共 126 条
[51]  
Furnell SM, 2005, 2005 IEEE International Symposium on Signal Processing and Information Technology (ISSPIT), Vols 1 and 2, P534
[52]   Should we trust web-based studies? A comparative analysis of six preconceptions about Internet questionnaires [J].
Gosling, SD ;
Vazire, S ;
Srivastava, S ;
John, OP .
AMERICAN PSYCHOLOGIST, 2004, 59 (02) :93-104
[53]   Crime Science and the Internet Battlefield: Securing the Analog World from Digital Crime [J].
Gradon, Kacper .
IEEE SECURITY & PRIVACY, 2013, 11 (05) :93-95
[54]   Cyber insecurity as a national threat: overreaction from Germany, France and the UK? [J].
Guitton, Clement .
EUROPEAN SECURITY, 2013, 22 (01) :21-35
[55]   Risk Perception and Buying Behavior: An Examination of Some Relationships in the Context of Cruise Tourism in Jamaica [J].
Henthorne, Tony L. ;
George, Babu P. ;
Smith, William C. .
INTERNATIONAL JOURNAL OF HOSPITALITY & TOURISM ADMINISTRATION, 2013, 14 (01) :66-86
[56]   Toward a Deeper Understanding of Social Media [J].
Hoffman, Donna L. ;
Novak, Thomas P. .
JOURNAL OF INTERACTIVE MARKETING, 2012, 26 (02) :69-70
[57]  
Hoffman DL, 2010, MIT SLOAN MANAGE REV, V52, P41
[58]   Examining the Applicability of Lifestyle-Routine Activities Theory for Cybercrime Victimization [J].
Holt, Thomas J. ;
Bossler, Adam M. .
DEVIANT BEHAVIOR, 2009, 30 (01) :1-25
[59]   Knowledge sharing behavior in virtual communities: The relationship between trust, self-efficacy, and outcome expectations [J].
Hsu, Meng-Hsiang ;
Ju, Teresa L. ;
Yen, Chia-Hui ;
Chang, Chun-Ming .
INTERNATIONAL JOURNAL OF HUMAN-COMPUTER STUDIES, 2007, 65 (02) :153-169
[60]   The effects of Web assurance seals on consumers' initial trust in an online vendor: A functional perspective [J].
Hu, Xiaorui ;
Wu, Guohua ;
Wu, Yuhong ;
Zhang, Han .
DECISION SUPPORT SYSTEMS, 2010, 48 (02) :407-418