Identifying Protection Motivation Theory Factors that Influence Smartphone Security Measures

被引:0
作者
Schneider, Marvin [1 ]
Rahman, Shawon [2 ]
机构
[1] DeVry Univ, Dept Comp Informat Syst CIS, New York, NY 10016 USA
[2] Univ Hawaii, Dept Comp Sci & Engn, Hilo, HI 96720 USA
来源
2021 IEEE INTERNATIONAL CONFERENCE ON BIG DATA (BIG DATA) | 2021年
关键词
Protection Motivation Theory; Avoidance Motivation; Smartphone Security; Antivirus; Self-efficacy; FEAR APPEALS; INTENTION;
D O I
10.1109/BigData52589.2021.9671882
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Because smartphones are ubiquitous in our society, and undergraduate students use smartphones extensively, it is necessary to understand how undergraduates can be protected from malicious hacker attacks, viruses, and malware. This quantitative study explores the influence of Protection Motivation Theory (PMT) constructs on security behaviors of undergraduate students. The primary focus of this quantitative study is to answer our primary research question: to what extent do the independent PMT variables (perceived threat severity, perceived threat vulnerability, self-efficacy, response efficacy, and response cost) explain undergraduate students' employment of smartphone security measures? The findings suggest that although all hypotheses were not supported by the analysis; however, self-efficacy and perceived threat vulnerability showed a statistically positive association with several smartphone security measures. However, none of the constructs showed a statistically significant association with using unsecured Wi-Fi in public places. The practical implications of the findings are for industry to focus on better design of smartphone hardware and software (such as antivirus apps) to protect users, and to increase self-efficacy among smartphone undergraduate users through training and education.
引用
收藏
页码:3353 / 3359
页数:7
相关论文
共 26 条
  • [1] [Anonymous], 2018, MOBILE FACT SHEET
  • [2] Protection motivation theory in predicting intention to receive cervical cancer screening in rural Chinese women
    Bai, Yang
    Liu, Qing
    Chen, Xinguang
    Gao, Yanduo
    Gong, Huiyun
    Tan, Xiaodong
    Zhang, Min
    Tuo, Jiyu
    Zhang, Yuling
    Xiang, Qunying
    Deng, Fenghua
    Liu, Guiling
    [J]. PSYCHO-ONCOLOGY, 2018, 27 (02) : 442 - 449
  • [3] An Android runtime security policy enforcement framework
    Banuri, Hammad
    Alam, Masoom
    Khan, Shahryar
    Manzoor, Jawad
    Ali, Bahar
    Khan, Yasar
    Yaseen, Mohsin
    Tahir, Mir Nauman
    Ali, Tamleek
    Alam, Quratulain
    Zhang, Xinwen
    [J]. PERSONAL AND UBIQUITOUS COMPUTING, 2012, 16 (06) : 631 - 641
  • [4] WHAT DO SYSTEMS USERS HAVE TO FEAR? USING FEAR APPEALS TO ENGENDER THREATS AND FEAR THAT MOTIVATE PROTECTIVE SECURITY BEHAVIORS
    Boss, Scott R.
    Galletta, Dennis F.
    Lowry, Paul Benjamin
    Moody, Gregory D.
    Polak, Peter
    [J]. MIS QUARTERLY, 2015, 39 (04) : 837 - U461
  • [5] Improved two-parameter estimators for the negative binomial and Poisson regression models
    Cetinkaya, Merve Kandemir
    Kaciranlar, Selahattin
    [J]. JOURNAL OF STATISTICAL COMPUTATION AND SIMULATION, 2019, 89 (14) : 2645 - 2660
  • [6] On Mobile Device Security Practices and Training Efficacy: An Empirical Study
    Chin, Amita Goyal
    Etudo, Ugochukwu
    Harris, Mark A.
    [J]. INFORMATICS IN EDUCATION, 2016, 15 (02): : 235 - 252
  • [7] Examining the Effectiveness of Fear Appeals in Prompting Help-Seeking: The Case of At-Risk Gamblers
    De Vos, Svetlana
    Crouch, Roberta
    Quester, Pascale
    Ilicic, Jasmina
    [J]. PSYCHOLOGY & MARKETING, 2017, 34 (06) : 648 - 660
  • [8] Field A., 2005, DISCOVERING STAT USI, V2
  • [9] Fox J., 1997, Applied regression analysis and generalized linear models, DOI DOI 10.5860/CHOICE.34-6323
  • [10] Hilbe JM, 2014, MODELING COUNT DATA, P1