Applying the Theory of Planned Behaviour to predicting online safety behaviour

被引:35
作者
Burns S. [1 ]
Roberts L. [1 ]
机构
[1] School of Psychology and Speech Pathology, Curtin University, Perth, WA 6845
关键词
Cyber-identity theft; Cyber-victimization; Cybercrime; Online privacy; Protective behaviours; Theory of Planned Behaviour;
D O I
10.1057/cpcs.2012.13
中图分类号
学科分类号
摘要
A widely promoted preventative measure against becoming a victim of cybercrime is the control of personal information online; however, little is known about what predicts the use of this type of protective safety behaviour. This study examines the utility of the Theory of Planned Behaviour in predicting online protective behaviours. Participants (N=150) completed measures of online privacy attitudes, normative influence, perceived behavioural control (PBC), intention to use and actual use of online protective behaviours. Path analysis indicated the effects of online privacy attitudes and normative beliefs on online protective safety behaviours were mediated through intention, while PBC had a significant direct effect on online protective safety behaviours. The model explained 81 per cent of the variance in protective online safety behaviours. The results of this study facilitate understanding of the psychological processes underlying the use of online protective behaviours, and can be used in the development of educational materials and cyber-identity theft prevention strategies. © 2013 Macmillan Publishers Ltd.
引用
收藏
页码:48 / 64
页数:16
相关论文
共 49 条
  • [11] Cho H., Lee J.S., Chung S., Optimistic bias about online privacy risks: Testing the moderating effects of perceived controllability and prior experience, Computers in Human Behaviour, 26, 5, pp. 987-995, (2010)
  • [12] Cho H., Rivera-Sanchez M., Lim S.S., A multinational study on online privacy: Global concerns and local responses, New Media & Society, 11, 3, pp. 395-416, (2009)
  • [13] Cohen J.A., A power primer, Psychological Bulletin, 112, 1, pp. 155-159, (1992)
  • [14] Dinev T., Goo J.M., Hu Q., Nam K., User behaviour towards protective information technologies: The role of national cultural differences, Information Systems Journal, 19, 4, pp. 391-412, (2009)
  • [15] Dinev T., Hu Q., The centrality of awareness in the formation of user behavioral intention toward protective information technologies, Journal of the Association for Information Systems, 8, 7, pp. 386-408, (2007)
  • [16] Goritz A.S., Incentives in web studies: Methodological issues and a review, International Journal of Internet Science, 1, 1, pp. 58-70, (2006)
  • [17] Henson B., Reyns B.W., Fisher B.S., Security in the 21st century, Criminal Justice Review, 36, 3, pp. 253-268, (2011)
  • [18] Higgins G.E., Blakely C.R., Cybercrime: An Introduction to An Emerging Phenomenon, (2010)
  • [19] Kline R.B., Principles and Practice of Structural Equation Modelling, (2005)
  • [20] Koops B., The internet and its opportunities for cybercrime, Transnational Criminology Manual, pp. 735-754, (2010)