2020
DOI: 10.1016/j.dib.2020.105588
|View full text |Cite
|
Sign up to set email alerts
|

Data modeling positive security behavior implementation among smart device users in Indonesia: A partial least squares structural equation modeling approach (PLS-SEM)

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

1
18
1

Year Published

2020
2020
2024
2024

Publication Types

Select...
7
1
1

Relationship

0
9

Authors

Journals

citations
Cited by 27 publications
(20 citation statements)
references
References 11 publications
1
18
1
Order By: Relevance
“…Although less widely used than the first type, PLS is unique in that it requires fewer samples, does not require data to conform to a normal distribution, can process both reflective and formative indicators, is not affected by multiple collinearities, and has strong predictive power. It is also widely used in management, economics, health behavior, and other fields, and some scholars have applied it to extend and test the theory of planned behavior [ 13 ]. Each endogenous latent variable had a path coefficient ( R 2 ) that tested the fit of the model.…”
Section: Methodsmentioning
confidence: 99%
“…Although less widely used than the first type, PLS is unique in that it requires fewer samples, does not require data to conform to a normal distribution, can process both reflective and formative indicators, is not affected by multiple collinearities, and has strong predictive power. It is also widely used in management, economics, health behavior, and other fields, and some scholars have applied it to extend and test the theory of planned behavior [ 13 ]. Each endogenous latent variable had a path coefficient ( R 2 ) that tested the fit of the model.…”
Section: Methodsmentioning
confidence: 99%
“…(4) Kautsarina et al (2020) This study aims to understand the positive security behaviors of smart device users in Indonesia, which was used to determine whether the studied variables were direct or mediating factors. The factors explored include government efforts, technology provider support, privacy concerns, trust, perceived behavioral control, attitudes, and subjective norms.…”
Section: Methodsmentioning
confidence: 99%
“…Participation in government social media accounts can help provide knowledge and tips to the public about the latest information security threats, so it can positively influence their information security behavior through perceived severity, perceived vulnerability, self-efficacy, and response efficiency [54]. Research conducted by Kautsarina et al [55] also stated that the result directly influences government engagement, privacy, perceived behavioral control, and the implementation of proactive security behaviors. Other variables have a positive and significant impact on the performance of positive security behaviors, indicating their role as mediators.…”
Section: B Related Workmentioning
confidence: 99%