2018
DOI: 10.1016/j.cose.2018.03.008
|View full text |Cite
|
Sign up to set email alerts
|

Understanding smartphone security behaviors: An extension of the protection motivation theory with anticipated regret

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

3
32
1

Year Published

2020
2020
2024
2024

Publication Types

Select...
6
3

Relationship

0
9

Authors

Journals

citations
Cited by 80 publications
(36 citation statements)
references
References 35 publications
3
32
1
Order By: Relevance
“…Perceived risk vulnerability is a person's perception that they will experience negative consequences for behaving in a risky way (Rogers, 1983;Salleh et al, 2012). It also refers to how likely they perceive a security threat to be (Verkijika, 2018) and whether they perceive their device as susceptible to particular threats (Hanus and Wu, 2016). Within the context of smartphone security, perceived risk vulnerability refers to the likelihood that a smartphone is prone to a security threat (Verkijika, 2018).…”
Section: Perceived Risk Vulnerabilitymentioning
confidence: 99%
See 1 more Smart Citation
“…Perceived risk vulnerability is a person's perception that they will experience negative consequences for behaving in a risky way (Rogers, 1983;Salleh et al, 2012). It also refers to how likely they perceive a security threat to be (Verkijika, 2018) and whether they perceive their device as susceptible to particular threats (Hanus and Wu, 2016). Within the context of smartphone security, perceived risk vulnerability refers to the likelihood that a smartphone is prone to a security threat (Verkijika, 2018).…”
Section: Perceived Risk Vulnerabilitymentioning
confidence: 99%
“…It also refers to how likely they perceive a security threat to be (Verkijika, 2018) and whether they perceive their device as susceptible to particular threats (Hanus and Wu, 2016). Within the context of smartphone security, perceived risk vulnerability refers to the likelihood that a smartphone is prone to a security threat (Verkijika, 2018). It also refers to the employee's belief that an unwanted incident will happen if they do not act to prevent it-which in turn affects security (Vance et al, 2012).…”
Section: Perceived Risk Vulnerabilitymentioning
confidence: 99%
“…Response efficacy believes in the effectiveness of the protection [65]. Protection motivation theory has been used to explain and understand protection behaviors online [64,65]; [66].…”
Section: Perceived Switching Risk In Online Shoppingmentioning
confidence: 99%
“…The studies that have in fact evaluated the influence of social norms have done so using different descriptions, such as social influence or social sanctions (Herath and Rao, 2009;Johnston and Warkentin, 2010;Siponen and Vance, 2010) or have evaluated the constituent elements of social norms (subjective, descriptive, or injunctive norms) separately (Ifinedo, 2014;Safa et al, 2017). Recent studies that have evaluated social norms as a single construct either use it within different disciplines (Emami and Khajeheian, 2019;Esfandiar et al, 2019;; or only evaluate the components thereof, such as subjective norms (Tsai et al, 2016) or descriptive norms (Verkijika, 2018;Merhi and Ahluwalia, 2019). In terms of users' privacy concerns and information security awareness, Lowry et al (2011) made use of social exchange theory and combined it with the attitudinal aspect of the theory of reasoned action, explicitly arguing in favor of actual self-disclosure as opposed to intent.…”
Section: Theoretical Foundationmentioning
confidence: 99%