Skip to main content
Erschienen in: Information Systems Frontiers 6/2019

18.07.2019

Antecedents and Outcome of Deficient Self-Regulation in Unknown Wireless Networks Use Context: An Exploratory Study

verfasst von: Emmanuel W. Ayaburi, James Wairimu, Francis Kofi Andoh-Baidoo

Erschienen in: Information Systems Frontiers | Ausgabe 6/2019

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Wireless networks are becoming the norm in the society, where hotspots afford users access to the internet through mobile devices. Unknown wireless networks, open public networks with unknown identity, pose threats as hackers can gain unauthorized access to users’ private information stored in their mobile devices. Despite the imminent dangers, individuals continue to use these networks. This study explicates a self-regulation theory model to investigate the antecedents of deficient self-regulation (DSR). We posit that both habit cues and information security experiential factors influence DSR, leading to habitual use of unknown wireless networks. The results show that perceived attachment, perceptions on privacy risk, and information security self-efficacy significantly influence DSR, which subsequently influences habitual use of unknown wireless networks. This study contributes to the literature on self-regulatory theory and privacy, and also provides implications for managers in dealing with vulnerabilities posed by employees using private or corporate mobile devices on unknown wireless network.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Anhänge
Nur mit Berechtigung zugänglich
Literatur
Zurück zum Zitat Aime, M., Calandriello, G., & Lioy, A. (2007). Dependability in Wireless Networks: Can We Rely on WiFi? IEEE Security and Privacy Magazine, 5(1), 23–29. Aime, M., Calandriello, G., & Lioy, A. (2007). Dependability in Wireless Networks: Can We Rely on WiFi? IEEE Security and Privacy Magazine, 5(1), 23–29.
Zurück zum Zitat Anderson, B. B., Vance, A., Kirwan, C. B., Jenkins, J. L., & Eargle, D. (2016). From Warning to Wallpaper: Why the Brain Habituates to Security Warnings and What Can Be Done About It. Journal of Management Information Systems, 33(3), 713–743. Anderson, B. B., Vance, A., Kirwan, C. B., Jenkins, J. L., & Eargle, D. (2016). From Warning to Wallpaper: Why the Brain Habituates to Security Warnings and What Can Be Done About It. Journal of Management Information Systems, 33(3), 713–743.
Zurück zum Zitat Balachandran, A., Voelker, G. M., & Bahl, P. (2005). Wireless hotspots: current challenges and future directions. Mobile Networks and Applications, 10(3), 265–274. Balachandran, A., Voelker, G. M., & Bahl, P. (2005). Wireless hotspots: current challenges and future directions. Mobile Networks and Applications, 10(3), 265–274.
Zurück zum Zitat Bandura, A. (1991). Social Cognitive Theory of Self-Regulation. Organizational Behavior and Human Decision Processes, 50, 248–287. Bandura, A. (1991). Social Cognitive Theory of Self-Regulation. Organizational Behavior and Human Decision Processes, 50, 248–287.
Zurück zum Zitat Barber, L. K., Munz, D. C., Bagsby, P. G., & Grawitch, M. J. (2009). When does time perspective matter? Self-control as a moderator between time perspective and academic achievement. Personality and Individual Differences, 46(2), 250–253. Barber, L. K., Munz, D. C., Bagsby, P. G., & Grawitch, M. J. (2009). When does time perspective matter? Self-control as a moderator between time perspective and academic achievement. Personality and Individual Differences, 46(2), 250–253.
Zurück zum Zitat Bayer, J. B., & Campbell, S. W. (2012). Texting while driving on automatic: considering the frequency-independent side of habit. Computers in Human Behavior 28(6), 2083–2090. Bayer, J. B., & Campbell, S. W. (2012). Texting while driving on automatic: considering the frequency-independent side of habit. Computers in Human Behavior 28(6), 2083–2090.
Zurück zum Zitat Bayer, J. B., Campbell, S. W., & Ling, R. (2016). Connection Cues: Activating the Norms and Habits of Social Connectedness: Connection Cues. Communication Theory, 26(2), 128–149. Bayer, J. B., Campbell, S. W., & Ling, R. (2016). Connection Cues: Activating the Norms and Habits of Social Connectedness: Connection Cues. Communication Theory, 26(2), 128–149.
Zurück zum Zitat Bayer, J. B., Dal Cin, S., Campbell, S. W., & Panek, E. (2016). Consciousness and Self-Regulation in Mobile Communication: Consciousness in Mobile Communication. Human Communication Research, 42(1), 71–97. Bayer, J. B., Dal Cin, S., Campbell, S. W., & Panek, E. (2016). Consciousness and Self-Regulation in Mobile Communication: Consciousness in Mobile Communication. Human Communication Research, 42(1), 71–97.
Zurück zum Zitat Buhrmester, M., Kwang, T., & Gosling, S. D. (2011). Amazon’s Mechanical Turk: A New Source of Inexpensive, Yet High-Quality, Data? Perspectives on Psychological Science, 6(1), 3–5. Buhrmester, M., Kwang, T., & Gosling, S. D. (2011). Amazon’s Mechanical Turk: A New Source of Inexpensive, Yet High-Quality, Data? Perspectives on Psychological Science, 6(1), 3–5.
Zurück zum Zitat Caplan, S. E. (2010). Theory and measurement of generalized problematic Internet use: A two-step approach. Computers in Human Behavior, 26(5), 1089–1097. Caplan, S. E. (2010). Theory and measurement of generalized problematic Internet use: A two-step approach. Computers in Human Behavior, 26(5), 1089–1097.
Zurück zum Zitat Chen, H.-T., & Chen, W. (2015). Couldn’t or Wouldn’t? The Influence of Privacy Concerns and Self-Efficacy in Privacy Management on Privacy Protection. Cyberpsychology, Behavior, and Social Networking, 18(1), 13–19. Chen, H.-T., & Chen, W. (2015). Couldn’t or Wouldn’t? The Influence of Privacy Concerns and Self-Efficacy in Privacy Management on Privacy Protection. Cyberpsychology, Behavior, and Social Networking, 18(1), 13–19.
Zurück zum Zitat Choi, H. S., & Carpenter, D. (2013). Connecting to Unknown Wi-Fi Hotspots - A Risk Taking Perspective, 10. Choi, H. S., & Carpenter, D. (2013). Connecting to Unknown Wi-Fi Hotspots - A Risk Taking Perspective, 10.
Zurück zum Zitat Choi, M.-K., Robles, R. J., Hong, C.-H., & Kim, T.-H. (2008). Wireless Network Security: Vulnerabilities, Threats and Countermeasures. International Journal of Multimedia and Ubiquitous Engineering 3(3), 77–86. Choi, M.-K., Robles, R. J., Hong, C.-H., & Kim, T.-H. (2008). Wireless Network Security: Vulnerabilities, Threats and Countermeasures. International Journal of Multimedia and Ubiquitous Engineering 3(3), 77–86.
Zurück zum Zitat Cisco. (2017). Cisco Visual Networking Index: Global Mobile Data Traffic Forecast Update, 2016–202, 35. Cisco. (2017). Cisco Visual Networking Index: Global Mobile Data Traffic Forecast Update, 2016–202, 35.
Zurück zum Zitat Eastin, M. S., Glynn, C. J., & Griffiths, R. P. (2007). Psychology of Communication Technology Use in the Workplace. CyberPsychology & Behavior, 10(3), 436–443. Eastin, M. S., Glynn, C. J., & Griffiths, R. P. (2007). Psychology of Communication Technology Use in the Workplace. CyberPsychology & Behavior, 10(3), 436–443.
Zurück zum Zitat Ersche, K. D., Lim, T.-V., Ward, L. H. E., Robbins, T. W., & Stochl, J. (2017). Creature of Habit: A self-report measure of habitual routines and automatic tendencies in everyday life. Personality and Individual Differences, 116, 73–85. Ersche, K. D., Lim, T.-V., Ward, L. H. E., Robbins, T. W., & Stochl, J. (2017). Creature of Habit: A self-report measure of habitual routines and automatic tendencies in everyday life. Personality and Individual Differences, 116, 73–85.
Zurück zum Zitat Fullwood, C., Quinn, S., Kaye, L. K., & Redding, C. (2017). My virtual friend: A qualitative analysis of the attitudes and experiences of Smartphone users: Implications for Smartphone attachment. Computers in Human Behavior, 75, 347–355. Fullwood, C., Quinn, S., Kaye, L. K., & Redding, C. (2017). My virtual friend: A qualitative analysis of the attitudes and experiences of Smartphone users: Implications for Smartphone attachment. Computers in Human Behavior, 75, 347–355.
Zurück zum Zitat Gast, M. S. (2002). 802.11 Wireless Networks: the definitive guide: [creating and administering Wireless Networks] (1st ed.). Beijing: O’Reilly. Gast, M. S. (2002). 802.11 Wireless Networks: the definitive guide: [creating and administering Wireless Networks] (1st ed.). Beijing: O’Reilly.
Zurück zum Zitat Gillan, C. M., Robbins, T. W., Sahakian, B. J., van den Heuvel, O. A., & van Wingen, G. (2016). The role of habit in compulsivity. European Neuropsychopharmacology, 26(5), 828–840. Gillan, C. M., Robbins, T. W., Sahakian, B. J., van den Heuvel, O. A., & van Wingen, G. (2016). The role of habit in compulsivity. European Neuropsychopharmacology, 26(5), 828–840.
Zurück zum Zitat Gökçearslan, Ş., Mumcu, F. K., Haşlaman, T., & Çevik, Y. D. (2016). Modelling smartphone addiction: The role of smartphone usage, self-regulation, general self-efficacy and cyberloafing in university students. Computers in Human Behavior, 63, 639–649. Gökçearslan, Ş., Mumcu, F. K., Haşlaman, T., & Çevik, Y. D. (2016). Modelling smartphone addiction: The role of smartphone usage, self-regulation, general self-efficacy and cyberloafing in university students. Computers in Human Behavior, 63, 639–649.
Zurück zum Zitat Groves, P. M., & Thompson, R. F. (1970). Habituation: a dual-process theory. Psychological review, 77(5), 419–450. Groves, P. M., & Thompson, R. F. (1970). Habituation: a dual-process theory. Psychological review, 77(5), 419–450.
Zurück zum Zitat Haagsma, M. C., Caplan, S. E., Peters, O., & Pieterse, M. E. (2013). A cognitive-behavioral model of problematic online gaming in adolescents aged 12–22 years. Computers in Human Behavior, 29(1), 202–209. Haagsma, M. C., Caplan, S. E., Peters, O., & Pieterse, M. E. (2013). A cognitive-behavioral model of problematic online gaming in adolescents aged 12–22 years. Computers in Human Behavior, 29(1), 202–209.
Zurück zum Zitat Hagerty, B. M. K., Lynch-Sauer, J., Patusky, K. L., & Bouwsema, M. (1993). An Emerging Theory of Human Relatedness. Image: the Journal of Nursing Scholarship, 25(4), 291–296. Hagerty, B. M. K., Lynch-Sauer, J., Patusky, K. L., & Bouwsema, M. (1993). An Emerging Theory of Human Relatedness. Image: the Journal of Nursing Scholarship, 25(4), 291–296.
Zurück zum Zitat Hair, J. F., Sarstedt, M., Ringle, C. M., & Mena, J. A. (2012). An assessment of the use of partial least squares structural equation modeling in marketing research. Journal of the Academy of Marketing Science, 40(3), 414–433. Hair, J. F., Sarstedt, M., Ringle, C. M., & Mena, J. A. (2012). An assessment of the use of partial least squares structural equation modeling in marketing research. Journal of the Academy of Marketing Science, 40(3), 414–433.
Zurück zum Zitat Hampton, K. N., Livio, O., & Sessions Goulet, L. (2009). The Social Life of Wireless Urban Spaces: Internet Use, Social Networks, and the Public Realm. Journal of Communication, 60(4), 701–722. Hampton, K. N., Livio, O., & Sessions Goulet, L. (2009). The Social Life of Wireless Urban Spaces: Internet Use, Social Networks, and the Public Realm. Journal of Communication, 60(4), 701–722.
Zurück zum Zitat Higgins, G. E., & Makin, D. A. (2004). Does Social Learning Theory Condition the Effects of Low Self-Control on College Students’ Software Piracy?, 2(2), 1–22. Higgins, G. E., & Makin, D. A. (2004). Does Social Learning Theory Condition the Effects of Low Self-Control on College Students’ Software Piracy?, 2(2), 1–22.
Zurück zum Zitat Hulland. (1999). Use of Partial Least Squares (PLS) in Strategic Management Research: A Review of Four Recent Studies. Strategic Management Journal, 20(2), 195–204. Hulland. (1999). Use of Partial Least Squares (PLS) in Strategic Management Research: A Review of Four Recent Studies. Strategic Management Journal, 20(2), 195–204.
Zurück zum Zitat Khang, H., Kim, J. K., & Kim, Y. (2013). Self-traits and motivations as antecedents of digital media flow and addiction: The Internet, mobile phones, and video games. Computers in Human Behavior, 29(6), 2416–2424. Khang, H., Kim, J. K., & Kim, Y. (2013). Self-traits and motivations as antecedents of digital media flow and addiction: The Internet, mobile phones, and video games. Computers in Human Behavior, 29(6), 2416–2424.
Zurück zum Zitat Kindberg, T., Bevan, C., O’Neill, E., Mitchell, J., Grimmett, J., & Woodgate, D. (2009). Authenticating Ubiquitous Services: A Study of Wireless Hotspot Access, 12. Kindberg, T., Bevan, C., O’Neill, E., Mitchell, J., Grimmett, J., & Woodgate, D. (2009). Authenticating Ubiquitous Services: A Study of Wireless Hotspot Access, 12.
Zurück zum Zitat King, A. L. S., Valença, A. M., Silva, A. C. O., Baczynski, T., Carvalho, M. R., & Nardi, A. E. (2013). Nomophobia: Dependency on virtual environments or social phobia? Computers in Human Behavior, 29(1), 140–144. King, A. L. S., Valença, A. M., Silva, A. C. O., Baczynski, T., Carvalho, M. R., & Nardi, A. E. (2013). Nomophobia: Dependency on virtual environments or social phobia? Computers in Human Behavior, 29(1), 140–144.
Zurück zum Zitat Klasnja, P., Consolvo, S., Jung, J., Greenstein, B. M., LeGrand, L., Powledge, P., & Wetherall, D. (2009). “When I am on Wi-Fi, I am Fearless:” Privacy Concerns & Practices in Everyday Wi-Fi Use, 10. Klasnja, P., Consolvo, S., Jung, J., Greenstein, B. M., LeGrand, L., Powledge, P., & Wetherall, D. (2009). “When I am on Wi-Fi, I am Fearless:” Privacy Concerns & Practices in Everyday Wi-Fi Use, 10.
Zurück zum Zitat LaRose, R. (2010). The Problem of Media Habits. Communication Theory, 20(2), 194–222. LaRose, R. (2010). The Problem of Media Habits. Communication Theory, 20(2), 194–222.
Zurück zum Zitat LaRose, R., Lin, C. A., & Eastin, M. S. (2003). Unregulated Internet Usage: Addiction, Habit, or DSR? Media Psychology, 5(3), 225–253. LaRose, R., Lin, C. A., & Eastin, M. S. (2003). Unregulated Internet Usage: Addiction, Habit, or DSR? Media Psychology, 5(3), 225–253.
Zurück zum Zitat Lee, K. C., & Perry, S. D. (2004). Student Instant Message Use in a Ubiquitous Computing Environment: Effects of DSR. Journal of Broadcasting & Electronic Media, 48(3), 399–420. Lee, K. C., & Perry, S. D. (2004). Student Instant Message Use in a Ubiquitous Computing Environment: Effects of DSR. Journal of Broadcasting & Electronic Media, 48(3), 399–420.
Zurück zum Zitat Lee, R. M., & Robbins, S. B. (1995). Measuring belongingness: The social connectedness and the social assurance scales. Journal of counseling psychology, 42(2), 232. Lee, R. M., & Robbins, S. B. (1995). Measuring belongingness: The social connectedness and the social assurance scales. Journal of counseling psychology, 42(2), 232.
Zurück zum Zitat Lee, B. W., & Stapinski, L. A. (2012). Seeking safety on the internet: Relationship between social anxiety and problematic internet use. Journal of Anxiety Disorders, 26(1), 197–205. Lee, B. W., & Stapinski, L. A. (2012). Seeking safety on the internet: Relationship between social anxiety and problematic internet use. Journal of Anxiety Disorders, 26(1), 197–205.
Zurück zum Zitat Lee, R. M., Draper, M., & Lee, S. (2001). Social Connectedness, Dysfunctional Interpersonal Behaviors, and Psychological Distress: Testing a Mediator Model, 9. Lee, R. M., Draper, M., & Lee, S. (2001). Social Connectedness, Dysfunctional Interpersonal Behaviors, and Psychological Distress: Testing a Mediator Model, 9.
Zurück zum Zitat Lee, Y.-K., Chang, C.-T., Lin, Y., & Cheng, Z.-H. (2014). The dark side of smartphone usage: Psychological traits, compulsive behavior and technostress. Computers in Human Behavior, 31, 373–383. Lee, Y.-K., Chang, C.-T., Lin, Y., & Cheng, Z.-H. (2014). The dark side of smartphone usage: Psychological traits, compulsive behavior and technostress. Computers in Human Behavior, 31, 373–383.
Zurück zum Zitat Lee, Z. W. Y., Cheung, C. M. K., & Chan, T. K. H. (2016). Technology-Mediated Self-Regulation: An Implication for Preventing Online Gaming Addiction. International Conference on Information Systems, 10. Lee, Z. W. Y., Cheung, C. M. K., & Chan, T. K. H. (2016). Technology-Mediated Self-Regulation: An Implication for Preventing Online Gaming Addiction. International Conference on Information Systems, 10.
Zurück zum Zitat McCord, B., Rodebaugh, T. L., & Levinson, C. A. (2014). Facebook: Social uses and anxiety. Computers in Human Behavior, 34, 23–27. McCord, B., Rodebaugh, T. L., & Levinson, C. A. (2014). Facebook: Social uses and anxiety. Computers in Human Behavior, 34, 23–27.
Zurück zum Zitat McIntyre, E., Wiener, K. K. K., & Saliba, A. J. (2015). Compulsive Internet use and relations between social connectedness, and introversion. Computers in Human Behavior, 48, 569–574. McIntyre, E., Wiener, K. K. K., & Saliba, A. J. (2015). Compulsive Internet use and relations between social connectedness, and introversion. Computers in Human Behavior, 48, 569–574.
Zurück zum Zitat Noor, M. M., & Hassan, W. H. (2013). Current threats of wireless networks. The Third International Conference on Society of Digital Information Processing and Communications, 704–713. Noor, M. M., & Hassan, W. H. (2013). Current threats of wireless networks. The Third International Conference on Society of Digital Information Processing and Communications, 704–713.
Zurück zum Zitat Olufon, T., Campbell, C. E.-A., Hole, S., Radhakrishnan, K., & Sedigh, A. (2014). Mitigating External Threats in Wireless Local Area Networks. International Journal of Communication Networks and Information Security, 6(3), 18. Olufon, T., Campbell, C. E.-A., Hole, S., Radhakrishnan, K., & Sedigh, A. (2014). Mitigating External Threats in Wireless Local Area Networks. International Journal of Communication Networks and Information Security, 6(3), 18.
Zurück zum Zitat Podsakoff, P. M., MacKenzie, S. B., Lee, J.-Y., & Podsakoff, N. P. (2003). Common method biases in behavioral research: A critical review of the literature and recommended remedies. Journal of Applied Psychology, 88(5), 879–903. Podsakoff, P. M., MacKenzie, S. B., Lee, J.-Y., & Podsakoff, N. P. (2003). Common method biases in behavioral research: A critical review of the literature and recommended remedies. Journal of Applied Psychology, 88(5), 879–903.
Zurück zum Zitat Polites, G. L., Serrano, C., Thatcher, J. B., & Matthews, K. (2018). Understanding social networking site (SNS) identity from a dual systems perspective: an investigation of the dark side of SNS use. European Journal of Information Systems, 27(5), 600–621. Polites, G. L., Serrano, C., Thatcher, J. B., & Matthews, K. (2018). Understanding social networking site (SNS) identity from a dual systems perspective: an investigation of the dark side of SNS use. European Journal of Information Systems, 27(5), 600–621.
Zurück zum Zitat Pratt, T. C., & Cullen, F. T. (2000). The empirical status of Gottfredson and Hirschi’s general theory of crime: A meta-analysis. Criminology, 38(3), 931–964. Pratt, T. C., & Cullen, F. T. (2000). The empirical status of Gottfredson and Hirschi’s general theory of crime: A meta-analysis. Criminology, 38(3), 931–964.
Zurück zum Zitat Prizant-Passal, S., Shechner, T., & Aderka, I. M. (2016). Social anxiety and internet use – A meta-analysis: What do we know? What are we missing? Computers in Human Behavior, 62, 221–229. Prizant-Passal, S., Shechner, T., & Aderka, I. M. (2016). Social anxiety and internet use – A meta-analysis: What do we know? What are we missing? Computers in Human Behavior, 62, 221–229.
Zurück zum Zitat Rhee, H.-S., Kim, C., & Ryu, Y. U. (2009). Self-efficacy in information security: Its influence on end users’ information security practice behavior. Computers & Security, 28(8), 816–826. Rhee, H.-S., Kim, C., & Ryu, Y. U. (2009). Self-efficacy in information security: Its influence on end users’ information security practice behavior. Computers & Security, 28(8), 816–826.
Zurück zum Zitat Ringle, C. M., Da Silva, D., & Bido, D. D. S. (2014). Structural Equation Modeling with the Smartpls. Revista Brasileira de Marketing, 13(02), 56–73. Ringle, C. M., Da Silva, D., & Bido, D. D. S. (2014). Structural Equation Modeling with the Smartpls. Revista Brasileira de Marketing, 13(02), 56–73.
Zurück zum Zitat Salehan, M., & Negahban, A. (2013). Social networking on smartphones: When mobile phones become addictive. Computers in Human Behavior, 29(6), 2632–2639. Salehan, M., & Negahban, A. (2013). Social networking on smartphones: When mobile phones become addictive. Computers in Human Behavior, 29(6), 2632–2639.
Zurück zum Zitat Sambamurthy, V., Bharadwaj, A., & Grover, V. (2003). Shaping Agility through Digital Options: Reconceptualizing the Role of Information Technology in Contemporary Firms. MIS Quarterly, 27(2), 237—263. Sambamurthy, V., Bharadwaj, A., & Grover, V. (2003). Shaping Agility through Digital Options: Reconceptualizing the Role of Information Technology in Contemporary Firms. MIS Quarterly, 27(2), 237—263.
Zurück zum Zitat Sayette, M. A., & Kasey, G. M. (2004). Self-regulatory failure and addiction (Vol. 2). Handbook of self-regulation: Research, theory, and applications. Sayette, M. A., & Kasey, G. M. (2004). Self-regulatory failure and addiction (Vol. 2). Handbook of self-regulation: Research, theory, and applications.
Zurück zum Zitat Schlenker, B. R., & Leary, M. R. (1982). Social Anxiety and Self-Presentation: A Conceptualization and Model. Social Anxiety, 29. Schlenker, B. R., & Leary, M. R. (1982). Social Anxiety and Self-Presentation: A Conceptualization and Model. Social Anxiety, 29.
Zurück zum Zitat Sicari, S., Cappiello, C., De Pellegrini, F., Miorandi, D., & Coen-Porisini, A. (2016). A security-and quality-aware system architecture for Internet of Things. Information Systems Frontiers, 18(4), 665–677. Sicari, S., Cappiello, C., De Pellegrini, F., Miorandi, D., & Coen-Porisini, A. (2016). A security-and quality-aware system architecture for Internet of Things. Information Systems Frontiers, 18(4), 665–677.
Zurück zum Zitat Smith, H. J., Milberg, S. J., & Burke, S. J. (1996). Information Privacy: Measuring Individuals’ Concerns about Organizational Practices. MIS Quarterly, 20(2), 167–196. Smith, H. J., Milberg, S. J., & Burke, S. J. (1996). Information Privacy: Measuring Individuals’ Concerns about Organizational Practices. MIS Quarterly, 20(2), 167–196.
Zurück zum Zitat Smith, H. J., Dinev, T., & Xu, H. (2011). Information Privacy Research: An Interdisciplinary Review. MIS Quarterly, 35(4), 989–1016. Smith, H. J., Dinev, T., & Xu, H. (2011). Information Privacy Research: An Interdisciplinary Review. MIS Quarterly, 35(4), 989–1016.
Zurück zum Zitat Sokolov, E. N. (1963). Higher Nervous Functions: The Orienting Reflex. Annual Review of Physiology, 25(1), 545–580. Sokolov, E. N. (1963). Higher Nervous Functions: The Orienting Reflex. Annual Review of Physiology, 25(1), 545–580.
Zurück zum Zitat Sombatruang, N., Sasse, M. A., & Baddeley, M. (2016). Why do people use unsecure public wi-fi?: an investigation of behaviour and factors driving decisions (pp. 61–72). ACM Press. Sombatruang, N., Sasse, M. A., & Baddeley, M. (2016). Why do people use unsecure public wi-fi?: an investigation of behaviour and factors driving decisions (pp. 61–72). ACM Press.
Zurück zum Zitat Son, J. Y., & Kim, S. S. (2008). Internet Users’ Information Privacy-Protective Responses: A Taxonomy and a Nomological Model. MIS Quarterly, 32(3), 503—529. Son, J. Y., & Kim, S. S. (2008). Internet Users’ Information Privacy-Protective Responses: A Taxonomy and a Nomological Model. MIS Quarterly, 32(3), 503—529.
Zurück zum Zitat Soror, A. A., Steelman, Z. R., & Limayem, M. (2012). Discipline Yourself Before Life Disciplines You: DSR and Mobile Phone Unregulated Use. In 2012 45th Hawaii International Conference on System Sciences (pp. 849–858). Soror, A. A., Steelman, Z. R., & Limayem, M. (2012). Discipline Yourself Before Life Disciplines You: DSR and Mobile Phone Unregulated Use. In 2012 45th Hawaii International Conference on System Sciences (pp. 849–858).
Zurück zum Zitat Soror, A. A., Hammer, B. I., Steelman, Z. R., Davis, F. D., & Limayem, M. M. (2015). Good habits gone bad: Explaining negative consequences associated with the use of mobile phones from a dual-systems perspective: Good habits gone bad. Information Systems Journal, 25(4), 403–427. Soror, A. A., Hammer, B. I., Steelman, Z. R., Davis, F. D., & Limayem, M. M. (2015). Good habits gone bad: Explaining negative consequences associated with the use of mobile phones from a dual-systems perspective: Good habits gone bad. Information Systems Journal, 25(4), 403–427.
Zurück zum Zitat Turner, P., & Turner, S. (2013). Emotional and aesthetic attachment to digital artefacts. Cognition, Technology & Work, 15(4), 403–414. Turner, P., & Turner, S. (2013). Emotional and aesthetic attachment to digital artefacts. Cognition, Technology & Work, 15(4), 403–414.
Zurück zum Zitat Uzun, A. M., & Kilis, S. (2019). Does persistent involvement in media and technology lead to lower academic performance? Evaluating media and technology use in relation to multitasking, self-regulation and academic performance. Computers in Human Behavior, 90, 196–203. Uzun, A. M., & Kilis, S. (2019). Does persistent involvement in media and technology lead to lower academic performance? Evaluating media and technology use in relation to multitasking, self-regulation and academic performance. Computers in Human Behavior, 90, 196–203.
Zurück zum Zitat van Deursen, A. J. A. M., Bolle, C. L., Hegner, S. M., & Kommers, P. A. M. (2015). Modeling habitual and addictive smartphone behavior. Computers in Human Behavior, 45, 411–420. van Deursen, A. J. A. M., Bolle, C. L., Hegner, S. M., & Kommers, P. A. M. (2015). Modeling habitual and addictive smartphone behavior. Computers in Human Behavior, 45, 411–420.
Zurück zum Zitat Vance, A., Siponen, M., & Pahnila, S. (2012). Motivating IS security compliance: Insights from Habit and Protection Motivation Theory. Information & Management, 49(3–4), 190–198. Vance, A., Siponen, M., & Pahnila, S. (2012). Motivating IS security compliance: Insights from Habit and Protection Motivation Theory. Information & Management, 49(3–4), 190–198.
Zurück zum Zitat Wang, C., Lee, M. K. O., & Hua, Z. (2015). A theory of social media dependence: Evidence from microblog users. Decision Support Systems, 69, 40–49. Wang, C., Lee, M. K. O., & Hua, Z. (2015). A theory of social media dependence: Evidence from microblog users. Decision Support Systems, 69, 40–49.
Zurück zum Zitat Weber, L., & Rudman, R. J. (2018). Addressing the Incremental Risks Associated with Adopting Bring Your Own Device. Open Access, 11(1), 13. Weber, L., & Rudman, R. J. (2018). Addressing the Incremental Risks Associated with Adopting Bring Your Own Device. Open Access, 11(1), 13.
Zurück zum Zitat Weller, J. A., Shackleford, C., Dieckmann, N., & Slovic, P. (2013). Possession attachment predicts cell phone use while driving. Health Psychology, 32(4), 379–387. Weller, J. A., Shackleford, C., Dieckmann, N., & Slovic, P. (2013). Possession attachment predicts cell phone use while driving. Health Psychology, 32(4), 379–387.
Zurück zum Zitat Wood, W., & Neal, D. T. (2007). A new look at habits and the habit-goal interface. Psychological Review, 114(4), 843–863. Wood, W., & Neal, D. T. (2007). A new look at habits and the habit-goal interface. Psychological Review, 114(4), 843–863.
Zurück zum Zitat Xu, F., Michael, K., & Chen, X. (2013). Factors affecting privacy disclosure on social network sites: an integrated model. Electronic Commerce Research, 13(2), 151–168. Xu, F., Michael, K., & Chen, X. (2013). Factors affecting privacy disclosure on social network sites: an integrated model. Electronic Commerce Research, 13(2), 151–168.
Metadaten
Titel
Antecedents and Outcome of Deficient Self-Regulation in Unknown Wireless Networks Use Context: An Exploratory Study
verfasst von
Emmanuel W. Ayaburi
James Wairimu
Francis Kofi Andoh-Baidoo
Publikationsdatum
18.07.2019
Verlag
Springer US
Erschienen in
Information Systems Frontiers / Ausgabe 6/2019
Print ISSN: 1387-3326
Elektronische ISSN: 1572-9419
DOI
https://doi.org/10.1007/s10796-019-09942-w

Weitere Artikel der Ausgabe 6/2019

Information Systems Frontiers 6/2019 Zur Ausgabe

Premium Partner