Skip to main content

2020 | OriginalPaper | Buchkapitel

Assessing the Determinants of Millennials’ Online Protective Behavior: How Their Protection Motivation Translates into Actual Use Behavior

verfasst von : Ana S. Medeiros, Luis F. Martinez, Luisa M. Martinez

Erschienen in: Advances in Digital Marketing and eCommerce

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

This research assesses the determinants of Millennials protection motivation (or security intentions) on their actual use behavior when navigating online, considering the protective measures they adopt. Accordingly, we propose a model integrating variables from two widely accepted behavioral theories, the Protection Motivation Theory and the Reasoned Action Approach. An online survey was conducted, relying on the responses of 236 participants from different nationalities, which were analyzed through hierarchical multiple regression. Results show a gap between security intentions and use behavior and indicate safety habit strength and actual control as significant predictors of Millennials’ use behavior. By focusing not only on the users’ behavioral intentions but also on their actual use behavior, this research seeks to extend the previous literature on the topic.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
Zurück zum Zitat Ajzen, I.: The theory of planned behavior. Organ. Behav. Hum. Decis. Process. 50(2), 179–211 (1991)CrossRef Ajzen, I.: The theory of planned behavior. Organ. Behav. Hum. Decis. Process. 50(2), 179–211 (1991)CrossRef
Zurück zum Zitat Anderson, C.L., Agarwal, R.: Practicing safe computing: a multimethod empirical examination of home computer user security behavioral intentions. MIS Q. 34(3), 613–643 (2010)CrossRef Anderson, C.L., Agarwal, R.: Practicing safe computing: a multimethod empirical examination of home computer user security behavioral intentions. MIS Q. 34(3), 613–643 (2010)CrossRef
Zurück zum Zitat Anderson, R., Barton, C., Böhme, R., Clayton, R., van Eeten, M.J.G., Levi, M., Moore, T., Savage, S.: Measuring the cost of cybercrime. In: Böhme, R. (ed.) The Economics of Information Security and Privacy, pp. 265–300. Springer, Heidelberg (2013)CrossRef Anderson, R., Barton, C., Böhme, R., Clayton, R., van Eeten, M.J.G., Levi, M., Moore, T., Savage, S.: Measuring the cost of cybercrime. In: Böhme, R. (ed.) The Economics of Information Security and Privacy, pp. 265–300. Springer, Heidelberg (2013)CrossRef
Zurück zum Zitat Boss, S., Galletta, D., Lowry, P., Moody, G., Polak, P.: What do systems users have to fear? Using fear appeals to engender threats and fear that motivate protective security behaviors. MIS Q. 39(4), 837–864 (2015)CrossRef Boss, S., Galletta, D., Lowry, P., Moody, G., Polak, P.: What do systems users have to fear? Using fear appeals to engender threats and fear that motivate protective security behaviors. MIS Q. 39(4), 837–864 (2015)CrossRef
Zurück zum Zitat Brosdahl, D., Carpenter, J.: Shopping orientations of US males: a generational cohort comparison. J. Retail. Consum. Serv. 18(6), 548–554 (2011)CrossRef Brosdahl, D., Carpenter, J.: Shopping orientations of US males: a generational cohort comparison. J. Retail. Consum. Serv. 18(6), 548–554 (2011)CrossRef
Zurück zum Zitat Chang, M., Cheung, W., Lai, V.: Literature derived reference models for the adoption of online shopping. Inf. Manag. 42(4), 543–559 (2005)CrossRef Chang, M., Cheung, W., Lai, V.: Literature derived reference models for the adoption of online shopping. Inf. Manag. 42(4), 543–559 (2005)CrossRef
Zurück zum Zitat Conner, M., McEachan, R., Lawton, R., Gardner, P.: Applying the reasoned action approach to understanding health protection and health risk behaviors. Soc. Sci. Med. 195, 140–148 (2017)CrossRef Conner, M., McEachan, R., Lawton, R., Gardner, P.: Applying the reasoned action approach to understanding health protection and health risk behaviors. Soc. Sci. Med. 195, 140–148 (2017)CrossRef
Zurück zum Zitat Dodge, R., Carver, C., Ferguson, A.: Phishing for user security awareness. Comput. Secur. 26(1), 73–80 (2007)CrossRef Dodge, R., Carver, C., Ferguson, A.: Phishing for user security awareness. Comput. Secur. 26(1), 73–80 (2007)CrossRef
Zurück zum Zitat Fishbein, M., Ajzen, I.: Belief, Attitude, Intention, and Behavior. Addison-Wesley Publishing Company, Reading (1975) Fishbein, M., Ajzen, I.: Belief, Attitude, Intention, and Behavior. Addison-Wesley Publishing Company, Reading (1975)
Zurück zum Zitat Fishbein, M., Ajzen, I.: Predicting and Changing Behavior: The Reasoned Action Approach. Taylor & Francis Group, New York (2010) Fishbein, M., Ajzen, I.: Predicting and Changing Behavior: The Reasoned Action Approach. Taylor & Francis Group, New York (2010)
Zurück zum Zitat Hulst, F., Posthumus, H.: Understanding (non-)adoption of conservation agriculture in Kenya using the Reasoned Action Approach. Land Use Policy 56, 303–314 (2016)CrossRef Hulst, F., Posthumus, H.: Understanding (non-)adoption of conservation agriculture in Kenya using the Reasoned Action Approach. Land Use Policy 56, 303–314 (2016)CrossRef
Zurück zum Zitat Jansen, J., Schaik, P.: Comparing three models to explain precautionary online behavioural intentions. Inf. Comput. Secur. 5(2), 165–180 (2017)CrossRef Jansen, J., Schaik, P.: Comparing three models to explain precautionary online behavioural intentions. Inf. Comput. Secur. 5(2), 165–180 (2017)CrossRef
Zurück zum Zitat Kritzinger, E., Solms, S.: Cyber security for home users: a new way of protection through awareness enforcement. Comput. Soc. 29(8), 840–847 (2010) Kritzinger, E., Solms, S.: Cyber security for home users: a new way of protection through awareness enforcement. Comput. Soc. 29(8), 840–847 (2010)
Zurück zum Zitat Lagazio, M., Sherif, N., Cushman, M.: A multi-level approach to understanding the impact of cybercrime on the financial sector. Comput. Soc. 45, 58–74 (2014) Lagazio, M., Sherif, N., Cushman, M.: A multi-level approach to understanding the impact of cybercrime on the financial sector. Comput. Soc. 45, 58–74 (2014)
Zurück zum Zitat LaRose, R., Rifon, N., Wirth, C.: Online safety begins with you and me: getting internet users to protect themselves. Paper presented at the 57th International Communication Association Conference (2007) LaRose, R., Rifon, N., Wirth, C.: Online safety begins with you and me: getting internet users to protect themselves. Paper presented at the 57th International Communication Association Conference (2007)
Zurück zum Zitat Liang, H., Xue, Y.: Understanding security behaviors in personal computer usage: a threat avoidance perspective. J. Assoc. Inf. Syst. 11(7), 394–413 (2010) Liang, H., Xue, Y.: Understanding security behaviors in personal computer usage: a threat avoidance perspective. J. Assoc. Inf. Syst. 11(7), 394–413 (2010)
Zurück zum Zitat Liu, Y., Segev, S., Villar, M.: Comparing two mechanisms for green consumption: cognitive-affect behaviour vs. theory of reasoned action. J. Consum. Mark. 34(5), 442–454 (2017)CrossRef Liu, Y., Segev, S., Villar, M.: Comparing two mechanisms for green consumption: cognitive-affect behaviour vs. theory of reasoned action. J. Consum. Mark. 34(5), 442–454 (2017)CrossRef
Zurück zum Zitat Mishra, D., Akman, I., Mishra, A.: Theory of reasoned action application for green information technology acceptance. Comput. Hum. Behav. 36, 29–40 (2014)CrossRef Mishra, D., Akman, I., Mishra, A.: Theory of reasoned action application for green information technology acceptance. Comput. Hum. Behav. 36, 29–40 (2014)CrossRef
Zurück zum Zitat Pinho, J., Soares, A.: Examining the technology acceptance model in the adoption of social networks. J. Res. Interact. Mark. 5(2/3), 116–129 (2011) Pinho, J., Soares, A.: Examining the technology acceptance model in the adoption of social networks. J. Res. Interact. Mark. 5(2/3), 116–129 (2011)
Zurück zum Zitat Poepjes, R., Lane, M.: An information security awareness capability model (ISACM). In: Australian Information Security Management Conference (SECAU 2012) (2012) Poepjes, R., Lane, M.: An information security awareness capability model (ISACM). In: Australian Information Security Management Conference (SECAU 2012) (2012)
Zurück zum Zitat Rogers, R.: A protection motivation theory of fear appeals and attitude change. J. Psychol. 91(1), 93–114 (1975)CrossRef Rogers, R.: A protection motivation theory of fear appeals and attitude change. J. Psychol. 91(1), 93–114 (1975)CrossRef
Zurück zum Zitat Rogers, R.: Cognitive and physiological processes in fear appeals and attitude change: a revised theory of protection motivation. In: Cacioppo, J.T., Petty, R.E. (eds.) Social Psychophysiology: A Sourcebook, pp. 153–177. Guilford Press, New York (1983) Rogers, R.: Cognitive and physiological processes in fear appeals and attitude change: a revised theory of protection motivation. In: Cacioppo, J.T., Petty, R.E. (eds.) Social Psychophysiology: A Sourcebook, pp. 153–177. Guilford Press, New York (1983)
Zurück zum Zitat Romanosky, S.: Examining the costs and causes of cyber incidents. J. Cybersecur. 2(2), 121–135 (2016) Romanosky, S.: Examining the costs and causes of cyber incidents. J. Cybersecur. 2(2), 121–135 (2016)
Zurück zum Zitat Ryder, N.: The cohort as a concept in the study of social change. Am. Sociol. Rev. 30, 843–861 (1965)CrossRef Ryder, N.: The cohort as a concept in the study of social change. Am. Sociol. Rev. 30, 843–861 (1965)CrossRef
Zurück zum Zitat Saridakis, G., Benson, V., Ezingeard, J., Tennakoon, H.: Individual information security, user behaviour and cyber victimisation: an empirical study of social networking users. Technol. Forecast. Soc. Change 102, 320–330 (2015)CrossRef Saridakis, G., Benson, V., Ezingeard, J., Tennakoon, H.: Individual information security, user behaviour and cyber victimisation: an empirical study of social networking users. Technol. Forecast. Soc. Change 102, 320–330 (2015)CrossRef
Zurück zum Zitat Tsai, H., Jiang, M., Alhabash, S., LaRose, R., Rifon, N., Cotten, S.: Understanding online safety behaviors: a protection motivation theory perspective. Comput. Secur. 59, 138–150 (2016)CrossRef Tsai, H., Jiang, M., Alhabash, S., LaRose, R., Rifon, N., Cotten, S.: Understanding online safety behaviors: a protection motivation theory perspective. Comput. Secur. 59, 138–150 (2016)CrossRef
Zurück zum Zitat Venkatesh, V., Thong, J., Xu, X.: Consumer acceptance and use of information technology: extending the unified theory of acceptance and use of technology. MIS Q. 36, 157–178 (2012)CrossRef Venkatesh, V., Thong, J., Xu, X.: Consumer acceptance and use of information technology: extending the unified theory of acceptance and use of technology. MIS Q. 36, 157–178 (2012)CrossRef
Zurück zum Zitat Workman, M., Bommer, W., Straub, D.: Security lapses and the omission of information security measures: a threat control model and empirical test. Comput. Hum. Behav. 24(6), 2799–2816 (2008)CrossRef Workman, M., Bommer, W., Straub, D.: Security lapses and the omission of information security measures: a threat control model and empirical test. Comput. Hum. Behav. 24(6), 2799–2816 (2008)CrossRef
Zurück zum Zitat Zahedi, F., Abbasi, A., Chen, Y.: Fake-website detection tools: identifying elements that promote individuals’ use and enhance their performance. J. Assoc. Inf. Syst. 6(16), 448–484 (2015) Zahedi, F., Abbasi, A., Chen, Y.: Fake-website detection tools: identifying elements that promote individuals’ use and enhance their performance. J. Assoc. Inf. Syst. 6(16), 448–484 (2015)
Zurück zum Zitat Zhou, L., Dai, L., Zhang, D.: Online shopping acceptance model: a critical survey of consumer factors in online shopping. J. Electron. Commer. Res. 8(1), 41–62 (2007) Zhou, L., Dai, L., Zhang, D.: Online shopping acceptance model: a critical survey of consumer factors in online shopping. J. Electron. Commer. Res. 8(1), 41–62 (2007)
Metadaten
Titel
Assessing the Determinants of Millennials’ Online Protective Behavior: How Their Protection Motivation Translates into Actual Use Behavior
verfasst von
Ana S. Medeiros
Luis F. Martinez
Luisa M. Martinez
Copyright-Jahr
2020
DOI
https://doi.org/10.1007/978-3-030-47595-6_20