Skip to main content
Top
Published in: Information Systems Frontiers 3/2022

27-02-2021

Risk Taking Behaviors Using Public Wi-Fi™

Authors: Hoon S. Choi, Darrell Carpenter, Myung S. Ko

Published in: Information Systems Frontiers | Issue 3/2022

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Dramatic increases in public Wi-Fi™ (hereafter referred to as Wi-Fi) availability have occurred over the last decade. Although Wi-Fi provides convenient network connectivity, it has significant security vulnerabilities. Despite widespread knowledge of potential vulnerabilities of public Wi-Fi, most people simply connect to it in public places. We investigated the individual calculus behind risk-taking behavior based on the theoretical foundations of risk taking behavior, technology threat avoidance theory, prospect theory, and self-determination theory. Using survey data collected from 1313 respondents in the United States, this study found that avoidance motivation, risk averting propensity, and intrinsic and extrinsic motivations affect intention to use public Wi-Fi. In addition, our results indicate that avoidance motivation is related to safeguard effectiveness, safeguard cost, and perceived threat, while risk averting propensity is associated with positive outcome history, age, gender, and education attainment.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Appendix
Available only for authorised users
Footnotes
1
The difference in Chi-squares is 391.33 with 98 degrees of freedom, which is not significant.
 
Literature
go back to reference Aime, C., & Lioy. (2007). Dependability in wireless networks: Can we rely on Wifi? IEEE SECURITY & PRIVACY, 5, 23–29.CrossRef Aime, C., & Lioy. (2007). Dependability in wireless networks: Can we rely on Wifi? IEEE SECURITY & PRIVACY, 5, 23–29.CrossRef
go back to reference Anderson, & Agarwal. (2011). The digitization of healthcare: Boundary risks, emotion, and consumer willingness to disclose personal health information. Information Systems Research, 22(3), 469–490.CrossRef Anderson, & Agarwal. (2011). The digitization of healthcare: Boundary risks, emotion, and consumer willingness to disclose personal health information. Information Systems Research, 22(3), 469–490.CrossRef
go back to reference Arachchilage, & Love. (2013). A game design framework for avoiding phishing attacks. Computers in Human Behavior, 29(3), 706–714.CrossRef Arachchilage, & Love. (2013). A game design framework for avoiding phishing attacks. Computers in Human Behavior, 29(3), 706–714.CrossRef
go back to reference Arachchilage, & Love. (2014). Security awareness of computer users: A phishing threat avoidance perspective. Computers in Human Behavior, 38, 304–312.CrossRef Arachchilage, & Love. (2014). Security awareness of computer users: A phishing threat avoidance perspective. Computers in Human Behavior, 38, 304–312.CrossRef
go back to reference Bachmann, M. (2010). The risk propensity and rationality of computer hackers. International Journal of Cyber Criminology, 4(1/2), 643–656. Bachmann, M. (2010). The risk propensity and rationality of computer hackers. International Journal of Cyber Criminology, 4(1/2), 643–656.
go back to reference Barlow, W., Ormond, & Dennis. (2013). Don't make excuses! Discouraging neutralization to reduce it policy violation. Computers & Security, 39, 145–159.CrossRef Barlow, W., Ormond, & Dennis. (2013). Don't make excuses! Discouraging neutralization to reduce it policy violation. Computers & Security, 39, 145–159.CrossRef
go back to reference Becker, D., Sorensen, G., Borch-Johnsen, M., et al. (1996). Prediction of risk of liver disease by alcohol intake, sex, and age: A prospective population study. Hepatology, 23(5), 1025–1029.CrossRef Becker, D., Sorensen, G., Borch-Johnsen, M., et al. (1996). Prediction of risk of liver disease by alcohol intake, sex, and age: A prospective population study. Hepatology, 23(5), 1025–1029.CrossRef
go back to reference Braverman, & Frost. (2012). Matching the graphical display of data to avoidance versus approach motivation increases outcome expectancies. The Journal of Social Psychology, 152(2), 228–245.CrossRef Braverman, & Frost. (2012). Matching the graphical display of data to avoidance versus approach motivation increases outcome expectancies. The Journal of Social Psychology, 152(2), 228–245.CrossRef
go back to reference Buhrmester, K., & Gosling. (2011). Amazon's mechanical Turk: A new source of inexpensive, yet high-quality, data? Perspectives on Psychological Science, 6(1), 3–5.CrossRef Buhrmester, K., & Gosling. (2011). Amazon's mechanical Turk: A new source of inexpensive, yet high-quality, data? Perspectives on Psychological Science, 6(1), 3–5.CrossRef
go back to reference Byrne. (2005). How do consumers evaluate risk in financial products? Journal of Financial Services Marketing, 10(1), 21–36.CrossRef Byrne. (2005). How do consumers evaluate risk in financial products? Journal of Financial Services Marketing, 10(1), 21–36.CrossRef
go back to reference Carpenter, Y., Barrett, & McLeod. (2019). Refining technology threat avoidance theory. Communications of the Association for Information Systems, 44(1), 22. Carpenter, Y., Barrett, & McLeod. (2019). Refining technology threat avoidance theory. Communications of the Association for Information Systems, 44(1), 22.
go back to reference Chang, D. V., & Chiremba. (2004). Determinants of subjective and objective risk tolerance. Journal of Personal Finance, 3(3), 53–67. Chang, D. V., & Chiremba. (2004). Determinants of subjective and objective risk tolerance. Journal of Personal Finance, 3(3), 53–67.
go back to reference Chin, W. W. (2010). How to write up and report PLS analyses. In Handbook of partial least squares (pp. 655–690). Springer, Berlin, Heidelberg. Chin, W. W. (2010). How to write up and report PLS analyses. In Handbook of partial least squares (pp. 655–690). Springer, Berlin, Heidelberg.
go back to reference Cox. (2012). Information systems user security: A structured model of the knowing–doing gap. Computers in Human Behavior, 28(5), 1849–1858.CrossRef Cox. (2012). Information systems user security: A structured model of the knowing–doing gap. Computers in Human Behavior, 28(5), 1849–1858.CrossRef
go back to reference Crossler, L., Loraas, & Trinkle. (2014). Understanding compliance with bring your own device policies utilizing protection motivation theory: Bridging the intention-behavior gap. Journal of Information Systems, 28(1), 209–226.CrossRef Crossler, L., Loraas, & Trinkle. (2014). Understanding compliance with bring your own device policies utilizing protection motivation theory: Bridging the intention-behavior gap. Journal of Information Systems, 28(1), 209–226.CrossRef
go back to reference Curry, G., & McBride. (1997). Reasons for quitting: Intrinsic and extrinsic motivation for smoking cessation in a population-based sample of smokers. Addictive Behaviors, 22(6), 727–739.CrossRef Curry, G., & McBride. (1997). Reasons for quitting: Intrinsic and extrinsic motivation for smoking cessation in a population-based sample of smokers. Addictive Behaviors, 22(6), 727–739.CrossRef
go back to reference Cutler, D. M., & Lleras-Muney, A. (2006). Education and health: evaluating theories and evidence. In National Poverty Center Working Paper Series# 06-19. National Poverty Center, University of Michigan. Cutler, D. M., & Lleras-Muney, A. (2006). Education and health: evaluating theories and evidence. In National Poverty Center Working Paper Series# 06-19. National Poverty Center, University of Michigan.
go back to reference Das, & Teng. (2001). Strategic risk behaviour and its temporalities: Between risk propensity and decision context. Journal of Management Studies, 38(4), 515–534.CrossRef Das, & Teng. (2001). Strategic risk behaviour and its temporalities: Between risk propensity and decision context. Journal of Management Studies, 38(4), 515–534.CrossRef
go back to reference Davis, B., & Warshaw. (1992). Extrinsic and intrinsic motivation to use computers in the workplace 1. Journal of Applied Social Psychology, 22(14), 1111–1132.CrossRef Davis, B., & Warshaw. (1992). Extrinsic and intrinsic motivation to use computers in the workplace 1. Journal of Applied Social Psychology, 22(14), 1111–1132.CrossRef
go back to reference den Broeck, V., Poels, & Walrave. (2015). Older and Wiser? Facebook Use, Privacy Concern, and Privacy Protection in the Life Stages of Emerging, Young, and Middle Adulthood. Social Media+ Society, 1(2), 2056305115616149. den Broeck, V., Poels, & Walrave. (2015). Older and Wiser? Facebook Use, Privacy Concern, and Privacy Protection in the Life Stages of Emerging, Young, and Middle Adulthood. Social Media+ Society, 1(2), 2056305115616149.
go back to reference der Heijden, V. (2004). User acceptance of hedonic information systems. MIS Quarterly, 28, 695–704.CrossRef der Heijden, V. (2004). User acceptance of hedonic information systems. MIS Quarterly, 28, 695–704.CrossRef
go back to reference Dewett. (2006). Exploring the role of risk in employee creativity. The Journal of Creative Behavior, 40(1), 27–45.CrossRef Dewett. (2006). Exploring the role of risk in employee creativity. The Journal of Creative Behavior, 40(1), 27–45.CrossRef
go back to reference Dinev, & Hart. (2006). An extended privacy Calculus model for E-commerce transactions. Information Systems Research, 17(1), 61–80,100.CrossRef Dinev, & Hart. (2006). An extended privacy Calculus model for E-commerce transactions. Information Systems Research, 17(1), 61–80,100.CrossRef
go back to reference Dinev, H., & Mullen. (2008). Internet privacy concerns and beliefs about government surveillance–an empirical investigation. The Journal of Strategic Information Systems, 17(3), 214–233.CrossRef Dinev, H., & Mullen. (2008). Internet privacy concerns and beliefs about government surveillance–an empirical investigation. The Journal of Strategic Information Systems, 17(3), 214–233.CrossRef
go back to reference Dulebohn, & Murray. (2007). Retirement savings behavior of higher education employees. Research in Higher Education, 48(5), 545–582.CrossRef Dulebohn, & Murray. (2007). Retirement savings behavior of higher education employees. Research in Higher Education, 48(5), 545–582.CrossRef
go back to reference Dymond, S., Roche, D. H., & Freegard. (2012). Safe from harm: Learned, instructed, and symbolic generalization pathways of human threat-avoidance. PLoS One, 7(10), e47539.CrossRef Dymond, S., Roche, D. H., & Freegard. (2012). Safe from harm: Learned, instructed, and symbolic generalization pathways of human threat-avoidance. PLoS One, 7(10), e47539.CrossRef
go back to reference Elliot, E., & Harmon-Jones. (2013). Approach–avoidance motivation and emotion: Convergence and divergence. Emotion Review, 5(3), 308–311.CrossRef Elliot, E., & Harmon-Jones. (2013). Approach–avoidance motivation and emotion: Convergence and divergence. Emotion Review, 5(3), 308–311.CrossRef
go back to reference Farahmand, & Spafford. (2013). Understanding insiders: An analysis of risk-taking behavior. Information Systems Frontiers, 15(1), 5–15.CrossRef Farahmand, & Spafford. (2013). Understanding insiders: An analysis of risk-taking behavior. Information Systems Frontiers, 15(1), 5–15.CrossRef
go back to reference Fornell, & Larcker. (1981). Structural equation models with unobservable variables and measurement error: Algebra and statistics. Journal of Marketing Research, 382–388. Fornell, & Larcker. (1981). Structural equation models with unobservable variables and measurement error: Algebra and statistics. Journal of Marketing Research, 382–388.
go back to reference Foster, S., & Goff. (2009). Why do narcissists take more risks? Testing the roles of perceived risks and benefits of risky behaviors. Personality and Individual Differences, 47(8), 885–889.CrossRef Foster, S., & Goff. (2009). Why do narcissists take more risks? Testing the roles of perceived risks and benefits of risky behaviors. Personality and Individual Differences, 47(8), 885–889.CrossRef
go back to reference Gnambs, A., & Oeberst. (2015). Red color and risk-taking behavior in online environments. PLoS One, 10(7), e0134033.CrossRef Gnambs, A., & Oeberst. (2015). Red color and risk-taking behavior in online environments. PLoS One, 10(7), e0134033.CrossRef
go back to reference Granié. (2009). Effects of gender, sex-stereotype conformity, age and internalization on risk-taking among adolescent pedestrians. Safety Science, 47(9), 1277–1283.CrossRef Granié. (2009). Effects of gender, sex-stereotype conformity, age and internalization on risk-taking among adolescent pedestrians. Safety Science, 47(9), 1277–1283.CrossRef
go back to reference Hamid, R., Taib, & Thurasamy. (2014). The relationship between risk propensity, risk perception and risk-taking behaviour in an emerging market. International Journal of Banking and Finance, 10(1), 134–147. Hamid, R., Taib, & Thurasamy. (2014). The relationship between risk propensity, risk perception and risk-taking behaviour in an emerging market. International Journal of Banking and Finance, 10(1), 134–147.
go back to reference Herath, C., Wang, B., Wilbur, & Rao. (2014). Security services as coping mechanisms: An investigation into user intention to adopt an email authentication service. Information Systems Journal, 24(1), 61–84.CrossRef Herath, C., Wang, B., Wilbur, & Rao. (2014). Security services as coping mechanisms: An investigation into user intention to adopt an email authentication service. Information Systems Journal, 24(1), 61–84.CrossRef
go back to reference Holden, D., & Hicks. (2013). Assessing the reliability of the M5-120 on Amazon’s mechanical Turk. Computers in Human Behavior, 29(4), 1749–1754.CrossRef Holden, D., & Hicks. (2013). Assessing the reliability of the M5-120 on Amazon’s mechanical Turk. Computers in Human Behavior, 29(4), 1749–1754.CrossRef
go back to reference Hongsranagon, K., Hongpukdee, H., & Deelertyuenyong. (2011). Traffic risk behavior and perceptions of Thai motorcyclists: A case study. IATSS research, 35(1), 30–33.CrossRef Hongsranagon, K., Hongpukdee, H., & Deelertyuenyong. (2011). Traffic risk behavior and perceptions of Thai motorcyclists: A case study. IATSS research, 35(1), 30–33.CrossRef
go back to reference Hoy, & Milne. (2010). Gender differences in privacy-related measures for young adult Facebook users. Journal of Interactive Advertising, 10(2), 28–45.CrossRef Hoy, & Milne. (2010). Gender differences in privacy-related measures for young adult Facebook users. Journal of Interactive Advertising, 10(2), 28–45.CrossRef
go back to reference Huff, & Prybutok. (2008). Information systems Project Management decision making: The influence of experience and risk propensity. Project Management Journal, 39(2), 34–47.CrossRef Huff, & Prybutok. (2008). Information systems Project Management decision making: The influence of experience and risk propensity. Project Management Journal, 39(2), 34–47.CrossRef
go back to reference Hulland. (1999). Use of partial least squares (Pls) in strategic management research: A review of four recent studies. Strategic Management Journal, 20, 195–204.CrossRef Hulland. (1999). Use of partial least squares (Pls) in strategic management research: A review of four recent studies. Strategic Management Journal, 20, 195–204.CrossRef
go back to reference Jardine. (2020). The case against commercial antivirus software: Risk homeostasis and information problems in Cybersecurity. Risk Analysis., 40, 1571–1588.CrossRef Jardine. (2020). The case against commercial antivirus software: Risk homeostasis and information problems in Cybersecurity. Risk Analysis., 40, 1571–1588.CrossRef
go back to reference Jonah. (1986). Accident risk and risk-taking behaviour among young drivers. Accident Analysis & Prevention, 18(4), 255–271.CrossRef Jonah. (1986). Accident risk and risk-taking behaviour among young drivers. Accident Analysis & Prevention, 18(4), 255–271.CrossRef
go back to reference Keil, W., Turk, D.-R., & Nulden. (2000). An investigation of risk perception and risk propensity on the decision to continue a software development project. Journal of Systems and Software, 53(2), 145–157.CrossRef Keil, W., Turk, D.-R., & Nulden. (2000). An investigation of risk perception and risk propensity on the decision to continue a software development project. Journal of Systems and Software, 53(2), 145–157.CrossRef
go back to reference Kindberg, T., O'Neill, E., Bevan, C., Kostakos, V., Stanton Fraser, D., & Jay, T. (2008, April). Measuring trust in wi-fi hotspots. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (pp. 173–182). Kindberg, T., O'Neill, E., Bevan, C., Kostakos, V., Stanton Fraser, D., & Jay, T. (2008, April). Measuring trust in wi-fi hotspots. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (pp. 173–182).
go back to reference Kirby. (2001). Understanding what works and what Doesn't in reducing adolescent sexual risk-taking. Family Planning Perspectives, 33(6), 276–281.CrossRef Kirby. (2001). Understanding what works and what Doesn't in reducing adolescent sexual risk-taking. Family Planning Perspectives, 33(6), 276–281.CrossRef
go back to reference Klasnja, C., Jung, G., LeGrand, P., et al. (2009). "When I Am on Wi-Fi, I Am Fearless": Privacy Concerns & Practices in Eeryday Wi-Fi Use. Paper presented at the proceedings of the SIGCHI conference on human factors in computing systems. Boston: MA, USA.CrossRef Klasnja, C., Jung, G., LeGrand, P., et al. (2009). "When I Am on Wi-Fi, I Am Fearless": Privacy Concerns & Practices in Eeryday Wi-Fi Use. Paper presented at the proceedings of the SIGCHI conference on human factors in computing systems. Boston: MA, USA.CrossRef
go back to reference Korzaan, B., & Greer. (2009). Demystifying personality and privacy: An empirical investigation into antecedents of concerns for information privacy. Journal of Behavioral Studies in Business, 1, 1. Korzaan, B., & Greer. (2009). Demystifying personality and privacy: An empirical investigation into antecedents of concerns for information privacy. Journal of Behavioral Studies in Business, 1, 1.
go back to reference Laric, P., & Katsanis. (2009). Consumer concerns for healthcare information privacy: A comparison of us and Canadian perspectives. Research in Healthcare Financial Management, 12(1), 93. Laric, P., & Katsanis. (2009). Consumer concerns for healthcare information privacy: A comparison of us and Canadian perspectives. Research in Healthcare Financial Management, 12(1), 93.
go back to reference Lee, C., & Chen. (2005). Acceptance of internet-based learning medium: The role of extrinsic and intrinsic motivation. Information & Management, 42(8), 1095–1104.CrossRef Lee, C., & Chen. (2005). Acceptance of internet-based learning medium: The role of extrinsic and intrinsic motivation. Information & Management, 42(8), 1095–1104.CrossRef
go back to reference Li, S., & Xu. (2011). The role of affect and cognition on online Consumers’ decision to disclose personal information to unfamiliar online vendors. Decision Support Systems, 51(3), 434–445.CrossRef Li, S., & Xu. (2011). The role of affect and cognition on online Consumers’ decision to disclose personal information to unfamiliar online vendors. Decision Support Systems, 51(3), 434–445.CrossRef
go back to reference Li, L., Steinberg, K.-C., Kim-Spoon, & Deater-Deckard. (2019). Longitudinal link between trait motivation and risk-taking behaviors via neural risk processing. Developmental Cognitive Neuroscience, 40, 100725.CrossRef Li, L., Steinberg, K.-C., Kim-Spoon, & Deater-Deckard. (2019). Longitudinal link between trait motivation and risk-taking behaviors via neural risk processing. Developmental Cognitive Neuroscience, 40, 100725.CrossRef
go back to reference Liang, & Xue. (2009). Avoidance of information Tehchnology threats: A theoretical perspective. [article]. MIS Quarterly, 33(1), 71–90.CrossRef Liang, & Xue. (2009). Avoidance of information Tehchnology threats: A theoretical perspective. [article]. MIS Quarterly, 33(1), 71–90.CrossRef
go back to reference Liang, & Xue. (2010). Understanding security behaviors in personal computer usage: A threat avoidance perspective*. Journal of the Association for Information Systems, 11(7), 394–413.CrossRef Liang, & Xue. (2010). Understanding security behaviors in personal computer usage: A threat avoidance perspective*. Journal of the Association for Information Systems, 11(7), 394–413.CrossRef
go back to reference Lin, F. T. (2009). Does the risk aversion vary with different background risk of households. International Research Journal of Finance and Economics, 34(34), 69–82. Lin, F. T. (2009). Does the risk aversion vary with different background risk of households. International Research Journal of Finance and Economics, 34(34), 69–82.
go back to reference Luarn, & Lin. (2005). Toward an understanding of the behavioral intention to use Mobile banking. Computers in Human Behavior, 21(6), 873–891.CrossRef Luarn, & Lin. (2005). Toward an understanding of the behavioral intention to use Mobile banking. Computers in Human Behavior, 21(6), 873–891.CrossRef
go back to reference McCormac, Z., Parsons, C., Butavicius, & Pattinson. (2017). Individual differences and information security awareness. Computers in Human Behavior, 69, 151–156.CrossRef McCormac, Z., Parsons, C., Butavicius, & Pattinson. (2017). Individual differences and information security awareness. Computers in Human Behavior, 69, 151–156.CrossRef
go back to reference Miltgen, & Peyrat-Guillard. (2014). Cultural and generational influences on privacy concerns: A qualitative study in seven European countries. European Journal of Information Systems, 23(2), 103–125.CrossRef Miltgen, & Peyrat-Guillard. (2014). Cultural and generational influences on privacy concerns: A qualitative study in seven European countries. European Journal of Information Systems, 23(2), 103–125.CrossRef
go back to reference Mongin. (1997). Expected Utility Theory (Handbook of Economic Methodology). London: Edward Elgar. Mongin. (1997). Expected Utility Theory (Handbook of Economic Methodology). London: Edward Elgar.
go back to reference Moody, G., & Dunn. (2017). Which phish get caught? An exploratory study of individuals′ susceptibility to phishing. European Journal of Information Systems, 26(6), 564–584.CrossRef Moody, G., & Dunn. (2017). Which phish get caught? An exploratory study of individuals′ susceptibility to phishing. European Journal of Information Systems, 26(6), 564–584.CrossRef
go back to reference Mun, & Hwang. (2003). Predicting the use of web-based information systems: Self-efficacy, enjoyment, learning goal orientation, and the technology acceptance model. International Journal of Human-Computer Studies, 59(4), 431–449.CrossRef Mun, & Hwang. (2003). Predicting the use of web-based information systems: Self-efficacy, enjoyment, learning goal orientation, and the technology acceptance model. International Journal of Human-Computer Studies, 59(4), 431–449.CrossRef
go back to reference Murty, V., & Rao. (2012). Performance evaluation of Wi-fi comparison with Wimax networks. International Journal of Distributed and Parallel Systems (IJDPS), 3(1), 321–329.CrossRef Murty, V., & Rao. (2012). Performance evaluation of Wi-fi comparison with Wimax networks. International Journal of Distributed and Parallel Systems (IJDPS), 3(1), 321–329.CrossRef
go back to reference Nobles, P., & Horrocks, P. A. (2004). Vulnerability of IEEE802. 11 WLANs to MAC layer DoS attacks. Nobles, P., & Horrocks, P. A. (2004). Vulnerability of IEEE802. 11 WLANs to MAC layer DoS attacks.
go back to reference Pablo. (1997). Reconciling predictions of decision making under risk: Insights from a Reconceptualized model of risk behaviour. Journal of Managerial Psychology, 12(1), 4–20.CrossRef Pablo. (1997). Reconciling predictions of decision making under risk: Insights from a Reconceptualized model of risk behaviour. Journal of Managerial Psychology, 12(1), 4–20.CrossRef
go back to reference Peace, G., & Thong. (2003). Software piracy in the workplace: A model and empirical test. Journal of Management Information Systems, 20(1), 153–178.CrossRef Peace, G., & Thong. (2003). Software piracy in the workplace: A model and empirical test. Journal of Management Information Systems, 20(1), 153–178.CrossRef
go back to reference Pelletier, F., Vallerand, T., Briere, & Blais. (1995). Toward a new measure of intrinsic motivation, extrinsic motivation, and Amotivation in sports: The sport motivation scale (Sms). Journal of Sport and Exercise Psychology, 17, 35–35 53.CrossRef Pelletier, F., Vallerand, T., Briere, & Blais. (1995). Toward a new measure of intrinsic motivation, extrinsic motivation, and Amotivation in sports: The sport motivation scale (Sms). Journal of Sport and Exercise Psychology, 17, 35–35 53.CrossRef
go back to reference Podsakoff, T., Grover, & Huber. (1984). Situational moderators of leader reward and punishment behaviors: Fact or fiction? Organizational Behavior and Human Performance, 34(1), 21–63.CrossRef Podsakoff, T., Grover, & Huber. (1984). Situational moderators of leader reward and punishment behaviors: Fact or fiction? Organizational Behavior and Human Performance, 34(1), 21–63.CrossRef
go back to reference Powell, & Ansic. (1997). Gender differences in risk behaviour in financial decision-making: An experimental analysis. Journal of Economic Psychology, 18(6), 605–628.CrossRef Powell, & Ansic. (1997). Gender differences in risk behaviour in financial decision-making: An experimental analysis. Journal of Economic Psychology, 18(6), 605–628.CrossRef
go back to reference Raghunathan. (1999). Impact of information quality and decision-maker quality on decision quality: A theoretical model and simulation analysis. Decision Support Systems, 26(4), 275–286.CrossRef Raghunathan. (1999). Impact of information quality and decision-maker quality on decision quality: A theoretical model and simulation analysis. Decision Support Systems, 26(4), 275–286.CrossRef
go back to reference Rainie, L., Kiesler, S., Kang, R., Madden, M., Duggan, M., Brown, S., & Dabbish, L. (2013). Anonymity, privacy, and security online. Pew Research Center, 5. Rainie, L., Kiesler, S., Kang, R., Madden, M., Duggan, M., Brown, S., & Dabbish, L. (2013). Anonymity, privacy, and security online. Pew Research Center, 5.
go back to reference Ruedl, P., Sommersacher, G., Kopp, N., et al. (2010). Factors associated with self-reported risk-taking behaviour on ski slopes. British Journal of Sports Medicine, 44(3), 204–206.CrossRef Ruedl, P., Sommersacher, G., Kopp, N., et al. (2010). Factors associated with self-reported risk-taking behaviour on ski slopes. British Journal of Sports Medicine, 44(3), 204–206.CrossRef
go back to reference Ryan, & Deci. (2000). Intrinsic and extrinsic motivations: Classic definitions and new directions. Contemporary Educational Psychology, 25(1), 54–67.CrossRef Ryan, & Deci. (2000). Intrinsic and extrinsic motivations: Classic definitions and new directions. Contemporary Educational Psychology, 25(1), 54–67.CrossRef
go back to reference Satz, M., Miller, S., McArthur, C., et al. (1993). Low. Education as a Possible Risk Factor for Cognitive Abnormalities in Hiv-1: Findings from the Multicenter Aids Cohort Study (Macs)., 6(5), 503–511. Satz, M., Miller, S., McArthur, C., et al. (1993). Low. Education as a Possible Risk Factor for Cognitive Abnormalities in Hiv-1: Findings from the Multicenter Aids Cohort Study (Macs)., 6(5), 503–511.
go back to reference Schoemaker. (1982). The expected utility model: Its variants, purposes, evidence and limitations. Journal of Economic Literature, 20(2), 529–563. Schoemaker. (1982). The expected utility model: Its variants, purposes, evidence and limitations. Journal of Economic Literature, 20(2), 529–563.
go back to reference Schomakers, L., Müllmann, & Ziefle. (2019). Internet users’ perceptions of information sensitivity–insights from Germany. International Journal of Information Management, 46, 142–150.CrossRef Schomakers, L., Müllmann, & Ziefle. (2019). Internet users’ perceptions of information sensitivity–insights from Germany. International Journal of Information Management, 46, 142–150.CrossRef
go back to reference Scott, B., Andersen, W., Voeks, D., et al. (2007). Testing the risk compensation hypothesis for safety helmets in Alpine skiing and snowboarding. Injury Prevention, 13(3), 173–177.CrossRef Scott, B., Andersen, W., Voeks, D., et al. (2007). Testing the risk compensation hypothesis for safety helmets in Alpine skiing and snowboarding. Injury Prevention, 13(3), 173–177.CrossRef
go back to reference Sebbar, Boulahya, Mezzour, & Boulmalf (2016). An Empirical Study of Wifi Security and Performance in Morocco-Wardriving in Rabat. In 2016 International Conference on Electrical and Information Technologies (ICEIT), 2016 (pp. 362–367): IEEE. Sebbar, Boulahya, Mezzour, & Boulmalf (2016). An Empirical Study of Wifi Security and Performance in Morocco-Wardriving in Rabat. In 2016 International Conference on Electrical and Information Technologies (ICEIT), 2016 (pp. 362–367): IEEE.
go back to reference Shadish, W. R., Cook, T. D., & Campbell, D. T. (2002). Experimental and quasi-experimental designs for generalized causal inference, by William R. Shedish, Thomas D. Cook, Donald T. Campbell. Boston Houghton Mifflin. Shadish, W. R., Cook, T. D., & Campbell, D. T. (2002). Experimental and quasi-experimental designs for generalized causal inference, by William R. Shedish, Thomas D. Cook, Donald T. Campbell. Boston Houghton Mifflin.
go back to reference Sharma, Y., & Crawford. (2009). Estimating the effect of common method variance: The method—Method pair technique with an illustration from tam research. MIS Quarterly, 33, 473–490.CrossRef Sharma, Y., & Crawford. (2009). Estimating the effect of common method variance: The method—Method pair technique with an illustration from tam research. MIS Quarterly, 33, 473–490.CrossRef
go back to reference Sheehan. (1999). An investigation of gender differences in on-line privacy concerns and resultant behaviors. Journal of Interactive Marketing, 13(4), 24–38.CrossRef Sheehan. (1999). An investigation of gender differences in on-line privacy concerns and resultant behaviors. Journal of Interactive Marketing, 13(4), 24–38.CrossRef
go back to reference Shim, C., & Lee. (2009). Empirical analysis of risk-taking behavior in it platform migration decisions. Computers in Human Behavior, 25(6), 1290–1305.CrossRef Shim, C., & Lee. (2009). Empirical analysis of risk-taking behavior in it platform migration decisions. Computers in Human Behavior, 25(6), 1290–1305.CrossRef
go back to reference Simbana, S., Lopez, G., Tipantuna, C., & Sanchez, F. (2018). Vulnerability analysis toolkit for IEEE 802.11 wireless networks: a practical approach. In 2018 International Conference on Information Systems and Computer Science (INCISCOS) (pp. 227–232). IEEE. Simbana, S., Lopez, G., Tipantuna, C., & Sanchez, F. (2018). Vulnerability analysis toolkit for IEEE 802.11 wireless networks: a practical approach. In 2018 International Conference on Information Systems and Computer Science (INCISCOS) (pp. 227–232). IEEE.
go back to reference Small, S. A., & Luster, T. (1994). Adolescent sexual activity: An ecological, risk-factor approach. Journal of Marriage and the Family, 181–192. Small, S. A., & Luster, T. (1994). Adolescent sexual activity: An ecological, risk-factor approach. Journal of Marriage and the Family, 181–192.
go back to reference Straub, L., & Karahanna-Evaristo. (1995). Measuring system usage: Implications for is theory testing. Management Science, 41(8), 1328–1342.CrossRef Straub, L., & Karahanna-Evaristo. (1995). Measuring system usage: Implications for is theory testing. Management Science, 41(8), 1328–1342.CrossRef
go back to reference Sun, A., & Koong (2011). The more secure the better? A Study of Information Security Readiness. Industrial Management & Data Systems. Sun, A., & Koong (2011). The more secure the better? A Study of Information Security Readiness. Industrial Management & Data Systems.
go back to reference Swanson, U., & Lank. (2010). Naïve security in a Wi-fi world. In M. Nishigaki, A. Jøsang, Y. Murayama, & S. Marsh (Eds.), Trust Management Iv (Vol. 321, pp. 32-47, Ifip advances in information and communication technology). Berlin Heidelberg: Springer. Swanson, U., & Lank. (2010). Naïve security in a Wi-fi world. In M. Nishigaki, A. Jøsang, Y. Murayama, & S. Marsh (Eds.), Trust Management Iv (Vol. 321, pp. 32-47, Ifip advances in information and communication technology). Berlin Heidelberg: Springer.
go back to reference Swierczek, & Ha. (2003). Entrepreneurial orientation, uncertainty avoidance and firm performance: An analysis of Thai and Vietnamese Smes. The International Journal of Entrepreneurship Innovation, 4(1), 46–58.CrossRef Swierczek, & Ha. (2003). Entrepreneurial orientation, uncertainty avoidance and firm performance: An analysis of Thai and Vietnamese Smes. The International Journal of Entrepreneurship Innovation, 4(1), 46–58.CrossRef
go back to reference Taylor, & Strutton. (2010). Has E-marketing come of age? Modeling historical influences on post-adoption era internet consumer behaviors. Journal of Business Research, 63(9), 950–956.CrossRef Taylor, & Strutton. (2010). Has E-marketing come of age? Modeling historical influences on post-adoption era internet consumer behaviors. Journal of Business Research, 63(9), 950–956.CrossRef
go back to reference Taylor, & Todd. (1995). Understanding information technology usage: A test of competing models. Information Systems Research, 6(2), 144–176.CrossRef Taylor, & Todd. (1995). Understanding information technology usage: A test of competing models. Information Systems Research, 6(2), 144–176.CrossRef
go back to reference Teo, L., & Lai. (1999). Intrinsic and extrinsic motivation in internet usage. Omega, 27(1), 25–37.CrossRef Teo, L., & Lai. (1999). Intrinsic and extrinsic motivation in internet usage. Omega, 27(1), 25–37.CrossRef
go back to reference Tu, Z., & Yuan, Y. (2012). Understanding user's behaviors in coping with security threat of mobile devices Loss and theft. In 2012 45th Hawaii International Conference on System Sciences (pp. 1393-1402). IEEE. Tu, Z., & Yuan, Y. (2012). Understanding user's behaviors in coping with security threat of mobile devices Loss and theft. In 2012 45th Hawaii International Conference on System Sciences (pp. 1393-1402). IEEE.
go back to reference Turner, & McClure. (2003). Age and gender differences in risk-taking behaviour as an explanation for high incidence of motor vehicle crashes as a driver in young males. Injury Control and Safety Promotion, 10(3), 123–130.CrossRef Turner, & McClure. (2003). Age and gender differences in risk-taking behaviour as an explanation for high incidence of motor vehicle crashes as a driver in young males. Injury Control and Safety Promotion, 10(3), 123–130.CrossRef
go back to reference Tversky, & Kahneman. (1992). Advances in Prospect theory: Cumulative representation of uncertainty. Journal of Risk uncertainty, 5(4), 297–323.CrossRef Tversky, & Kahneman. (1992). Advances in Prospect theory: Cumulative representation of uncertainty. Journal of Risk uncertainty, 5(4), 297–323.CrossRef
go back to reference Vansteenkiste, L., & Deci. (2006). Intrinsic versus extrinsic goal contents in self-determination theory: Another look at the quality of academic motivation. Educational Psychologist, 41(1), 19–31.CrossRef Vansteenkiste, L., & Deci. (2006). Intrinsic versus extrinsic goal contents in self-determination theory: Another look at the quality of academic motivation. Educational Psychologist, 41(1), 19–31.CrossRef
go back to reference Vater, M., & Roepke. (2018). Does a narcissism epidemic exist in modern Western societies? Comparing narcissism and self-esteem in east and West Germany. PLoS One, 13(1), e0188287.CrossRef Vater, M., & Roepke. (2018). Does a narcissism epidemic exist in modern Western societies? Comparing narcissism and self-esteem in east and West Germany. PLoS One, 13(1), e0188287.CrossRef
go back to reference Venkatesh. (1999). Creation of favorable user perceptions: Exploring the role of intrinsic motivation. MIS Quarterly, 23(2), 239–260.CrossRef Venkatesh. (1999). Creation of favorable user perceptions: Exploring the role of intrinsic motivation. MIS Quarterly, 23(2), 239–260.CrossRef
go back to reference Venkatesh, M., Davis, & Davis. (2003). User acceptance of information technology: Toward a unified view. MIS Quarterly, 27(3), 425–478.CrossRef Venkatesh, M., Davis, & Davis. (2003). User acceptance of information technology: Toward a unified view. MIS Quarterly, 27(3), 425–478.CrossRef
go back to reference Warkentin, & Siponen. (2015). An enhanced fear appeal rhetorical framework: Leveraging threats to the human asset through sanctioning rhetoric. MIS Quarterly, 39(1), 113–134.CrossRef Warkentin, & Siponen. (2015). An enhanced fear appeal rhetorical framework: Leveraging threats to the human asset through sanctioning rhetoric. MIS Quarterly, 39(1), 113–134.CrossRef
go back to reference Watts. (2016). Secure authentication is the only solution for vulnerable public Wifi. Computer Fraud & Security, 2016(1), 18–20.CrossRef Watts. (2016). Secure authentication is the only solution for vulnerable public Wifi. Computer Fraud & Security, 2016(1), 18–20.CrossRef
go back to reference Witemyre, S. J., Abegaz, T. T., Payne, B. R., & Mady, A. (2018). Hijacking wireless communications using WiFi Pineapple NANO as a rogue access point. 2018 Kennesaw State University Conference on Cybersecurity Education. Witemyre, S. J., Abegaz, T. T., Payne, B. R., & Mady, A. (2018). Hijacking wireless communications using WiFi Pineapple NANO as a rogue access point. 2018 Kennesaw State University Conference on Cybersecurity Education.
go back to reference Wolburg. (2001). The “risky business” of binge drinking among college students: Using risk models for Psas and anti-drinking campaigns. Journal of Advertising, 30(4), 23–39.CrossRef Wolburg. (2001). The “risky business” of binge drinking among college students: Using risk models for Psas and anti-drinking campaigns. Journal of Advertising, 30(4), 23–39.CrossRef
go back to reference Wong. (2005). The role of risk in making decisions under escalation situations. Applied Psychology, 54(4), 584–607.CrossRef Wong. (2005). The role of risk in making decisions under escalation situations. Applied Psychology, 54(4), 584–607.CrossRef
go back to reference Woon, I., Tan, G. W., & Low, R. (2005). A protection motivation theory approach to home wireless security. 2005 International Conference on Information Systems (ICIS). Woon, I., Tan, G. W., & Low, R. (2005). A protection motivation theory approach to home wireless security. 2005 International Conference on Information Systems (ICIS).
go back to reference Workman, B., & Straub. (2008). Security lapses and the omission of information security measures: A threat control model and empirical test. Computers in Human Behavior, 24(6), 2799–2816.CrossRef Workman, B., & Straub. (2008). Security lapses and the omission of information security measures: A threat control model and empirical test. Computers in Human Behavior, 24(6), 2799–2816.CrossRef
go back to reference Yao, S., & Wang. (2011). Decomposing the age effect on risk tolerance. The Journal of Socio-Economics, 40(6), 879–887.CrossRef Yao, S., & Wang. (2011). Decomposing the age effect on risk tolerance. The Journal of Socio-Economics, 40(6), 879–887.CrossRef
go back to reference Yim, & Han. (2013). An Investigation of the Factors That Influence the Compliance to Information Security Policy: From Risk Compensation Theory. The Journal of Digital Policy and Management, 11(10), 153–168. Yim, & Han. (2013). An Investigation of the Factors That Influence the Compliance to Information Security Policy: From Risk Compensation Theory. The Journal of Digital Policy and Management, 11(10), 153–168.
go back to reference Yoon, & Kim. (2013). Understanding computer security behavioral intention in the workplace: An empirical study of Korean firms. Information Technology People, 26(4), 401–419.CrossRef Yoon, & Kim. (2013). Understanding computer security behavioral intention in the workplace: An empirical study of Korean firms. Information Technology People, 26(4), 401–419.CrossRef
go back to reference Yordanova, I., & Alexandrova-Boshnakova, I. (2011). Gender effects on risk-taking of entrepreneurs: Evidence from Bulgaria. International Journal of Entrepreneurial Behavior Research, 17(3), 272–295.CrossRef Yordanova, I., & Alexandrova-Boshnakova, I. (2011). Gender effects on risk-taking of entrepreneurs: Evidence from Bulgaria. International Journal of Entrepreneurial Behavior Research, 17(3), 272–295.CrossRef
go back to reference Youn. (2009). Determinants of online privacy concern and its influence on privacy protection behaviors among young adolescents. Journal of Consumer Affairs, 43(3), 389–418.CrossRef Youn. (2009). Determinants of online privacy concern and its influence on privacy protection behaviors among young adolescents. Journal of Consumer Affairs, 43(3), 389–418.CrossRef
go back to reference Zhang, R., & Li. (2009). Impact of perceived technical protection on security behaviors. Information Management & Computer Security., 17, 330–340.CrossRef Zhang, R., & Li. (2009). Impact of perceived technical protection on security behaviors. Information Management & Computer Security., 17, 330–340.CrossRef
Metadata
Title
Risk Taking Behaviors Using Public Wi-Fi™
Authors
Hoon S. Choi
Darrell Carpenter
Myung S. Ko
Publication date
27-02-2021
Publisher
Springer US
Published in
Information Systems Frontiers / Issue 3/2022
Print ISSN: 1387-3326
Electronic ISSN: 1572-9419
DOI
https://doi.org/10.1007/s10796-021-10119-7

Other articles of this Issue 3/2022

Information Systems Frontiers 3/2022 Go to the issue

Premium Partner