Skip to main content
Top
Published in: Information Systems Frontiers 2/2023

19-04-2022

Using Multi-Factor Authentication for Online Account Security: Examining the Influence of Anticipated Regret

Authors: Obi M. Ogbanufe, Corey Baham

Published in: Information Systems Frontiers | Issue 2/2023

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Authentication plays an important role in securing our systems but is threatened by increasingly sophisticated account hacking and account take over. Several security services have been developed, including multi-factor authentication (MFA) designed to cope with online account authentication. It remains unknown how users perceive and evaluate secure authentication for online account threats and consequently use it to protect their online account. Drawing on the Protection Motivation Theory (PMT) and the literature on anticipated regret, this study investigates the factors that affect the use of MFA secure authentication to avoid online account threats. This work extends PMT by showing how the emotion of anticipated regret heightens appraisals of threat and coping.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Appendix
Available only for authorised users
Footnotes
1
We thank reviewer one for providing this recommendation.
 
2
Although this study’s focus is on understanding the influence of anticipated regret (i.e., emotions) as an information source for PMT’s mediating variables, previous studies have modeled anticipated regret as a consequence of coping behaviors and cognitive appraisals (e.g., Verkijika, 2018). Thus, we performed a post-hoc analysis (See Appendix 5) to include the estimation of anticipated regret as a consequent of threat appraisal, and anticipated regret as a determinant of MFA motivation and MFA use. These relationships are significant at the 0.05 level of significance or lower.
 
Literature
go back to reference Abraham, C., & Sheeran, P. (2003). Acting on intentions: The role of anticipated regret. British Journal of Social Psychology, 42, 495–511.CrossRef Abraham, C., & Sheeran, P. (2003). Acting on intentions: The role of anticipated regret. British Journal of Social Psychology, 42, 495–511.CrossRef
go back to reference Anderson, C., & Agarwal, R. (2010). Practicing safe computing: A multimethod empirical examination of home computer user security behavioral intentions. MIS Quarterly, 34(3), 613–643.CrossRef Anderson, C., & Agarwal, R. (2010). Practicing safe computing: A multimethod empirical examination of home computer user security behavioral intentions. MIS Quarterly, 34(3), 613–643.CrossRef
go back to reference Bose, I., & Leung, A. C. M. (2019). Adoption of identity theft countermeasures and its short- and long-term impact on firm value. MIS Quarterly, 43(1), 313–327.CrossRef Bose, I., & Leung, A. C. M. (2019). Adoption of identity theft countermeasures and its short- and long-term impact on firm value. MIS Quarterly, 43(1), 313–327.CrossRef
go back to reference Boss, S. R., Galletta, D. F., Lowry, P. B., Moody, G. D., & Polak, P. (2015). What do systems users have to fear? Using fear appeals to engender threats and fear that motivate protective security behaviors. MIS Quarterly, 39(4), 837–864.CrossRef Boss, S. R., Galletta, D. F., Lowry, P. B., Moody, G. D., & Polak, P. (2015). What do systems users have to fear? Using fear appeals to engender threats and fear that motivate protective security behaviors. MIS Quarterly, 39(4), 837–864.CrossRef
go back to reference Burns, A. J., Posey, C., Roberts, T. L., & Benjamin Lowry, P. (2017b). Examining the relationship of organizational insiders’ psychological capital with information security threat and coping appraisals. Computers in Human Behavior, 68, 190–209.CrossRef Burns, A. J., Posey, C., Roberts, T. L., & Benjamin Lowry, P. (2017b). Examining the relationship of organizational insiders’ psychological capital with information security threat and coping appraisals. Computers in Human Behavior, 68, 190–209.CrossRef
go back to reference Chen, Y., & Zahedi, F. M. (2016). Individuals ’ internet security perceptions and behaviors : Polycontextual contrasts between the Unites States and China. MIS Ouarterly, 40(1), 205–222. Chen, Y., & Zahedi, F. M. (2016). Individuals ’ internet security perceptions and behaviors : Polycontextual contrasts between the Unites States and China. MIS Ouarterly, 40(1), 205–222.
go back to reference Choi, H. S., Carpenter, D., & Ko, M. S. (2021). Risk taking behaviors using public Wi-Fi TM. Information Systems Frontiers, 1–18. Choi, H. S., Carpenter, D., & Ko, M. S. (2021). Risk taking behaviors using public Wi-Fi TM. Information Systems Frontiers, 1–18.
go back to reference Crossler, R., & Bélanger, F. (2014). An extended perspective on individual security behaviors: Protection motivation theory and a unified security practices (USP) instrument. The DATA BASE for Advances in Information Systems, 45(4), 51–71.CrossRef Crossler, R., & Bélanger, F. (2014). An extended perspective on individual security behaviors: Protection motivation theory and a unified security practices (USP) instrument. The DATA BASE for Advances in Information Systems, 45(4), 51–71.CrossRef
go back to reference Crossler, R., Andoh-Baidoo, K., & Menard, P. (2019a). Espoused cultural values as antecedents of individuals’ threat and coping appraisal toward protective information technologies: Study of US and Ghana. Information & Management, 56(5), 754–766.CrossRef Crossler, R., Andoh-Baidoo, K., & Menard, P. (2019a). Espoused cultural values as antecedents of individuals’ threat and coping appraisal toward protective information technologies: Study of US and Ghana. Information & Management, 56(5), 754–766.CrossRef
go back to reference Culnan, M. J., & Williams, C. C. (2009). How ethics can enhance organizational privacy: Lessons from the choicepoint and TJX data breaches. MIS Quarterly, 33(4), 673–687.CrossRef Culnan, M. J., & Williams, C. C. (2009). How ethics can enhance organizational privacy: Lessons from the choicepoint and TJX data breaches. MIS Quarterly, 33(4), 673–687.CrossRef
go back to reference Featherman, M. S., & Pavlou, P. A. (2003). Predicting e-services adoption: A perceived risk facets perspective. International Journal of Human-Computer Studies, 59(4), 451–474.CrossRef Featherman, M. S., & Pavlou, P. A. (2003). Predicting e-services adoption: A perceived risk facets perspective. International Journal of Human-Computer Studies, 59(4), 451–474.CrossRef
go back to reference Featherman, M. S., & Wells, J. D. (2010). The intangibility of e-Services: Effects on perceived risk and acceptance. ACM SIGMIS Database, 41(2), 110.CrossRef Featherman, M. S., & Wells, J. D. (2010). The intangibility of e-Services: Effects on perceived risk and acceptance. ACM SIGMIS Database, 41(2), 110.CrossRef
go back to reference Floyd, D. L., Prentice-Dunn, S., & Rogers, R. W. (2000). A meta-analysis of research on protection motivation theory. Journal of Applied Social Psychology, 30(2), 407–429.CrossRef Floyd, D. L., Prentice-Dunn, S., & Rogers, R. W. (2000). A meta-analysis of research on protection motivation theory. Journal of Applied Social Psychology, 30(2), 407–429.CrossRef
go back to reference Fornell, C., & Larcker, D. F. (1981). Structural equation models with unobservable variables and measurement error: Algebra and statistics. Journal of Marketing Research, 18, 382–388. CrossRef Fornell, C., & Larcker, D. F. (1981). Structural equation models with unobservable variables and measurement error: Algebra and statistics. Journal of Marketing Research, 18, 382–388. CrossRef
go back to reference Gohm, C., & Clore, G. L. (2002). Affect as information: An individual differences approach. In F. Barrett & P. Salovey (Eds.), The wisdom in feelings: Psychological processes underlying emotional intelligence (pp. 1–39). Guilford Press. Gohm, C., & Clore, G. L. (2002). Affect as information: An individual differences approach. In F. Barrett & P. Salovey (Eds.), The wisdom in feelings: Psychological processes underlying emotional intelligence (pp. 1–39). Guilford Press.
go back to reference Hair, J. F., Black, W. C., Babin, B. J., Anderson, R. E., & Tatham, R. L. (2006). Multivariate data analysis (Vol. 6). Pearson Prentice Hall Upper Saddle River. Hair, J. F., Black, W. C., Babin, B. J., Anderson, R. E., & Tatham, R. L. (2006). Multivariate data analysis (Vol. 6). Pearson Prentice Hall Upper Saddle River.
go back to reference Hair, J. F., Ringle, C. M., & Sarstedt, M. (2011). PLS-SEM: Indeed a silver bullet. The Journal of Marketing Theory and Practice, 19(2), 139–152.CrossRef Hair, J. F., Ringle, C. M., & Sarstedt, M. (2011). PLS-SEM: Indeed a silver bullet. The Journal of Marketing Theory and Practice, 19(2), 139–152.CrossRef
go back to reference Harman, D. (1967). A single factor test of common method variance. Journal of Psychology, 35(1967), 359–378. Harman, D. (1967). A single factor test of common method variance. Journal of Psychology, 35(1967), 359–378.
go back to reference Jenkins, J. L., Anderson, B. B., Vance, A., Kirwan, C. B., & Eargle, D. (2016). More harm than good? How messages that interrupt can make us vulnerable. Information Systems Research, 27(4), 880–896.CrossRef Jenkins, J. L., Anderson, B. B., Vance, A., Kirwan, C. B., & Eargle, D. (2016). More harm than good? How messages that interrupt can make us vulnerable. Information Systems Research, 27(4), 880–896.CrossRef
go back to reference Johnston, A. C., & Warkentin, M. (2010). Fear Appeals and information security behaviors: An empirical study. MIS Quarterly, 34(3), 549–563.CrossRef Johnston, A. C., & Warkentin, M. (2010). Fear Appeals and information security behaviors: An empirical study. MIS Quarterly, 34(3), 549–563.CrossRef
go back to reference Johnston, A. C., Warkentin, M., & Siponen, M. (2015). An enhanced fear appeal rhetorical framework: Leveraging Threats to the human asset through sanctioning rhetoric. MIS Quarterly, 39(1), 113-A7.CrossRef Johnston, A. C., Warkentin, M., & Siponen, M. (2015). An enhanced fear appeal rhetorical framework: Leveraging Threats to the human asset through sanctioning rhetoric. MIS Quarterly, 39(1), 113-A7.CrossRef
go back to reference Kock, N. (2015). Common method bias in PLS-SEM: A full collinearity assessment approach. International Journal of E-Collaboration, 11(4), 1–10.CrossRef Kock, N. (2015). Common method bias in PLS-SEM: A full collinearity assessment approach. International Journal of E-Collaboration, 11(4), 1–10.CrossRef
go back to reference Liang, H., & Xue, Y. (2009). Avoidance of information technology threats: A theoretical perspective. MIS Quarterly, 33(1), 71–90.CrossRef Liang, H., & Xue, Y. (2009). Avoidance of information technology threats: A theoretical perspective. MIS Quarterly, 33(1), 71–90.CrossRef
go back to reference Liang, H., & Xue, Y. (2010). Understanding security behaviors in personal computer usage: A threat avoidance perspective. Journal of the Association for Information Systems, 11(7), 394–413.CrossRef Liang, H., & Xue, Y. (2010). Understanding security behaviors in personal computer usage: A threat avoidance perspective. Journal of the Association for Information Systems, 11(7), 394–413.CrossRef
go back to reference Libicki, M. C., Balkovich, E., Jackson, B. A., Rudavsky, R., & Webb, K. W. (2011). Influences on the Adoption of Multifactor Authentication. Rand Corporation. Santa Monica, CA: RAND Corporation. Libicki, M. C., Balkovich, E., Jackson, B. A., Rudavsky, R., & Webb, K. W. (2011). Influences on the Adoption of Multifactor Authentication. Rand Corporation. Santa Monica, CA: RAND Corporation.
go back to reference Lowry, P. B., D’Arcy, J., Hammer, B., & Moody, G. D. (2016). “Cargo Cult” science in traditional organization and information systems survey research: A case for using nontraditional methods of data collection, including Mechanical Turk and online panels. Journal of Strategic Information Systems, 25, 232–240. https://doi.org/10.1016/j.jsis.2016.06.002CrossRef Lowry, P. B., D’Arcy, J., Hammer, B., & Moody, G. D. (2016). “Cargo Cult” science in traditional organization and information systems survey research: A case for using nontraditional methods of data collection, including Mechanical Turk and online panels. Journal of Strategic Information Systems, 25, 232–240. https://​doi.​org/​10.​1016/​j.​jsis.​2016.​06.​002CrossRef
go back to reference Milne, G. (2003). How well do consumers protect themselves from identity theft? Journal of Consumer Affairs, 37(2), 388–402.CrossRef Milne, G. (2003). How well do consumers protect themselves from identity theft? Journal of Consumer Affairs, 37(2), 388–402.CrossRef
go back to reference Moody, G. D., Siponen, M., & Pahnila, S. (2018). Toward a unified model of information security policy compliance. MIS Quarterly, 42(1), 285–311.CrossRef Moody, G. D., Siponen, M., & Pahnila, S. (2018). Toward a unified model of information security policy compliance. MIS Quarterly, 42(1), 285–311.CrossRef
go back to reference Phillips, P., Abraham, C., & Bond, R. (2003). Personality, cognition , and university students ’ examination performance. 448(December 2002), 435–448. Phillips, P., Abraham, C., & Bond, R. (2003). Personality, cognition , and university students ’ examination performance. 448(December 2002), 435–448.
go back to reference Posey, C., Roberts, T. L., & Lowry, P. B. (2015). The impact of organizational commitment on insiders’ motivation to protect organizational information assets. Journal of Management Information Systems, 32(4), 179–214.CrossRef Posey, C., Roberts, T. L., & Lowry, P. B. (2015). The impact of organizational commitment on insiders’ motivation to protect organizational information assets. Journal of Management Information Systems, 32(4), 179–214.CrossRef
go back to reference Rogers, R. W. (1975). A protection motivation theory of fear appeals and attitude change. The Journal of Psychology, 91(1), 93–114.CrossRef Rogers, R. W. (1975). A protection motivation theory of fear appeals and attitude change. The Journal of Psychology, 91(1), 93–114.CrossRef
go back to reference Rogers, R. W. (1983). Cognitive and physiological processes in fear appeals and attitude change: A revised theory of protection motivation. In J. T. Cacioppo & R. Petty (Eds.), Social psychophysiology: A sourcebook (pp. 153–177). Rogers, R. W. (1983). Cognitive and physiological processes in fear appeals and attitude change: A revised theory of protection motivation. In J. T. Cacioppo & R. Petty (Eds.), Social psychophysiology: A sourcebook (pp. 153–177).
go back to reference Sandhu, R., & Samarati, P. (1996). Authentication, access control, and audit. ACM Computing Surveys (CSUR), 28(1), 241–243. Sandhu, R., & Samarati, P. (1996). Authentication, access control, and audit. ACM Computing Surveys (CSUR), 28(1), 241–243.
go back to reference Sharp, T., Shreve-Neiger, A., Fremouw, W., Kane, J., & Hutton, S. (2004). Exploring the psychological and somatic impact of identity theft. Journal of Forensic Sciences, 49(1), 131–136.CrossRef Sharp, T., Shreve-Neiger, A., Fremouw, W., Kane, J., & Hutton, S. (2004). Exploring the psychological and somatic impact of identity theft. Journal of Forensic Sciences, 49(1), 131–136.CrossRef
go back to reference Siponen, M., & Vance, A. (2010). Neutralization: New insights into the problem of employee information systems security neutralization. MIS Quarterly, 34(3), 487–502.CrossRef Siponen, M., & Vance, A. (2010). Neutralization: New insights into the problem of employee information systems security neutralization. MIS Quarterly, 34(3), 487–502.CrossRef
go back to reference Steelman, Z. R., Hammer, B. I., & Limayem, M. (2014). Data collection in the digital age: Innovative alternatives to student samples. MIS Quarterly, 38(2), 355–378.CrossRef Steelman, Z. R., Hammer, B. I., & Limayem, M. (2014). Data collection in the digital age: Innovative alternatives to student samples. MIS Quarterly, 38(2), 355–378.CrossRef
go back to reference Vance, A., Siponen, M., & Pahnila, S. (2012). Motivating IS security compliance: Insights from habit and protection motivation theory. Information & Management, 49(3–4), 190–198.CrossRef Vance, A., Siponen, M., & Pahnila, S. (2012). Motivating IS security compliance: Insights from habit and protection motivation theory. Information & Management, 49(3–4), 190–198.CrossRef
go back to reference Venkatesh, V., & Davis, F. D. (2000). A theoretical extension of the technology acceptance model: Four longitudinal field studies. Management Science, 46(2), 186–204.CrossRef Venkatesh, V., & Davis, F. D. (2000). A theoretical extension of the technology acceptance model: Four longitudinal field studies. Management Science, 46(2), 186–204.CrossRef
go back to reference Williams, F., & Haldeman, V. (1996). Financial concerns and productivity. Financial Counseling and Planning, 7(702), 147–156. Williams, F., & Haldeman, V. (1996). Financial concerns and productivity. Financial Counseling and Planning, 7(702), 147–156.
go back to reference Wilson, D., & Sperber, D. (2002). Relevance theory. In G. Ward & L. Horn (Eds.), Handbook of pragmatics. Blackwell. Wilson, D., & Sperber, D. (2002). Relevance theory. In G. Ward & L. Horn (Eds.), Handbook of pragmatics. Blackwell.
go back to reference Zeelenberg, M. (1999). Anticipated regret, expected feedback and behavioral decision making. Journal of Behavioral Decision Making, 12, 93–106.CrossRef Zeelenberg, M. (1999). Anticipated regret, expected feedback and behavioral decision making. Journal of Behavioral Decision Making, 12, 93–106.CrossRef
go back to reference Zeelenberg, M., & Beattie, J. (1997). Consequences of regret Aversion2: Additional evidence for effects of feedback on decision making. Organizational Behavior and Human Decision Processes, 72(1), 63–78.CrossRef Zeelenberg, M., & Beattie, J. (1997). Consequences of regret Aversion2: Additional evidence for effects of feedback on decision making. Organizational Behavior and Human Decision Processes, 72(1), 63–78.CrossRef
Metadata
Title
Using Multi-Factor Authentication for Online Account Security: Examining the Influence of Anticipated Regret
Authors
Obi M. Ogbanufe
Corey Baham
Publication date
19-04-2022
Publisher
Springer US
Published in
Information Systems Frontiers / Issue 2/2023
Print ISSN: 1387-3326
Electronic ISSN: 1572-9419
DOI
https://doi.org/10.1007/s10796-022-10278-1

Other articles of this Issue 2/2023

Information Systems Frontiers 2/2023 Go to the issue

Premium Partner