Skip to main content
Erschienen in: Information Systems Frontiers 2/2023

19.04.2022

Using Multi-Factor Authentication for Online Account Security: Examining the Influence of Anticipated Regret

verfasst von: Obi M. Ogbanufe, Corey Baham

Erschienen in: Information Systems Frontiers | Ausgabe 2/2023

Einloggen

Aktivieren Sie unsere intelligente Suche um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Authentication plays an important role in securing our systems but is threatened by increasingly sophisticated account hacking and account take over. Several security services have been developed, including multi-factor authentication (MFA) designed to cope with online account authentication. It remains unknown how users perceive and evaluate secure authentication for online account threats and consequently use it to protect their online account. Drawing on the Protection Motivation Theory (PMT) and the literature on anticipated regret, this study investigates the factors that affect the use of MFA secure authentication to avoid online account threats. This work extends PMT by showing how the emotion of anticipated regret heightens appraisals of threat and coping.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Anhänge
Nur mit Berechtigung zugänglich
Fußnoten
1
We thank reviewer one for providing this recommendation.
 
2
Although this study’s focus is on understanding the influence of anticipated regret (i.e., emotions) as an information source for PMT’s mediating variables, previous studies have modeled anticipated regret as a consequence of coping behaviors and cognitive appraisals (e.g., Verkijika, 2018). Thus, we performed a post-hoc analysis (See Appendix 5) to include the estimation of anticipated regret as a consequent of threat appraisal, and anticipated regret as a determinant of MFA motivation and MFA use. These relationships are significant at the 0.05 level of significance or lower.
 
Literatur
Zurück zum Zitat Abraham, C., & Sheeran, P. (2003). Acting on intentions: The role of anticipated regret. British Journal of Social Psychology, 42, 495–511.CrossRef Abraham, C., & Sheeran, P. (2003). Acting on intentions: The role of anticipated regret. British Journal of Social Psychology, 42, 495–511.CrossRef
Zurück zum Zitat Anderson, C., & Agarwal, R. (2010). Practicing safe computing: A multimethod empirical examination of home computer user security behavioral intentions. MIS Quarterly, 34(3), 613–643.CrossRef Anderson, C., & Agarwal, R. (2010). Practicing safe computing: A multimethod empirical examination of home computer user security behavioral intentions. MIS Quarterly, 34(3), 613–643.CrossRef
Zurück zum Zitat Bose, I., & Leung, A. C. M. (2019). Adoption of identity theft countermeasures and its short- and long-term impact on firm value. MIS Quarterly, 43(1), 313–327.CrossRef Bose, I., & Leung, A. C. M. (2019). Adoption of identity theft countermeasures and its short- and long-term impact on firm value. MIS Quarterly, 43(1), 313–327.CrossRef
Zurück zum Zitat Boss, S. R., Galletta, D. F., Lowry, P. B., Moody, G. D., & Polak, P. (2015). What do systems users have to fear? Using fear appeals to engender threats and fear that motivate protective security behaviors. MIS Quarterly, 39(4), 837–864.CrossRef Boss, S. R., Galletta, D. F., Lowry, P. B., Moody, G. D., & Polak, P. (2015). What do systems users have to fear? Using fear appeals to engender threats and fear that motivate protective security behaviors. MIS Quarterly, 39(4), 837–864.CrossRef
Zurück zum Zitat Burns, A. J., Posey, C., Roberts, T. L., & Benjamin Lowry, P. (2017b). Examining the relationship of organizational insiders’ psychological capital with information security threat and coping appraisals. Computers in Human Behavior, 68, 190–209.CrossRef Burns, A. J., Posey, C., Roberts, T. L., & Benjamin Lowry, P. (2017b). Examining the relationship of organizational insiders’ psychological capital with information security threat and coping appraisals. Computers in Human Behavior, 68, 190–209.CrossRef
Zurück zum Zitat Chen, Y., & Zahedi, F. M. (2016). Individuals ’ internet security perceptions and behaviors : Polycontextual contrasts between the Unites States and China. MIS Ouarterly, 40(1), 205–222. Chen, Y., & Zahedi, F. M. (2016). Individuals ’ internet security perceptions and behaviors : Polycontextual contrasts between the Unites States and China. MIS Ouarterly, 40(1), 205–222.
Zurück zum Zitat Choi, H. S., Carpenter, D., & Ko, M. S. (2021). Risk taking behaviors using public Wi-Fi TM. Information Systems Frontiers, 1–18. Choi, H. S., Carpenter, D., & Ko, M. S. (2021). Risk taking behaviors using public Wi-Fi TM. Information Systems Frontiers, 1–18.
Zurück zum Zitat Crossler, R., & Bélanger, F. (2014). An extended perspective on individual security behaviors: Protection motivation theory and a unified security practices (USP) instrument. The DATA BASE for Advances in Information Systems, 45(4), 51–71.CrossRef Crossler, R., & Bélanger, F. (2014). An extended perspective on individual security behaviors: Protection motivation theory and a unified security practices (USP) instrument. The DATA BASE for Advances in Information Systems, 45(4), 51–71.CrossRef
Zurück zum Zitat Crossler, R., Andoh-Baidoo, K., & Menard, P. (2019a). Espoused cultural values as antecedents of individuals’ threat and coping appraisal toward protective information technologies: Study of US and Ghana. Information & Management, 56(5), 754–766.CrossRef Crossler, R., Andoh-Baidoo, K., & Menard, P. (2019a). Espoused cultural values as antecedents of individuals’ threat and coping appraisal toward protective information technologies: Study of US and Ghana. Information & Management, 56(5), 754–766.CrossRef
Zurück zum Zitat Culnan, M. J., & Williams, C. C. (2009). How ethics can enhance organizational privacy: Lessons from the choicepoint and TJX data breaches. MIS Quarterly, 33(4), 673–687.CrossRef Culnan, M. J., & Williams, C. C. (2009). How ethics can enhance organizational privacy: Lessons from the choicepoint and TJX data breaches. MIS Quarterly, 33(4), 673–687.CrossRef
Zurück zum Zitat Featherman, M. S., & Pavlou, P. A. (2003). Predicting e-services adoption: A perceived risk facets perspective. International Journal of Human-Computer Studies, 59(4), 451–474.CrossRef Featherman, M. S., & Pavlou, P. A. (2003). Predicting e-services adoption: A perceived risk facets perspective. International Journal of Human-Computer Studies, 59(4), 451–474.CrossRef
Zurück zum Zitat Featherman, M. S., & Wells, J. D. (2010). The intangibility of e-Services: Effects on perceived risk and acceptance. ACM SIGMIS Database, 41(2), 110.CrossRef Featherman, M. S., & Wells, J. D. (2010). The intangibility of e-Services: Effects on perceived risk and acceptance. ACM SIGMIS Database, 41(2), 110.CrossRef
Zurück zum Zitat Floyd, D. L., Prentice-Dunn, S., & Rogers, R. W. (2000). A meta-analysis of research on protection motivation theory. Journal of Applied Social Psychology, 30(2), 407–429.CrossRef Floyd, D. L., Prentice-Dunn, S., & Rogers, R. W. (2000). A meta-analysis of research on protection motivation theory. Journal of Applied Social Psychology, 30(2), 407–429.CrossRef
Zurück zum Zitat Fornell, C., & Larcker, D. F. (1981). Structural equation models with unobservable variables and measurement error: Algebra and statistics. Journal of Marketing Research, 18, 382–388. CrossRef Fornell, C., & Larcker, D. F. (1981). Structural equation models with unobservable variables and measurement error: Algebra and statistics. Journal of Marketing Research, 18, 382–388. CrossRef
Zurück zum Zitat Gohm, C., & Clore, G. L. (2002). Affect as information: An individual differences approach. In F. Barrett & P. Salovey (Eds.), The wisdom in feelings: Psychological processes underlying emotional intelligence (pp. 1–39). Guilford Press. Gohm, C., & Clore, G. L. (2002). Affect as information: An individual differences approach. In F. Barrett & P. Salovey (Eds.), The wisdom in feelings: Psychological processes underlying emotional intelligence (pp. 1–39). Guilford Press.
Zurück zum Zitat Hair, J. F., Black, W. C., Babin, B. J., Anderson, R. E., & Tatham, R. L. (2006). Multivariate data analysis (Vol. 6). Pearson Prentice Hall Upper Saddle River. Hair, J. F., Black, W. C., Babin, B. J., Anderson, R. E., & Tatham, R. L. (2006). Multivariate data analysis (Vol. 6). Pearson Prentice Hall Upper Saddle River.
Zurück zum Zitat Hair, J. F., Ringle, C. M., & Sarstedt, M. (2011). PLS-SEM: Indeed a silver bullet. The Journal of Marketing Theory and Practice, 19(2), 139–152.CrossRef Hair, J. F., Ringle, C. M., & Sarstedt, M. (2011). PLS-SEM: Indeed a silver bullet. The Journal of Marketing Theory and Practice, 19(2), 139–152.CrossRef
Zurück zum Zitat Harman, D. (1967). A single factor test of common method variance. Journal of Psychology, 35(1967), 359–378. Harman, D. (1967). A single factor test of common method variance. Journal of Psychology, 35(1967), 359–378.
Zurück zum Zitat Jenkins, J. L., Anderson, B. B., Vance, A., Kirwan, C. B., & Eargle, D. (2016). More harm than good? How messages that interrupt can make us vulnerable. Information Systems Research, 27(4), 880–896.CrossRef Jenkins, J. L., Anderson, B. B., Vance, A., Kirwan, C. B., & Eargle, D. (2016). More harm than good? How messages that interrupt can make us vulnerable. Information Systems Research, 27(4), 880–896.CrossRef
Zurück zum Zitat Johnston, A. C., & Warkentin, M. (2010). Fear Appeals and information security behaviors: An empirical study. MIS Quarterly, 34(3), 549–563.CrossRef Johnston, A. C., & Warkentin, M. (2010). Fear Appeals and information security behaviors: An empirical study. MIS Quarterly, 34(3), 549–563.CrossRef
Zurück zum Zitat Johnston, A. C., Warkentin, M., & Siponen, M. (2015). An enhanced fear appeal rhetorical framework: Leveraging Threats to the human asset through sanctioning rhetoric. MIS Quarterly, 39(1), 113-A7.CrossRef Johnston, A. C., Warkentin, M., & Siponen, M. (2015). An enhanced fear appeal rhetorical framework: Leveraging Threats to the human asset through sanctioning rhetoric. MIS Quarterly, 39(1), 113-A7.CrossRef
Zurück zum Zitat Kock, N. (2015). Common method bias in PLS-SEM: A full collinearity assessment approach. International Journal of E-Collaboration, 11(4), 1–10.CrossRef Kock, N. (2015). Common method bias in PLS-SEM: A full collinearity assessment approach. International Journal of E-Collaboration, 11(4), 1–10.CrossRef
Zurück zum Zitat Liang, H., & Xue, Y. (2009). Avoidance of information technology threats: A theoretical perspective. MIS Quarterly, 33(1), 71–90.CrossRef Liang, H., & Xue, Y. (2009). Avoidance of information technology threats: A theoretical perspective. MIS Quarterly, 33(1), 71–90.CrossRef
Zurück zum Zitat Liang, H., & Xue, Y. (2010). Understanding security behaviors in personal computer usage: A threat avoidance perspective. Journal of the Association for Information Systems, 11(7), 394–413.CrossRef Liang, H., & Xue, Y. (2010). Understanding security behaviors in personal computer usage: A threat avoidance perspective. Journal of the Association for Information Systems, 11(7), 394–413.CrossRef
Zurück zum Zitat Libicki, M. C., Balkovich, E., Jackson, B. A., Rudavsky, R., & Webb, K. W. (2011). Influences on the Adoption of Multifactor Authentication. Rand Corporation. Santa Monica, CA: RAND Corporation. Libicki, M. C., Balkovich, E., Jackson, B. A., Rudavsky, R., & Webb, K. W. (2011). Influences on the Adoption of Multifactor Authentication. Rand Corporation. Santa Monica, CA: RAND Corporation.
Zurück zum Zitat Lowry, P. B., D’Arcy, J., Hammer, B., & Moody, G. D. (2016). “Cargo Cult” science in traditional organization and information systems survey research: A case for using nontraditional methods of data collection, including Mechanical Turk and online panels. Journal of Strategic Information Systems, 25, 232–240. https://doi.org/10.1016/j.jsis.2016.06.002CrossRef Lowry, P. B., D’Arcy, J., Hammer, B., & Moody, G. D. (2016). “Cargo Cult” science in traditional organization and information systems survey research: A case for using nontraditional methods of data collection, including Mechanical Turk and online panels. Journal of Strategic Information Systems, 25, 232–240. https://​doi.​org/​10.​1016/​j.​jsis.​2016.​06.​002CrossRef
Zurück zum Zitat Milne, G. (2003). How well do consumers protect themselves from identity theft? Journal of Consumer Affairs, 37(2), 388–402.CrossRef Milne, G. (2003). How well do consumers protect themselves from identity theft? Journal of Consumer Affairs, 37(2), 388–402.CrossRef
Zurück zum Zitat Moody, G. D., Siponen, M., & Pahnila, S. (2018). Toward a unified model of information security policy compliance. MIS Quarterly, 42(1), 285–311.CrossRef Moody, G. D., Siponen, M., & Pahnila, S. (2018). Toward a unified model of information security policy compliance. MIS Quarterly, 42(1), 285–311.CrossRef
Zurück zum Zitat Phillips, P., Abraham, C., & Bond, R. (2003). Personality, cognition , and university students ’ examination performance. 448(December 2002), 435–448. Phillips, P., Abraham, C., & Bond, R. (2003). Personality, cognition , and university students ’ examination performance. 448(December 2002), 435–448.
Zurück zum Zitat Posey, C., Roberts, T. L., & Lowry, P. B. (2015). The impact of organizational commitment on insiders’ motivation to protect organizational information assets. Journal of Management Information Systems, 32(4), 179–214.CrossRef Posey, C., Roberts, T. L., & Lowry, P. B. (2015). The impact of organizational commitment on insiders’ motivation to protect organizational information assets. Journal of Management Information Systems, 32(4), 179–214.CrossRef
Zurück zum Zitat Rogers, R. W. (1975). A protection motivation theory of fear appeals and attitude change. The Journal of Psychology, 91(1), 93–114.CrossRef Rogers, R. W. (1975). A protection motivation theory of fear appeals and attitude change. The Journal of Psychology, 91(1), 93–114.CrossRef
Zurück zum Zitat Rogers, R. W. (1983). Cognitive and physiological processes in fear appeals and attitude change: A revised theory of protection motivation. In J. T. Cacioppo & R. Petty (Eds.), Social psychophysiology: A sourcebook (pp. 153–177). Rogers, R. W. (1983). Cognitive and physiological processes in fear appeals and attitude change: A revised theory of protection motivation. In J. T. Cacioppo & R. Petty (Eds.), Social psychophysiology: A sourcebook (pp. 153–177).
Zurück zum Zitat Sandhu, R., & Samarati, P. (1996). Authentication, access control, and audit. ACM Computing Surveys (CSUR), 28(1), 241–243. Sandhu, R., & Samarati, P. (1996). Authentication, access control, and audit. ACM Computing Surveys (CSUR), 28(1), 241–243.
Zurück zum Zitat Sharp, T., Shreve-Neiger, A., Fremouw, W., Kane, J., & Hutton, S. (2004). Exploring the psychological and somatic impact of identity theft. Journal of Forensic Sciences, 49(1), 131–136.CrossRef Sharp, T., Shreve-Neiger, A., Fremouw, W., Kane, J., & Hutton, S. (2004). Exploring the psychological and somatic impact of identity theft. Journal of Forensic Sciences, 49(1), 131–136.CrossRef
Zurück zum Zitat Siponen, M., & Vance, A. (2010). Neutralization: New insights into the problem of employee information systems security neutralization. MIS Quarterly, 34(3), 487–502.CrossRef Siponen, M., & Vance, A. (2010). Neutralization: New insights into the problem of employee information systems security neutralization. MIS Quarterly, 34(3), 487–502.CrossRef
Zurück zum Zitat Steelman, Z. R., Hammer, B. I., & Limayem, M. (2014). Data collection in the digital age: Innovative alternatives to student samples. MIS Quarterly, 38(2), 355–378.CrossRef Steelman, Z. R., Hammer, B. I., & Limayem, M. (2014). Data collection in the digital age: Innovative alternatives to student samples. MIS Quarterly, 38(2), 355–378.CrossRef
Zurück zum Zitat Vance, A., Siponen, M., & Pahnila, S. (2012). Motivating IS security compliance: Insights from habit and protection motivation theory. Information & Management, 49(3–4), 190–198.CrossRef Vance, A., Siponen, M., & Pahnila, S. (2012). Motivating IS security compliance: Insights from habit and protection motivation theory. Information & Management, 49(3–4), 190–198.CrossRef
Zurück zum Zitat Venkatesh, V., & Davis, F. D. (2000). A theoretical extension of the technology acceptance model: Four longitudinal field studies. Management Science, 46(2), 186–204.CrossRef Venkatesh, V., & Davis, F. D. (2000). A theoretical extension of the technology acceptance model: Four longitudinal field studies. Management Science, 46(2), 186–204.CrossRef
Zurück zum Zitat Williams, F., & Haldeman, V. (1996). Financial concerns and productivity. Financial Counseling and Planning, 7(702), 147–156. Williams, F., & Haldeman, V. (1996). Financial concerns and productivity. Financial Counseling and Planning, 7(702), 147–156.
Zurück zum Zitat Wilson, D., & Sperber, D. (2002). Relevance theory. In G. Ward & L. Horn (Eds.), Handbook of pragmatics. Blackwell. Wilson, D., & Sperber, D. (2002). Relevance theory. In G. Ward & L. Horn (Eds.), Handbook of pragmatics. Blackwell.
Zurück zum Zitat Zeelenberg, M. (1999). Anticipated regret, expected feedback and behavioral decision making. Journal of Behavioral Decision Making, 12, 93–106.CrossRef Zeelenberg, M. (1999). Anticipated regret, expected feedback and behavioral decision making. Journal of Behavioral Decision Making, 12, 93–106.CrossRef
Zurück zum Zitat Zeelenberg, M., & Beattie, J. (1997). Consequences of regret Aversion2: Additional evidence for effects of feedback on decision making. Organizational Behavior and Human Decision Processes, 72(1), 63–78.CrossRef Zeelenberg, M., & Beattie, J. (1997). Consequences of regret Aversion2: Additional evidence for effects of feedback on decision making. Organizational Behavior and Human Decision Processes, 72(1), 63–78.CrossRef
Metadaten
Titel
Using Multi-Factor Authentication for Online Account Security: Examining the Influence of Anticipated Regret
verfasst von
Obi M. Ogbanufe
Corey Baham
Publikationsdatum
19.04.2022
Verlag
Springer US
Erschienen in
Information Systems Frontiers / Ausgabe 2/2023
Print ISSN: 1387-3326
Elektronische ISSN: 1572-9419
DOI
https://doi.org/10.1007/s10796-022-10278-1

Weitere Artikel der Ausgabe 2/2023

Information Systems Frontiers 2/2023 Zur Ausgabe