1,200
Views
39
CrossRef citations to date
0
Altmetric
Original Articles

Old risks, new challenges: exploring differences in security between home computer and mobile device use

&
Pages 1111-1124 | Received 21 Jan 2016, Accepted 03 Jul 2017, Published online: 18 Jul 2017

References

  • Ajzen, I. 1991. “The Theory of Planned Behavior.” Organizational Behavior and Human Decision Processes 50 (2): 179–211. doi: 10.1016/0749-5978(91)90020-T
  • Alsaleh, M., N. Alomar, and A. Alarifi. 2017. “Smartphone Users: Understanding How Security Mechanisms are Perceived and New Persuasive Methods.” PLOS ONE 12 (3): e0173284. doi:10.1371/journal.pone.0173284.
  • Anderson, C. L., and R. Agarwal. 2010. “Practicing Safe Computing: A Multimethod Empirical Examination of Home Computer User Security Behavioural Intentions.” MIS Quarterly 34 (3): 613–643.
  • Ben-Asher, N., N. Kirschnick, H. Sieger, J. Meyer, A. Ben-Oved, and S. Moller. 2011. “On the Need for Different Security Methods on Mobile Phones.” In Proceedings of the 13th International Conference on Human Computer Interaction with Mobile Devices and Services, 465–473. Stockholm, Sweden: ACM.
  • Boss, S. R., D. F. Galletta, P. B. Lowry, G. D. Moody, and P. Polak. 2015. “What do Systems Users Have to Fear? Using Fear Appeals to Engender Threats and Fear That Motivate Protective Security Behaviors.” MIS Quarterly 39 (4): 837–864. doi: 10.25300/MISQ/2015/39.4.5
  • Botha, R. A., S. M. Furnell, and N. L. Clarke. 2009. “From Desktop to Mobile: Examining the Security Experience.” Computers & Security 28 (3): 130–137. doi: 10.1016/j.cose.2008.11.001
  • Boyles, J. L., A. Smith, and M. Madden. 2012. Privacy and Data Management on Mobile Devices. Washington, DC: Pew Internet.
  • Bulgurcu, B., H. Cavusoglu, and I. Benbasat. 2010. “Information Security Awareness, Information Security Management, Compliance, Information Security Policy, Behavioral Issues of Information Security, Theory of Planned Behavior.” MIS Quarterly 34 (3): 523–548.
  • Chin, E., A. P. Felt, V. Sekar, and D. Wagner. 2012. “Measuring User Confidence in Smartphone Security and Privacy.” In Proceedings of the Eighth Symposium on Usable Privacy and Security, 1–16. Washington, DC: ACM.
  • Clarke, N., J. Symes, H. Saevanee, and S. Furnell. 2016. “Awareness of Mobile Device Security: A Survey of User’s Attitudes.” International Journal of Mobile Computing and Multimedia Communications 7 (1): 15–31. doi: 10.4018/IJMCMC.2016010102
  • Crossler, R. E. 2010. “Protection Motivation Theory: Understanding Determinants to Backing up Personal Data.” In Proceedings of the 43rd Hawaii International Conference on System Sciences (HICSS), 1–10. Kauai: IEEE.
  • Crossler, R. E., and F. Bélanger. 2014. “An Extended Perspective on Individual Security Behaviors: Protection Motivation Theory and a Unified Security Practices (USP) Instrument.” ACM SIGMIS Database 45 (4): 51–71. doi: 10.1145/2691517.2691521
  • Crossler, R. E., A. C. Johnston, P. B. Lowry, Q. Hu, M. Warkentin, and R. Baskerville. 2013. “ Future Directions for Behavioral Information Security Research.” Computers & Security 32: 90–101. doi: 10.1016/j.cose.2012.09.010
  • Dang-Pham, D., and S. Pittayachawan. 2015. “Comparing Intention to Avoid Malware Across Contexts in a BYOD-Enabled Australian University: A Protection Motivation Theory Approach.” Computers & Security 48: 281–297. doi: 10.1016/j.cose.2014.11.002
  • Das, A., and H. U. Khan. 2016. “Security Behaviors of Smartphone Users.” Information and Computer Security 24 (1): 116–134. doi: 10.1108/ICS-04-2015-0018
  • Dulaney, K., V. L. Baker, R. Marshall, R. Cozza, T. Zimmerman, and D. A. Willis. 2014. Predicts 2015: Mobile and Wireless. Stamford, CT: Gartner.
  • Egelman, S., S. Jain, R. S. Portnoff, K. Liao, S. Consolvo, and D. Wagner. 2014. “Are You Ready to Lock?” In Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 750–761. Scottsdale: ACM.
  • Faruki, P., A. Bharmal, V. Laxmi, M. S. Gaur, M. Conti, and M. Rajarajan. 2014. “Evaluation of Android Anti-Malware Techniques Against Dalvik Bytecode Obfuscation.” In Proceedings of the 2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications, 414–421. Beijing: IEEE.
  • Furnell, S. M., P. Bryant, and A. D. Phippen. 2007. “Assessing the Security Perceptions of Personal Internet Users.” Computers & Security 26: 410–417. doi: 10.1016/j.cose.2007.03.001
  • Gikas, J., and M. M. Grant. 2013. “Mobile Computing Devices in Higher Education: Student Perspectives on Learning with Cellphones, Smartphones & Social media.” The Internet and Higher Education 19: 18–26. doi: 10.1016/j.iheduc.2013.06.002
  • Harris, M. A., A. G. Chin, and R. Brookshire. 2015. “Mobile App Installation: The Role of Precautions and Desensitization.” Journal of International Technology and Information Management 24 (4): 47–62.
  • Harris, M., K. C. Cox, C. F. Musgrove, and K. W. Ernstberger. 2016. “Consumer Preferences for Banking Technologies by Age Groups.” International Journal of Bank Marketing 34 (4): 587–602. doi: 10.1108/IJBM-04-2015-0056
  • Herath, T., and H. R. Rao. 2009. “Protection Motivation and Deterrence: A Framework for Security Policy Compliance in Organisations.” European Journal of Information Systems 18 (2): 106–125. doi: 10.1057/ejis.2009.6
  • Howe, A. E., I. Ray, M. Roberts, M. Urbanska, and Z. Byrne. 2012. “The Psychology of Security for the Home Computer User.” In Proceedings of the 2012 IEEE Symposium on Security and Privacy, 209–223. San Francisco, CA: IEEE.
  • Huang, J. L., P. G. Curran, J. Keeney, E. M. Poposki, and R. P. DeShon. 2012. “Detecting and Deterring Insufficient Effort Responding to Surveys.” Journal of Business and Psychology 27 (1): 99–114. doi: 10.1007/s10869-011-9231-8
  • Ifinedo, P. 2012. “Understanding Information Systems Security Policy Compliance: An Integration of the Theory of Planned Behavior and the Protection Motivation Theory.” Computers & Security 31 (1): 83–95. doi: 10.1016/j.cose.2011.10.007
  • Imgraben, J., A. Engelbrecht, and K.-K. R. Choo. 2014. “Always Connected, but are Smart Mobile Users Getting More Security Savvy? A Survey of Smart Mobile Device Users.” Behaviour & Information Technology 33 (12): 1347–1360. doi: 10.1080/0144929X.2014.934286
  • Jeske, D., and P. van Schaik. 2017. “Familiarity with Internet Threats: Beyond Awareness.” Computers & Security 66, 129–141. doi: 10.1016/j.cose.2017.01.010
  • Jones, B. H., and A. G. Chin. 2015. “On the Efficacy of Smartphone Security: A Critical Analysis of Modifications in Business Students’ Practices Over Time.” International Journal of Information Management 35 (5): 561–571. doi: 10.1016/j.ijinfomgt.2015.06.003
  • Kaiser Family Foundation. 2016. Population Distribution by Age 2014. Accessed July 14, 2016. http://kff.org/other/state-indicator/distribution-by-age/.
  • Karatzouni, S., S. F. Furnell, N. L. Clarke, and R. A. Botha. 2007. “Perceptions of User Authentication on Mobile Devices.” In Proceedings of the 6th Annual ISOneWorld Conference, 1–13. Las Vegas, NV: Information Institute.
  • Keller, J. 2011. “The Slow-Motion Mobile Campus.” The Chronicle of Higher Education, May 8.
  • Kelley, P. G., S. Consolvo, L. F. Cranor, J. Jung, N. Sadeh, and D. Wetherall. 2012. “A Conundrum of Permissions: Installing Applications on an Android Smartphone.” In Financial Cryptography and Data Security, 68–79. Berlin: Springer.
  • Kowalski, S., and M. Goldstein. 2006. “Consumers” Awareness of, Attitudes Towards and Adoption of Mobile Phone Security.” In Proceedings of the 20th International Symposium on Human Factors in Telecommunication, 20–23. Sophia-Antipolis: HTF.
  • Leavitt, N. 2005. “Mobile Phones: The Next Frontier for Hackers?” IEEE Computer 38 (4): 20–23. doi: 10.1109/MC.2005.134
  • Liang, H., and Y. Xue. 2010. “Understanding Security Behaviors in Personal Computer Usage: A Threat Avoidance Perspective.” Journal of the Association for Information Systems 11 (7): 394–413.
  • Ludwig, A. 2014.“ Keynote.” Paper read at Google IO Developers Conference, at San Francisco, CA.
  • McCracken, G. 1986. “Culture and Consumption: A Theoretical Account of the Structure and Movement of the Cultural Meaning of Consumer Goods.” Journal of Consumer Research 13: 71–84. doi: 10.1086/209048
  • Milne, G. R., L. I. Labrecque, and C. Cromer. 2009. “Toward an Understanding of the Online Consumer’s Risky Behavior and Protection Practices.” Journal of Consumer Affairs 43 (3): 449–473. doi: 10.1111/j.1745-6606.2009.01148.x
  • Munch, B., and C. Canales. 2014. Mobile Device Proliferation is Forcing Network Leaders to Redesign Enterprise Wireless LANs. Stamford, CT: Gartner.
  • Mwagwabi, F., T. McGill, and M. Dixon. 2014. “Improving Compliance with Password Guidelines: How User Perceptions of Passwords and Security Threats Affect Compliance with Guidelines.” In Proceedings of the 47th Hawaii International Conference on System Sciences (HICSS), 3188–3197. Hawaii: IEEE.
  • Mylonas, A., D. Gritzalis, B. Tsoumas, and T. Apostolopoulos. 2013. “A Qualitative Metrics Vector for the Awareness of Smartphone Security Users.” In Proceedings of the International Conference on Trust, Privacy and Security in Digital Business, 173–184. Prague: Springer.
  • Mylonas, A., A. Kastania, and D. Gritzalis. 2013. “Delegate the Smartphone User? Security Awareness in Smartphone Platforms.” Computers & Security 34: 47–66. doi: 10.1016/j.cose.2012.11.004
  • Ng, B. Y., and M. A. Rahim. 2005. “A Socio-Behavioral Study of Home Computer Users’ Intention to Practice Security.” In Proceedings of the Ninth Pacific Asia Conference on Information Systems, 234–247. Bangkok: AIS.
  • Nunnally, J. C. 1978. Psychometric Theory. 2nd ed. New York: McGraw-Hill.
  • Öğütçü, G., ÖM Testik, and O. Chouseinoglou. 2016. “Analysis of Personal Information Security Behavior and Awareness.” Computers & Security 56: 83–93. doi: 10.1016/j.cose.2015.10.002
  • Pierce, J. L., T. Kostova, and K. T. Dirks. 2003. “The State of Psychological Ownership: Integrating and Extending a Century of Research.” Review of General Psychology 7 (1): 84–107. doi: 10.1037/1089-2680.7.1.84
  • Posey, C., T. Roberts, and P. B. Lowry. 2015. “The Impact of Organizational Commitment on Insiders’ Motivation to Protect Organizational Information Assets.” Journal of Management Information Systems 32 (4): 179–214. doi: 10.1080/07421222.2015.1138374
  • Rastogi, V., Y. Chen, and X. Jiang. 2014. “Catch Me If You Nan: Evaluating Android Anti-Malware Against Transformation Attacks.” IEEE Transactions on Information Forensics and Security 9 (1): 99–108. doi: 10.1109/TIFS.2013.2290431
  • Rivis, A., and P. Sheeran. 2003. “Descriptive Norms as an Additional Predictor in the Theory of Planned Behaviour: A Meta-Analysis.” Current Psychology 22 (3): 218–233. doi: 10.1007/s12144-003-1018-2
  • Rogers, R. W. 1975. “A Protection Motivation Theory of Fear Appeals and Attitude Change.” Journal of Psychology 91 (1): 93–114. doi: 10.1080/00223980.1975.9915803
  • Rogers, R. W. 1983. “Cognitive and Physiological Processes in Fear Appeals and Attitude Change: A Revised Theory of Protection Motivation.” In Social Psychophysiology, edited by J. T. Cacioppo and R. E. Petty, 153–176. New York: Guilford Press.
  • Sasse, M., S. Brostoff, and D. Weirich. 2001. “Transforming the ‘Weakest Link’ – A Human/Computer Interaction Approach to Usable and Effective Security.” BT Technology Journal 19 (3): 122–131. doi: 10.1023/A:1011902718709
  • Shaikh, A. A., and H. Karjaluoto. 2015. “Mobile Banking Adoption: A Literature Review.” Telematics and Informatics 32 (1): 129–142. doi: 10.1016/j.tele.2014.05.003
  • Siponen, M., A. Mahmood, and S. Pahnila. 2014. “Employees’ Adherence to Information Security Policies: An Exploratory Field Study.” Information & Management 51 (2): 217–224. doi: 10.1016/j.im.2013.08.006
  • Sobel, A. E., and G. McGraw. 2010. “Interview: Software Security in the Real World.” IEEE Computer 43 (9): 47–53. doi: 10.1109/MC.2010.256
  • Symantec. 2017. Internet Security Threat Report. Symantec Corporation. https://www.symantec.com/content/dam/symantec/docs/reports/istr-22-2017-en.pdf
  • Taylor, S., and P. A. Todd. 1995. “Understanding Information Technology Usage: A Test of Competing Models.” Information Systems Research 6 (2): 144–176. doi: 10.1287/isre.6.2.144
  • Tu, Z., O. Turel, Y. Yuan, and N. Archer. 2015. “Learning to Cope With Information Security Risks Regarding Mobile Device Loss or Theft: An Empirical Examination.” Information & Management 52 (4): 506–517. doi: 10.1016/j.im.2015.03.002
  • Vance, A., M. Siponen, and S. Pahnila. 2012. “Motivating Is Security Compliance: Insights from Habit and Protection Motivation Theory.” Information & Management 49 (3): 190–198. doi: 10.1016/j.im.2012.04.002
  • Vecchiato, D., and E. Martins. 2015. “Experience Report: A Field Analysis of User-Defined Security Configurations of Android Devices.” In Proceedings of the 2015 IEEE 26th International Symposium on Software Reliability Engineering (ISSRE), 314–323. Gaithersburg, MD: IEEE.
  • Walsh, S. P., K. M. White, S. Cox, and R. M. Young. 2011. “Keeping in Constant Touch: The Predictors of Young Australians’ Mobile Phone Involvement.” Computers in Human Behavior 27 (1): 333–342. doi: 10.1016/j.chb.2010.08.011
  • West, R. 2008. “The Psychology of Security.” Communications of the ACM 51 (4): 34–40. doi: 10.1145/1330311.1330320
  • White, G. L. 2015. “Education and Prevention Relationships on Security Incidents for Home Computers.” Journal of Computer Information Systems 55 (3): 29–37. doi: 10.1080/08874417.2015.11645769
  • Wood, P., B. Nahorney, K. Chandrasekar, S. Wallace, and K. Haley. 2015. Symantec Internet Security Threat Report. Symantec Corporation. https://www4.symantec.com/mktginfo/whitepaper/ISTR/21347932_GA-internet-security-threat-report-volume-20-2015-social_v2.pdf.
  • Woon, I., G. Tan, and R. Low. 2005. “A Protection Motivation Theory Approach to Home Wireless Security.” In Proceedings of the Twenty-Sixth International Conference on Information Systems, 367–380. Las Vegas: AIS.
  • Workman, M., W. H. Bommer, and D. Straub. 2008. “Security Lapses and the Omission of Information Security Measures: A Threat Control Model and Empirical Test.” Computers in Human Behavior 24 (6): 2799–2816. doi: 10.1016/j.chb.2008.04.005
  • Zhang, L., and W. C. McDowell. 2009. “Am I Really at Risk? Determinants of Online Users” Intentions to use Strong Passwords.” Journal of Internet Commerce 8 (3): 180–197. doi: 10.1080/15332860903467508

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.