709
Views
0
CrossRef citations to date
0
Altmetric
Research Article

Approaching IT Security & Avoiding Threats in the Smart Home Context

ORCID Icon & ORCID Icon

References

  • Abraham, C.S.; Sheeran, P.; Abrams, D.; and Spears, R. Exploring teenagers’ adaptive and maladaptive thinking in relation to the threat of HIV infection. Psychology & Health, 9, 4 (1994), 253–272.
  • Aurigemma, S.; Mattson, T.; and Leonard, L.N. Evaluating the core and full protection motivation theory nomologies for the voluntary adoption of password manager applications. AIS Transactions on Replication Research, 5, 1 (2019), 1–21.
  • Avgerou, C. Contextual explanation: Alternative approaches and persistent challenges. MIS Quarterly, 43, 3 (2019), 977–1006.
  • Bastos, D.; Shackleton, M.; and El-Moussa, F. Internet of things: A survey of technologies and security risks in smart home and city environments. In Living in the Internet of Things: Cybersecurity of the IoT. London: IET, 2018, pp. 1–7.
  • Beaudry, A.; and Pinsonneault, A. The other side of acceptance: Studying the direct and indirect effects of emotions on information technology use. MIS Quarterly, 34, 4 (2010), 689–710.
  • Belk, R.W. Possessions and the extended self. Journal of Consumer Research, 15, 2 (1988), 139–168.
  • Boss, S.R.; Galletta, D.F.; Lowry, P.B.; Moody, G.D.; and Polak, P. What do systems users have to fear? Using fear appeals to engender threats and fear that motivate protective security behaviors. MIS Quarterly, 39, 4 (2015), 837–864.
  • Boysen, S.; Hewitt, B.; Gibbs, D.; and McLeod, A. Refining the threat calculus of technology threat avoidance theory. Communications of the Association for Information Systems, 45, 1 (2019), 5.
  • Burns, A.J.; Posey, C.; Roberts, T.L.; and Benjamin Lowry, P. Examining the relationship of organizational insiders’ psychological capital with information security threat and coping appraisals. Computers in Human Behavior, 68, (2017), 190–209.
  • Burns, A.J.; Roberts, T.L.; Posey, C.; and Lowry, P.B. The adaptive roles of positive and negative emotions in organizational insiders’ security-based precaution taking. Information Systems Research, 30, 4 (2019), 1228–1247.
  • Byrne, B.M. Testing the factorial validity of scores from a measuring instrument. In, Structural Equation Modeling with Mplus: Basic Concepts, Applications, and Programming. New York: Routledge, Taylor and Francis Group, 2012, pp. 97–127.
  • Carpenter, D.; Young, D.K.; Barrett, P.; and McLeod, A.J. Refining technology threat avoidance theory. Communications of the Association for Information Systems, 44, (2019), 380–407.
  • Carter, M.; and Grover, V. Me, my self, and I (T): Conceptualizing information technology identity and its implications. MIS Quarterly, 39, 4 (2015), 931–958.
  • Cericola, R. The Best Smart Home Devices to Help Seniors Age in Place. New York Times Wirecutter, 2021. https://www.nytimes.com/wirecutter/reviews/smart-home-for-seniors/.
  • Chen, Y.; and Zahedi, F.M. Individuals’ internet security perceptions and behaviors: Polycontextual contrasts between the United States and China. MIS Quarterly, 40, 1 (2016), 205–222.
  • Cheung, G.W.; and Rensvold, R.B. Evaluating goodness-of-fit indexes for testing measurement invariance. Structural Equation Modeling, 9, 2 (2002), 233–255.
  • Chou, C.-P.; and Huh, J. Model modification in structural equation modeling. In, R.H. Hoyle (ed.), Handbook of Structural Equation Modeling. New York: The Guilford Press, 2012, pp. 232–246.
  • CISA. CISA Cybersecurity Awareness Program. Cybersecurity & Infrastructure Security Agency. https://www.cisa.gov/cisa-cybersecurity-awareness-program.
  • Cohen, J. Statistical Power Analysis for the Behavioral Sciences. Hillsdale: Lawrence Erlbaum, 1988.
  • DeCarlo, L.T. On the meaning and use of kurtosis. Psychological Methods, 2, 3 (1997), 292.
  • Descartes, R. The Passions of the Soul. 1649.
  • Dittmar, H. Material and consumer identities. In S.J. Schwartz, K. Luyckx, and V.L. Vignoles (eds.), Handbook of Identity Theory and Research. New York: Springer, 2011, pp. 745–769.
  • Elliot, A.J. The hierarchical model of approach-avoidance motivation. Motivation and Emotion, 30, 2 (2006), 111–116.
  • Endler, N.S.; and Parker, J.D. Multidimensional assessment of coping: A critical evaluation. Journal of Personality and Social Psychology, 58, 5 (1990), 844–854.
  • Folkman, S. Personal control and stress and coping processes: A theoretical analysis. Journal of Personality and Social Psychology, 46, 4 (1984), 839–852.
  • Frijda, N.H. The Emotions. Cambridge: Cambridge University Press, 1986.
  • Furby, L. Possession in humans: An exploratory study of its meaning and motivation. Social Behavior and Personality: An International Journal, 6, 1 (1978), 49–65.
  • Furby, L. Collective possession and ownership: A study of its judged feasibility and desirability. Social Behavior & Personality: An International Journal, 8, 2 (1980), 165–183.
  • Gefen, D.; Rigdon, R.E.; and Straub, D. Editor’s comments: An update and extension to SEM guidelines for administrative and social science research. MIS Quarterly, 35, 2 (2011), iii–xiv.
  • Hallman, R.; Bryan, J.; Palavicini, G.; Divita, J.; and Romero-Mariona, J. IoDDoS-the internet of distributed denial of sevice attacks. In, Proceedings of the 2nd International Conference on Internet of Things, Big Data and Security. Setubal: Scitepress, 2017, pp. 47–58.
  • Hong, W.; Chan, F.K.Y.; Thong, J.Y.L.; Chasalow, L.C.; and Dhillon, G. A framework and guidelines for context-specific theorizing in information systems research. Information Systems Research, 25, 1 (2014), 111–136.
  • Hoyle, R.H. Model specification in structural equation modeling. In R.H. Hoyle (ed.), Handbook of Structural Equation Modeling. New York: The Guilford Press, 2012, pp. 126–144.
  • Johnston, A.C.; and Warkentin, M. Fear appeals and information security behaviors: An empirical study. MIS Quarterly, 34, 3 (2010), 549.
  • Johnston, A.C.; Warkentin, M.; and Siponen, M. An enhanced fear appeal rhetorical framework: leveraging threats to the human asset through sanctioning rhetoric. MIS Quarterly, 39, 1 (2015), 113–134.
  • Kaspersky Lab. How to not break the Internet. Kaspersky Lab Daily, 2016. https://www.kaspersky.com/blog/attack-on-dyn-explained/13325/.
  • Lazarus, R.S. Emotion and Adaptation. New York: Oxford University Press, 1991.
  • Lazarus, R.S. Progress on a cognitive-motivational-relational theory of emotion. American Psychologist, (1991), 819-834.
  • Lazarus, R.S. Hope: an emotion and a vital coping resource against despair. Social Research, 66, 2 (1999), 653–678.
  • Lazarus, R.S.; and Folkman, S. Stress, Appraisal, and Coping. New York: Springer Publishing Company, 1984.
  • Lazarus, R.S.; and Folkman, S. Transactional theory and research on emotions and coping. European Journal of Personality, 1, 3 (1987), 141–169.
  • Lee, D.; Larose, R.; and Rifon, N. Keeping our network safe: A model of online protection behaviour. Behaviour & Information Technology, 27, 5 (2008), 445–454.
  • Leventhal, H. Findings and Theory in the Study of Fear Communications. In L. Berkowitz (ed.), Advances in Experimental Social Psychology. New York: Academic Press, 1970, pp. 119–186.
  • Li, H.; Yoo, S.; and Kettinger, W.J. The roles of IT strategies and security investments in reducing organizational security breaches. Journal of Management Information Systems, 38, 1 (January 2021), 222–245.
  • Liang, H.; and Xue, Y. Understanding security behaviors in personal computer usage: A threat avoidance perspective. Journal of the Association for Information Systems, 11, 07 (2010), 394–413.
  • Liang, H.; and Xue, Y. Avoidance of information technology threats: A theoretical perspective. MIS Quarterly, 33, 1 (2009), 71–90.
  • Little, T.D. Longitudinal Structural Equation Modeling. New York: Guilford Press, 2013.
  • MacInnis, D.J.; and de Mello, G.E. The concept of hope and its relevance to product evaluation and choice. Journal of Marketing, 69, 1 (2005), 1–14.
  • Malhotra, N.K.; Kim, S.S.; and Patil, A. Common method variance in IS research: A comparison of alternative approaches and a reanalysis of past research. Management Science, 52, 12 (2006), 1865–1883.
  • Meade, A.W.; Johnson, E.C.; and Braddy, P.W. Power and sensitivity of alternative fit indices in tests of measurement invariance. Journal of Applied Psychology, 93, 3 (2008), 568.
  • Menard, P.; Bott, G.J.; and Crossler, R.E. User motivations in protecting information security: Protection motivation theory versus self-determination theory. Journal of Management Information Systems, 34, 4 (2017), 1203–1230.
  • Menard, P.; Warkentin, M.; and Lowry, P.B. The impact of collectivism and psychological ownership on protection motivation: a cross-cultural examination. Computers & Security, 75, (June 2018), 147–166.
  • Mueller, B.; and Urbach, N. Understanding the why, what, and how of theories in IS research. Communications of the Association for Information Systems, 41, 1 (2017), 17.
  • Muthén, L.K.; and Muthén, B.O. Mplus User’s Guide. Los Angeles: Muthén & Muthén, 2017.
  • Nabi, R.L. The case for emphasizing discrete emotions in communication research. Communication Monographs, 77, 2 (2010), 153–159.
  • Ng, K.C.; Zhang, X.; Thong, J.Y.; and Tam, K.Y. Protecting against threats to information security: An attitudinal ambivalence perspective. Journal of Management Information Systems, 38, 3 (2021), 732–764.
  • Pierce, J.L.; Kostova, T.; and Dirks, K.T. The state of psychological ownership: Integrating and extending a century of research. Review of General Psychology, 7, 1 (2003), 84–107.
  • Posey, C.; Roberts, T.L.; and Lowry, P.B. The impact of organizational commitment on insiders’ motivation to protect organizational information assets. Journal of Management Information Systems, 32, 4 (2015), 179–214.
  • Preacher, K.J.; and Hayes, A.F. Asymptotic and resampling strategies for assessing and comparing indirect effects in multiple mediator models. Behavior Research Methods, 40, 3 (2008), 879–891.
  • Rogers, R.W. A protection motivation theory of fear appeals and attitude change. Journal of Psychology, 91, 1 (1975), 93–114.
  • Rogers, R.W. Cognitive and psychological processes in fear appeals and attitude change: A revised theory of protection motivation. In J.T Cacioppo and R.E Petty (eds.), Social Psychophysiology: A Sourcebook. New York: Guilford Press, 1983, pp. 153–176.
  • Roth, S.; and Cohen, L.J. Approach, avoidance, and coping with stress. American Psychologist, 41, 7 (1986), 813–819.
  • Schau, H.J. Discourse of possessions: The metatheory of Russell W. Belk. In J.W. Alba and J.W. Hutchinson (eds.), Advances in Consumer Research. Provo, UT: Association for Consumer Research, 1998, pp. 37–44.
  • Schuetz, S.W.; Lowry, P.B.; Pienta, D.A.; and Thatcher, J.B. The effectiveness of abstract versus concrete fear appeals in information security. Journal of Management Information Systems, 37, 3 (2020), 723–757.
  • Sharpe Wessling, K.; Huber, J.; and Netzer, O. Mturk character misrepresentation: Assessment and solutions. Journal of Consumer Research, 44, 1 (2017), 211–230.
  • Sivadas, E.; and Machleit, K.A. A scale to determine the extent of object incorporation in the extended self. Marketing Theory and Applications, 5, 1 (1994), 143–149.
  • Smith, C.A.; and Lazarus, R.S. Emotion and adaptation. In L.A. Pervin (ed.), Handbook of Personality: Theory and research. New York: The Guilford Press, 1990, pp. 609–637.
  • Snyder, C.R. Hope theory: rainbows in the mind. Psychological Inquiry, 13, 4 (2002), 249–275.
  • Spinoza, B. Part III. On the Origin and Nature of Emotions. In Ethics. 1677.
  • Statista. Smart home product ownership by age U.S. 2020. Statista, 2021. https://www.statista.com/statistics/799584/united-states-smart-home-device-survey-by-age/.
  • Statista. Smart home devices unit shipments in the United States from 2016 to 2020. Statista, 2022. https://www.statista.com/statistics/798370/us-smart-home-units/.
  • Venkatesh, V.; Thong, J.Y.; and Xu, X. Consumer acceptance and use of information technology: Extending the unified theory of acceptance and use of technology. MIS Quarterly, (2012), 157-178.
  • Vignoles, V.L.; Schwartz, S.J.; and Luyckx, K. Introduction: Toward an integrative view of identity. In S.J. Schwartz, K. Luyckx, and V.L. Vignoles (eds.), Handbook of Identity Theory and Research. New York: Springer, 2011, pp. 1–27.
  • Zhao, X.; Lynch, J.G.; and Chen, Q. Reconsidering Baron and Kenny: Myths and truths about mediation analysis. Journal of Consumer Research, 37, 2 (2010), 197–206.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.