Search results

1 – 10 of 660
Article
Publication date: 17 April 2024

Hassan Jamil, Tanveer Zia, Tahmid Nayeem, Monica T. Whitty and Steven D'Alessandro

The current advancements in technologies and the internet industry provide users with many innovative digital devices for entertainment, communication and trade. However…

Abstract

Purpose

The current advancements in technologies and the internet industry provide users with many innovative digital devices for entertainment, communication and trade. However, simultaneous development and the rising sophistication of cybercrimes bring new challenges. Micro businesses use technology like how people use it at home, but face higher cyber risks during riskier transactions, with human error playing a significant role. Moreover, information security researchers have often studied individuals’ adherence to compliance behaviour in response to cyber threats. The study aims to examine the protection motivation theory (PMT)-based model to understand individuals’ tendency to adopt secure behaviours.

Design/methodology/approach

The study focuses on Australian micro businesses since they are more susceptible to cyberattacks due to the least security measures in place. Out of 877 questionnaires distributed online to Australian micro business owners through survey panel provider “Dynata,” 502 (N = 502) complete responses were included. Structural equational modelling was used to analyse the relationships among the variables.

Findings

The results indicate that all constructs of the protection motivation, except threat susceptibility, successfully predict the user protective behaviours. Also, increased cybersecurity costs negatively impact users’ safe cyber practices.

Originality/value

The study has critical implications for understanding micro business owners’ cyber security behaviours. The study contributes to the current knowledge of cyber security in micro businesses through the lens of PMT.

Details

Information & Computer Security, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2056-4961

Keywords

Article
Publication date: 9 November 2023

Gregory Lyon

The rapid expansion of internet usage and device connectivity has underscored the importance of understanding the public’s cyber behavior and knowledge. Despite this, there is…

145

Abstract

Purpose

The rapid expansion of internet usage and device connectivity has underscored the importance of understanding the public’s cyber behavior and knowledge. Despite this, there is little research that examines the public’s objective knowledge of secure information security practices. The purpose of this study is to examine how objective cyber awareness is distributed throughout society.

Design/methodology/approach

This study draws on a large national survey of adults to examine the relationship between individual factors – such as demographic attributes and socioeconomic resources – and information security awareness. The study estimates several statistical models using weighted logistic regression to model objective information security awareness.

Findings

The results indicate that socioeconomic resources such as income and education have a significant effect on individuals’ information security awareness with richer and more highly educated individuals exhibiting greater awareness of important security practices and tools. Additionally, age and gender represent consistent and clear informational gaps in society as older individuals and females are significantly less knowledgeable about an array of information security practices than younger individuals and males, respectively.

Social implications

The findings have important implications for our understanding of information security behavior and user vulnerability in an increasingly digital and connected society. Despite the growing importance of cybersecurity for all individuals in nearly all domains of daily life, there is substantial inequality in awareness about secure cyber practices and the tools and techniques used to protect one’s self from attacks. While digital technology will continue to permeate many aspects of daily life – from financial transactions to health services to social interactions – the findings here indicate that some users may be far more exposed and vulnerable to attack than others.

Originality/value

This study contributes to our understanding of general user information security awareness using a large survey and statistical models to generalize about the public’s information security awareness across multiple domains and stimulates future research on public knowledge of information security. The findings indicate that some users may be far more exposed and vulnerable to attack than others. Despite the growing importance of cybersecurity for all individuals in nearly all domains of daily life, there is substantial inequality in awareness about secure cyber practices and the tools and techniques used to protect one’s self from attacks.

Details

Information & Computer Security, vol. 32 no. 2
Type: Research Article
ISSN: 2056-4961

Keywords

Article
Publication date: 3 April 2024

Tuğçe Karayel, Bahadır Aktaş and Adem Akbıyık

The purpose of this paper is to investigate the cyber hygiene practices of remote workers.

Abstract

Purpose

The purpose of this paper is to investigate the cyber hygiene practices of remote workers.

Design/methodology/approach

This paper used two instruments: first, the Cyber Hygiene Inventory scale, which measures users’ information and computer security behaviors; second, the Recsem Inventory, developed within this paper’s context, to evaluate the cybersecurity measures adopted by organizations for remote workers. It was conducted on remote workers to examine their information security practices. The instrument was administered to a sample of 442 employees reached via the LinkedIn platform. Analyses were performed with SPSS v26, Python programming language and Seaborn library.

Findings

The findings indicate a significant correlation between the security measures implemented by companies and their employees’ cyber hygiene practices. A sector comparison revealed a significant difference in cyber hygiene levels between public and private sector workers.

Research limitations/implications

This paper aims to provide policymakers with suggestions for enhancing the cyber hygiene of remote workers to facilitate compliance with corporate security protocols.

Originality/value

This paper’s conclusions highlight the importance of companies increasing their cybersecurity investments as remote work becomes more prevalent. This should consider not only corporate-level factors but also employees' information and computer security behaviors.

Details

Information & Computer Security, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2056-4961

Keywords

Article
Publication date: 16 April 2024

Shiu-Wan Hung, Min-Jhih Cheng and Yu-Jou Tung

The adoption of mobile payment remains low in certain regions, highlighting the need to identify the factors that enable and inhibit its adoption. This study aims to address this…

Abstract

Purpose

The adoption of mobile payment remains low in certain regions, highlighting the need to identify the factors that enable and inhibit its adoption. This study aims to address this gap by investigating the role of information security, loss aversion and the moderating influence of the herd effect on Inertia and behavioral intentions in the adoption of mobile payment systems.

Design/methodology/approach

A structural equation model was developed and tested with 332 valid questionnaires to examine the proposed hypotheses.

Findings

The empirical results reveal that information security plays a significant role as an enabler, while loss aversion acts as an inhibitor of mobile payment adoption. Furthermore, the study uncovers the moderating influence of the herd effect on the relationship between Inertia and behavioral intentions.

Research limitations/implications

This study was conducted in a specific region and may not be generalizable to other regions. Future studies could expand the sample size and scope to enhance the external validity of the findings.

Practical implications

This study offers practical implications for mobile payment service providers. Understanding the key enabling and inhibiting factors identified in this study can guide providers in designing and improving their services. Strengthening information security measures can help build trust among potential adopters, while offering incentives can mitigate the impact of loss aversion and encourage early adoption.

Social implications

The findings of this study have social implications as they contribute to promoting the adoption of mobile payment systems. Increased adoption can enhance financial inclusion and stimulate economic development.

Originality/value

This study provides novel insights into the enabling and inhibiting factors of mobile payment adoption and highlights the moderating role of the herd effect. By shedding light on the influence of social norms on individual behavior in the context of mobile payment adoption, this study contributes to the existing literature and advances our understanding of this phenomenon.

Details

International Journal of Bank Marketing, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0265-2323

Keywords

Article
Publication date: 17 March 2023

Tu Lyu, Yulin Guo and Hao Chen

Based on the cognition–affect–conation pattern, this study explores the factors that affect the intention to use facial recognition services (FRS). The study adopts the driving…

Abstract

Purpose

Based on the cognition–affect–conation pattern, this study explores the factors that affect the intention to use facial recognition services (FRS). The study adopts the driving factor perspective to examine how network externalities influence FRS use intention through the mediating role of satisfaction and the barrier factor perspective to analyze how perceived privacy risk affects FRS use intention through the mediating role of privacy cynicism.

Design/methodology/approach

The data collected from 478 Chinese FRS users are analyzed via partial least squares-based structural equation modeling (PLS-SEM).

Findings

The study produces the following results. (1) FRS use intention is motivated directly by the positive affective factor of satisfaction and the negative affective factor of privacy cynicism. (2) Satisfaction is affected by cognitive factors related to network externalities. Perceived complementarity and perceived compatibility, two indirect network externalities, positively affect satisfaction, whereas perceived critical mass, a direct network externality, does not significantly affect satisfaction. In addition, perceived privacy risk generates privacy cynicism. (3) Resistance to change positively moderates the relationship between privacy cynicism and intention to use FRS.

Originality/value

This study extends knowledge on people's use of FRS by exploring affect- and cognitive-based factors and finding that the affect-based factors (satisfaction and privacy cynicism) play fully mediating roles in the relationship between the cognitive-based factors and use intention. This study also expands the cognitive boundaries of FRS use by exploring the functional condition between affect-based factors and use intention, that is, the moderating role of resistance to use.

Details

Information Technology & People, vol. 37 no. 3
Type: Research Article
ISSN: 0959-3845

Keywords

Article
Publication date: 3 April 2024

Tim Wright, Zainab Ruhwanya and Jacques Ophoff

The COVID-19 pandemic necessitated a significant shift in how employees executed their professional responsibilities. Concurrently, the incidence of cybercrime experienced a…

Abstract

Purpose

The COVID-19 pandemic necessitated a significant shift in how employees executed their professional responsibilities. Concurrently, the incidence of cybercrime experienced a noteworthy surge due to the increased utilisation of cyberspace. The abrupt transition to telecommuting altered the interpersonal dynamics inherent in traditional work environments. This paper aims to examine the impact of interpersonal factors on the cybercrime preventative measures adopted by telecommuting employees.

Design/methodology/approach

A conceptual model, grounded in the Theory of Interpersonal Behaviour, is evaluated through an online survey. The data set comprises responses from 209 employees in South Africa, and the analysis uses partial least squares structural equation modelling.

Findings

The results reveal substantial predictive power to explain cybercrime preventative behaviours. Notably, the study underscores the significant influence of habit and affect on intention and subsequent behaviour.

Practical implications

The results suggest that practitioners should give due attention to emotional dimensions (affect) as a catalyst for information security behaviour. The formulation of employees’ information security responsibilities should be pragmatic, fostering subconscious compliance to establish routine behaviour (habit).

Originality/value

This research underscores the pivotal roles played by habit and emotions in shaping behavioural patterns related to information security. Furthermore, it provides researchers with an illustrative model for operationalising these constructs within the realm of security. The results contribute additional perspectives on the repercussions of the COVID-19 pandemic on cybercrime preventative behaviours.

Details

Information & Computer Security, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2056-4961

Keywords

Article
Publication date: 26 March 2024

Aastha Kathuria and Apurva Bakshi

Online impulsive purchasing is growing exponentially, and website-related factors play a substantial role in this phenomenon. This study provides a comprehensive and integrative…

Abstract

Purpose

Online impulsive purchasing is growing exponentially, and website-related factors play a substantial role in this phenomenon. This study provides a comprehensive and integrative framework encompassing a variety of website-related factors influencing impulsive purchase behaviour.

Design/methodology/approach

The study is a systematic literature review, which includes literature search from two prominent databases. This article consolidates the results of 60 relevant research papers, and thematic analysis is performed on various website-related aspects classified into five research topics.

Findings

The different website qualities have been classified into broad themes and their role in online impulse buying has been explored. The antecedents, moderators, mediators, and outcomes are portrayed in an integrated research framework. Possible research gaps have been identified, and a future research agenda has been proposed, representing potential research areas.

Research limitations/implications

As we have included only studies published in the English language, this review may be limited by language bias. Relevant research published in other languages might have been excluded.

Practical implications

This literature review may provide management insights to marketers and practitioners managing online retail websites. To sustain an online business in the long term, it is critical for online retailers to have a thorough understanding of all conceivable website stimuli and develop them in a way that compels consumers to make impulsive purchases.

Originality/value

This study represents an original contribution to the realm of systematic literature reviews. To the best of our knowledge, this is the first SLR that elaborately delineates the influence of website-related factors on online impulse buying behaviour.

Details

Marketing Intelligence & Planning, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0263-4503

Keywords

Article
Publication date: 14 March 2024

Hasibul Islam, Lalmi Soumia, Masud Rana, Jhansi Bharathi Madavarapu and Shimanto Saha

This study analyzed the relationship between mobile financial services (MFS) usage and customer satisfaction with MFS in Bangladesh, considering perception, purpose of use and…

Abstract

Purpose

This study analyzed the relationship between mobile financial services (MFS) usage and customer satisfaction with MFS in Bangladesh, considering perception, purpose of use and technical challenges as the primary factors influencing customer satisfaction with MFS. The aim is to determine the factors most influencing the use of MFS.

Design/methodology/approach

Data were collected from 400 MFS users through a structured web survey using snowball sampling that is consistent with the nature of MFS users who are difficult to identify or locate. Structural equation modeling (SEM) was used to analyze the data and evaluate the reliability and validity of the measurement model.

Findings

The results show that customers’ perceptions and satisfaction significantly impact their intention to use MFS. Specifically, customers’ perceptions strongly influence their satisfaction with MFS, and the purpose of use significantly predicts both perception and satisfaction. Technical problems and challenges were found to have no significant impact on satisfaction levels, but other factors were more critical. Furthermore, the integration of innovative technological solutions is crucial for fostering sustainability in MFS, as it enhances reliability and efficiency while minimizing environmental footprints.

Research limitations/implications

The study was conducted in a single country, relied on self-reported data, and used a cross-sectional design, which limits the ability to draw causal inferences. Future research could explore the factors that influence customer satisfaction with MFS in different countries and regions and incorporate additional variables to provide a more comprehensive understanding of the drivers of customer satisfaction with MFS.

Originality/value

This study significantly contributes by extending the technology acceptance model (TAM) framework with the innovation resistance theory, offering a nuanced understanding of MFS adoption. The findings challenge conventional wisdom, highlighting the limited impact of technical problems on satisfaction and emphasizing the central role of user perceptions in shaping satisfaction and intention to use.

Details

Technological Sustainability, vol. 3 no. 2
Type: Research Article
ISSN: 2754-1312

Keywords

Article
Publication date: 24 May 2023

Siqi Hu, Carol Hsu and Zhongyun Zhou

Security education, training and awareness (SETA) programs are the key to addressing “people problems” in information systems (IS) security. Contrary to studies using conventional…

Abstract

Purpose

Security education, training and awareness (SETA) programs are the key to addressing “people problems” in information systems (IS) security. Contrary to studies using conventional methods, the present study leveraged an “event” lens and dimensionalized employees' perceptions into three sub-dimensions: perceived novelty, perceived disruption and perceived criticality. Moreover, this research went a step further by examining how pedagogical and communication approaches to a SETA program affect employees' perceptions of the program. This study then investigated whether – and if so, how – these approaches impact employees' perceptions of the SETA program and their subsequent commitment to it.

Design/methodology/approach

Utilizing a factorial-based scenario survey, this study empirically tested a model of the above relationships via covariance-based structural equation modeling.

Findings

The results of this research showed that pedagogical approaches were more effective than communication approaches and that employees' perceptions of the SETA program accounted for a large variance in their commitment to SETA.

Originality/value

First, this research deepens understanding of the protection of information assets by elaborating on the different approaches that organizations can take to encourage employees' commitment to SETA. Second, the study enriches the SETA literature by theorizing a SETA program as an organizational “event”, which represents a major shift from the conventional approach. Third, the study adds to the theoretical knowledge of the event lens by extending it to the SETA context and investigating the relationship among three event strength components.

Article
Publication date: 28 February 2023

Angeliki Nikolinakou and Joe Phua

Social media has the potential to enable exchange of diverse opinions, foster dialogue on important social issues and exert positive influence on stakeholders and society…

Abstract

Purpose

Social media has the potential to enable exchange of diverse opinions, foster dialogue on important social issues and exert positive influence on stakeholders and society. However, evidence is contradictory as to whether this is the case; it is possible that millennials' behaviors on social media are mainly driven by conservation (conformity and safety) or self-enhancement (power and achievement). In this research, the authors examine the extent to which different human values (self-transcendence, conservation, self-enhancement and openness to change) influence millennials' activities and behaviors on social media.

Design/methodology/approach

The authors conduct three separate surveys on Facebook, Twitter and Instagram with 491 millennials (18–34 years of age) in the USA, examining the influence of four higher-order values of the Schwartz human values model (open self-transcendence, conservation, self-enhancement and openness to change) on specific social media activities (consumption, self-focused and sharing nonpersonal content activities).

Findings

First, the authors find that for millennial users, human values significantly influence social media activities. Second, conservation values, followed by self-enhancement values, overshadow the expression of open self-transcendence values on social media. Thus, social media platforms may function more as agents of conservation and self-enhancement than agents of personal growth.

Originality/value

This is among the first studies to examine the influence of human values on social media and to find that human values such as conservation and self-enhancement have a strong influence on users' social media activities, while open self-transcendence values, which lead to expansion and growth, do not find genuine expression on social media.

1 – 10 of 660