Understanding the inward emotion-focused coping strategies of individual users in response to mobile malware threats
Xin, T., Siponen, M., & Chen, S. (2022). Understanding the inward emotion-focused coping strategies of individual users in response to mobile malware threats. Behaviour and Information Technology, 41(13), 2835-2859. https://doi.org/10.1080/0144929x.2021.1954242
Published inBehaviour and Information Technology
© 2021 the Authors
According to coping theory, individuals cope with information system threats by adopting either problem-focused coping (PFC) or emotion-focused coping (EFC). However, little is known about EFC in the information security (ISec) literature. Moreover, there is potential confusion regarding the meaning of some EFC strategies. Hence, ISec scholars and practitioners may (i) have a narrow view of EFC or (ii) confuse it with other concepts. In this study, we offer one response to this issue. We first address the ambiguity regarding EFC before differentiating five inward EFC strategies and assessing them empirically in the mobile malware context. To the best of our knowledge, this study is the first to compare several inward EFC strategies in the ISec field.We contribute two new findings on EFC: 1) response efficacy is a crucial factor that impedes users from implementing EFC strategies; 2) avoidance and fatalism significantly impede PFC. Our study also contributes to the ISec literature by categorising EFC into active and passive forms. We showed that individuals’ use of passive inward EFC strategies was positively associated with threat vulnerability. Finally, we provide interesting insights into the complicated responses of individuals to mobile malware threats, presenting implications for ISec research and practice. ...
PublisherTaylor & Francis
ISSN Search the Publication Forum0144-929X
Publication in research information system
MetadataShow full item record
Showing items with similar title or keywords.
Young People and the Dark Side of Social Media : Possible Threats to National Security Norri-Sederholm, Teija; Riikonen, Reetta; Moilanen, Panu; Huhtinen, Aki-Mauri (Academic Conferences International, 2020)Social media is increasingly becoming a forum for criminality, misuse, and hate speech, as there are no filters or other controlling mechanisms to filter user-generated content.Furthermore, disinformation and propaganda ...
Protection Motivation Theory in Information Systems Security Research : A Review of the Past and a Road Map for the Future Haag, Steffi; Siponen, Mikko; Liu, Fufan (ACM, 2021)Protection motivation theory (PMT) is one of the most commonly used theories to examine information security behaviors. Our systematic review of the application of PMT in information systems (IS) security and the comparison ...
Motivations behind employee information security behavior Räikkönen, Iiro (2017)Tämän tutkielman tavoitteena oli selvittää mikä motivoi työntekijöitä noudattamaan tai jättämään noudattamatta hyviä tietoturvakäytänteitä. Tavoitteena oli olemassaolevaan kirjallisuuteen pohjustaen, nostaa esiin teemoja ...
An Empirical Examination of the Economics of Mobile Application Security Sanyal, Pallab; Menon, Nirup; Siponen, Mikko (Society for Management Information Systems, 2021)The growth of mobile devices coupled with the advances in mobile technologies has resulted in the development and widespread use of a variety of mobile applications (apps). Mobile apps have been developed for social ...
A Review of GDPR Impacts on Information Security Hirvonen, Pauliina (Association for Information Systems, 2022)The aim of this literature review is to understand GDPR impacts on information security in organisations. The research question is: What outcomes previous research reveal about the GDPR impacts on information security ...