Understanding the inward emotion-focused coping strategies of individual users in response to mobile malware threats

Abstract
According to coping theory, individuals cope with information system threats by adopting either problem-focused coping (PFC) or emotion-focused coping (EFC). However, little is known about EFC in the information security (ISec) literature. Moreover, there is potential confusion regarding the meaning of some EFC strategies. Hence, ISec scholars and practitioners may (i) have a narrow view of EFC or (ii) confuse it with other concepts. In this study, we offer one response to this issue. We first address the ambiguity regarding EFC before differentiating five inward EFC strategies and assessing them empirically in the mobile malware context. To the best of our knowledge, this study is the first to compare several inward EFC strategies in the ISec field.We contribute two new findings on EFC: 1) response efficacy is a crucial factor that impedes users from implementing EFC strategies; 2) avoidance and fatalism significantly impede PFC. Our study also contributes to the ISec literature by categorising EFC into active and passive forms. We showed that individuals’ use of passive inward EFC strategies was positively associated with threat vulnerability. Finally, we provide interesting insights into the complicated responses of individuals to mobile malware threats, presenting implications for ISec research and practice.
Main Authors
Format
Articles Research article
Published
2022
Series
Subjects
Publication in research information system
Publisher
Taylor & Francis
The permanent address of the publication
https://urn.fi/URN:NBN:fi:jyu-202107274396Use this for linking
Review status
Peer reviewed
ISSN
0144-929X
DOI
https://doi.org/10.1080/0144929x.2021.1954242
Language
English
Published in
Behaviour and Information Technology
Citation
  • Xin, T., Siponen, M., & Chen, S. (2022). Understanding the inward emotion-focused coping strategies of individual users in response to mobile malware threats. Behaviour and Information Technology, 41(13), 2835-2859. https://doi.org/10.1080/0144929x.2021.1954242
License
CC BY-NC-ND 4.0Open Access
Copyright© 2021 the Authors

Share