Understanding the inward emotion-focused coping strategies of individual users in response to mobile malware threats
Xin, T., Siponen, M., & Chen, S. (2022). Understanding the inward emotion-focused coping strategies of individual users in response to mobile malware threats. Behaviour and Information Technology, 41(13), 2835-2859. https://doi.org/10.1080/0144929x.2021.1954242
Julkaistu sarjassa
Behaviour and Information TechnologyPäivämäärä
2022Tekijänoikeudet
© 2021 the Authors
According to coping theory, individuals cope with information system threats by adopting either problem-focused coping (PFC) or emotion-focused coping (EFC). However, little is known about EFC in the information security (ISec) literature. Moreover, there is potential confusion regarding the meaning of some EFC strategies. Hence, ISec scholars and practitioners may (i) have a narrow view of EFC or (ii) confuse it with other concepts. In this study, we offer one response to this issue. We first address the ambiguity regarding EFC before differentiating five inward EFC strategies and assessing them empirically in the mobile malware context. To the best of our knowledge, this study is the first to compare several inward EFC strategies in the ISec field.We contribute two new findings on EFC: 1) response efficacy is a crucial factor that impedes users from implementing EFC strategies; 2) avoidance and fatalism significantly impede PFC. Our study also contributes to the ISec literature by categorising EFC into active and passive forms. We showed that individuals’ use of passive inward EFC strategies was positively associated with threat vulnerability. Finally, we provide interesting insights into the complicated responses of individuals to mobile malware threats, presenting implications for ISec research and practice.
...
Julkaisija
Taylor & FrancisISSN Hae Julkaisufoorumista
0144-929XAsiasanat
Julkaisu tutkimustietojärjestelmässä
https://converis.jyu.fi/converis/portal/detail/Publication/99129417
Metadata
Näytä kaikki kuvailutiedotKokoelmat
Lisenssi
Samankaltainen aineisto
Näytetään aineistoja, joilla on samankaltainen nimeke tai asiasanat.
-
Protection Motivation Theory in Information Security Behavior Research : Reconsidering the Fundamentals
Siponen, Mikko; Rönkkö, Mikko; Fufan, Liu; Haag, Steffi; Laatikainen, Gabriella (Association for Information Systems, 2024)Scholars commonly use protection motivation theory (PMT) by Rogers to examine information systems (IS) security behaviors and behavioral intentions. A recent, influential paper by Boss, Galletta, Lowry, Moody, and Polak ... -
Young People and the Dark Side of Social Media : Possible Threats to National Security
Norri-Sederholm, Teija; Riikonen, Reetta; Moilanen, Panu; Huhtinen, Aki-Mauri (Academic Conferences International, 2020)Social media is increasingly becoming a forum for criminality, misuse, and hate speech, as there are no filters or other controlling mechanisms to filter user-generated content.Furthermore, disinformation and propaganda ... -
Protection Motivation Theory in Information Systems Security Research : A Review of the Past and a Road Map for the Future
Haag, Steffi; Siponen, Mikko; Liu, Fufan (ACM, 2021)Protection motivation theory (PMT) is one of the most commonly used theories to examine information security behaviors. Our systematic review of the application of PMT in information systems (IS) security and the comparison ... -
Motivations behind employee information security behavior
Räikkönen, Iiro (2017)Tämän tutkielman tavoitteena oli selvittää mikä motivoi työntekijöitä noudattamaan tai jättämään noudattamatta hyviä tietoturvakäytänteitä. Tavoitteena oli olemassaolevaan kirjallisuuteen pohjustaen, nostaa esiin teemoja ... -
TARA+AD: Threat Analysis and Risk Assessment for Automated Driving : cybersecurity of road vehicles
Loskin, Ilona (2023)Cybersecurity of road vehicles has become a genuine matter as vehicles are not manufactured anymore as plain mechanical devices but containing numerous amounts of computers and millions of lines of code. The intelligent ...
Ellei toisin mainittu, julkisesti saatavilla olevia JYX-metatietoja (poislukien tiivistelmät) saa vapaasti uudelleenkäyttää CC0-lisenssillä.