dc.contributor.author | Xin, Tong | |
dc.contributor.author | Siponen, Mikko | |
dc.contributor.author | Chen, Sihua | |
dc.date.accessioned | 2021-07-27T11:24:38Z | |
dc.date.available | 2021-07-27T11:24:38Z | |
dc.date.issued | 2022 | |
dc.identifier.citation | Xin, T., Siponen, M., & Chen, S. (2022). Understanding the inward emotion-focused coping strategies of individual users in response to mobile malware threats. <i>Behaviour and Information Technology</i>, <i>41</i>(13), 2835-2859. <a href="https://doi.org/10.1080/0144929x.2021.1954242" target="_blank">https://doi.org/10.1080/0144929x.2021.1954242</a> | |
dc.identifier.other | CONVID_99129417 | |
dc.identifier.uri | https://jyx.jyu.fi/handle/123456789/77225 | |
dc.description.abstract | According to coping theory, individuals cope with information system threats by adopting either problem-focused coping (PFC) or emotion-focused coping (EFC). However, little is known about EFC in the information security (ISec) literature. Moreover, there is potential confusion regarding the meaning of some EFC strategies. Hence, ISec scholars and practitioners may (i) have a narrow view of EFC or (ii) confuse it with other concepts. In this study, we offer one response to this issue. We first address the ambiguity regarding EFC before differentiating five inward EFC strategies and assessing them empirically in the mobile malware context. To the best of our knowledge, this study is the first to compare several inward EFC strategies in the ISec field.We contribute two new findings on EFC: 1) response efficacy is a crucial factor that impedes users from implementing EFC strategies; 2) avoidance and fatalism significantly impede PFC. Our study also contributes to the ISec literature by categorising EFC into active and passive forms. We showed that individuals’ use of passive inward EFC strategies was positively associated with threat vulnerability. Finally, we provide interesting insights into the complicated responses of individuals to mobile malware threats, presenting implications for ISec research and practice. | en |
dc.format.mimetype | application/pdf | |
dc.language.iso | eng | |
dc.publisher | Taylor & Francis | |
dc.relation.ispartofseries | Behaviour and Information Technology | |
dc.rights | CC BY-NC-ND 4.0 | |
dc.subject.other | tietoturvakäyttäytyminen | |
dc.subject.other | inward emotion-focused coping | |
dc.subject.other | coping theory | |
dc.subject.other | protection motivation theory | |
dc.subject.other | information security behaviour | |
dc.title | Understanding the inward emotion-focused coping strategies of individual users in response to mobile malware threats | |
dc.type | research article | |
dc.identifier.urn | URN:NBN:fi:jyu-202107274396 | |
dc.contributor.laitos | Informaatioteknologian tiedekunta | fi |
dc.contributor.laitos | Faculty of Information Technology | en |
dc.contributor.oppiaine | Tietojärjestelmätiede | fi |
dc.contributor.oppiaine | Information Systems Science | en |
dc.type.uri | http://purl.org/eprint/type/JournalArticle | |
dc.type.coar | http://purl.org/coar/resource_type/c_2df8fbb1 | |
dc.description.reviewstatus | peerReviewed | |
dc.format.pagerange | 2835-2859 | |
dc.relation.issn | 0144-929X | |
dc.relation.numberinseries | 13 | |
dc.relation.volume | 41 | |
dc.type.version | publishedVersion | |
dc.rights.copyright | © 2021 the Authors | |
dc.rights.accesslevel | openAccess | fi |
dc.type.publication | article | |
dc.subject.yso | torjunta | |
dc.subject.yso | selviytyminen | |
dc.subject.yso | tietojärjestelmät | |
dc.subject.yso | turvallisuus | |
dc.subject.yso | asenteet | |
dc.subject.yso | uhat | |
dc.subject.yso | haittaohjelmat | |
dc.subject.yso | vaikutukset | |
dc.subject.yso | tietoturva | |
dc.subject.yso | riskit | |
dc.subject.yso | tunteet | |
dc.format.content | fulltext | |
jyx.subject.uri | http://www.yso.fi/onto/yso/p792 | |
jyx.subject.uri | http://www.yso.fi/onto/yso/p11867 | |
jyx.subject.uri | http://www.yso.fi/onto/yso/p3927 | |
jyx.subject.uri | http://www.yso.fi/onto/yso/p7349 | |
jyx.subject.uri | http://www.yso.fi/onto/yso/p5619 | |
jyx.subject.uri | http://www.yso.fi/onto/yso/p21206 | |
jyx.subject.uri | http://www.yso.fi/onto/yso/p2837 | |
jyx.subject.uri | http://www.yso.fi/onto/yso/p795 | |
jyx.subject.uri | http://www.yso.fi/onto/yso/p5479 | |
jyx.subject.uri | http://www.yso.fi/onto/yso/p11099 | |
jyx.subject.uri | http://www.yso.fi/onto/yso/p3485 | |
dc.rights.url | https://creativecommons.org/licenses/by-nc-nd/4.0/ | |
dc.relation.doi | 10.1080/0144929x.2021.1954242 | |
dc.type.okm | A1 | |