1
|
Cao J, Zhong L, Liu D, Zhang G, Shang M. Offense and defense between streamers and customers in live commerce marketing: Protection motivation and information overload. PLoS One 2024; 19:e0305585. [PMID: 39240886 PMCID: PMC11379157 DOI: 10.1371/journal.pone.0305585] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [MESH Headings] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Received: 10/18/2023] [Accepted: 06/01/2024] [Indexed: 09/08/2024] Open
Abstract
While live commerce provides consumers with a new shopping experience, it also leads them to experience shopping failures and to develop a self-protection mechanism to prevent wrong purchases. To address this issue, merchants have attempted to explore new marketing methods for live commerce, giving rise to an offense and defense game between streamers and consumers. In this study, we sought to confirm the effectiveness of consumer protection mechanisms and the impact of streamers' information overload marketing strategy in live commerce. Accordingly, we constructed a hypothetical model based on protection motive theory and information overload theory. In addition, we analyzed the data from the simulated live streaming marketing on seven hundred people through partial least squares structural equation modeling. The results indicate that product utilitarian value uncertainty, consumers' experiential efficacy, and response costs, which are the main factors in the formation of consumer protection mechanisms, influence consumers' intention to stop their purchases. Streamers can circumvent consumer self-protection mechanisms through information overload marketing by reducing utilitarian value uncertainty and consumers' experiential efficacy and increasing consumers' response costs. However, consumers would be able to rebuild their self-protection mechanism through consumer resilience, which moderates the effects of information overload. This study's results provide important theoretical perspectives and new ideas for formulating marketing strategies for live commerce.
Collapse
Affiliation(s)
- Junwei Cao
- School of Business, Yangzhou University, Yangzhou, China
| | - Lingling Zhong
- School of Business, Yangzhou University, Yangzhou, China
| | - Dong Liu
- School of Business, Yangzhou University, Yangzhou, China
| | - Guihua Zhang
- School of Business, Xinyang Normal University, Xinyang, China
| | - Meng Shang
- School of Flight, Anyang Institute of Technology, Anyang, China
| |
Collapse
|
2
|
Xu X, Su Y, Zhang Y, Wu Y, Xu X. Understanding learners' perceptions of ChatGPT: A thematic analysis of peer interviews among undergraduates and postgraduates in China. Heliyon 2024; 10:e26239. [PMID: 38420484 PMCID: PMC10900412 DOI: 10.1016/j.heliyon.2024.e26239] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 07/28/2023] [Revised: 02/02/2024] [Accepted: 02/08/2024] [Indexed: 03/02/2024] Open
Abstract
ChatGPT, an artificial intelligence (AI)-driven language model engineered by OpenAI, has experienced a substantial upsurge in adoption within higher education due to its versatile applications and sophisticated capabilities. Although prevailing research on ChatGPT has predominantly concentrated on its technological aspects and pedagogical ramifications, a comprehensive understanding of students' perceptions and experiences regarding ChatGPT remains elusive. To address this gap, this study employed a peer interview methodology, conducting a thematic analysis of 106 first-year undergraduates and 81 first-year postgraduate students' perceptions from diverse disciplines at a comprehensive university in East China. The data analysis revealed that among the four factors examined-grade, age, gender, and major-grade emerged as the most influential determinant, followed by age and major. Postgraduate students demonstrated heightened awareness of the potential limitations of ChatGPT in addressing academic challenges and exhibited greater concern for security issues associated with its application. This research offers essential insights into students' perceptions and experiences with ChatGPT, emphasizing the importance of recognizing potential limitations and ethical concerns associated with ChatGPT usage. Additionally, the findings highlight ethical concerns, as students noted the importance of responsible data handling and academic integrity in ChatGPT usage, underscoring the need for ethical guidance in AI utilization. Moreover, further research is essential to optimize AI use in education, aiming to improve learning outcomes effectively.
Collapse
Affiliation(s)
- Xiaoshu Xu
- School of Foreign Studies, Wenzhou University, Wenzhou City, Zhejiang Province, China
- Stamford International University Thailand
- Macao Polytechnique University
| | - Yujie Su
- School of Foreign Studies, Wenzhou University, Wenzhou City, Zhejiang Province, China
| | - Yunfeng Zhang
- The Faculty of Languages and Translation, R. de Luís Gonzaga Gomes, Macao Polytechnic University
| | - Yunyang Wu
- School of Foreign Studies, Wenzhou University, Wenzhou City, Zhejiang Province, China
| | - Xinyu Xu
- School of Foreign Studies, Wenzhou University, Wenzhou City, Zhejiang Province, China
| |
Collapse
|
3
|
Lei W, Hu S, Hsu C. Unveiling The Process Of Phishing Precautions Taking: The Moderating Role Of Optimism Bias. Comput Secur 2023. [DOI: 10.1016/j.cose.2023.103249] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 04/05/2023]
|
4
|
Trim PRJ, Lee YI, Vu A. Insights into How Vietnamese Retailers Utilize Social Media to Facilitate Knowledge Creation through the Process of Value Co-Creation. FUTURE INTERNET 2023. [DOI: 10.3390/fi15040123] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 03/28/2023] Open
Abstract
Social media usage is a direct result of Internet connectivity and is gaining increased prominence in business-to-consumer (B2C), business-to-business (B2B), and consumer-to-business (C2B) relationship building, which is allowing marketers to devise and implement digital marketing strategies that are perceived as enhancing a customer’s well-being. Through the process of utilizing social media (SM) to share information with consumers, marketers are affording themselves with the concept of value co-creation and ensuring that the development of knowledge is given priority. To explain how this happens in an emerging economy, in-depth personal interviews were undertaken with the owners of five retail fashion companies in Vietnam. The findings indicate that fashion retail companies in Vietnam are deploying digital marketing strategies that deliver perceived enhanced value to consumers through the process of value co-creation. This highlights the advantage of using SM in relation to increasing retail staff’s ability to convert information into usable resources such as intelligence and knowledge. By achieving knowledge conversion, retail staff fulfill the role of ‘knowledge broker’ and ‘knowledge connector’, and identify how organizational intervention, such as new operating structures, can help to deliver perceived enhanced value to customers.
Collapse
|
5
|
Alraja MN, Butt UJ, Abbod M. Information security policies compliance in a global setting: An employee's perspective. Comput Secur 2023. [DOI: 10.1016/j.cose.2023.103208] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 03/31/2023]
|
6
|
Pang H, Liu Y. Untangling the effect of cognitive trust and perceived value on health-related information seeking, sharing and psychological well-being:Motivations sought perspective. TELEMATICS AND INFORMATICS 2023. [DOI: 10.1016/j.tele.2023.101964] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 03/08/2023]
|
7
|
There's No place like home: Understanding users' intentions toward securing internet-of-things (IoT) smart home networks. COMPUTERS IN HUMAN BEHAVIOR 2023. [DOI: 10.1016/j.chb.2022.107551] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/11/2022]
|
8
|
Evaluating protection motivation based cybersecurity awareness training on Kirkpatrick's Model. Comput Secur 2023. [DOI: 10.1016/j.cose.2022.103049] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 12/12/2022]
|
9
|
Protecting Your Business against Ransomware Attacks? Explaining the Motivations of Entrepreneurs to Take Future Protective Measures against Cybercrimes Using an Extended Protection Motivation Theory Model. Comput Secur 2023. [DOI: 10.1016/j.cose.2023.103099] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 01/15/2023]
|
10
|
Alam SS, Masukujjaman M, Al-Shaikh ME, Ali MH, Makhbul ZKM, Othman AS. Desire to stay shorter time at the shopping mall: insight from protection motivation (PMT), behavioral inhibition system (BIS), reactance, and expectancy theories. CURRENT PSYCHOLOGY 2022; 42:1-20. [PMID: 36570056 PMCID: PMC9759057 DOI: 10.1007/s12144-022-04117-4] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Accepted: 12/01/2022] [Indexed: 12/23/2022]
Abstract
After withdrawing the movement control order (MCO), new variant (Omicron) of COVID-19 returns as an outbreak again. Therefore, consumers are very much informed by various media to be more cautious in visiting shopping malls and spend less time in there. The purpose of this study was to identify the predictors influencing the desire to stay shorter at the shopping mall. This study was conducted in Malaysia, with the application of three psychological theories and one behavioural theory. This is quantitative research based on an online cross-sectional survey design. Data were collected from 296 respondents, by applying the online snowball sampling method through numerous media platforms i.e., Viber, WhatsApp, Messenger, and other apps in three severely affected cities in Malaysia i.e., Selangor state, Putrajaya, and Kuala Lumpur. SmartPLS was used to analyse the data. Using structural equation modelling, this study result shows risk, protection motivation, and fear have a significant effect on the desire to stay a shorter time at the shopping mall. Social norm moderates the association between fear and the desire to spend a shorter time at the shopping mall. These findings, highlight the need for a more empirical study to design more robust strategies, and a safer and risk-free shopping mall environment.
Collapse
Affiliation(s)
- Syed Shah Alam
- Graduate School of Business, Universiti Kebangsaan Malaysia, UKM, 43600 Bangi, Selangor Malaysia
| | - Mohammad Masukujjaman
- Graduate School of Business, Universiti Kebangsaan Malaysia, UKM, 43600 Bangi, Selangor Malaysia
| | - Mohammed Emad Al-Shaikh
- College of Business Administration, Imam Abdulrahman Bin Faisal University, Dammam, Saudi Arabia
| | - Mohd Helmi Ali
- Graduate School of Business, Universiti Kebangsaan Malaysia, UKM, 43600 Bangi, Selangor Malaysia
| | | | - Abdullah Sanusi Othman
- Faculty of Economics and Management, Universiti Kebangsaan Malaysia, UKM, 43600 Bangi, Selangor Malaysia
| |
Collapse
|
11
|
Indonesian Scientists’ Behavior Relative to Research Data Governance in Preventing WMD-Applicable Technology Transfer. PUBLICATIONS 2022. [DOI: 10.3390/publications10040050] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 12/13/2022] Open
Abstract
Performing research data governance is critical for preventing the transfer of technologies related to weapons of mass destruction (WMD). While research data governance is common in developed countries, it is still often considered less necessary by research organizations in developing countries such as Indonesia. An investigation of research data governance behavior for Indonesian scientists was conducted in this study. The theories of planned behavior (TPB) and protection motivation (PMT) were used to explain the relationships between different factors influencing scientists’ behavior. The theories have been widely used in the information security domain, and the approach was adopted to build the research model of this study. The obtained data were analyzed using partial least-squares structural equation modeling (PLS-SEM) to answer the main research question: “what factors determine the likelihood of practicing research data governance by Indonesian scientists to prevent WMD-applicable technology transfer?” By learning what motivates scientists to adopt research data governance practices, organizations can design relevant strategies that are directed explicitly at stimulating positive responses. The results of this study can also be applied in other developing countries that have similar situations, such as Indonesia.
Collapse
|
12
|
Dey S, Singh PK. Estimating farmers' intention towards institutional credit adoption by using extended theory of planned behavior. JOURNAL OF APPLIED SOCIAL PSYCHOLOGY 2022. [DOI: 10.1111/jasp.12952] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 12/05/2022]
Affiliation(s)
- Shiladitya Dey
- Center for Rural Development and Innovative Sustainable Technology Indian Institute of Technology Kharagpur Kharagpur West Bengal India
| | - Piyush Kumar Singh
- Center for Rural Development and Innovative Sustainable Technology Indian Institute of Technology Kharagpur Kharagpur West Bengal India
| |
Collapse
|
13
|
Li W, Liu R, Sun L, Guo Z, Gao J. An Investigation of Employees' Intention to Comply with Information Security System-A Mixed Approach Based on Regression Analysis and fsQCA. INTERNATIONAL JOURNAL OF ENVIRONMENTAL RESEARCH AND PUBLIC HEALTH 2022; 19:16038. [PMID: 36498115 PMCID: PMC9737675 DOI: 10.3390/ijerph192316038] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [MESH Headings] [Track Full Text] [Figures] [Subscribe] [Scholar Register] [Received: 10/17/2022] [Revised: 11/22/2022] [Accepted: 11/28/2022] [Indexed: 06/17/2023]
Abstract
Employee security compliance behavior has become an important safeguard to protect the security of corporate information assets. Focusing on human factors, this paper discusses how to regulate and guide employees' compliance with information security systems through effective methods. Based on protection motivation theory (PMT), a model of employees' intention to comply with the information security system was constructed. A questionnaire survey was adopted to obtain 224 valid data points, and SPSS 26.0 was applied to verify the hypotheses underlying the research model. Then, based on the results of a regression analysis, fuzzy set qualitative comparative analysis (fsQCA) was used to explore the conditional configurations that affect employees' intention to comply with the information security system from a holistic perspective. The empirical results demonstrated that perceived severity, perceived vulnerability, response efficacy, and self-efficacy all positively influenced the employees' intention to comply with the information security system; while rewards and response costs had a negative effect. Threat appraisal had a greater effect on employees' intention to comply with the information security system compared to response appraisal. The fsQCA results showed that individual antecedent conditions are not necessary to influence employees' intention to comply with an information security system. Seven pathways exist that influence an employees' intention to comply with an information security system, with reward, self-efficacy, and response cost being the core conditions having the highest probability of occurring in each configuration of pathways, and with perceived severity and self-efficacy appearing in the core conditions of configurations with an original coverage greater than 40%. Theoretically, this study discusses the influence of the elements of PMT on employees' intention to comply with an information security system, reveals the mechanism of influence of the combination of the influencing factors on the outcome variables, and identifies the core factors and auxiliary factors in the condition configurations, providing a new broader perspective for the study of information security compliance behavior and providing some theoretical support for strengthening enterprise security management. Practically, targeted suggestions are proposed based on the research results, to increase the intention of enterprise employees to comply with information security systems, thereby improving the effectiveness of enterprise information security management and the degree of information security in enterprises.
Collapse
Affiliation(s)
- Wenqin Li
- School of Management, Xi’an University of Science and Technology, Xi’an 710054, China
| | - Rongmin Liu
- School of Management, Xi’an University of Science and Technology, Xi’an 710054, China
- Research Center for Human Factors and Management Ergonomics, Xi’an University of Science and Technology, Xi’an 710054, China
| | - Linhui Sun
- School of Management, Xi’an University of Science and Technology, Xi’an 710054, China
- Research Center for Human Factors and Management Ergonomics, Xi’an University of Science and Technology, Xi’an 710054, China
| | - Zigu Guo
- School of Management, Xi’an University of Science and Technology, Xi’an 710054, China
- Research Center for Human Factors and Management Ergonomics, Xi’an University of Science and Technology, Xi’an 710054, China
| | - Jie Gao
- School of Management, Xi’an Jiaotong University, Xi’an 710049, China
| |
Collapse
|
14
|
Alanazi M, Freeman M, Tootell H. Exploring the factors that influence the cybersecurity behaviors of young adults. COMPUTERS IN HUMAN BEHAVIOR 2022. [DOI: 10.1016/j.chb.2022.107376] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/26/2022]
|
15
|
Bai S, Yu D, Yang M, Tang R, He H, Zhao J, Huang P. Is negative e-WOM more powerful? Multimodal data analysis on air passengers’ perception of COVID-19 safety measures. Front Psychol 2022; 13:983987. [PMID: 36329743 PMCID: PMC9624191 DOI: 10.3389/fpsyg.2022.983987] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Grants] [Track Full Text] [Download PDF] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 07/04/2022] [Accepted: 09/12/2022] [Indexed: 11/22/2022] Open
Abstract
During the normalization stage of the COVID-19 epidemic prevention and control, the safety threats caused by improper epidemic prevention measures of airlines have become the primary concern for air passengers. Negative e-WOM related to safety perception obtained based on online multimodal reviews of travel websites has become an important decision-making basis for potential air passengers when making airline choices. This study aims to examine the relationship between potential air passengers’ negative safety perception and the usefulness of online reviews, as well as to test the moderating effect of review modality and airline type. It also further explores the effectiveness and feasibility of applying big data sentiment analysis to e-WOM management. To this end, the theoretical model of negative safety perception, review modality, and airline type affecting review usefulness was constructed. Then we select 10 low-cost airlines and 10 full-service airlines, respectively, according to the number of reviews sorted by the TripAdvisor website, and use crawling techniques to obtain 10,485 reviews related to COVID-19 safety of the above companies from December 2019 to date, and conduct safety perception sentiment analysis based on Python’s Textblob library. Finally, to avoid data overdispersion, the model is empirically analyzed by negative binomial regression using R software. The results indicate that (1) Negative safety perception significantly and negatively affects review usefulness, that is, extreme negative safety perception can provide higher review usefulness for potential air passengers. (2) Review modality and airline type have a significant moderating effect on the relationship between negative safety perception and review usefulness, in which multimodal reviews and full-service airlines both weakened the negative impact of negative safety perception on review usefulness. The theoretical model in this paper is both an extension of the application of big data sentiment analysis techniques and a beneficial supplement to current research findings of e-WOM, providing an important reference for potential air passengers to identify useful reviews accurately and thus reduce safety risks in online decision-making.
Collapse
Affiliation(s)
- Shizhen Bai
- School of Management, Harbin University of Commerce, Harbin, China
| | - Dingyao Yu
- School of Management, Harbin University of Commerce, Harbin, China
| | - Mu Yang
- Department of Management, Birkbeck, University of London, London, United Kingdom
- *Correspondence: Mu Yang,
| | - Rui Tang
- School of Economics Teaching and Research, Party School of the Central Committee of C.P.C (Chinese Academy of Governance), Beijing, China
| | - Hao He
- School of Management, Harbin University of Commerce, Harbin, China
| | - Jiayuan Zhao
- School of Computer and Information Engineering, Harbin University of Commerce, Harbin, China
| | - Peihua Huang
- School of Management, Harbin University of Commerce, Harbin, China
| |
Collapse
|
16
|
Goel L, Zhang JZ, Williamson S. Work-to-Home Cybersecurity Spillover: Construct Development and Validation. INFORMATION SYSTEMS MANAGEMENT 2022. [DOI: 10.1080/10580530.2022.2128116] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 11/05/2022]
Affiliation(s)
- Lakshmi Goel
- Department of Management, Coggin College of Business, University of North Florida, Jacksonville, Florida 32224, USA
| | - Justin Zuopeng Zhang
- Department of Management, Coggin College of Business, University of North Florida, Jacksonville, Florida 32224, USA
| | - Steven Williamson
- Department of Management, Coggin College of Business, University of North Florida, Jacksonville, Florida 32224, USA
| |
Collapse
|
17
|
Cybersecurity Behavior among Government Employees: The Role of Protection Motivation Theory and Responsibility in Mitigating Cyberattacks. INFORMATION 2022. [DOI: 10.3390/info13090413] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/16/2022] Open
Abstract
This study examines the factors influencing government employees’ cybersecurity behavior in Malaysia. The country is considered the most vulnerable in Southeast Asia. Applying the protection motivation theory, this study addresses the gap by investigating how government employees behave toward corresponding cyberrisks and threats. Using partial least-squares structural equation modeling (PLS-SEM), 446 respondents participated and were analyzed. The findings suggest that highly motivated employees with high severity, vulnerability, response efficacy, and self-efficacy exercise cybersecurity. Incorporating the users’ perceptions of vulnerability and severity facilitates behavioral change and increases the understanding of cybersecurity behavior’s role in addressing cybersecurity threats—particularly the impact of the threat response in predicting the cybersecurity behavior of government employees. The implications include providing robust information security protection to the government information systems.
Collapse
|
18
|
Acar D, Kıcali ÜÖ. An Integrated Approach to COVID-19 Preventive Behaviour Intentions: Protection Motivation Theory, Information Acquisition, and Trust. SOCIAL WORK IN PUBLIC HEALTH 2022; 37:419-434. [PMID: 34962187 DOI: 10.1080/19371918.2021.2018082] [Citation(s) in RCA: 10] [Impact Index Per Article: 3.3] [Reference Citation Analysis] [Abstract] [Key Words] [MESH Headings] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 06/14/2023]
Abstract
COVID-19 has been a global threat since November 2019 due to its high transmission rates and the issue of unwillingness to vaccinate. Effective risk management requires accurate health communication and public compliance with reccomended preventive behaviors. Therefore, we investigated predictors of COVID-19 preventive behavior intention based on Protection Motivation Theory (PMT) in addition to frequency of public's use of and trust in a group of COVID-19 related information sources. This cross-sectional study was conducted on 458 adults in Turkey with online survey. Results showed that all PMT components (except perceived susceptibility) accounted for 49% of the variance in protection motivation and there was relationship between information sources and protection motivation. Overall, our study findings suggested that being more informed and having confidence in the feasibility (self-efficacy) and effectiveness (response efficacy) of preventive behaviors may particularly help slow the disease spread.
Collapse
Affiliation(s)
- Didem Acar
- Psychology Department, Bursa Uludağ University, Bursa, Turkey
| | | |
Collapse
|
19
|
Blockchain adoption: A study of cognitive factors underpinning decision making. COMPUTERS IN HUMAN BEHAVIOR 2022. [DOI: 10.1016/j.chb.2022.107207] [Citation(s) in RCA: 4] [Impact Index Per Article: 1.3] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/17/2022]
|
20
|
Shore A, Prena K, Cummings JJ. To share or not to share: Extending Protection Motivation Theory to understand data sharing with the police. COMPUTERS IN HUMAN BEHAVIOR 2022. [DOI: 10.1016/j.chb.2022.107188] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/16/2022]
|
21
|
Makeswaran P, Shah SA, Safian N, Muhamad NA, Harith AA. Determinants of delayed tuberculosis treatment among patients in Selangor: A study protocol. PLoS One 2022; 17:e0266746. [PMID: 35468167 PMCID: PMC9037902 DOI: 10.1371/journal.pone.0266746] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [MESH Headings] [Track Full Text] [Download PDF] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 07/08/2021] [Accepted: 03/27/2022] [Indexed: 11/19/2022] Open
Abstract
The high prevalence rate and ever-increasing incidence of tuberculosis (TB) worldwide remain a significant issue in healthcare. In Malaysia, the incidence and mortality rate of TB is increasing due to the delayed presentation of TB patients to healthcare facilities. However, there is a lack of local studies on the contributing factors of delayed presentation of TB patients in Malaysia. This study aims to establish a social epidemiology framework by analysing social factors including socio-epidemiological, socio-cultural, and health-seeking behaviours associated with the delay in seeking TB treatment among patients in Selangor, Malaysia. A sequential exploratory mixed-method study design that combines qualitative and quantitative research methods will be employed. This study will recruit adult patients who have been diagnosed with TB using chest X-ray and sputum smear microscopy. Four districts with the highest recorded cases in the state of Selangor will be selected as study locations. The qualitative study will involve a Focus Group Discussion (FGD) to explore six components, namely demographic, socio-cultural, health-seeking behaviours, social support and resources, previous knowledge and experience with illness, and treatment pathway. Meanwhile, the quantitative study will incorporate a structured survey that will be developed based on the themes identified in the qualitative phase and a review of several studies in the literature. Several quality control measures will be taken while ensuring that the survey questionnaires are anonymised and participants' confidentiality is maintained. The data obtained from both qualitative and quantitative approaches will be combined to provide a more robust assessment of the study. Given that this study will focus on districts with high recorded cases of TB in Selangor, the findings might assist to address TB-related issues such as the increasing incidence and mortality rates, which are mainly attributed to the delayed presentation of TB patients to healthcare facilities.
Collapse
Affiliation(s)
- Punitha Makeswaran
- Department of Community Medicine, UKM Medical Centre, Cheras, Kuala Lumpur, Malaysia
| | - Shamsul Azhar Shah
- Department of Community Medicine, UKM Medical Centre, Cheras, Kuala Lumpur, Malaysia
| | - Nazarudin Safian
- Department of Community Medicine, UKM Medical Centre, Cheras, Kuala Lumpur, Malaysia
| | - Nor Asiah Muhamad
- Evidence Based Healthcare Medicine Sector, National Institutes of Health, Ministry of Health, Shah Alam, Selangor, Malaysia
| | - Abdul Aziz Harith
- Occupational Health Research Centre, Institute for Public Health, Ministry of Health Malaysia, Shah Alam, Selangor, Malaysia
| |
Collapse
|
22
|
Amankwa E, Loock M, Kritzinger E. The determinants of an information security policy compliance culture in organisations: the combined effects of organisational and behavioural factors. INFORMATION AND COMPUTER SECURITY 2022. [DOI: 10.1108/ics-10-2021-0169] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/17/2022]
Abstract
Purpose
This paper aims to examine the individual and combined effects of organisational and behavioural factors on employees’ attitudes and intentions to establish an information security policy compliance culture (ISPCC) in organisations.
Design/methodology/approach
Based on factors derived from the organisational culture theory, social bond theory and accountability theory, a testable research model was developed and evaluated in an online survey that involves the use of a questionnaire to collect quantitative data from 313 employees, from ten different organisations in Ghana. The data collected were analysed using the partial least squares-structural equation modelling approach, involving the measurement and structural model tests.
Findings
The study reveals that the individual measures of accountability – identifiability (2.4%), expectations of evaluation (38.8%), awareness of monitoring (55.7%) and social presence (−41.2%) – had weak to moderate effects on employees’ attitudes towards information security policy compliance. However, the combined effect showed a significant influence. In addition, organisational factors – supportive organisational culture (15%), security compliance leadership (2%) and user involvement (63%) – showed positive effects on employees’ attitudes. Further, employees’ attitudes had a substantial influence (65%), while behavioural intentions demonstrated a weak effect (24%) on the establishment of an ISPCC in the organisation. The combined effect also had a substantial statistical influence on the establishment of an ISPCC in the organisation.
Practical implications
Given the findings of the study, information security practitioners should implement organisational and behavioural factors that will have an impact on compliance, in tandem, with the organisational effort to build a culture of compliance for information security policies.
Originality/value
The study provides new insights on how to address the problem of non-compliance with regard to the information security policy in organisations through the combined application of organisational and behavioural factors to establish an information security policy compliance culture, which has not been considered in any past research.
Collapse
|
23
|
Sun Y, Chia SC, Lu F, Oktavianus J. The Battle is On: Factors that Motivate People to Combat Anti-Vaccine Misinformation. HEALTH COMMUNICATION 2022; 37:327-336. [PMID: 33095088 DOI: 10.1080/10410236.2020.1838108] [Citation(s) in RCA: 2] [Impact Index Per Article: 0.7] [Reference Citation Analysis] [Abstract] [MESH Headings] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 06/11/2023]
Abstract
This study proposes a theory-driven model to concurrently examine the cognitive and emotional factors that motivate vaccine supporters to combat erroneous online anti-vaccination information. The model was tested using data from a web survey of 599 vaccination supporters in the United States. The vaccine supporters reported greater support for government regulation of misinformation when they perceived greater susceptibility among the general public to the influence of misinformation. Surprisingly, the perceived severity of the influence was inversely related to respondents' intention to correct misinformation. In addition, perceived susceptibility to the influence of anti-vaccine misinformation and perceived severity of its influence on others induced negative emotions that included anticipated guilt and anger. The negative emotions in turn motivate vaccine supporters to attitudinally support government's media restriction or behaviorally correct the online misinformation.
Collapse
Affiliation(s)
- Yanqing Sun
- Department of Media and Communication, City University of Hong Kong
| | - Stella C Chia
- Department of Media and Communication, City University of Hong Kong
| | - Fangcao Lu
- Department of Media and Communication, City University of Hong Kong
| | | |
Collapse
|
24
|
Chen Y, Luo X(R, Li H. Beyond adaptive security coping behaviors: Theory and empirical evidence. INFORMATION & MANAGEMENT 2022. [DOI: 10.1016/j.im.2021.103575] [Citation(s) in RCA: 3] [Impact Index Per Article: 1.0] [Reference Citation Analysis] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 11/24/2022]
|
25
|
Response Efficacy and Self-Efficacy Mediated the Relationship between Perceived Threat and Psychic Anxiety among College Students in the Early Stage of the COVID-19 Pandemic. INTERNATIONAL JOURNAL OF ENVIRONMENTAL RESEARCH AND PUBLIC HEALTH 2022; 19:ijerph19052832. [PMID: 35270528 PMCID: PMC8910033 DOI: 10.3390/ijerph19052832] [Citation(s) in RCA: 8] [Impact Index Per Article: 2.7] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 01/24/2022] [Revised: 02/25/2022] [Accepted: 02/25/2022] [Indexed: 01/08/2023]
Abstract
Applying Fear Appeals Theory and Social Learning Theory, this study aims to explore the impact of perceived threat on psychic anxiety among college students in the early stage of the COVID-19 pandemic and the mediating roles of response efficacy and self-efficacy. An empirical study was conducted using an online cross-sectional survey in the early stage of the COVID-19 pandemic in February 2020. A random sampling method was applied to administer questionnaires to 646 Chinese college students. The results showed that: (1) the perceived threat of the COVID-19 pandemic, including perceived susceptibility and severity, was positively correlated with psychic anxiety; (2) self-efficacy mediated the effect of both perceived susceptibility and severity on psychic anxiety, while the response efficacy only mediated the effect of perceived susceptibility on psychic anxiety; and (3) response efficacy and self-efficacy played a serial mediating role on the relationship between perceived susceptibility and psychic anxiety. This study elucidates the relationship between perceived threat and psychic anxiety from the perspective of cognitive appraisal of threat, showing the role positive efficacy appraisal played in reducing psychic anxiety, which could be induced by the perceived threat of major public health emergencies such as COVID-19 pandemic.
Collapse
|
26
|
Zhang H, Zhuang M, Cao Y, Pan J, Zhang X, Zhang J, Zhang H. Social Distancing in Tourism Destination Management during the COVID-19 Pandemic in China: A Moderated Mediation Model. INTERNATIONAL JOURNAL OF ENVIRONMENTAL RESEARCH AND PUBLIC HEALTH 2021; 18:ijerph182111223. [PMID: 34769741 PMCID: PMC8583034 DOI: 10.3390/ijerph182111223] [Citation(s) in RCA: 7] [Impact Index Per Article: 1.8] [Reference Citation Analysis] [Abstract] [Key Words] [MESH Headings] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 09/09/2021] [Revised: 10/18/2021] [Accepted: 10/23/2021] [Indexed: 01/02/2023]
Abstract
While protective measures in response to infectious diseases may reduce the freedom of tourists (regarding their behaviors), few studies have documented the effects of destination protective measures on the self-protective behaviors of tourists. By applying the protection motivation theory, this study examines the effects of perceived destination protective supports on the social distancing intentions of tourists during the COVID-19 pandemic. The results reveal significant relationships among perceived destination support, coping appraisal, threat appraisal, and the social distancing intentions of tourists. Moreover, two cognitive appraisals—toward the pandemic—partially mediate the relationship between perceived destination support and social distancing intention, and this mediational process is ‘intervened’ with by social norms. This has implications on whether tourist destinations apply more rigorous social distancing polices during the COVID-19 pandemic, to enhance the coping confidence behaviors of tourists, without causing anxiety and fear, and to achieve the goal of enhancing tourists’ intentions to protect themselves.
Collapse
|
27
|
Alwreikat A, Shehata A, Edakar MAM. Arab women feelings while seeking information during COVID-19 pandemic: applying PMT constructs. ONLINE INFORMATION REVIEW 2021. [DOI: 10.1108/oir-09-2020-0419] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.3] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 11/17/2022]
Abstract
PurposeThis study investigates the effect of protection motivation theory (PMT) constructs on Arab women's feelings while seeking information during the COVID-19 pandemic.Design/methodology/approachThe study has adopted a mixed-method approach using semi-structured interviews and a questionnaire to explore PMT constructs' impact on women's feelings while seeking information on COVID-19. Several tests, such as standard deviation, mean, skewness, kurtosis and persons, were used to check the reliability of data and inter-relationships between constructs.FindingsThe study results show a significant positive correlation between PMT constructs (perceived vulnerability, perceived severity, response efficacy, self-efficacy and response cost) with the feelings of Arab women during information seeking on COVID-19. However, the relationship between threat appraisal and feelings during information seeking was more substantial than coping appraisal and feelings during information seeking. The researchers hope that this study creates a baseline of cross-cultural studies on PMT constructs' effect on women's feelings while seeking health information.Research limitations/implicationsThe current study was conducted on female participants only. While the study intended to examine Arab women's feelings during information seeking with PMT's application, the results may be affected by other factors that were not considered in the current study. Furthermore, the questionnaire was distributed in three Arab countries, which means that the results cannot be generalized in other geographical contexts. Therefore, similar studies need to be conducted in larger geographical areas as cultural factors may produce different results.Originality/valueThis study explores women's feelings while seeking COVID-19 information using the PMT constructs. As far as we know, this study is the first study to investigate Arab women's feelings while seeking health information during pandemics. PMT utilization is considered a new approach to discover and measure informational needs and feelings associated with it during pandemics.
Collapse
|
28
|
Developing and Validating a Behavioural Model of Cyberinsurance Adoption. SUSTAINABILITY 2021. [DOI: 10.3390/su13179528] [Citation(s) in RCA: 2] [Impact Index Per Article: 0.5] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 11/16/2022]
Abstract
Business disruption from cyberattacks is a growing concern, yet cyberinsurance uptake remains low. Using an online behavioural economics experiment with 4800 participants across four EU countries, this study tests a predictive model of cyberinsurance adoption, incorporating elements of Protection Motivation Theory (PMT) and the Theory of Planned Behaviour (TPB) as well as factors in relation to risk propensity and price. During the experiment, participants were given the opportunity to purchase different cybersecurity measures and cyberinsurance products before performing an online task. Participants likelihood of suffering a cyberattack was dependent upon their adoption of cybersecurity measures and their behaviour during the online task. The consequences of any attack were dependent upon the participants insurance decisions. Structural equation modelling was applied and the model was further developed to include elements of the wider security ecosystem. The final model shows that all TPB factors, and response efficacy from the PMT, positively predicted adoption of premium cyberinsurance. Interestingly, adoption of cybersecurity measures was associated with safer behaviour online, contrary to concerns of “moral hazard”. The findings highlight the need to consider the larger cybersecurity ecosystem when designing interventions to increase adoption of cyberinsurance and/or promote more secure online behaviour.
Collapse
|
29
|
Gillam AR, Waite AM. Gender differences in predictors of technology threat avoidance. INFORMATION AND COMPUTER SECURITY 2021. [DOI: 10.1108/ics-01-2020-0008] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.3] [Reference Citation Analysis] [Abstract] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/17/2022]
Abstract
Purpose
The purpose of this paper is to examine gender differences in predictors of technology threat avoidance motivation and behavior among working US adults. Implications were considered in regard to cybersecurity awareness training motivation and perceptions of need for protective cybersecurity behavior in the workplace.
Design/methodology/approach
A single-shot regression-based study used ordinal regression supported by K-means clustering to evaluate the moderating effects of gender on predictors of technology threat avoidance motivation and behavior on a sample of n = 206 US adult workers.
Findings
The regression model explained 47.5% of variance in avoidance motivation and 39% of avoidance behavior variance. Gender moderated predictive associations between several independent variables and avoidance motivation: perceived susceptibility, perceived effectiveness, perceived cost and self-efficacy. Gender also moderated the association between avoidance motivation and avoidance behavior.
Research limitations/implications
The predictive impact of gender extends beyond the main effects in technology threat avoidance. Data frequency distributions and inter-variable relationships should be routinely considered in threat avoidance studies, especially if sample variables exhibit non-normal frequency distributions and nonlinear associations.
Practical implications
Gender was significantly associated with threat avoidance motivation and avoidance behavior and exhibited notable associations with antecedents of avoidance motivation. Related insights can inform the design and delivery of training content relating to technology threat avoidance as organizations strive to more effectively leverage information technology end-users as protective assets for the enterprise.
Originality/value
The uniqueness of this study derives from its focus and findings regarding the moderating effects of gender on technology threat avoidance factors and techniques used to measure and evaluate the associations between them.
Collapse
|
30
|
Response to a phishing attack: persuasion and protection motivation in an organizational context. INFORMATION AND COMPUTER SECURITY 2021. [DOI: 10.1108/ics-02-2021-0021] [Citation(s) in RCA: 2] [Impact Index Per Article: 0.5] [Reference Citation Analysis] [Abstract] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/17/2022]
Abstract
Purpose
This study aims to examine the effect of cybersecurity threat and efficacy upon click-through, response to a phishing attack: persuasion and protection motivation in an organizational context.
Design/methodology/approach
In a simulated field trial conducted in a financial institute, via PhishMe, employees were randomly sent one of five possible emails using a set persuasion strategy. Participants were then invited to complete an online survey to identify possible protective factors associated with clicking and reporting behavior (N = 2,918). The items of interest included perceived threat severity, threat susceptibility, response efficacy and personal efficacy.
Findings
The results indicate that response behaviors vary significantly across different persuasion strategies. Perceptions of threat susceptibility increased the likelihood of reporting behavior beyond clicking behavior. Threat susceptibility and organizational response efficacy were also associated with increased odds of not responding to the simulated phishing email attack.
Practical implications
This study again highlights human susceptibility to phishing attacks in the presence of social engineering strategies. The results suggest heightened awareness of phishing threats and responsibility to personal cybersecurity are key to ensuring secure business environments.
Originality/value
The authors extend existing phishing literature by investigating not only click-through behavior, but also no-response and reporting behaviors. Furthermore, the authors observed the relative effectiveness of persuasion strategies used in phishing emails as they compete to manipulate unsafe email behavior.
Collapse
|
31
|
Bodford JE, Bunker CJ, Kwan VS. Does perceived social networking site security arise from actual and perceived physical safety? COMPUTERS IN HUMAN BEHAVIOR 2021. [DOI: 10.1016/j.chb.2021.106779] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.3] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 10/21/2022]
|
32
|
Yaprak Ü, Kılıç F, Okumuş A. Is the Covid-19 pandemic strong enough to change the online order delivery methods? Changes in the relationship between attitude and behavior towards order delivery by drone. TECHNOLOGICAL FORECASTING AND SOCIAL CHANGE 2021; 169:120829. [PMID: 36540546 PMCID: PMC9755559 DOI: 10.1016/j.techfore.2021.120829] [Citation(s) in RCA: 11] [Impact Index Per Article: 2.8] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Figures] [Subscribe] [Scholar Register] [Received: 10/30/2020] [Revised: 04/10/2021] [Accepted: 04/18/2021] [Indexed: 06/17/2023]
Abstract
Delivery of products in online orders by drones has begun to be tested by major retailers. How about consumers? Are they ready for this? Due to the emergence of Covid-19 and its easy transmission from person to person, considering the risks in the streets, a lot of people have started to place their orders online. However, the interaction between the courier and the consumer during the order delivery has become a problem over time. Reducing people's anxiousness in such pandemic situations brings uncertainty about the delivery of the orders. The object of the research is to create a drone delivery system, which is an alternative delivery system that will be solution to these problems and is also used in a limited way around the world. With this study, whose theoretical background is based on the diffusion of innovations theory, technology acceptance model and protection motivation theory, it is aimed to test the relationship between consumer's perceptions, attitudes and behavioral intentions towards drone delivery of online orders. In this research, questionnaire method has been used for data collection and measurement. Moreover, the Structural Equation Modeling approach has been used for data analysis and validation of models. According to the results of this study, significant relationships have been identified between the consumers' perception of benefit and risk, and attitudes and behavioral intentions towards drone delivery of online orders during pandemics.
Collapse
Affiliation(s)
- Ümit Yaprak
- Institute of Social Science, Marketing Ph.D Program, Istanbul University, Istanbul, Turkey
| | - Fatih Kılıç
- Institute of Social Science, Marketing Ph.D Program, Istanbul University, Istanbul, Turkey
| | - Abdullah Okumuş
- Marketing Department, School of Business, Istanbul University & Dean Faculty of Transportation and Logistics, Istanbul University
| |
Collapse
|
33
|
McGill T, Thompson N. Exploring potential gender differences in information security and privacy. INFORMATION AND COMPUTER SECURITY 2021. [DOI: 10.1108/ics-07-2020-0125] [Citation(s) in RCA: 2] [Impact Index Per Article: 0.5] [Reference Citation Analysis] [Abstract] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/17/2022]
Abstract
Purpose
Information technology users often fail to adopt necessary security and privacy measures, leading to increased risk of cybercrimes. There has been limited research on how demographic differences influence information security behaviour and understanding this could be important in identifying users who may be more likely to have poor information security behaviour. This study aims to investigate whether there are any gender differences in security and privacy behaviours and perceptions, to identify potential differences that may have implications for protecting users’ privacy and securing their devices, software and data.
Design/methodology/approach
This paper addresses this research gap by investigating security behaviours and perceptions in the following two studies: one focussing on information security and one on information privacy. Data was collected in both studies using anonymous online surveys.
Findings
This study finds significant differences between men and women in over 40% of the security and privacy behaviours considered, suggesting that overall levels of both are significantly lower for women than for men, with behaviours that require more technical skill being adopted less by female users. Furthermore, individual perceptions exhibited some gender differences.
Originality/value
This research suggests that potential gender differences in some security and privacy behaviours and perceptions should be taken into account when designing information security education, training and awareness initiatives for both organisations and the broader community. This study also provides a strong foundation to explore information security individual differences more deeply.
Collapse
|
34
|
|
35
|
Vrhovec S, Mihelič A. Redefining threat appraisals of organizational insiders and exploring the moderating role of fear in cyberattack protection motivation. Comput Secur 2021. [DOI: 10.1016/j.cose.2021.102309] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.3] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 02/02/2023]
|
36
|
Knapova L, Kruzikova A, Dedkova L, Smahel D. Who Is Smart with Their Smartphones? Determinants of Smartphone Security Behavior. CYBERPSYCHOLOGY BEHAVIOR AND SOCIAL NETWORKING 2021; 24:584-592. [PMID: 34152852 DOI: 10.1089/cyber.2020.0599] [Citation(s) in RCA: 2] [Impact Index Per Article: 0.5] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 11/13/2022]
Abstract
Smartphones have recently become a major target for cybercriminals due to large amounts of sensitive data and credentials being stored on the devices. To protect themselves against cyberthreats, users can employ a range of security behaviors. Although research has largely focused on computer security, relatively little is known about personal smartphone security behavior. The goal of our study was to evaluate determinants of smartphone security behavior based on the combination of the Health Belief Model and Protection Motivation Theory. We extended the models by including the construct of general security orientation. We also developed a smartphone security behavior scale that measured various aspects of this behavior. The sample included 331 Czech Android smartphone users aged between 26 and 81 years who were not IT specialists by employment or education. Path analysis showed that individuals who perceived a potential smartphone security threat as more severe, had higher smartphone self-efficacy, and general orientation and interest in digital security, and less personal experience with a digital security incident reported more secure behavior on their smartphones. Perceived susceptibility to security threats and family and friends' previous experience with digital security incidents did not predict smartphone security behavior. General security orientation affected smartphone security behavior also indirectly through perceived severity. These findings have theoretical implications for the models and also emphasize the importance of general digital security awareness as well as smartphone training to increase smartphone security behavior.
Collapse
Affiliation(s)
- Lenka Knapova
- Faculty of Informatics and Masaryk University, Brno, Czech Republic
| | - Agata Kruzikova
- Faculty of Informatics and Masaryk University, Brno, Czech Republic
| | - Lenka Dedkova
- Faculty of Social Studies, Masaryk University, Brno, Czech Republic
| | - David Smahel
- Faculty of Informatics and Masaryk University, Brno, Czech Republic.,Faculty of Social Studies, Masaryk University, Brno, Czech Republic
| |
Collapse
|
37
|
Abstract
Abstract
Having access and skills to use social technology, i.e. social internet use, social media and social applications, are considered as being vital to online social connection. Whilst evidence exists around facilitators and barriers to general technology use, evidence is limited with regards to the motivators, skills and tangible offline benefits older technology users experience with social technology. Therefore, this study used a qualitative, exploratory method to understand older adults’ experiences of using social technology to connect with others. Semi-structured interviews were conducted with 20 older adults (65+ years) across England, Scotland and Wales. Despite having access to social technology for social connection, and using this technology regularly, multiple barriers impacted motivators and skills for use, namely perceived self-efficacy and fear, the culture of online communication, absence of social capital and physical functioning. Some of these barriers of social technology use are reminiscent of barriers of wider technology use and emphasise the importance of addressing these barriers for digital exclusion, as well as social connection. However, some of these barriers were specific to social technology use and should be considered when providing guidance or interventions to increase older adults’ online social connection. Social connection was a clear tangible outcome to social technology use, and individuals discussed the benefits of using social technology, particularly visual communication tools, for online connection.
Collapse
|
38
|
Tchetchik A, Kaplan S, Blass V. Recycling and consumption reduction following the COVID-19 lockdown: The effect of threat and coping appraisal, past behavior and information. RESOURCES, CONSERVATION, AND RECYCLING 2021; 167:105370. [PMID: 36570977 PMCID: PMC9759599 DOI: 10.1016/j.resconrec.2020.105370] [Citation(s) in RCA: 13] [Impact Index Per Article: 3.3] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Subscribe] [Scholar Register] [Received: 06/08/2020] [Revised: 12/18/2020] [Accepted: 12/18/2020] [Indexed: 05/17/2023]
Abstract
The COVID-19 pandemic has created sudden, rapid, and unprecedented change in almost every possible aspect of the general population's behavior. Despite its devastating consequences, the COVID-19 pandemic can alter individual behavior towards responsible environmental actions. This study provides an in-depth analysis of how the COVID-19 pandemic has changed pro-environmental beliefs and behavior. We compare pre-COVID-19 recycling and consumption reduction with post-COVID-19 intentions, focusing on the COVID-19 pandemic's role in catalyzing the change. The protection motivation theory is applied to investigate threat appraisal and coping appraisal as potential motivators for taking climate change more seriously and engaging in pro-environmental behavior. A tailor-made survey carried out during the national lockdown imposed in March-April 2020 in Israel served for the analysis. A generalized ordered probit estimated on a sample of 296 respondents served to validate the behavioral model. The results confirm that threat and coping appraisal are drivers of behavioral change towards pro-environmental behavior. The results show that: i) 40% of low-intensity recyclers are likely to increase recycling compared to 20% of high-intensity recyclers; ii) following the COVID-19 outbreak, 40% intend to consume less; iii) the changes are catalyzed by threat and coping appraisal; iv) taking climate change more seriously following the pandemic is a function of the individual's perceived association between COVID-19 and climate change, external knowledge, income loss due to the pandemic, self-resilience, and ecocentric beliefs; v) self-resilient attitudes lead to positive behavioral change, while anthropocentric beliefs impede changes towards sustainable behavior.
Collapse
Affiliation(s)
- Anat Tchetchik
- Department of Geography and Environment, Bar Ilan University, Ramat-Gan 5290002, Israel
| | - Sigal Kaplan
- Department of Geography, Environment, and Geo-Information, Hebrew University of Jerusalem, Israel
| | - Vered Blass
- Porter School of the Environment and Earth Sciences, Tel Aviv University, Tel Aviv 69978, Israel
| |
Collapse
|
39
|
Understanding cybersecurity behavioral habits: Insights from situational support. JOURNAL OF INFORMATION SECURITY AND APPLICATIONS 2021. [DOI: 10.1016/j.jisa.2020.102710] [Citation(s) in RCA: 10] [Impact Index Per Article: 2.5] [Reference Citation Analysis] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 11/19/2022]
|
40
|
Ameen N, Tarhini A, Shah MH, Madichie N, Paul J, Choudrie J. Keeping customers' data secure: A cross-cultural study of cybersecurity compliance among the Gen-Mobile workforce. COMPUTERS IN HUMAN BEHAVIOR 2021. [DOI: 10.1016/j.chb.2020.106531] [Citation(s) in RCA: 25] [Impact Index Per Article: 6.3] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/15/2022]
|
41
|
Cummings CL, Rosenthal S, Kong WY. Secondary Risk Theory: Validation of a Novel Model of Protection Motivation. RISK ANALYSIS : AN OFFICIAL PUBLICATION OF THE SOCIETY FOR RISK ANALYSIS 2021; 41:204-220. [PMID: 32790201 DOI: 10.1111/risa.13573] [Citation(s) in RCA: 16] [Impact Index Per Article: 4.0] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Subscribe] [Scholar Register] [Received: 02/06/2020] [Revised: 06/29/2020] [Accepted: 07/16/2020] [Indexed: 06/11/2023]
Abstract
Protection motivation theory states individuals conduct threat and coping appraisals when deciding how to respond to perceived risks. However, that model does not adequately explain today's risk culture, where engaging in recommended behaviors may create a separate set of real or perceived secondary risks. We argue for and then demonstrate the need for a new model accounting for a secondary threat appraisal, which we call secondary risk theory. In an online experiment, 1,246 participants indicated their intention to take a vaccine after reading about the likelihood and severity of side effects. We manipulated likelihood and severity in a 2 × 2 between-subjects design and examined how well secondary risk theory predicts vaccination intention compared to protection motivation theory. Protection motivation theory performed better when the likelihood and severity of side effects were both low (R2 = 0.30) versus high (R2 = 0.15). In contrast, secondary risk theory performed similarly when the likelihood and severity of side effects were both low (R2 = 0.42) or high (R2 = 0.45). But the latter figure is a large improvement over protection motivation theory, suggesting the usefulness of secondary risk theory when individuals perceive a high secondary threat.
Collapse
Affiliation(s)
| | - Sonny Rosenthal
- Wee Kim Wee School of Communication and Information, Nanyang Technological University, Singapore
| | - Wei Yi Kong
- Gillings School of Global Public Health, University of North Carolina, Chapel Hill, NC, USA
| |
Collapse
|
42
|
Rodríguez-Priego N, van Bavel R, Vila J, Briggs P. Framing Effects on Online Security Behavior. Front Psychol 2020; 11:527886. [PMID: 33192769 PMCID: PMC7609889 DOI: 10.3389/fpsyg.2020.527886] [Citation(s) in RCA: 5] [Impact Index Per Article: 1.0] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 01/17/2020] [Accepted: 09/28/2020] [Indexed: 11/13/2022] Open
Abstract
We conducted an incentivized lab experiment examining the effect of gain vs. loss-framed warning messages on online security behavior. We measured the probability of suffering a cyberattack during the experiment as the result of five specific security behaviors: choosing a safe connection, providing minimum information during the sign-up process, choosing a strong password, choosing a trusted vendor, and logging-out. A loss-framed message led to more secure behavior during the experiment. The experiment also measured the effect of trusting beliefs and cybersecurity knowledge. Trusting beliefs had a negative effect on security behavior, while cybersecurity knowledge had a positive effect.
Collapse
Affiliation(s)
- Nuria Rodríguez-Priego
- Joint Research Centre, European Commission, Seville, Spain.,Departamento de Análisis Económico: Teoría Económica e Historia Económica, Universidad Autónoma de Madrid, Madrid, Spain
| | - René van Bavel
- Joint Research Centre, European Commission, Seville, Spain
| | - José Vila
- Center for Research in Social and Economic Behavior (ERI-CES), Intelligent Data Analysis Laboratory (IDAL), University of Valencia, Valencia, Spain
| | - Pam Briggs
- Department of Psychology, School of Life Sciences, Northumbria University, Newcastle upon Tyne, United Kingdom
| |
Collapse
|
43
|
Al-Emran M, Granić A, Al-Sharafi MA, Ameen N, Sarrab M. Examining the roles of students' beliefs and security concerns for using smartwatches in higher education. JOURNAL OF ENTERPRISE INFORMATION MANAGEMENT 2020. [DOI: 10.1108/jeim-02-2020-0052] [Citation(s) in RCA: 15] [Impact Index Per Article: 3.0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 11/17/2022]
Abstract
PurposeDespite the increased use of wearables in education, little attention has been paid to why some students are more likely to adopt smartwatches than others. The question of what impacts the adoption of smartwatches in educational activities is still neglected. In addition, the question of how security determinants can affect the adoption of smartwatches by students has not been addressed yet. Hence, this study aims to develop a theoretical model by integrating the technology acceptance model (TAM) and protection motivation theory (PMT) to study students' adoption of smartwatches for educational purposes.Design/methodology/approachQuestionnaires were distributed to university students in Malaysia. A total of 679 valid responses were collected. The collected data were analyzed using partial least squares-structural equation modeling (PLS-SEM).FindingsThe results of data analysis provide support for the proposed model. Furthermore, the findings indicated that perceived vulnerability, self-efficacy, response efficacy, response cost, ease of use and perceived usefulness have significant effects on students' behavioral intention to use smartwatches for educational purposes. In addition, perceived ease of use of smartwatches for educational purposes helps students to realize the benefits of this technology.Originality/valueThis is an original study that develops a new holistic theoretical model by combining the PMT and TAM to study the effects of ease of use, usefulness and security-related factors on the adoption of smartwatches for educational purposes. The study offers practical implications for universities and higher education institutions to improve students' learning experiences to ensure their sustainability using new and innovative ways by exploiting new technologies such as smartwatches.
Collapse
|
44
|
Kaspar K. Motivations for Social Distancing and App Use as Complementary Measures to Combat the COVID-19 Pandemic: Quantitative Survey Study. J Med Internet Res 2020; 22:e21613. [PMID: 32759100 PMCID: PMC7458661 DOI: 10.2196/21613] [Citation(s) in RCA: 68] [Impact Index Per Article: 13.6] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 06/18/2020] [Accepted: 07/24/2020] [Indexed: 11/28/2022] Open
Abstract
Background The current COVID-19 pandemic is showing negative effects on human health as well as on social and economic life. It is a critical and challenging task to revive public life while minimizing the risk of infection. Reducing interactions between people by social distancing is an effective and prevalent measure to reduce the risk of infection and spread of the virus within a community. Current developments in several countries show that this measure can be technologically accompanied by mobile apps; meanwhile, privacy concerns are being intensively discussed. Objective The aim of this study was to examine central cognitive variables that may constitute people’s motivations for social distancing, using an app, and providing health-related data requested by two apps that differ in their direct utility for the individual user. The results may increase our understanding of people’s concerns and convictions, which can then be specifically addressed by public-oriented communication strategies and appropriate political decisions. Methods This study refers to the protection motivation theory, which is adaptable to both health-related and technology-related motivations. The concept of social trust was added. The quantitative survey included answers from 406 German-speaking participants who provided assessments of data security issues, trust components, and the processes of threat and coping appraisal related to the prevention of SARS-CoV-2 infection by social distancing. With respect to apps, one central focus was on the difference between a contact tracing app and a data donation app. Results Multiple regression analyses showed that the present model could explain 55% of the interindividual variance in the participants’ motivation for social distancing, 46% for using a contact tracing app, 42% for providing their own infection status to a contact tracing app, and 34% for using a data donation app. Several cognitive components of threat and coping appraisal were related to motivation measurements. Trust in other people’s social distancing behavior and general trust in official app providers also played important roles; however, the participants’ age and gender did not. Motivations for using and accepting a contact tracing app were higher than those for using and accepting a data donation app. Conclusions This study revealed some important cognitive factors that constitute people’s motivation for social distancing and using apps to combat the COVID-19 pandemic. Concrete implications for future research, public-oriented communication strategies, and appropriate political decisions were identified and are discussed.
Collapse
Affiliation(s)
- Kai Kaspar
- Department of Psychology, University of Cologne, Cologne, Germany
| |
Collapse
|
45
|
van der Schyff K, Flowerday S, Lowry PB. Information privacy behavior in the use of Facebook apps: A personality-based vulnerability assessment. Heliyon 2020; 6:e04714. [PMID: 32904276 PMCID: PMC7452521 DOI: 10.1016/j.heliyon.2020.e04714] [Citation(s) in RCA: 8] [Impact Index Per Article: 1.6] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 07/13/2020] [Revised: 08/06/2020] [Accepted: 08/10/2020] [Indexed: 12/03/2022] Open
Abstract
The unauthorized use of personal information belonging to users of apps integrated with the Facebook platform affects millions of users. Crucially, although privacy concerns and awareness have increased, the use of these apps, and related privacy behaviors, remain largely unchanged. Given that such privacy behaviors are likely influenced by individuals' personality traits, it is imperative to better understand which personality traits make individuals more vulnerable to such unauthorized uses. We build on a recontextualized version of the theory of planned behavior (TPB) to evaluate the influence of the Big Five personality traits on attitudes toward Facebook privacy settings, social norms, and information privacy concerns (IPCs)—all within the context of Facebook app use. To evaluate this study's model, we analyzed 576 survey responses by way of partial least squares path modeling. Results indicate that highly extraverted individuals are particularly vulnerable to privacy violations (e.g., unauthorized use of personal information) because of their negative attitudes toward Facebook privacy settings. Our post hoc analysis uncovered interesting combinations of personality traits that make individuals particularly vulnerable to the unauthorized use of app-based information. In particular, the combination of extraversion and conscientiousness had a negative effect on individuals' attitude toward privacy settings. We also found a significant negative relationship between IPCs and intention to use Facebook apps. Finally, we found a positive relationship between social norms and intentions. Taken together, these results infer that individuals are likely to be influenced by their peers in the use of Facebook apps but that their intentions to use these apps declines as privacy concerns increase.
Collapse
Affiliation(s)
- Karl van der Schyff
- Department of Information Systems, Rhodes University, Grahamstown, South Africa
- Corresponding author.
| | - Stephen Flowerday
- Department of Information Systems, Rhodes University, Grahamstown, South Africa
| | - Paul Benjamin Lowry
- Pamplin College of Business, Virginia Tech, Blacksburg, VA, 24061, United States
| |
Collapse
|
46
|
De Kimpe L, Ponnet K, Walrave M, Snaphaan T, Pauwels L, Hardyns W. Help, I need somebody: Examining the antecedents of social support seeking among cybercrime victims. COMPUTERS IN HUMAN BEHAVIOR 2020. [DOI: 10.1016/j.chb.2020.106310] [Citation(s) in RCA: 10] [Impact Index Per Article: 2.0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/30/2022]
|
47
|
Gillam AR, Foster WT. Factors affecting risky cybersecurity behaviors by U.S. workers: An exploratory study. COMPUTERS IN HUMAN BEHAVIOR 2020. [DOI: 10.1016/j.chb.2020.106319] [Citation(s) in RCA: 6] [Impact Index Per Article: 1.2] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 10/24/2022]
|
48
|
Wiafe I, Koranteng FN, Wiafe A, Obeng EN, Yaokumah W. The role of norms in information security policy compliance. INFORMATION AND COMPUTER SECURITY 2020. [DOI: 10.1108/ics-08-2019-0095] [Citation(s) in RCA: 4] [Impact Index Per Article: 0.8] [Reference Citation Analysis] [Abstract] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/17/2022]
Abstract
Purpose
The purpose of this paper is to determine which factors influence information system security policy compliance. It examines how different norms influence compliance intention.
Design/methodology/approach
Based on relevant literature on information system security policy compliance, a research model was developed and validated. An online questionnaire was used to gather data from respondents and partial least square structural equation modelling (PLS-SEM) was used to analyse 432 responses received.
Findings
The results indicated that attitude towards information security compliance mediates the effects of personal norms on compliance intention. In addition, descriptive and subjective norms are significant predictors of personal norms.
Originality/value
Though advancement in technology has reached significant heights, it is still inadequate to guaranteed information systems’ security. Researchers have identified humans to be central in ensuring information security. To this effect, this study provides empirical evidence of the role of norms in influence information security behaviour.
Collapse
|
49
|
Wang J, Kim J, Moon J, Song H. The Effect of Smog-Related Factors on Korean Domestic Tourists' Decision-Making Process. INTERNATIONAL JOURNAL OF ENVIRONMENTAL RESEARCH AND PUBLIC HEALTH 2020; 17:ijerph17103706. [PMID: 32466084 PMCID: PMC7277908 DOI: 10.3390/ijerph17103706] [Citation(s) in RCA: 10] [Impact Index Per Article: 2.0] [Reference Citation Analysis] [Abstract] [Key Words] [MESH Headings] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 04/29/2020] [Revised: 05/19/2020] [Accepted: 05/21/2020] [Indexed: 11/22/2022]
Abstract
The present study aims to explore Korean domestic tourists’ decision-making processes by utilizing an extended model of goal-directed behavior (EMGB) as a theoretical framework. Integrating government policy (PLY) and protection motivation for smog (PMS) with the original model of goal-directed behavior (MGB) makes it easier to better understand the formation process of tourists’ behavioral intentions for domestic travel. Structural equation modeling (SEM) is employed to identify the structural relationships among the latent variables. The results of the EMGB indicated that desire had the strongest effect on the behavioral intention of tourists to travel domestically; positive anticipated emotion is the main source of desire, followed by negative anticipated emotion. Government PLY on smog has a significant, positive and indirect effect on behavioral intentions of domestic or potential tourists through the protection motive theory. We found that desires are verified as a determinant of the behavioral intention’s formation, more significant than that of perceived behavioral control, frequency of past behavior and protection motivation. In addition, this study offers theoretical and practical suggestions.
Collapse
Affiliation(s)
- JunHui Wang
- College of Tourism and Fashion, Pai Chai University, Daejeon 35345, Korea;
| | - JooHyang Kim
- Department of Convention and Hotel Management, Hannam University, Daejeon 34430, Korea;
| | - JiHyo Moon
- School of Business, Hanyang University, Seoul 133-791, Korea;
| | - HakJun Song
- College of Tourism and Fashion, Pai Chai University, Daejeon 35345, Korea;
- Correspondence:
| |
Collapse
|
50
|
Dang VT, Wang J, Vu TT. An integrated model of the younger generation's online shopping behavior based on empirical evidence gathered from an emerging economy. PLoS One 2020; 15:e0232213. [PMID: 32374783 PMCID: PMC7202652 DOI: 10.1371/journal.pone.0232213] [Citation(s) in RCA: 5] [Impact Index Per Article: 1.0] [Reference Citation Analysis] [Abstract] [MESH Headings] [Grants] [Track Full Text] [Download PDF] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 11/11/2019] [Accepted: 04/09/2020] [Indexed: 11/18/2022] Open
Abstract
The younger generation is the largest Internet user group in China. They are the first generation to grow up with computers, the Internet, smartphones, online social media, and online shopping. The individuals that belong to this generational cohort have one thing in common-their online shopping behavior. To understand the shopping behavior of the younger Chinese generation, this study draws on the theoretical foundation of generational cohort theory. This study proposes an integrated model that examines the effects of information adoption, personalized service, perceived switching risk, and habitual behavior on purchase intention in the online shopping environment. Survey data have been collected from 407 Chinese people that belong to the post-90s generation. Structural equation modeling is used to analyze the data. Empirical findings show that information adoption, personalized service, and perceived switching risk are the most important predictors of online purchase intention. However, habitual behavior is negatively related to online purchase intention.
Collapse
Affiliation(s)
- Van Thac Dang
- Department of Business Administration, Business School, Shantou University, Shantou, Guangdong, China
| | - Jianming Wang
- School of Business Administration, Zhejiang University of Finance & Economics, Hangzhou, China
| | - Thinh Truong Vu
- Department of Business Administration, Dong Nai Technology University, Bien Hoa, Vietnam
| |
Collapse
|