Personality Traits and Cognitive Determinants – An Empirical Investigation of the Use of Smartphone Security Measures

In the last years, increasing smartphones’ capabilities have caused a paradigm shift in the way of users’ view and using mobile devices. Although researchers have started to focus on behavioral models to explain and predict human behavior, there is limited empirical research about the influence of smartphone users’ individual differences on the usage of security measures. The aim of this study is to examine the influence of individual differences on cognitive determinants of behavioral intention to use security measures. Individual differences are measured by the Five-Factor Model; cognitive determinants of behavioral intention are adapted from the validated behavioral models theory of planned behavior and technology acceptance model. An explorative, quantitative survey of 435 smartphone users is served as data basis. The results suggest that multiple facets of smartphone user’s personalities significantly affect the cognitive determinants, which indicate the behavioral intention to use security measures. From these findings, practical and theoretical implications for companies, organizations, and researchers are derived and discussed.

[1]  Yufei Yuan,et al.  Understanding User's Behaviors in Coping with Security Threat of Mobile Devices Loss and Theft , 2012, 2012 45th Hawaii International Conference on System Sciences.

[2]  Oded Nov,et al.  Personality and Technology Acceptance: Personal Innovativeness in IT, Openness and Resistance to Change , 2008, Proceedings of the 41st Annual Hawaii International Conference on System Sciences (HICSS 2008).

[3]  Younghwa Lee,et al.  The Technology Acceptance Model: Past, Present, and Future , 2003, Commun. Assoc. Inf. Syst..

[4]  Detmar W. Straub,et al.  Specifying Formative Constructs in Information Systems Research , 2007, MIS Q..

[5]  Wynne W. Chin Issues and Opinion on Structural Equation Modeling by , 2009 .

[6]  Sebastian Möller,et al.  On the need for different security methods on mobile phones , 2011, Mobile HCI.

[7]  Steven Furnell,et al.  From desktop to mobile: Examining the security experience , 2009, Comput. Secur..

[8]  Jan Guynes Clark,et al.  Why there aren't more information security research studies , 2004, Inf. Manag..

[9]  Gaurav Bansal Security Concerns in the Nomological Network of Trust and Big 5: First Order Vs. Second Order , 2011, ICIS.

[10]  P. Costa,et al.  Facet Scales for Agreeableness and Conscientiousness: A Revision of the NEO Personality Inventory☆ , 1991 .

[11]  Robert F. Easley,et al.  Research Note - How Does Personality Matter? Relating the Five-Factor Model to Technology Acceptance and Use , 2008, Inf. Syst. Res..

[12]  Dennis F. Galletta,et al.  User Awareness of Security Countermeasures and Its Impact on Information Systems Misuse: A Deterrence Approach , 2009, Inf. Syst. Res..

[13]  Detmar W. Straub,et al.  Structural Equation Modeling and Regression: Guidelines for Research Practice , 2000, Commun. Assoc. Inf. Syst..

[14]  Jan Marco Leimeister,et al.  Consumerization - IT Innovations from the Consumer Market as a Challenge for Corporate IT , 2012, Bus. Inf. Syst. Eng..

[15]  Wei Wang How Personality Affects Continuance Intention: An Empirical Investigation of Instant Messaging , 2010, PACIS.

[16]  Michael H. Breitner,et al.  Employees' Information Security Awareness and Behavior: A Literature Review , 2013, 2013 46th Hawaii International Conference on System Sciences.

[17]  Ruth C. King,et al.  Service Convenience and Relational Exchange in Electronic Mediated Environment: An Empirical Investigation , 2008, ICIS.

[18]  Rajeev Sharma,et al.  The Contingent Effects of Management Support and Task Interdependence on Successful Information Systems Implementation , 2003, MIS Q..

[19]  Appa Rao Korukonda,et al.  Differences that do matter: A dialectic analysis of individual characteristics and personality dimensions contributing to computer anxiety , 2007, Comput. Hum. Behav..

[20]  Murray R. Barrick,et al.  Personality and Performance at the Beginning of the New Millennium: What Do We Know and Where Do We Go Next? , 2001 .

[21]  Norman A. Johnson,et al.  Personality traits and concern for privacy: an empirical study in the context of location-based services , 2008, Eur. J. Inf. Syst..

[22]  A. Adam Whatever happened to information systems ethics? Caught between the devil and the deep blue sea , 2004 .

[23]  James C. McElroy,et al.  Dispositional Factors in Internet Use: Personality Versus Cognitive Style , 2007, MIS Q..

[24]  I. Ajzen The theory of planned behavior , 1991 .

[25]  Steven Furnell,et al.  Authentication of users on mobile telephones - A survey of attitudes and practices , 2005, Comput. Secur..

[26]  Hock-Hai Teo,et al.  Decision-Maker Mindfulness in IT Adoption: The Role of Informed Culture and Individual Personality , 2009, ICIS.

[27]  Izak Benbasat,et al.  Predicting Intention to Adopt Interorganizational Linkages: An Institutional Perspective , 2003, MIS Q..

[28]  T. Judge,et al.  Personality and leadership: a qualitative and quantitative review. , 2002, The Journal of applied psychology.

[29]  Qing Hu,et al.  Top Management Championship and Individual Behaviour Towards Information Security: An Integrative Model , 2008, ECIS.

[30]  Detmar W. Straub,et al.  Validation Guidelines for IS Positivist Research , 2004, Commun. Assoc. Inf. Syst..

[31]  Deborah Compeau,et al.  Computer Self-Efficacy: Development of a Measure and Initial Test , 1995, MIS Q..

[32]  Gordon B. Davis,et al.  User Acceptance of Information Technology: Toward a Unified View , 2003, MIS Q..

[33]  Izak Benbasat,et al.  Information Security Policy Compliance: An Empirical Study of Rationality-Based Beliefs and Information Security Awareness , 2010, MIS Q..

[34]  Merrill Warkentin,et al.  Fear Appeals and Information Security Behaviors: An Empirical Study , 2010, MIS Q..

[35]  Cheryl Burke Jarvis,et al.  A Critical Review of Construct Indicators and Measurement Model Misspecification in Marketing and Consumer Research , 2003 .

[36]  Viswanath Venkatesh,et al.  Technology Acceptance Model 3 and a Research Agenda on Interventions , 2008, Decis. Sci..

[37]  Jordan Shropshire,et al.  Personality and IT security: An application of the five-factor model , 2006, AMCIS.

[38]  Fred D. Davis Perceived Usefulness, Perceived Ease of Use, and User Acceptance of Information Technology , 1989, MIS Q..

[39]  Gordon W. Allport,et al.  Pattern and growth in personality , 1961 .

[40]  Shintaro Okazaki,et al.  What do we know about mobile Internet adopters? A cluster analysis , 2006, Inf. Manag..

[41]  Adam Pridgen,et al.  STAAF: Scaling Android Application Analysis with a Modular Framework , 2012, 2012 45th Hawaii International Conference on System Sciences.