An investigation of email processing from a risky decision making perspective

The prevalence of cyber crimes has threatened the business model enabled by email. Users have to evaluate email related risks before forming their attitude and read intention toward commercial emails. Drawing on a seminal theoretical framework in risky decision making, we propose a research model that incorporates computer risk taking propensity and email risk perception as influential in cultivating commercial email attitude and read intention. The research model is empirically validated using survey data and the results provide significant support. This study contributes to the literature on email use by exploring the process of risky decision making and influence sources.

[1]  Janet Fulk,et al.  Organizational Colleagues, Media Richness, and Electronic Mail , 1991 .

[2]  M. Zuckerman Sensation Seeking : Beyond the Optimal Level of Arousal , 1979 .

[3]  S. Sitkin,et al.  Determinants of Risky Decision-Making Behavior: A Test of the Mediating Role of Risk Perceptions and Propensity , 1995 .

[4]  Barbara H Wixom,et al.  A Theoretical Integration of User Satisfaction and Technology Acceptance , 2005, Inf. Syst. Res..

[5]  A. Tversky,et al.  Prospect theory: analysis of decision under risk , 1979 .

[6]  Peter A. Todd,et al.  Assessing IT usage: the role of prior experience , 1995 .

[7]  Sirkka L. Jarvenpaa,et al.  Consumer and Business Deception on the Internet: Content Analysis of Documentary Evidence , 2003, Int. J. Electron. Commer..

[8]  N. Jianakoplos,et al.  ARE WOMEN MORE RISK AVERSE , 1998 .

[9]  C. Fornell,et al.  Evaluating structural equation models with unobservable variables and measurement error. , 1981 .

[10]  Donna L. Hoffman,et al.  Building consumer trust online , 1999, CACM.

[11]  Ron Weber,et al.  The Grim Reaper : The Curse of E-mail , 2004 .

[12]  Steve H. Barr,et al.  Propensity to adopt technological innovations: the impact of personal characteristics and organizational context , 1999 .

[13]  Hsinchun Chen,et al.  Fighting cybercrime: a review and the Taiwan experience , 2006, Decis. Support Syst..

[14]  A. Tversky,et al.  Prospect Theory : An Analysis of Decision under Risk Author ( s ) : , 2007 .

[15]  H. Raghav Rao,et al.  A trust-based consumer decision-making model in electronic commerce: The role of trust, perceived risk, and their antecedents , 2008, Decis. Support Syst..

[16]  Deborah Compeau,et al.  Computer Self-Efficacy: Development of a Measure and Initial Test , 1995, MIS Q..

[17]  Albert Levi,et al.  Risks in email security. , 2001 .

[18]  Mark Keil,et al.  An investigation of risk perception and risk propensity on the decision to continue a software development project , 2000, J. Syst. Softw..

[19]  Laurence Steinberg,et al.  Peer influence on risk taking, risk preference, and risky decision making in adolescence and adulthood: an experimental study. , 2005, Developmental psychology.

[20]  Detmar W. Straub,et al.  A Practical Guide To Factorial Validity Using PLS-Graph: Tutorial And Annotated Example , 2005, Commun. Assoc. Inf. Syst..

[21]  M. Leary,et al.  Self-presentational determinants of health risk behavior among college freshmen , 2001 .

[22]  Gurpreet Dhillon,et al.  Principles of information systems security - text and cases , 2006 .

[23]  Janet Fulk,et al.  Social construction of communication technology , 1993 .

[24]  Paul A. Pavlou,et al.  Consumer Acceptance of Electronic Commerce: Integrating Trust and Risk with the Technology Acceptance Model , 2003, Int. J. Electron. Commer..

[25]  Gordon B. Davis,et al.  User Acceptance of Information Technology: Toward a Unified View , 2003, MIS Q..

[26]  R. Linn Educational measurement, 3rd ed. , 1989 .

[27]  Peter A. Todd,et al.  Understanding Information Technology Usage: A Test of Competing Models , 1995, Inf. Syst. Res..

[28]  M. Zuckerman,et al.  A comparison of three structural models for personality: the big three , 1993 .

[29]  A. Bandura Reflections on self-efficacy , 1978 .

[30]  Robert D. Klassen,et al.  Linking forward and reverse supply chain investments: The role of business uncertainty , 2007 .

[31]  Eugene F. Stone Research methods in organizational behavior , 1978 .

[32]  Arvind K. Tripathi,et al.  Economics of first-contact email advertising , 2006, Decis. Support Syst..

[33]  Matthew K. O. Lee,et al.  A Trust Model for Consumer Internet Shopping , 2001, Int. J. Electron. Commer..

[34]  Phyllis C. Panzano,et al.  AN ORGANIZATIONAL-LEVEL TEST OF A PARTIALLY MEDIATED MODEL OF RISKY DECISION MAKING BEHAVIOR. , 1997 .

[35]  J KimDan,et al.  A trust-based consumer decision-making model in electronic commerce , 2008 .

[36]  Wynne W. Chin Issues and Opinion on Structural Equation Modeling by , 2009 .

[37]  Paul A. Pavlou,et al.  Understanding and Predicting Electronic Commerce Adoption: An Extension of the Theory of Planned Behavior , 2006, MIS Q..

[38]  Alladi Venkatesh,et al.  Has the Internet become indispensable? , 2004, CACM.

[39]  Paul A. Pavlou,et al.  Understanding and Mitigating Uncertainty in Online Exchange Relationships: A Principal-Agent Perspective , 2007, MIS Q..

[40]  J. Dutton,et al.  Discerning threats and opportunities. , 1988 .

[41]  Annika E. Sundén,et al.  Gender Differences in the Allocation of Assets in Retirement Savings Plans , 1998 .

[42]  Stewart Thornhill,et al.  Entrepreneurs and Evolutionary Biology: The Relationship between Testosterone and New Venture Creation , 2006 .

[43]  P. M. Podsakoff,et al.  Self-Reports in Organizational Research: Problems and Prospects , 1986 .

[44]  Shuliang Li,et al.  The development of a hybrid intelligent system for developing marketing strategy , 2000, Decis. Support Syst..

[45]  Tejaswini Herath,et al.  Encouraging information security behaviors in organizations: Role of penalties, pressures and perceived effectiveness , 2009, Decis. Support Syst..

[46]  Ron Weber,et al.  E-Mail Management: A Techno-Managerial Research Perspective , 2005, Commun. Assoc. Inf. Syst..

[47]  Paul A. Pavlou,et al.  Psychological Contract Violation in Online Marketplaces: Antecedents, Consequences, and Moderating Role , 2005, Inf. Syst. Res..

[48]  Balaji Padmanabhan,et al.  Toward user patterns for online security: Observation time and online user identification , 2010, Decis. Support Syst..

[49]  Gerald J.S. Wilde,et al.  Differences in risk experience between sensation avoiders and sensation seekers , 1996 .

[50]  Bernard C. Y. Tan,et al.  A Cross-Cultural Study on Escalation of Commitment Behavior in Software Projects , 2000, MIS Q..

[51]  Gilbert A. Churchill A Paradigm for Developing Better Measures of Marketing Constructs , 1979 .

[52]  Scott B. MacKenzie,et al.  Common method biases in behavioral research: a critical review of the literature and recommended remedies. , 2003, The Journal of applied psychology.

[53]  Albert Levi,et al.  Inside risks: Risks in email security , 2001, Commun. ACM.

[54]  H. Thomas,et al.  Toward a Contingency Model of Strategic Risk Taking , 1985 .

[55]  H. Raghav Rao,et al.  Web channels in e-commerce , 2001, CACM.

[56]  E. Weber,et al.  A Domain-Specific Risk-Taking (DOSPERT) Scale for Adult Populations , 2006, Judgment and Decision Making.

[57]  W. G. Sanders,et al.  Behavioral Responses of CEOs to Stock Ownership and Stock Option Pay , 2001 .

[58]  Viswanath Venkatesh,et al.  Why Don't Men Ever Stop to Ask for Directions? Gender, Social Influence, and Their Role in Technology Acceptance and Usage Behavior , 2000, MIS Q..

[59]  Vallabh Sambamurthy,et al.  Sources of Influence on Beliefs about Information Technolgoy Use: An Empirical Study of Knowledge Workers , 2003, MIS Q..

[60]  I. Ajzen The theory of planned behavior , 1991 .

[61]  Kar Yan Tam,et al.  Understanding the Adoption of Multipurpose Information Appliances: The Case of Mobile Data Services , 2006, Inf. Syst. Res..

[62]  Rui Chen,et al.  Visual e-mail authentication and identification services: An investigation of the effects on e-mail use , 2009, Decis. Support Syst..

[63]  Bing-Sheng Teng,et al.  Strategic risk behaviour and its temporalities: between risk propensity and decision context , 2001 .

[64]  Amy L. Pablo,et al.  Reconceptualizing the Determinants of Risk Behavior , 1992 .

[65]  Michael D Slater,et al.  Brief measures of sensation seeking for screening and large-scale surveys. , 2003, Drug and alcohol dependence.

[66]  Barry M. Staw,et al.  Threat-rigidity effects in organizational behavior: A multilevel analysis. , 1981 .

[67]  J. March,et al.  Managerial perspectives on risk and risk taking , 1987 .

[68]  K. Jöreskog,et al.  Intraclass Reliability Estimates: Testing Structural Assumptions , 1974 .

[69]  Peter M. Bentler,et al.  Cognitive Motivations and Sensation Seeking as Long-Term Predictors of Drinking Problems , 1993 .

[70]  T. C. Edwin Cheng,et al.  Adoption of internet banking: An empirical study in Hong Kong , 2006, Decis. Support Syst..

[71]  Ritu Agarwal,et al.  A Conceptual and Operational Definition of Personal Innovativeness in the Domain of Information Technology , 1998, Inf. Syst. Res..

[72]  A. Bandura Social Foundations of Thought and Action: A Social Cognitive Theory , 1985 .

[73]  R. RaoH.,et al.  Encouraging information security behaviors in organizations , 2009 .

[74]  M. Zuckerman Behavioral Expressions and Biosocial Bases of Sensation Seeking , 1994 .

[75]  YangYinghui,et al.  Toward user patterns for online security , 2010, DSS 2010.

[76]  Traci Carte,et al.  In Pursuit of Moderation: Nine Common Errors and Their Solutions , 2003, MIS Q..

[77]  Wynne W. Chin,et al.  A Partial Least Squares Latent Variable Modeling Approach for Measuring Interaction Effects: Results from a Monte Carlo Simulation Study and an Electronic - Mail Emotion/Adoption Study , 2003, Inf. Syst. Res..

[78]  L. Donohew,et al.  Television campaigns and adolescent marijuana use: tests of sensation seeking targeting. , 2001, American journal of public health.

[79]  Kin Fai Ellick Wong The role of risk in making decisions under escalation situations , 2005 .