Can Secure Behaviors Be Contagious? A Two-Stage Investigation of the Influence of Herd Behavior on Security Decisions

IT users often make information security-related decisions in complex and multidimensional environments, which could lead to phenomena like behavioral anomalies. For instance, under uncertain circumstances, users may discount their own limited information about a security technology and make their adoption decisions based on what the majority of users’ decisions are in this regard. In this context, imitation can become a legitimate and rational strategy for making security-related decisions. Current behavioral security theories generally assume that users possess sufficient information about security technologies before making security-related decisions. This theory assumption limits our understanding of how security decisions are made in various real-world circumstances. Our research is focused on security behaviors under uncertain circumstances. We investigate how providing popularity information can trigger herd behavior and can subsequently influence security behaviors. We also provide insights into security-related decisions that are influenced by herd mentality and investigate whether they persist over time. Additionally, we conceptualize and operationalize two constructs that can be used in future research to better examine post-adoption security behaviors. The findings of this multistage experiment show that in uncertain circumstances, when users are aware of the widespread use of a certain security technology, they develop a significantly higher intention to engage in protection-motivated behaviors. Furthermore, the results show that at the post-adoption stage, users rely more heavily on their own information about their continuous use of security technologies and put less emphasis on herd-related factors.

[1]  Jacob Cohen Statistical Power Analysis for the Behavioral Sciences , 1969, The SAGE Encyclopedia of Research Design.

[2]  Merrill Warkentin,et al.  Experience Matters: The Role of Vicarious Experience in Secure Actions , 2020, J. Database Manag..

[3]  Dustin Ormond,et al.  Don't Even Think About It! The Effects of Antineutralization, Informational, and Normative Communication on Information Security Compliance , 2018, J. Assoc. Inf. Syst..

[4]  Chong Wang,et al.  Socially Nudged: A Quasi-Experimental Study of Friends' Social Influence in Online Product Ratings , 2018, Inf. Syst. Res..

[5]  Merrill Warkentin,et al.  Secure Behavior over Time: Perspectives from the Theory of Process Memory , 2018, DATB.

[6]  Yang Liu,et al.  When Online Reviews Meet Sales Volume Information: Is More or Accurate Information Always Better? , 2017, Inf. Syst. Res..

[7]  Jingguo Wang,et al.  Coping Responses in Phishing Detection: An Investigation of Antecedents and Consequences , 2017, Inf. Syst. Res..

[8]  Yi-Jen Ho,et al.  Popularity or Proximity: Characterizing the Nature of Social Influence in an Online Music Community , 2017, Inf. Syst. Res..

[9]  Jan Marco Leimeister,et al.  Not just an ego-trip: Exploring backers' motivation for funding in incentive-based crowdfunding , 2017, J. Strateg. Inf. Syst..

[10]  Andrew Schwarz,et al.  Examining the Impact and Detection of the "Urban Legend" of Common Method Bias , 2017, DATB.

[11]  Jordan Shropshire,et al.  Continuance of protective security behavior: A longitudinal study , 2016, Decis. Support Syst..

[12]  Paul Benjamin Lowry,et al.  Limited Information and Quick Decisions: Consumer Privacy Calculus for Mobile Applications , 2016, AIS Trans. Hum. Comput. Interact..

[13]  Alexander Benlian,et al.  Effects of Social Interaction Dynamics on Platforms , 2016, J. Manag. Inf. Syst..

[14]  Byungjoon Yoo,et al.  An analysis of popularity information effects: Field experiments in an online marketplace , 2016, Electron. Commer. Res. Appl..

[15]  Yili Hong,et al.  Culture, Conformity, and Emotional Suppression in Online Reviews , 2016, J. Assoc. Inf. Syst..

[16]  Detmar W. Straub,et al.  Neural Correlates of Protection Motivation for Secure IT Behaviors: An fMRI Examination , 2016, J. Assoc. Inf. Syst..

[17]  Dennis F. Galletta,et al.  What Do Systems Users Have to Fear? Using Fear Appeals to Engender Threats and Fear that Motivate Protective Security Behaviors , 2015, MIS Q..

[18]  Chih-Hsiang Chang,et al.  The effects of national culture and behavioral pitfalls on investors' decision-making: Herding behavior in international stock markets ☆ , 2015 .

[19]  Merrill Warkentin,et al.  An Enhanced Fear Appeal Rhetorical Framework: Leveraging Threats to the Human Asset Through Sanctioning Rhetoric , 2015, MIS Q..

[20]  Kent Marett,et al.  Checking the manipulation checks in information security research , 2015, Inf. Comput. Secur..

[21]  Joseph S. Valacich,et al.  The Behavioral Roots of Information Systems Security: Exploring Key Factors Related to Unethical IT Use , 2015, J. Manag. Inf. Syst..

[22]  B. A. Conway,et al.  The effects of laforin, malin, Stbd1, and Ptg deficiencies on heart glycogen levels in Pompe disease mouse models , 2015 .

[23]  Gregory Kadlec,et al.  Institutional Investors and Stock Return Anomalies , 2014 .

[24]  Robert E. Crossler,et al.  Understanding Compliance with Bring Your Own Device Policies Utilizing Protection Motivation Theory: Bridging the Intention-Behavior Gap , 2014, J. Inf. Syst..

[25]  Heshan Sun,et al.  A Longitudinal Study of Herd Behavior in the Adoption and Continued Use of Technology , 2013, MIS Q..

[26]  Sean J. Taylor,et al.  Social Influence Bias: A Randomized Experiment , 2013, Science.

[27]  Qing Hu,et al.  Future directions for behavioral information security research , 2013, Comput. Secur..

[28]  Scott B. MacKenzie,et al.  Construct Measurement and Validation Procedures in MIS and Behavioral Research: Integrating New and Existing Techniques , 2011, MIS Q..

[29]  Juanjuan Zhang,et al.  How Does Popularity Information Affect Choices? A Field Experiment , 2009 .

[30]  M Baddeley,et al.  Information Security: Lessons from Behavioural Economics , 2011 .

[31]  Merrill Warkentin,et al.  Fear Appeals and Information Security Behaviors: An Empirical Study , 2010, MIS Q..

[32]  Yajiong Xue,et al.  Understanding Security Behaviors in Personal Computer Usage: A Threat Avoidance Perspective , 2010, J. Assoc. Inf. Syst..

[33]  Sung S. Kim The integrative framework of technology use: an extension and test , 2009 .

[34]  Glenn J. Browne,et al.  Sequential Adoption Theory: A Theory for Understanding Herding Behavior in Early Adoption of Novel Technologies , 2009, J. Assoc. Inf. Syst..

[35]  Sung S. Kim,et al.  Out of Dedication or Constraint? A Dual Model of Post-Adoption Phenomena and its Empirical Test in the Context of Online Services , 2009, MIS Q..

[36]  Bin Gu,et al.  Informational Cascades and Software Adoption on the Internet: An Empirical Investigation , 2008, MIS Q..

[37]  Ping Wang,et al.  Popular Concepts beyond Organizations : Exploring New Dimensions of Information Technology Innovations , 2009 .

[38]  Lorin M. Hitt,et al.  Self Selection and Information Role of Online Product Reviews , 2007, Inf. Syst. Res..

[39]  William Lewis,et al.  Research Note - Statistical Power in Analyzing Interaction Effects: Questioning the Advantage of PLS with Product Indicators , 2007, Inf. Syst. Res..

[40]  Mark Srite,et al.  The Role of Espoused National Cultural Values in Technology Acceptance , 2006, MIS Q..

[41]  M. Lieberman,et al.  Why Do Firms Imitate Each Other , 2006 .

[42]  Naresh K. Malhotra,et al.  A Longitudinal Model of Continued IS Use: An Integrative View of Four Mechanisms Underlying Postadoption Phenomena , 2005, Manag. Sci..

[43]  John D. Hey,et al.  Do Markets Drive Out Lemmings - or Vice Versa? , 2004 .

[44]  Rossouw von Solms,et al.  The 10 deadly sins of information security management , 2004, Comput. Secur..

[45]  Anol Bhattacherjee,et al.  Understanding Changes in Belief and Attitude Toward Information Technology Usage: A Theoretical Model and Longitudinal Test , 2004, MIS Q..

[46]  Detmar W. Straub,et al.  Validation Guidelines for IS Positivist Research , 2004, Commun. Assoc. Inf. Syst..

[47]  Robert J. Kauffman,et al.  What Do You Know? Rational Expectations in Information Technology Adoption and Investment , 2003, J. Manag. Inf. Syst..

[48]  Scott B. MacKenzie,et al.  Common method biases in behavioral research: a critical review of the literature and recommended remedies. , 2003, The Journal of applied psychology.

[49]  Charles J. Kacmar,et al.  Developing and Validating Trust Measures for e-Commerce: An Integrative Typology , 2002, Inf. Syst. Res..

[50]  H. Rao,et al.  Fool's Gold: Social Proof in the Initiation and Abandonment of Coverage by Wall Street Analysts , 2001 .

[51]  Anol Bhattacherjee,et al.  Understanding Information Systems Continuance: An Expectation-Confirmation Model , 2001, MIS Q..

[52]  M. Allen,et al.  A Meta-Analysis of Fear Appeals: Implications for Effective Public Health Campaigns , 2000, Health education & behavior : the official publication of the Society for Public Health Education.

[53]  R. W. Rogers,et al.  A meta-analysis of research on protection motivation theory. , 2000 .

[54]  J. Steenkamp,et al.  Assessing Measurement Invariance in Cross-National Consumer Research , 1998 .

[55]  C. Avery,et al.  Multidimensional Uncertainty and Herd Behavior in Financial Markets , 1998 .

[56]  J. Graham Herding Among Investment Newsletters: Theory and Evidence , 1998 .

[57]  Wynne W. Chin,et al.  On the use, usefulness, and ease of use of structural equation modeling in MIS research: a note of caution , 1995 .

[58]  Lori Rosenkopf,et al.  INSTITUTIONAL AND COMPETITIVE BANDWAGONS: USING MATHEMATICAL MODELING AS A TOOL TO EXPLORE INNOVATION DIFFUSION , 1993 .

[59]  D. Acemoglu Learning about Others' Actions and the Investment Accelerator , 1993 .

[60]  A. Banerjee,et al.  A Simple Model of Herd Behavior , 1992 .

[61]  Izak Benbasat,et al.  Development of an Instrument to Measure the Perceptions of Adopting an Information Technology Innovation , 1991, Inf. Syst. Res..

[62]  Jane M. Howell,et al.  Personal Computing: Toward a Conceptual Model of Utilization , 1991, MIS Q..

[63]  H C Triandis,et al.  Values, attitudes, and interpersonal behavior. , 1980, Nebraska Symposium on Motivation. Nebraska Symposium on Motivation.

[64]  H. Simon,et al.  From substantive to procedural rationality , 1976 .

[65]  J. Keynes The General Theory of Employment , 1937 .