Understanding User's Behaviors in Coping with Security Threat of Mobile Devices Loss and Theft

As mobile devices widely used for personal and business purpose, mobile devices loss and theft have become one big security threat. In this paper, we analyze the potential risks of mobile devices loss and theft and summarize the countermeasures that can be used to cope with such risks. Based on protection motivation theory, we propose a research framework to investigate the factors that affect users' behavior to cope with the risk of mobile devices loss and theft.

[1]  Younghwa Lee,et al.  Threat or coping appraisal: determinants of SMB executives’ decision to adopt anti-malware software , 2009, Eur. J. Inf. Syst..

[2]  Anne Beaudry,et al.  Understanding User Responses to Information Technology: A Coping Model of User Adaption , 2005, MIS Q..

[3]  Jizhou Sun,et al.  A new design of wearable token system for mobile device security , 2008, IEEE Transactions on Consumer Electronics.

[4]  Alan Goode,et al.  Managing mobile security: How are we doing? , 2010, Netw. Secur..

[5]  Detmar W. Straub,et al.  The amplification effects of procedural justice on a threat control model of information systems security behaviours , 2009, Behav. Inf. Technol..

[6]  Yajiong Xue,et al.  Avoidance of Information Technology Threats: A Theoretical Perspective , 2009, MIS Q..

[7]  D. Cicchetti Emotion and Adaptation , 1993 .

[8]  W. Bearden,et al.  Consumer Self‐Confidence: Refinements in Conceptualization and Measurement , 2001 .

[9]  A. Bandura Self-efficacy mechanism in human agency. , 1982 .

[10]  Detmar W. Straub,et al.  Security lapses and the omission of information security measures: A threat control model and empirical test , 2008, Comput. Hum. Behav..

[11]  Alfred Loo,et al.  Technical opinionSecurity threats of smart phones and Bluetooth , 2009, CACM.

[12]  Wynne W. Chin The partial least squares approach for structural equation modeling. , 1998 .

[13]  A. Bandura Self-efficacy: toward a unifying theory of behavioral change. , 1977, Psychology Review.

[14]  Jon Friedman,et al.  Protecting data on mobile devices: A taxonomy of security threats to mobile computing and review of applicable defenses , 2008, Inf. Knowl. Syst. Manag..

[15]  Ritu Agarwal,et al.  Practicing Safe Computing: A Multimedia Empirical Examination of Home Computer User Security Behavioral Intentions , 2010, MIS Q..

[16]  Yajiong Xue,et al.  Understanding Security Behaviors in Personal Computer Usage: A Threat Avoidance Perspective , 2010, J. Assoc. Inf. Syst..

[17]  J. Rotter Generalized expectancies for internal versus external control of reinforcement. , 1966, Psychological monographs.

[18]  R. Rogers Cognitive and physiological processes in fear appeals and attitude change: a revised theory of prote , 1983 .

[19]  H. Raghav Rao,et al.  Protection motivation and deterrence: a framework for security policy compliance in organisations , 2009, Eur. J. Inf. Syst..

[20]  Murray R. Barrick,et al.  Team Structure and Performance: Assessing the Mediating Role of Intrateam Process and the Moderating Role of Task Type , 2000 .

[21]  R. W. Rogers,et al.  A Protection Motivation Theory of Fear Appeals and Attitude Change1. , 1975, The Journal of psychology.

[22]  Merrill Warkentin,et al.  Fear Appeals and Information Security Behaviors: An Empirical Study , 2010, MIS Q..