Research on the influence of fear appeals on APP users' privacy protection behavior

This paper builds a model based on the fear appeals, and explores the factors influencing the willingness of APP users with different experience groups to actively adopt privacy security protection behaviors. 387 samples were collected by questionnaire survey, and path analysis was carried out by using structural equation model to explore the influence mechanism of fear appeals on privacy protection behavior of APP users. We found that perceived threat severity has a positive effect on the self-efficacy, fear and response efficacy of APP users; perceived threat susceptibility has a negative effect on self-efficacy, and it has a positive effect on fear emotion and no significant effect on response efficacy. We also found that there were differences in the influencing factors between groups of users with or without experience in APP privacy protection. This study has certain reference significance for APP operators and service providers providing third-party network security.

[1]  Merrill Warkentin,et al.  Fear Appeals and Information Security Behaviors: An Empirical Study , 2010, MIS Q..

[2]  Torleif Halkjelsvik,et al.  Fear appeals in advanced tobacco control environments: the impact of a national mass media campaign in Norway. , 2013, Health education research.

[3]  A. Bandura The Explanatory and Predictive Scope of Self-Efficacy Theory , 1986 .

[4]  Patrick D. McDaniel,et al.  On lightweight mobile phone application certification , 2009, CCS.

[5]  K. Witte Fear control and danger control: A test of the extended parallel process model (EPPM) , 1994 .

[6]  L. Miller,et al.  Probiotics reduce symptoms of antibiotic use in a hospital setting: a randomized dose response study. , 2014, Vaccine.

[7]  D. Shuman,et al.  The Language of Miranda Warnings in American Jurisdictions: A Replication and Vocabulary Analysis , 2008, Law and human behavior.

[8]  Li Xiang An Android User Privacy Protection System , 2012 .

[9]  Swarat Chaudhuri,et al.  A Study of Android Application Security , 2011, USENIX Security Symposium.

[10]  David A. Wagner,et al.  Analyzing inter-application communication in Android , 2011, MobiSys '11.

[11]  Peter R Harris,et al.  Does heightening risk appraisals change people's intentions and behavior? A meta-analysis of experimental studies. , 2014, Psychological bulletin.

[12]  Lizhuo Wang,et al.  Analysis of alternatives for insulinizing patients to achieve glycemic control and avoid accompanying risks of hypoglycemia. , 2015, Biomedical reports.

[13]  Fatemeh Zahedi,et al.  Individuals' Internet Security Perceptions and Behaviors: Polycontextual Contrasts Between the United States and China , 2016, MIS Q..

[14]  Robert LaRose,et al.  Online safety begins with you and me: Convincing Internet users to protect themselves , 2015, Comput. Hum. Behav..

[15]  W. Gan,et al.  Opposite effects of fear conditioning and extinction on dendritic spine remodelling , 2012, Nature.

[16]  Izak Benbasat,et al.  Information Security Policy Compliance: An Empirical Study of Rationality-Based Beliefs and Information Security Awareness , 2010, MIS Q..

[17]  F. Gresham,et al.  Self-Efficacy Differences Among Mildly Handicapped, Gifted, and Nonhandicapped Students , 1988 .

[18]  Se-Hoon Jeong Visual Metaphor in Advertising: Is the Persuasive Effect Attributable to Visual Argumentation or Metaphorical Rhetoric? , 2008 .

[19]  H. Raghav Rao,et al.  Protection motivation and deterrence: a framework for security policy compliance in organisations , 2009, Eur. J. Inf. Syst..