Individuals' Internet Security Perceptions and Behaviors: Polycontextual Contrasts Between the United States and China

Little is known about the context sensitivity of users’ online security perceptions and behaviors to national and individual attributes, and there is inadequate research about the spectrum of users’ behaviors in dealing with online security threats. In addressing this gap, this paper draws on two complementary theoretical bases: (1) the contextualization of the protection motivation theory (PMT) to online security behavior and (2) a polycontextual lens for the cross-national comparison of users’ security behaviors in the United States and China. The conceptualized model is tested based on 718 survey observations collected from the United States and China. The results support our model and show the divergence between the United States, an exemplar of modern Western society, and China, an exemplar of traditional Eastern society, in forming threat perceptions and in seeking help and avoidance as coping behaviors. Our results also uncovered the significant moderating impacts of espoused culture on the way perceptions of security threats and coping appraisals influence security behaviors. Our findings underline the importance of context-sensitive theory building in security research and provide insights into the motivators and moderators of individuals’ online security behaviors in the two nations.

[1]  K Witte,et al.  Predicting risk behaviors: development and validation of a diagnostic scale. , 1996, Journal of health communication.

[2]  R R McCrae Situational determinants of coping responses: loss, threat, and challenge. , 1984, Journal of personality and social psychology.

[3]  Kenneth A. Holroyd,et al.  The hierarchical factor structure of the coping strategies inventory , 1989, Cognitive Therapy and Research.

[4]  Matthew K. O. Lee,et al.  Digital Inclusiveness--Longitudinal Study of Internet Adoption by Older Adults , 2006, J. Manag. Inf. Syst..

[5]  Deborah Compeau,et al.  Computer Self-Efficacy: Development of a Measure and Initial Test , 1995, MIS Q..

[6]  Young U. Ryu,et al.  International Conference on Information Systems ( ICIS ) December 2005 I Am Fine but You Are Not : Optimistic Bias and Illusion of Control on Information Security , 2017 .

[7]  Steven Furnell,et al.  Assessing the security perceptions of personal Internet users , 2007, Comput. Secur..

[8]  Susannah Fox,et al.  Generations online in 2009 , 2009 .

[9]  Ritu Agarwal,et al.  Practicing Safe Computing: A Multimedia Empirical Examination of Home Computer User Security Behavioral Intentions , 2010, MIS Q..

[10]  M. Goldberg,et al.  What to Convey in Antismoking Advertisements for Adolescents: The use of Protection Motivation Theory to Identify Effective Message Themes , 2003 .

[11]  Younghwa Lee,et al.  Investigating factors affecting the adoption of anti-spyware systems , 2005, CACM.

[12]  R. W. Rogers,et al.  A Protection Motivation Theory of Fear Appeals and Attitude Change1. , 1975, The Journal of psychology.

[13]  Qing Hu,et al.  The Centrality of Awareness in the Formation of User Behavioral Intention toward Protective Information Technologies , 2007, J. Assoc. Inf. Syst..

[14]  R. Lazarus Coping theory and research: past, present, and future. , 1993, Psychosomatic medicine.

[15]  Robert LaRose,et al.  Promoting personal responsibility for internet safety , 2008, CACM.

[16]  R. Bhagat Culture's Consequences: Comparing Values, Behaviors, Institutions, and Organizations Across Nations , 2002 .

[17]  Cal D. Stoltenberg,et al.  Self-efficacy expectancy, outcome expectancy, and outcome value: Relative effects on behavioral intentions. , 1986 .

[18]  R W Rogers,et al.  Fear appeals and attitude change: effects of a threat's noxiousness, probability of occurrence, and the efficacy of coping responses. , 1976, Journal of personality and social psychology.

[19]  Yajiong Xue,et al.  Understanding Security Behaviors in Personal Computer Usage: A Threat Avoidance Perspective , 2010, J. Assoc. Inf. Syst..

[20]  H. Leventhal,et al.  EFFECTS OF FEAR AND SPECIFICITY OF RECOMMENDATION UPON ATTITUDES AND BEHAVIOR. , 1965, Journal of personality and social psychology.

[21]  R. W. Rogers,et al.  Protection motivation and self-efficacy: A revised theory of fear appeals and attitude change , 1983 .

[22]  Yajiong Xue,et al.  Avoidance of Information Technology Threats: A Theoretical Perspective , 2009, MIS Q..

[23]  Irene Woon,et al.  A Protection Motivation Theory Approach to Home Wireless Security , 2005, ICIS.