Evaluating the Behavior of Users of Mobile Electronic Devices with the Emphasis on Protection Motivation Theory of Data Breach: a Case Study of Graduate Students

Iranian Journal of Information Processing and Management(2021)

引用 0|浏览2
暂无评分
摘要
This study tries to evaluate the experimental behavior of graduate students of Ilam University when using mobile electronic devices (mobile phones, tablets and laptops) based on the protection motivation theory of data breach. This research is of applied-survey type. The statistical population of research includes graduate students of Ilam University. Data collection tool was based on the questionnaires introduced by Boss et al., Woon et al., Claar and Johnson, Johnson and Warkentin, and Posey et al. For data analysis, structural equation modeling was used to fit the model and test the hypotheses of research in AMOS software using partial least squares method. Results indicated that there is a positive relationship between the perceived threat sensitivity, response effectiveness, self-efficacy and the possibility of using the security of mobile electronic devices with the protection motivation. In addition, the findings showed that there is not a meaningful relationship between the perceived threat intensity and the motivation of protecting the mobile electronic devices. There is a negative (indirect) relationship between the perceived response cost and the protection motivation. Generally, this study emphasized that the confrontational assessment process is a more important factor than the threat assessment process in increasing users’ protection motivation.
更多
查看译文
关键词
mobile rlectronic devices,protection motivation theory,data breach
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络
Chat Paper
正在生成论文摘要