Understanding user behaviour in coping with security threats of mobile device loss and theft

@article{Tu2014UnderstandingUB,
  title={Understanding user behaviour in coping with security threats of mobile device loss and theft},
  author={Zhiling Tu and Yufei Yuan and Norman P. Archer},
  journal={IJMC},
  year={2014},
  volume={12},
  pages={603-623}
}
Mobile devices have been widely used by people to meet their information processing and communication needs for both work and personal life. However, the loss and theft of these devices has created a new type of information security threat to the individuals as well as to the companies involved. Based on protection motivation theory (PMT), this study constructs a user behaviour model to empirically investigate the key factors that may affect end user behaviours in coping with mobile device loss… CONTINUE READING

References

Publications referenced by this paper.
Showing 1-9 of 9 references

SE2 I have the capability to keep my mobile devices in safe place to avoid it being lost or stolen

Adapted Workman
2008
View 4 Excerpts
Highly Influenced

CI2 I intend to take measures to prevent unauthorised access to my services through my lost or stolen mobile devices

Davis
1989
View 5 Excerpts
Highly Influenced

Cognitive and physiological process in fear appeals and attitude change : a revised theory of protection motivation ’

R. W. Rogers
1983
View 15 Excerpts
Highly Influenced

A Protection Motivation Theory of Fear Appeals and Attitude Change1.

The Journal of psychology • 1975
View 14 Excerpts
Highly Influenced

The efforts and financial cost to implement protective measures exceeds benefits

Adapted Workman
2008

Similar Papers

Loading similar papers…