Applying attitude theory to determine user security approaches
Abstract
Mobile phones and internet form a crucial part of modern life, which raises important questions, such as security, data protection and privacy. Countless studies examine what influences users' approaches towards security. The attitude theory gives the basic background to the present study through which the topics of cyber safety and security, data protection and privacy are examined. The three components of attitude, which served as the three pillars of the applied survey, are: (1) the cognitive component (belief and knowledge), (2) the affective component (feelings) and (3) the behavioural component (the effect of the attitude on the users’ behaviour). Self-reported security knowledge and feelings about security were assessed, out of which three factors were formed using EFA. The security behaviour of each factor was examined to determine the consistency of the responses. Moreover, the three factors helped to identify three separate clusters. As a conclusion it can be stated that the theory of attitudes can help understanding user security behaviour better. Finally, future research directions are suggested.
References
Ashenden, D. (2018). In their own words: employee attitudes towards information security. Information and Computer Security, 26 (3), 327-337.
Aydin, K., Say, A. T., Ustaahmetoglu, E., & Yamamoto, G. T. (2007). Attitudes of Potential Consumers toward Country-of-Origin and Auto Brand Images. Serbian Journal of Management, 2 (2), 205 - 216.
Balapour, A., Nikkhah, R. H., & Sabherwal, R. (2020). Mobile application security: Role of perceived privacy as the predictor of security perceptions. International Journal of Information Management, 52, 102063.
Behardien, R., & Brown, I. (2022). Factors Influencing Smartphone End-User Security Behaviour – The Case of Young Adults in South Africa. 2022 IST-Africa Conference (IST-Africa), (pp. 1-10). Retrieved from https://ieeexplore.ieee.org/document/9845602
Chan, J. K. (2008). Understanding the Tourists' Attitudes toward Participating Nature-Based Tourism. Proceedings for Euro-Asia conference on environment and corporate social responsibility: tourism and management session, 156-168. Retrieved from https://www.webofscience.com/wos/woscc/full-record/WOS:000263364600018
Gerber, N., Gerber, P., & Volkamer, M. (2018). Explaining the privacy paradox: A systematic review of literature investigating privacy attitude and behavior. Computers & Security, 77, 226-261.
Harris, M. A., Brookshire, R., & Chin, A. G. (2016). Identifying factors influencing consumers’ intent to install mobile applications. International Journal of Information Management, 36 (3), 441-450.
Hofmeister-Tóth, Á. (2014). The Fundamentals of Consumer behavior. Budapest, Hungary: Akadémiai Kiadó (AK), (in Hungarian)
Kadena, E., & Keszthelyi, A. (2022). Identifying Failures in Mobile Devices. Interdisciplinary Description of Complex Systems, 20 (3), 222-229.
Kadena, E., Koçak, S., Takács-György, K., & Keszthelyi, A. (2022). FMEA in Smartphones: A Fuzzy Approach. MATHEMATICS, 10(3), 513.
KSH. (2021). 12.1.3.4. Internet users [as a percentage of the population aged 16-74]. Budapest, Hungary: KSH (Hungarian Central Statistical Office). Retrieved from https://www.ksh.hu/stadat_files/ikt/hu/ikt0029.html. (in Hungarian)
KSH. (2022a). 12.1.1.1. Main indicators of information and communication. Budapest, Hungary: KSH (Hungarian Central Statistical Office). Retrieved from https://www.ksh.hu/stadat_files/ikt/hu/ikt0001.html. (in Hungarian)
KSH. (2022b). Faster internet with a stable wireless net data processing form - Internet usage, 2022. Quarter II. Budapest, Hungary: KSH (Hungarian Central Statistical Office). Retrieved from https://www.ksh.hu/infografika/2022/internet_infografika_20222.pdf. (in Hungarian)
KSH. (2022c). 12.1.1.14. Percentage of households connected to the internet. Budapest, Hungary: KSH (Hungarian Central Statistical Office). Retrieved from https://www.ksh.hu/stadat_files/ikt/hu/ikt0016.html. (in Hungarian)
KSH. (2022d). 12.1.1.16. Frequency distribution of internet use. Budapest, Hungary: KSH (Hungarian Central Statistical Office). Retrieved from https://www.ksh.hu/stadat_files/ikt/hu/ikt0018.html. (In Hungarian)
KSH. (2022e). 22.1.1.2. Number and average age of the population by sex. Budapest, Hungary: KSH (Hungarian Central Statistical Office). Retrieved from https://www.ksh.hu/stadat_files/nep/hu/nep0002.html. (in Hungarian)
KSH. (2022f). 22.1.2.1. Population by sex, county and region, 1 January. Budapest, Hungary: KSH (Hungarian Central Statistical Office). Retrieved from https://www.ksh.hu/stadat_files/nep/hu/nep0034.html. (in Hungarian)
Lazareva, E., Zakharova, A., Nikolaev, E., & Emelianova, M. (2019). Professional culture and attitude to personality security in future specialists. Professional culture of the specialists of the future- Book SeriesEuropean Proceedings of Social and Behavioural Sciences, 73, 785-793.
Münnich, Á., Nagy , Á., & Abari , K. (2006). Multivariate statistics for psychology students. Debrecen, Hungary: Bölcsész Konzorcium. Retrieved from http://gepeskonyv.btk.elte.hu/adatok/Pszichologia/8M%FCnnich/pages/p_2_9.xml. (in Hungarian)
Rahim, N., Hamid, S., Mat Kiah, M., Shamshirband, S., & Furnell , S. (2015). A systematic review of approaches to assessing cybersecurity awareness. Kybernetes, 44, 606-622.
Rekettye , G., Tóth , T., & Malota , E. (2016). International Marketing - Online version. Budapest, Hungary: Akadémiai Publisher. Retrieved from https://mersz.hu/hivatkozas/dj76nm_116. (in Hungarian)
Szatmáry, R., & Szikora, P. (2023). Factors influencing technostress. In A. Szakál (Ed.), 2023 IEEE 21st World Symposium on Applied Machine Intelligence and Informatics (SAMI) (pp. 299-306). Herlany,: Slovakia. doi:10.1109/SAMI58000.2023.10044527
Szucs, K. (2019). Mobile security basics to improve personal and corporate safety. National security review : periodical of the military national security service, (2), 56-72.
Thompson, N., McGill, T., & Wang, X. (2017). “Security begins at home”: Determinants of home computer and mobile device security behavior. Computers & Security, 70, 376-391.
Tick, A., Cranfield, D. J., Venter, I. M., Renaud, K. V., & Blignaut, R. J. (2021). Comparing Three Countries’ Higher Education Students’ Cyber Related Perceptions and Behaviours during COVID-19. Electronics , 10 (22), 2865.
Tsai, C.-Y., Shih, W.-L., Hsieh, F.-P., Chen , Y.-A., Lin, C.-L., & Wu, H.-J. (2022). Using the ARCS model to improve undergraduates’ perceived information security protection motivation and behavior. Computers & Education, 181. 104449
The Author wishes to submit the Work to SJM for publication. To enable SJM to publish the Work and to give effect to the parties’ intention set forth herein, they have agreed to cede the first right to publication and republication in the SJM Journal.
Cession
The Author hereby cedes to SJM, who accepts the cession, to the copyright in and to the paper.
The purpose of the cession is to enable SJM to publish the Work, as first publisher world-wide, and for republication in the SJM Journal, and to grant the right to others to publish the Work world-wide, for so long as such copyright subsists;
SJM shall be entitled to edit the work before publication, as it deems fit, subject to the Authors approval
The Author warrants to SJM that:
- the Author is the owner of the copyright in the Work, whether as author or as reassigned from the Author’s employee and that the Author is entitled to cede the copyright to SJM;
- the paper (or any of its part) is not submitted or accepted for publication in any other Journal;
- the Work is an original work created by the Author;
- the Author has not transferred, ceded, or assigned the copyright, or any part thereof, to any third party; or granted any third party a licence or other right to the copyright, which may affect or detract from the rights granted to SJM in terms of this agreement.
The Author hereby indemnifies the SJM as a body and its individual members, to the fullest extent permitted in law, against all or any claims which may arise consequent to the warranties set forth.
No monetary consideration shall be payable by SJM to the Author for the cession, but SJM shall clearly identify the Author as having produced the Work and ensure that due recognition is given to the Author in any publication of the Work.
Should SJM, in its sole discretion, elect not to publish the Work within 1 year after the date of this agreement, the cession shall lapse and be of no further effect. In such event the copyright shall revert to the Author and SJM shall not publish the Work, or any part thereof, without the Author’s prior written consent.