Applying attitude theory to determine user security approaches

Keywords: attitude theory, security attitude, mobile device security, information security

Abstract


Mobile phones and internet form a crucial part of modern life, which raises important questions, such as security, data protection and privacy. Countless studies examine what influences users' approaches towards security. The attitude theory gives the basic background to the present study through which the topics of cyber safety and security, data protection and privacy are examined. The three components of attitude, which served as the three pillars of the applied survey, are: (1) the cognitive component (belief and knowledge), (2) the affective component (feelings) and (3) the behavioural component (the effect of the attitude on the users’ behaviour). Self-reported security knowledge and feelings about security were assessed, out of which three factors were formed using EFA. The security behaviour of each factor was examined to determine the consistency of the responses. Moreover, the three factors helped to identify three separate clusters. As a conclusion it can be stated that the theory of attitudes can help understanding user security behaviour better. Finally, future research directions are suggested. 

Author Biographies

Kata Rebeka Szűcs, ÓBUDA UNIVERSITY

PhD student

Doctoral School on Safety and Security Sciences, Népszínház u. 8., Budapest, Hungary

Andrea Tick, Óbuda University

Andrea Tick PhD is a habilitated associate professor at Óbuda University Keleti Faculty of Business and Management. Her research interests include internet security, cyber security, user behavior regarding digital learning, cyber security awareness and the human factor in cyber security. She also does research in digitalisation and digital transformation of SMESs. She has a BSc in Economics, an MA in Mathematics, Computer Science and English language and literature. Her PhD and Dr. habil research areas are digital teaching and learning with special cyber security awareness.

Regina Zsuzsanna Reicher, BUDAPEST BUSINESS SCHOOL

Associate professor

Faculty of Finance and Accountancy, Buzogány u. 10-12., Budapest, Hungary

References

Ashenden, D. (2018). In their own words: employee attitudes towards information security. Information and Computer Security, 26 (3), 327-337.

Aydin, K., Say, A. T., Ustaahmetoglu, E., & Yamamoto, G. T. (2007). Attitudes of Potential Consumers toward Country-of-Origin and Auto Brand Images. Serbian Journal of Management, 2 (2), 205 - 216.

Balapour, A., Nikkhah, R. H., & Sabherwal, R. (2020). Mobile application security: Role of perceived privacy as the predictor of security perceptions. International Journal of Information Management, 52, 102063.

Behardien, R., & Brown, I. (2022). Factors Influencing Smartphone End-User Security Behaviour – The Case of Young Adults in South Africa. 2022 IST-Africa Conference (IST-Africa), (pp. 1-10). Retrieved from https://ieeexplore.ieee.org/document/9845602

Chan, J. K. (2008). Understanding the Tourists' Attitudes toward Participating Nature-Based Tourism. Proceedings for Euro-Asia conference on environment and corporate social responsibility: tourism and management session, 156-168. Retrieved from https://www.webofscience.com/wos/woscc/full-record/WOS:000263364600018

Gerber, N., Gerber, P., & Volkamer, M. (2018). Explaining the privacy paradox: A systematic review of literature investigating privacy attitude and behavior. Computers & Security, 77, 226-261.

Harris, M. A., Brookshire, R., & Chin, A. G. (2016). Identifying factors influencing consumers’ intent to install mobile applications. International Journal of Information Management, 36 (3), 441-450.

Hofmeister-Tóth, Á. (2014). The Fundamentals of Consumer behavior. Budapest, Hungary: Akadémiai Kiadó (AK), (in Hungarian)

Kadena, E., & Keszthelyi, A. (2022). Identifying Failures in Mobile Devices. Interdisciplinary Description of Complex Systems, 20 (3), 222-229.

Kadena, E., Koçak, S., Takács-György, K., & Keszthelyi, A. (2022). FMEA in Smartphones: A Fuzzy Approach. MATHEMATICS, 10(3), 513.

KSH. (2021). 12.1.3.4. Internet users [as a percentage of the population aged 16-74]. Budapest, Hungary: KSH (Hungarian Central Statistical Office). Retrieved from https://www.ksh.hu/stadat_files/ikt/hu/ikt0029.html. (in Hungarian)

KSH. (2022a). 12.1.1.1. Main indicators of information and communication. Budapest, Hungary: KSH (Hungarian Central Statistical Office). Retrieved from https://www.ksh.hu/stadat_files/ikt/hu/ikt0001.html. (in Hungarian)

KSH. (2022b). Faster internet with a stable wireless net data processing form - Internet usage, 2022. Quarter II. Budapest, Hungary: KSH (Hungarian Central Statistical Office). Retrieved from https://www.ksh.hu/infografika/2022/internet_infografika_20222.pdf. (in Hungarian)

KSH. (2022c). 12.1.1.14. Percentage of households connected to the internet. Budapest, Hungary: KSH (Hungarian Central Statistical Office). Retrieved from https://www.ksh.hu/stadat_files/ikt/hu/ikt0016.html. (in Hungarian)

KSH. (2022d). 12.1.1.16. Frequency distribution of internet use. Budapest, Hungary: KSH (Hungarian Central Statistical Office). Retrieved from https://www.ksh.hu/stadat_files/ikt/hu/ikt0018.html. (In Hungarian)

KSH. (2022e). 22.1.1.2. Number and average age of the population by sex. Budapest, Hungary: KSH (Hungarian Central Statistical Office). Retrieved from https://www.ksh.hu/stadat_files/nep/hu/nep0002.html. (in Hungarian)

KSH. (2022f). 22.1.2.1. Population by sex, county and region, 1 January. Budapest, Hungary: KSH (Hungarian Central Statistical Office). Retrieved from https://www.ksh.hu/stadat_files/nep/hu/nep0034.html. (in Hungarian)

Lazareva, E., Zakharova, A., Nikolaev, E., & Emelianova, M. (2019). Professional culture and attitude to personality security in future specialists. Professional culture of the specialists of the future- Book SeriesEuropean Proceedings of Social and Behavioural Sciences, 73, 785-793.

Münnich, Á., Nagy , Á., & Abari , K. (2006). Multivariate statistics for psychology students. Debrecen, Hungary: Bölcsész Konzorcium. Retrieved from http://gepeskonyv.btk.elte.hu/adatok/Pszichologia/8M%FCnnich/pages/p_2_9.xml. (in Hungarian)

Rahim, N., Hamid, S., Mat Kiah, M., Shamshirband, S., & Furnell , S. (2015). A systematic review of approaches to assessing cybersecurity awareness. Kybernetes, 44, 606-622.

Rekettye , G., Tóth , T., & Malota , E. (2016). International Marketing - Online version. Budapest, Hungary: Akadémiai Publisher. Retrieved from https://mersz.hu/hivatkozas/dj76nm_116. (in Hungarian)

Szatmáry, R., & Szikora, P. (2023). Factors influencing technostress. In A. Szakál (Ed.), 2023 IEEE 21st World Symposium on Applied Machine Intelligence and Informatics (SAMI) (pp. 299-306). Herlany,: Slovakia. doi:10.1109/SAMI58000.2023.10044527

Szucs, K. (2019). Mobile security basics to improve personal and corporate safety. National security review : periodical of the military national security service, (2), 56-72.

Thompson, N., McGill, T., & Wang, X. (2017). “Security begins at home”: Determinants of home computer and mobile device security behavior. Computers & Security, 70, 376-391.

Tick, A., Cranfield, D. J., Venter, I. M., Renaud, K. V., & Blignaut, R. J. (2021). Comparing Three Countries’ Higher Education Students’ Cyber Related Perceptions and Behaviours during COVID-19. Electronics , 10 (22), 2865.

Tsai, C.-Y., Shih, W.-L., Hsieh, F.-P., Chen , Y.-A., Lin, C.-L., & Wu, H.-J. (2022). Using the ARCS model to improve undergraduates’ perceived information security protection motivation and behavior. Computers & Education, 181. 104449

Published
2024/05/20
Section
Original Scientific Paper