Enxhia Sala – University of Tirana, Faculty of Economy, Department of Statistics and Applied Informatics, Rruga Arben Broci, 1, 1001, Tirana, Albania
Edlira Martiri – University of Tirana, Faculty of Economy, Department of Statistics and Applied Informatics, Rruga Arben Broci, 1, 1001, Tirana, Albania
Keywords:
Theoretical frameworks;
Information security;
Privacy;
Mobile technology
Abstract: This paper provides a comprehensive exploration of theoretical frameworks essential for understanding smartphone usersโ security behavยญior. It delves into the Decomposed Theory of Planned Behavior (DTPB), Techยญnology Acceptance Model (TAM), Protection Motivation Theory (PMT), and Human-Computer Interaction (HCI). Every framework provides distinct perยญspectives on the implementation, acceptance, and usage of security measยญures. Through the integration of these frameworks, researchers get an in-depth understanding of the elements that impact behavioral intentions and actions in the domain of smartphone security. The paper also highlights the evolution and expansion of these frameworks over time, emphasizing their relevance in contemporary research and practical applications. Moreover, it outlines prospective directions for research, such as examining the interacยญtion between developing technology and perceptions of security, evaluatยญing the impact of cultural factors on security practices, and assessing the efยญficacy of interventions.
Download file
LIMEN Conference
9th International Scientific-Business Conference – LIMEN 2023 – Leadership, Innovation, Management and Economics: Integrated Politics of Research – CONFERENCE PROCEEDINGS, Hybrid (Graz University of Technology, Graz, Austria), December 7, 2023
LIMEN Conference Proceedings published by the Association of Economists and Managers of the Balkans, Belgrade, Serbia
LIMEN Conference 2023 Conference Proceedings: ISBN 978-86-80194-78-3, ISSN 2683-6149, DOI: https://doi.org/10.31410/LIMEN.2023
Creative Commons Nonย Commercial CC BY-NC: This article is distributed under the terms of the Creative Commons Attribution-Non-Commercial 4.0 License (https://creativecommons.org/licenses/by-nc/4.0/) which permits non-commercial use, reproduction and distribution of the work without further permission.ย
Suggested citation
Sala, E., & Martiri, E. (2023). Exploring Theoretical Frameworks for Analyzing the Security Behavior of Smartphone Users. In V. Bevanda (Ed.), International Scientific-Business Conference – LIMEN 2023: Vol 9. Conference Proceedings (pp. 311-321). Association of Economists and Managers of the Balkans. https://doi.org/10.31410/LIMEN.2023.311
References
Ajzen, I. (1991). The theory of planned behavior. Organizational Behavior and Human Decision Processes, 50(2), 179-211. doi:10.1016/0749-5978(91)90020-Tย
Ajzen, I. (2011). The theory of planned behaviour: Reactions and reflections. Psychology & Health, 26(9), 1113-1127.
Al-Gahtani, S. S. (2016). Empirical investigation of e-learning acceptance and assimilation: A structural equation model. Applied Computing and Informatics, 12(1), 27-50.
Arkesteijn, K., & Oerlemans, L. (2005). The early adoption of green power by Dutch houseยญholds. Energy Policy, 33(2), 183-196.
Bandura, A. (1982). Self-efficacy mechanism in human agency. American Psychologist, 37(2), 122-147.
Boer, R. (2005). Trends in continuum mechanics of porous media (Vol. 18). Springer Science & Business Media.
Boss, S. R., Galletta, D. F., Lowry, P. B., Moody, G. D., & Polak, P. (2015). What do systems usยญers have to fear? Using fear appeals to engender threats and fear that motivate protective security behaviors. MIS Quarterly, 39(4), 837-864.
Carroll, J. M. (2014). Human Computer Interaction – brief intro. Interaction Design Foundaยญtion – IxDF.
Compeau, D., Higgins, C. A., & Huff, S. (1999). Social cognitive theory and individual reยญactions to computing technology: A longitudinal study. MIS Quarterly, 23(2), 145-158. doi:10.2307/249749
Davis, F. D. (1989). Perceived Usefulness, Perceived Ease of Use, and User Acceptance of Inforยญmation Technology. MIS Quarterly, 13(3), 319.
Davis, F. D. (1993). User acceptance of information technology: system characteristics, user perceptions and behavioral impacts. International Journal of Man-Machine Studies, 38(3), 475-487.
Davis, F. D., Bagozzi, R. P., & Warshaw, P. R. (1989). User Acceptance of Computer Technolยญogy: A Comparison of Two Theoretical Models. Management Science, 35(8), 982-1003.
Demoulin, N. T., & Coussement, K. (2020). Acceptance of text-mining systems: The signaling role of information quality. Information & Management, 57(1), 103120.
Floyd, D. L., Prentice-Dunn, S., & Rogers, R. W. (2000). A meta-analysis of research on protection motivation theory. Journal of Applied Social Psychology, 30(2), 407โ429. doi:10.1111/j.1559-1816.2000.tb02323.x
Franz, C. R., & Robey, D. (1986). Organisational context, user involvement, and the usefulness of information systems. Decision Sciences, 17(3), 329-356.
Gefen, Karahanna, & Straub. (2003). Trust and TAM in Online Shopping: An Integrated Modยญel. MIS Quarterly, 27(1), 51.
Ginzberg, M. J. (1981). Early Diagnosis of MIS Implementation Failure: Promising Results and Unanswered Questions. Management Science, 27(4), 459-478.
Gould, J. D., & Lewis, C. (1985). Designing for usability: key principles and what designers think. Communications of the ACM, 28(3), 300-311.
Hsieh, J. J. P.-A., Rai, A., & Keil, M. (2008). Understanding Digital Inequality: Comparing Continued Use Behavioral Models of the Socio-Economically Advantaged and Disadvanยญtaged. MIS Quarterly, 32(1), 97-126.
Lazarus, R., & Folkman, S. (1984). Stress, appraisal, and coping. New York: Springer Publishยญing Company, Inc.
Lwin, M., & Saw, S. (2007). Protecting children from myopia: A PMT perspective for improvยญing health marketing communications. Journal of Health Communication, 12.
Monat, A., & Lazarus, R. (Eds.). (1991). Stress and coping: An anthology. New York: Columยญbia University Press.
Plotnikoff, R. C., & Trinh, L. (2010). Protection Motivation Theory. Exercise and Sport Sciencยญes Reviews, 38(2), 91โ98. doi:10.1097/JES.0b013e3181d49612. PMID: 20335741.
Prentice-Dunn, S., McMath, B., & Cramer, R. (2009). Protection motivation theory and stages of change in sun protective behavior. Journal of Health Psychology, 14.
Rogers, R. W. (1975). A protection motivation theory of fear appeals and attitude change. Jourยญnal of Psychology, 91(1), 93โ114. doi:10.1080/00223980.1975.9915803. PMID: 28136248.
Rogers, R. W. (1983). Cognitive and physiological processes in fear appeals and attitude change: A revised theory of protection motivation. Social psychology: A source book, 153-176.
Sharda, R., Barr, S. H., & McDonnell, J. C. (1988). Decision Support System Effectiveness: A Reยญview and an Empirical Test. Management Science, 34(2), 139-159. https://doi.org/10.1287/mnsc.34.2.139ย ย
Singh, N., Sinha, N., & Liรฉbana-Cabanillas, F. J. (2020). Determining factors in the adoption and recommendation of mobile wallet services in India: Analysis of the effect of innovaยญtiveness, stress to use and social influence. International Journal of Information Manageยญment, 50, 191-205. https://doi.org/10.1016/j.ijinfomgt.2019.05.022
Taylor, S., & Todd, P. (1995a). Decomposition and crossover effects in the theory of planned behavior: A study of consumer adoption intentions. International Journal of Research in Marketing, 12(2), 137-155. doi:10.1016/0167-8116(94)00019-Kย
Taylor, S., & Todd, P. (1995b). Understanding information technology usage: A test of competยญing models. Information Systems Research, 6(2), 144-176.
Van der Velde, F. W., & Van der Plight, J. (1991). AIDS-related health behavior: Coping, protecยญtion, motivation, and previous behavior. Journal of Behavioral Medicine, 14(5), 429โ451. doi:10.1007/bf00845103. PMID: 1744908.
Van Slyke, C., Ilie, V., Lou, H., & Stafford, T. (2007). Perceived critical mass and the adoption of a communication technology. European Journal of Information Systems, 16(3), 270โ283.
Venkatesh, V., & Bala, H. (2008). Technology Acceptance Model 3 and a Research Agenda on Interventions. Decision Sciences, 39(2), 273-315.