fbpx

Enxhia Sala – University of Tirana, Faculty of Economy, Department of Statistics and Applied Informatics, Rruga Arben Broci, 1, 1001, Tirana, Albania

Edlira Martiri – University of Tirana, Faculty of Economy, Department of Statistics and Applied Informatics, Rruga Arben Broci, 1, 1001, Tirana, Albania

 

Keywords:
Theoretical frameworks;
Information security;
Privacy;
Mobile technology

DOI: https://doi.org/10.31410/LIMEN.2023.311

Abstract: This paper provides a comprehensive exploration of theoretical frameworks essential for understanding smartphone usersโ€™ security behavยญior. It delves into the Decomposed Theory of Planned Behavior (DTPB), Techยญnology Acceptance Model (TAM), Protection Motivation Theory (PMT), and Human-Computer Interaction (HCI). Every framework provides distinct perยญspectives on the implementation, acceptance, and usage of security measยญures. Through the integration of these frameworks, researchers get an in-depth understanding of the elements that impact behavioral intentions and actions in the domain of smartphone security. The paper also highlights the evolution and expansion of these frameworks over time, emphasizing their relevance in contemporary research and practical applications. Moreover, it outlines prospective directions for research, such as examining the interacยญtion between developing technology and perceptions of security, evaluatยญing the impact of cultural factors on security practices, and assessing the efยญficacy of interventions.

Download file

LIMEN Conference

9th International Scientific-Business Conference – LIMEN 2023 – Leadership, Innovation, Management and Economics: Integrated Politics of Research – CONFERENCE PROCEEDINGS, Hybrid (Graz University of Technology, Graz, Austria), December 7, 2023

LIMEN Conference Proceedings published by the Association of Economists and Managers of the Balkans, Belgrade, Serbia

LIMEN Conference 2023 Conference Proceedings: ISBN 978-86-80194-78-3, ISSN 2683-6149, DOI: https://doi.org/10.31410/LIMEN.2023

Creative Commons Nonย Commercial CC BY-NC: This article is distributed under the terms of the Creative Commons Attribution-Non-Commercial 4.0 License (https://creativecommons.org/licenses/by-nc/4.0/) which permits non-commercial use, reproduction and distribution of the work without further permission.ย 

Suggested citation

Sala, E., & Martiri, E. (2023). Exploring Theoretical Frameworks for Analyzing the Security Behavior of Smartphone Users. In V. Bevanda (Ed.), International Scientific-Business Conference – LIMEN 2023: Vol 9. Conference Proceedings (pp. 311-321). Association of Economists and Managers of the Balkans. https://doi.org/10.31410/LIMEN.2023.311

References

Ajzen, I. (1991). The theory of planned behavior. Organizational Behavior and Human Decision Processes, 50(2), 179-211. doi:10.1016/0749-5978(91)90020-Tย 

Ajzen, I. (2011). The theory of planned behaviour: Reactions and reflections. Psychology & Health, 26(9), 1113-1127.

Al-Gahtani, S. S. (2016). Empirical investigation of e-learning acceptance and assimilation: A structural equation model. Applied Computing and Informatics, 12(1), 27-50.

Arkesteijn, K., & Oerlemans, L. (2005). The early adoption of green power by Dutch houseยญholds. Energy Policy, 33(2), 183-196.

Bandura, A. (1982). Self-efficacy mechanism in human agency. American Psychologist, 37(2), 122-147.

Boer, R. (2005). Trends in continuum mechanics of porous media (Vol. 18). Springer Science & Business Media.

Boss, S. R., Galletta, D. F., Lowry, P. B., Moody, G. D., & Polak, P. (2015). What do systems usยญers have to fear? Using fear appeals to engender threats and fear that motivate protective security behaviors. MIS Quarterly, 39(4), 837-864.

Carroll, J. M. (2014). Human Computer Interaction – brief intro. Interaction Design Foundaยญtion – IxDF.

Compeau, D., Higgins, C. A., & Huff, S. (1999). Social cognitive theory and individual reยญactions to computing technology: A longitudinal study. MIS Quarterly, 23(2), 145-158. doi:10.2307/249749

Davis, F. D. (1989). Perceived Usefulness, Perceived Ease of Use, and User Acceptance of Inforยญmation Technology. MIS Quarterly, 13(3), 319.

Davis, F. D. (1993). User acceptance of information technology: system characteristics, user perceptions and behavioral impacts. International Journal of Man-Machine Studies, 38(3), 475-487.

Davis, F. D., Bagozzi, R. P., & Warshaw, P. R. (1989). User Acceptance of Computer Technolยญogy: A Comparison of Two Theoretical Models. Management Science, 35(8), 982-1003.

Demoulin, N. T., & Coussement, K. (2020). Acceptance of text-mining systems: The signaling role of information quality. Information & Management, 57(1), 103120.

Floyd, D. L., Prentice-Dunn, S., & Rogers, R. W. (2000). A meta-analysis of research on protection motivation theory. Journal of Applied Social Psychology, 30(2), 407โ€“429. doi:10.1111/j.1559-1816.2000.tb02323.x

Franz, C. R., & Robey, D. (1986). Organisational context, user involvement, and the usefulness of information systems. Decision Sciences, 17(3), 329-356.

Gefen, Karahanna, & Straub. (2003). Trust and TAM in Online Shopping: An Integrated Modยญel. MIS Quarterly, 27(1), 51.

Ginzberg, M. J. (1981). Early Diagnosis of MIS Implementation Failure: Promising Results and Unanswered Questions. Management Science, 27(4), 459-478.

Gould, J. D., & Lewis, C. (1985). Designing for usability: key principles and what designers think. Communications of the ACM, 28(3), 300-311.

Hsieh, J. J. P.-A., Rai, A., & Keil, M. (2008). Understanding Digital Inequality: Comparing Continued Use Behavioral Models of the Socio-Economically Advantaged and Disadvanยญtaged. MIS Quarterly, 32(1), 97-126.

Lazarus, R., & Folkman, S. (1984). Stress, appraisal, and coping. New York: Springer Publishยญing Company, Inc.

Lwin, M., & Saw, S. (2007). Protecting children from myopia: A PMT perspective for improvยญing health marketing communications. Journal of Health Communication, 12.

Monat, A., & Lazarus, R. (Eds.). (1991). Stress and coping: An anthology. New York: Columยญbia University Press.

Plotnikoff, R. C., & Trinh, L. (2010). Protection Motivation Theory. Exercise and Sport Sciencยญes Reviews, 38(2), 91โ€“98. doi:10.1097/JES.0b013e3181d49612. PMID: 20335741.

Prentice-Dunn, S., McMath, B., & Cramer, R. (2009). Protection motivation theory and stages of change in sun protective behavior. Journal of Health Psychology, 14.

Rogers, R. W. (1975). A protection motivation theory of fear appeals and attitude change. Jourยญnal of Psychology, 91(1), 93โ€“114. doi:10.1080/00223980.1975.9915803. PMID: 28136248.

Rogers, R. W. (1983). Cognitive and physiological processes in fear appeals and attitude change: A revised theory of protection motivation. Social psychology: A source book, 153-176.

Sharda, R., Barr, S. H., & McDonnell, J. C. (1988). Decision Support System Effectiveness: A Reยญview and an Empirical Test. Management Science, 34(2), 139-159. https://doi.org/10.1287/mnsc.34.2.139ย ย 

Singh, N., Sinha, N., & Liรฉbana-Cabanillas, F. J. (2020). Determining factors in the adoption and recommendation of mobile wallet services in India: Analysis of the effect of innovaยญtiveness, stress to use and social influence. International Journal of Information Manageยญment, 50, 191-205. https://doi.org/10.1016/j.ijinfomgt.2019.05.022

Taylor, S., & Todd, P. (1995a). Decomposition and crossover effects in the theory of planned behavior: A study of consumer adoption intentions. International Journal of Research in Marketing, 12(2), 137-155. doi:10.1016/0167-8116(94)00019-Kย 

Taylor, S., & Todd, P. (1995b). Understanding information technology usage: A test of competยญing models. Information Systems Research, 6(2), 144-176.

Van der Velde, F. W., & Van der Plight, J. (1991). AIDS-related health behavior: Coping, protecยญtion, motivation, and previous behavior. Journal of Behavioral Medicine, 14(5), 429โ€“451. doi:10.1007/bf00845103. PMID: 1744908.

Van Slyke, C., Ilie, V., Lou, H., & Stafford, T. (2007). Perceived critical mass and the adoption of a communication technology. European Journal of Information Systems, 16(3), 270โ€“283.

Venkatesh, V., & Bala, H. (2008). Technology Acceptance Model 3 and a Research Agenda on Interventions. Decision Sciences, 39(2), 273-315.

Connect with us

Association of Economists and Managers of the Balkans โ€“ UdEkoM Balkan
179 Ustanicka St, 11000 Belgrade, Republic of Serbia

https://www.udekom.org.rs/home

Udekom Balkans isย a dynamic non-governmental and non-profit organization, established in 2014 with a mission to foster the growth of scientific knowledge within the Balkan region and beyond. Our primary objectives include advancing the fields of management and economics, as well as providing educational resources to our members and the wider public.

Who We Are: Our members include esteemed university professors from various scientific disciplines, postgraduate students, and experts from ministries, public administrations, private and public enterprises, multinational corporations, associations, and similar organizations.

Building Bridges Together: Over the course of ten years since our establishment, the Association of Economists and Managers of the Balkans has established impactful partnerships with more than 1,000 diverse institutions across the Balkans region and worldwide.

LIMEN conference publications are licensed under aย Creative Commons Attribution-NonCommercial 4.0 International License.