Factors that influence secure behaviour while using mobile digital devices
Purpose The use of mobile digital devices requires secure behaviour while using these devices. To influence this behaviour, one should be able to adequately measure the behaviour. The purpose of this study is to establish a model for measuring secure behaviour, and to use this model to measure the secure behaviour of individuals while using mobile digital devices such as smartphones and laptops. Design/methodology/approach Based on a wide-ranging questionnaire ( N = 1000), this study investigates the degree of influence that a relatively large number of factors have on secure behaviour while using mobile digital devices. These factors include knowledge and cognitive attitude, but also affective attitude, as well as several types of bias. Findings This study has provided a model for measuring secure behaviour. The results of the measurements show that knowledge, bias, cognitive attitude and affective attitude all have impact on secure behaviour while using mobile digital devices. Moreover, none of these factors is of minor importance. Practical implications This study shows that it is important to also consider previously undervalued factors, such as affective attitude and various types of bias, when designing interventions to improve secure behaviour while using mobile digital devices. Originality/value Most research on secure behaviour has only looked at a small number of influencing factors, usually limited to knowledge and cognitive attitude. This study shows that one needs a more elaborate model for measuring secure behaviour, and that previously undervalued factors have a clear influence on secure behaviour.
Year of publication: |
2024
|
---|---|
Authors: | Spruit, Marcel ; Oosting, Deborah ; Kreffer, Céline |
Published in: |
Information & Computer Security. - Emerald Publishing Limited, ISSN 2056-497X, ZDB-ID 2810936-3. - Vol. 32.2024, 5, p. 729-747
|
Publisher: |
Emerald Publishing Limited |
Subject: | Information security | Individual behaviour | Personal computing |
Saved in:
Saved in favorites
Similar items by subject
-
Spot the phish by checking the pruned URL
Volkamer, Melanie, (2016)
-
Rautenstrauch, Claus, (1997)
-
Computerstile : vom individuellen Umgang mit dem PC im Alltag
Bühl, Achim, (1999)
- More ...
Similar items by person