Cyber-security, Privacy and Ethics of IS

Loading...

Media is loading
 

Paper Number

1474

Paper Type

short

Description

Identity theft continues to pose a serious problem to mobile users. Although many cybersecurity experts have warned that mobiles will be a favorable gateway for hackers to steal user identities, mobile context is being frequently neglected in identity protection literature. Despite the many technical means that have been proposed to solve the problem, motivational aspects of protection are largely overlooked. Further, the discrepancy between individual expectations to protect mobile identities and actual capabilities aggravates the problem. Using the motivational concepts of expectancy-value theory, this study uses a mixed-methods approach to understand the expectancy-capability gap, the motivational-protection gap, and the impact of motivation on the individual intentions to achieve mobile identity protection. We use in-depth interviews to develop a model that is subsequently used in a quantitative study.

Comments

07-Security

Share

COinS
 
Dec 12th, 12:00 AM

Using the Expectancy-Value Theory of Motivation to Understand the Gaps in Mobile Identity Protection.

Identity theft continues to pose a serious problem to mobile users. Although many cybersecurity experts have warned that mobiles will be a favorable gateway for hackers to steal user identities, mobile context is being frequently neglected in identity protection literature. Despite the many technical means that have been proposed to solve the problem, motivational aspects of protection are largely overlooked. Further, the discrepancy between individual expectations to protect mobile identities and actual capabilities aggravates the problem. Using the motivational concepts of expectancy-value theory, this study uses a mixed-methods approach to understand the expectancy-capability gap, the motivational-protection gap, and the impact of motivation on the individual intentions to achieve mobile identity protection. We use in-depth interviews to develop a model that is subsequently used in a quantitative study.

When commenting on articles, please be friendly, welcoming, respectful and abide by the AIS eLibrary Discussion Thread Code of Conduct posted here.