To read this content please select one of the options below:

Empirical assessment of mobile device users’ information security behavior towards data breach: Leveraging protection motivation theory

Anthony Duke Giwah (College of Engineering and Computing, Nova Southeastern University, Fort Lauderdale, Florida, USA)
Ling Wang (College of Engineering and Computing, Nova Southeastern University, Fort Lauderdale, Florida, USA)
Yair Levy (College of Engineering and Computing, Nova Southeastern University, Fort Lauderdale, Florida, USA)
Inkyoung Hur (College of Engineering and Computing, Nova Southeastern University, Fort Lauderdale, Florida, USA)

Journal of Intellectual Capital

ISSN: 1469-1930

Article publication date: 11 November 2019

Issue publication date: 28 May 2020

1367

Abstract

Purpose

The purpose of this paper is to investigate the information security behavior of mobile device users in the context of data breach. Much of the previous research done in user information security behavior have been in broad contexts, therefore creating needs of research that focuses on specific emerging technologies and trends such as mobile technology.

Design/methodology/approach

This study was an empirical study that gathered survey data from 390 mobile users. Delphi study and pilot study were conducted prior to the main survey study. Partial Least Square Structural Equation Modeling was used to analyze the survey data after conducting pre-analysis data screening.

Findings

This study shows that information security training programs must be designed by practitioners to target the mobile self-efficacy (MSE) of device users. It also reveals that practitioners must design mobile device management systems along with processes and procedures that guides users to take practical steps at protecting their devices. This study shows the high impact of MSE on users’ protection motivation (PM) to protect their mobile devices. Additionally, this study reveals that the PM of users influences their usage of mobile device security.

Originality/value

This study makes theoretical contributions to the existing information security literature. It confirms PM theory’s power to predict user behavior within the context of mobile device security usage. Additionally, this study investigates mobile users’ actual security usage. Thus, it goes beyond users’ intention.

Keywords

Citation

Giwah, A.D., Wang, L., Levy, Y. and Hur, I. (2020), "Empirical assessment of mobile device users’ information security behavior towards data breach: Leveraging protection motivation theory", Journal of Intellectual Capital, Vol. 21 No. 2, pp. 215-233. https://doi.org/10.1108/JIC-03-2019-0063

Publisher

:

Emerald Publishing Limited

Copyright © 2019, Emerald Publishing Limited

Related articles