2016
DOI: 10.1016/j.dss.2016.09.013
|View full text |Cite
|
Sign up to set email alerts
|

Continuance of protective security behavior: A longitudinal study

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

2
41
0

Year Published

2018
2018
2022
2022

Publication Types

Select...
7
1
1

Relationship

0
9

Authors

Journals

citations
Cited by 94 publications
(52 citation statements)
references
References 76 publications
2
41
0
Order By: Relevance
“…However, as we argue, theories applied to understand continued use of hedonic systems do not suit the emergency context, in which most interaction with the app is prompted by occasional emergency notifications. In particular, explaining continued use with theories that consider drivers such as satisfaction, hedonic value, habit, flow, or perceived enjoyment (Franque et al 2020 ), while appropriate for hedonic systems (Warkentin et al 2016 ) such as social media apps (Chang and Zhu 2012 ), is less appropriate for emergency warning systems. For instance, while theories on IS continuance stress the role of satisfaction in the sense of a pleasurable user experience for the continuance of use intention (Bhattacherjee and Premkumar 2004 ; Shaikh and Karjaluoto 2015 ), this determinant is less relevant with respect to protective behavior.…”
Section: Literature Reviewmentioning
confidence: 99%
See 1 more Smart Citation
“…However, as we argue, theories applied to understand continued use of hedonic systems do not suit the emergency context, in which most interaction with the app is prompted by occasional emergency notifications. In particular, explaining continued use with theories that consider drivers such as satisfaction, hedonic value, habit, flow, or perceived enjoyment (Franque et al 2020 ), while appropriate for hedonic systems (Warkentin et al 2016 ) such as social media apps (Chang and Zhu 2012 ), is less appropriate for emergency warning systems. For instance, while theories on IS continuance stress the role of satisfaction in the sense of a pleasurable user experience for the continuance of use intention (Bhattacherjee and Premkumar 2004 ; Shaikh and Karjaluoto 2015 ), this determinant is less relevant with respect to protective behavior.…”
Section: Literature Reviewmentioning
confidence: 99%
“…For instance, while theories on IS continuance stress the role of satisfaction in the sense of a pleasurable user experience for the continuance of use intention (Bhattacherjee and Premkumar 2004 ; Shaikh and Karjaluoto 2015 ), this determinant is less relevant with respect to protective behavior. IS use in the context of security behavior is not aimed at personal satisfaction, as it is in hedonic systems (Warkentin et al 2016 ).…”
Section: Literature Reviewmentioning
confidence: 99%
“…The purpose of this paper is to provide a replication of the core PMT models as used by Warkentin, Johnston, Shropshire, and Barnett (2016) and Siponen, Mahmood, and Pahnila (2014) along with the full PMT nomology as used by Boss et al (2015) and Posey et al (2015). This paper replicates these two different instantiations of the PMT using the voluntary adoption of password manager applications (i.e., applications used to manage a user's passwords across multiple websites and devices) for home end-users.…”
Section: Introductionmentioning
confidence: 99%
“…And, we expect such a high self-efficacy will finally result in the formation of his/her habit of repetitive adherence to privacy policy. A number of studies [3235] have found a relationship between self-efficacy and policy compliance intention or continuance intention to protect security. Further, research on the role of self-efficacy [29] has suggested the importance of self-efficacy on forming habits.…”
Section: Introductionmentioning
confidence: 99%