scispace - formally typeset
Open AccessJournal ArticleDOI

Compliance with security guidelines in teenagers

TLDR
Using an extended form of protection motivation theory (PMT) (Rogers, 1983), this paper found that even if teenage computer users believe they are susceptible to being hacked, or that being hacked would be detrimental, it has no bearing on their password choices.
Abstract
What drives teenagers to comply with computer password guidelines? Using an extended form of protection motivation theory (PMT) (Rogers, 1983), we found that even if teenage computer users believe they are susceptible to being hacked, or that being hacked would be detrimental, it has no bearing on their password choices Other motives outside of PMT also drive teenage security behaviour Personal norms fully mediate the relationship between the perceived severity of threat and compliance intentions such that perceived severity is not sufficient to encourage compliance Teenagers must actually feel obligated to comply While personal norms may encourage compliance, concerns about feeling embarrassed or ashamed if their social media accounts are hacked into actually encourages compliance On the other hand, peer influence, such as the fear of being teased about someone hacking into their account, discourages compliance Our study contributes to understanding early security practices and highlights potential differences between adult and teenage behaviours to consider in future studies For example, our findings suggest that password security guidelines alone will not suffice to ensure teenage compliance; they may need enforced password rules at the authentication level to eliminate any opportunity to violate password rules Our study will benefit children and parents as well as organizations that have changed work practices to enable employees to work from home, but which places children in danger of clicking on malicious links on their parents’ computers To our knowledge, this is the first password security study that applies PMT to examine computer-based security behaviours in teenagers

read more

Content maybe subject to copyright    Report

Citations
More filters
Book ChapterDOI

Protecting Organizational Information Security at Home During the COVID-19 Pandemic in Vietnam: Exploratory Findings from Technology-Organization-Environment Framework

TL;DR: In this article , the authors adapt the technology-organization-environment (TOE) framework to investigate the factors that influence how employees in Vietnam protect organizational information security while working from home during the COVID-19 pandemic.
Journal ArticleDOI

Citizen-centric cybersecurity model for promoting good cybersecurity behaviour

TL;DR: In this paper , a citizen-centric cybersecurity model is proposed to promote good cybersecurity behavior by using Protection Motivation Theory (PMT) to feed into the development of a cybersecurity model for promoting good cybersecurity behaviour.
References
More filters
Journal ArticleDOI

Intrinsic and Extrinsic Motivations: Classic Definitions and New Directions.

TL;DR: This review revisits the classic definitions of intrinsic and extrinsic motivation in light of contemporary research and theory and discusses the relations of both classes of motives to basic human needs for autonomy, competence and relatedness.
Book

A primer on partial least squares structural equation modeling (PLS-SEM)

TL;DR: The Second Edition of this practical guide to partial least squares structural equation modeling is designed to be easily understood by those with limited statistical and mathematical training who want to pursue research opportunities in new ways.
Journal ArticleDOI

Reconsidering Baron and Kenny: Myths and Truths about Mediation Analysis

TL;DR: Baron and Kenny's procedure for determining if an independent variable affects a dependent variable through some mediator is so well known that it is used by authors and requested by reviewers almost reflexively.
Journal ArticleDOI

When to use and how to report the results of PLS-SEM

TL;DR: A comprehensive overview of the considerations and metrics required for partial least squares structural equation modeling (PLS-SEM) analysis and result reporting can be found in this paper, where the authors provide an overview of previously and recently proposed metrics as well as rules of thumb for evaluating the research results based on the application of PLSSEM.
Journal ArticleDOI

Computer self-efficacy: development of a measure and initial test

TL;DR: Self-efficacy represents an important individual trait, which moderates organizational influences on an individual's decision to use computers, and is important to the successful implementation of systems in organizations.
Related Papers (5)