International Journal of Scientific & Technology Research

Home About Us Scope Editorial Board Blog/Latest News Contact Us
10th percentile
Powered by  Scopus
Scopus coverage:
Nov 2018 to May 2020


IJSTR >> Volume 10 - Issue 8, August 2021 Edition

International Journal of Scientific & Technology Research  
International Journal of Scientific & Technology Research

Website: http://www.ijstr.org

ISSN 2277-8616

Behaviours Of Mobile Users: Impact On Information Security

[Full Text]



Luis M. Cardona-Hernández, Isabel Rivera-Ruiz



Perceived vulnerability, Perceived severity, attitude towards behavior, Safe behavior, mobile devices, protection motivation theory, theory of planned behavior.



The objective of this empirical study was to measure a set of factors associated with the safe behavior of mobile device users. An adapted model was created using protection motivation theory, theory of reasoned action, and theory of planned behavior to predict the intention to have a safe behavior that leads to a safe conduct. The research was non-experimental with a transversal-descriptive, correlational-causal design. A survey was developed to test the relationships. The sample of this research (292) was only people who own a mobile device and use it in some way as part of the work, whether provided by the company or through BYOD The results clearly define how technological advances in mobile devices have brought new security risks. It was found that users do not feel fear or threats when using mobile devices. This research revealed the importance of creating awareness among users of mobile devices from the dangers they are exposed when accessing bank accounts, social networks, company databases, emails, among others.



[1] Agudelo, C. A., Bosua, R., Ahmad, A., & Maynard, S. B. (2015). Understanding Knowledge Leakage & BYOD (Bring Your Own Device): A Mobile Worker Perspective. Australasian Conference on Information Systems
[2] Al-khatib, A. A., & Hammood, W. A. (2017). Mobile malware and defending systems: Comparison study. International Journal of Electronics and Information Engineering, 6(2), 116-123.
[3] Alraja, M. N., Farooque, M. M. J., & Khashab, B. (2019). The effect of security, privacy, familiarity, and trust on users’ attitudes toward the use of the IoT-based healthcare: the mediation role of risk perception. IEEE Access, 7, 111341-111354.
[4] Baillette, P., & Barlette, Y. (2018). BYOD-related innovations and organizational change for entrepreneurs and their employees in SMEs. Journal of Organizational Change Management.
[5] Bauer, S., & Bernroider, E. W. (2017). From information security awareness to reasoned compliant action: analyzing information security policy compliance in a large banking organization. ACM SIGMIS Database: the DATABASE for Advances in Information Systems, 48(3), 44-68.
[6] Bhuyan, S. S., Kim, H., Isehunwa, O. O., Kumar, N., Bhatt, J., Wyant, D. K., ... & Dasgupta, D. (2017). Privacy and security issues in mobile health: Current research and future directions. Health policy and technology, 6(2), 188-191.
[7] Blythe, J. M., Coventry, L., & Little, L. (2015). Unpacking security policy compliance: The motivators and barriers of employees’ security behaviors. In Eleventh Symposium on Usable Privacy and Security (SOUPS 2015) (pp. 103-1 Blythe22).
[8] Boer, H., & Seydel, E. R. 1996. “Protection motivation theory”.
[9] Boiko, A., & Shendryk, V. (2017). System integration and security of information systems. Procedia Computer Science, 104, 35-42.
[10] Bonderud, D. (2017). BYOD Policy: Pay Up or Play the Game?. Forbes Media LLC.
[11] Boss, S. R., Galletta, D. F., Lowry, P. B., Moody, G. D., & Polak, P. (2015). What Do Users Have to Fear? Using Fear Appeals to Engender Threats and Fear that Motivate Protective Security Behaviors. MIS Quarterly (MISQ), 39(4), 837-864.
[12] Branley, D. B., & Covey, J. (2018). Risky behavior via social media: The role of reasoned and social reactive pathways. Computers in Human Behavior, 78, 183-191.
[13] Brown, T. A. (2015). Confirmatory factor analysis for applied research. Guilford Publications.
[14] Chen, H., Li, W. (2017). Mobile device users’ privacy security assurance behavior: A technology threat avoidance perspective. Information & Computer Security. Emerald Vol. 25 Issue: 3, 330-344, doi-org.librarylogin.suagm.edu/10.1108/ICS-04-2016-0027
[15] Chen, H., Li, Y., Chen, L., & Yin, J. (2020). Understanding employees' adoption of the Bring-Your-Own-Device (BYOD): the roles of information security–related conflict and fatigue. Journal of Enterprise Information Management.
[16] Cheung, M. F., & To, W. M. (2017). The influence of the propensity to trust on mobile users' attitudes toward in-app advertisements: An extension of the theory of planned behavior. Computers in Human Behavior, 76, 102-111.
[17] Chin, W., Cheah, J. H., Liu, Y., Ting, H., Lim, X. J., & Cham, T. H. (2020). Demystifying the role of causal-predictive modeling using partial least squares structural equation modeling in information systems research. Industrial Management & Data Systems.
[18] Chunata, I., & de Jesús, M. (2015). Guía de procedimientos para el manejo de incidentes en dispositivos móviles mediante análisis forense.
[19] Cilliers, L. (2020). Wearable devices in healthcare: Privacy and information security issues. Health information management journal, 49(2-3), 150-156.
[20] De Luna, I. R., Liébana-Cabanillas, F. J., Montoro-Ríos, F. J., & Luz, A. R. G. (2015). Nuevas perspectivas sobre el comportamiento del consumidor para la adopción del pago móvil sin contacto. Desenvolve Revista de Gestão do Unilasalle, 4(1), p-65.
[21] Dokuchaev, V. A., Maklachkova, V. V., & Statev, V. Y. (2020). Classification of personal data security threats in information systems. T-Comm-Телекоммуникации и Транспорт, 14(1).
[22] Fichbein, A. (1975). Belief, Attitude, Intention and Behavior.
[23] Garba, A. B., Armarego, J., Murray, D., & Kenworthy, W. (2015). Review of the information security and privacy challenges in Bring Your Own Device (BYOD) environments. Journal of Information Privacy and Security, 11(1), 38-54.
[24] Ghafir, I., Saleem, J., Hammoudeh, M., Faour, H., Prenosil, V., Jaf, S., ... & Baker, T. (2018). Security threats to critical infrastructure: the human factor. The Journal of Supercomputing, 74(10), 4986-5002.
[25] Hair Jr, J. F., Wolfinbarger, M., Money, A. H., Samouel, P., & Page, M. J. (2015). Essentials of business research methods. Routledge.
[26] Hubert, M., Blut, M., Brock, C., Backhaus, C., & Eberhardt, T. (2017). Acceptance of smartphone‐based mobile shopping: Mobile benefits, customer characteristics, perceived risks, and the impact of application context. Psychology & Marketing, 34(2), 175-194.
[27] Humaidi, N., & Balakrishnan, V. (2018). Indirect effect of management support on users’ compliance behaviour towards information security policies. Health Information Management Journal, 47(1), 17-27.
[28] Jayakumar, P., Lawrence, L., Chean, R. L. W., & Brohi, S. N. (2019, August). A Review and Survey on Smartphones: The Closest Enemy to Privacy. In International Conference for Emerging Technologies in Computing (pp. 106-118). Springer, Cham.
[29] Karyda, M. (2017). Fostering Information Security Culture in Organizations: A Research Agenda. In MCIS (p. 28).
[30] Keshtkarjahromi, Y., Seferoglu, H., Ansari, R., & Khokhar, A. (2018). Device-to-device networking meets cellular via network coding. IEEE/ACM Transactions on Networking, 26(1), 370-383.
[31] Krushkov, N. (2018). Identifying and Managing Protected Information Types in Information Society. Economic Alternatives, (3), 311-324.
[32] Macía, N., Lanfranco, E. F., Venosa, P., & Sabolansky, A. J. (2015). Uso de dispositivos móviles y BYOD: Su impacto en la seguridad. In XVII Workshop de Investigadores en Ciencias de la Computación (Salta, 2015).
[33] Mamonov, S., & Benbunan-Fich, R. (2018). The impact of information security threat awareness on privacy-protective behaviors. Computers in Human Behavior, 83, 32-44.
[34] McGill, T., & Thompson, N. (2017). Old risks, new challenges: exploring differences in security between home computer and mobile device use. Behaviour & Information Technology, 36(11), 1111-1124.
[35] Miller, Z. D. (2017). The enduring use of the theory of planned behavior. Human Dimensions of Wildlife, 22(6), 583-590.
[36] Miralles, F., Giones, F., & Gozun, B. (2017). Does direct experience matter? Examining the consequences of current entrepreneurial behavior on entrepreneurial intention. International Entrepreneurship and Management Journal, 13(3), 881-903.
[37] National Conference of States Legislature. https://www.ncsl.org/ (marzo, 2021).
[38] Olalere, M., Abdullah, M. T., Mahmod, R., & Abdullah, A. (2015). A Review of Bring Your Own Device on Security Issues. SAGE Open, 5(2), 2158244015580372.
[39] Ozturk, S., Cakin, H., Kurtuldu, H., Kocak, O., Erol, F. S., & Kaplan, M. (2017). Smartphones and programmable shunts: Are these indispensable phones safe and smart? World neurosurgery, 102, 518-525.
[40] Ringle, C. M., Sarstedt, M., Mitchell, R., & Gudergan, S. P. (2020). Partial least squares structural equation modeling in HRM research. The International Journal of Human Resource Management, 31(12), 1617-1643.
[41] Rogers, R. W. (1975). A protection motivation theory of fear appeals and attitude change. The Journal of Psychology, 91, 93-114.
[42] Ruvalcaba, M. M., Arámbula, R. E., & Castillo, S. G. (2015). Impacto del uso de la tecnología móvil en el comportamiento de los niños en las relaciones interpersonales Impact of the use of mobile technology in the behavior of children in interpersonal relationships. Revista EDUCATECONCIENCIA, 5(6).
[43] Safa, N. S., Sookhak, M., Von Solms, R., Furnell, S., Ghani, N. A., & Herawan, T. (2015). Information security conscious care behaviour formation in organizations. Computers & Security, 53, 65-78.
[44] Sarstedt, M., Ringle, C. M., & Hair, J. F. (2017). Partial least squares structural equation modeling. Handbook of market research, 26(1), 1-40.
[45] Schuetz, S. W., Benjamin Lowry, P., Pienta, D. A., & Bennett Thatcher, J. (2020). The effectiveness of abstract versus concrete fear appeals in information security. Journal of Management Information Systems, 37(3), 723-757.
[46] Shave, L. (2018). The CIA of security and access. IQ: The RIM Quarterly, 34(2), 18-22.
[47] Singh, M. M., Chan, C. W., & Zulkefli, Z. (2017). Security and privacy risks awareness for bring your own device (BYOD) paradigm. International Journal of Advanced Computer Science and Applications, 8(2), 53-62.
[48] Surwade, Y. P., & Patil, H. J. (2019). Information Security. E-Journal of Library and Information Science, 458-466.
[49] Tham, J., Ab Yazid, M. S., Khatibi, A. A., & Azam, S. F. (2017). Internet and data security–understanding customer perception on trusting virtual banking security in Malaysia. European Journal of Social Sciences Studies.
[50] Wall, J. D., & Buche, M. W. (2017). To fear or not to fear? A critical review and analysis of fear appeals in the information security context. Communications of the Association for Information Systems, 41(1), 13.
[51] Wang, W. T., Ou, W. M., & Chen, W. Y. (2019). The impact of inertia and user satisfaction on the continuance intentions to use mobile communication applications: A mobile service quality perspective. International Journal of Information Management, 44, 178-193.
[52] Widyarini, L. A. (2017). Analisis Niat Perilaku Menggunakan Internet Banking di Kalangan Pengguna Internet di Surabaya. Jurnal Widya Manajemen & Akuntansi, 5(1).
[53] Yu, D., Li, Y., Xu, F., Zhang, P., & Kostakos, V. (2018). Smartphone app usage prediction using points of interest. Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies, 1(4), 1-21.