IDEAS home Printed from https://ideas.repec.org/a/spr/infosf/v24y2022i6d10.1007_s10796-021-10194-w.html
   My bibliography  Save this article

Online Users’ Identity Theft and Coping Strategies, Attribution and Sense of Urgency: A Non-Linear Quadratic Effect Assessment

Author

Listed:
  • A. F. Salam

    (The University of North Carolina at Greensboro)

  • Hua Dai

    (California State University Channel Islands)

  • Lei Wang

    (Penn State University)

Abstract

Defined as someone using other’s personally identifiable information to make profit or commit crimes, identity theft has become a critical problem for the whole society. The development of Internet technology has made this problem worse. Results of empirical assessment including non-linear quadratic effect prove that when users have the perception of more control over the identity theft threat, they are likely to find solutions, feel it is their responsibility and has more intentions for identity theft prevention actions to prevent identity theft. Interestingly, our theory and empirical results suggest that quadratic effect exist among critical constructs in our theoretical model and that the underlying complexity require further investigation and that linear models may not be necessarily sufficient. We further contribute by developing theory and empirical validation of non-linear quadratic effect among key constructs related to Identity theft in the context of IT security literature.

Suggested Citation

  • A. F. Salam & Hua Dai & Lei Wang, 2022. "Online Users’ Identity Theft and Coping Strategies, Attribution and Sense of Urgency: A Non-Linear Quadratic Effect Assessment," Information Systems Frontiers, Springer, vol. 24(6), pages 1929-1948, December.
  • Handle: RePEc:spr:infosf:v:24:y:2022:i:6:d:10.1007_s10796-021-10194-w
    DOI: 10.1007/s10796-021-10194-w
    as

    Download full text from publisher

    File URL: http://link.springer.com/10.1007/s10796-021-10194-w
    File Function: Abstract
    Download Restriction: Access to the full text of the articles in this series is restricted.

    File URL: https://libkey.io/10.1007/s10796-021-10194-w?utm_source=ideas
    LibKey link: if access is restricted and if your library uses this service, LibKey will redirect you to where you can use your library subscription to access this item
    ---><---

    As the access to this document is restricted, you may want to search for a different version of it.

    References listed on IDEAS

    as
    1. Kahn, Charles M. & Roberds, William, 2008. "Credit and identity theft," Journal of Monetary Economics, Elsevier, vol. 55(2), pages 251-264, March.
    2. Richard F. J. Haans & Constant Pieters & Zi-Lin He, 2016. "Thinking about U: Theorizing and testing U- and inverted U-shaped relationships in strategy research," Strategic Management Journal, Wiley Blackwell, vol. 37(7), pages 1177-1195, July.
    3. Matejkovic, John E. & Lahey, Karen Eilers, 2001. "Identity theft: no help for consumers," Financial Services Review, Elsevier, vol. 10(1-4), pages 221-235.
    4. Dan J. Kim & Donald L. Ferrin & H. Raghav Rao, 2009. "Trust and Satisfaction, Two Stepping Stones for Successful E-Commerce Relationships: A Longitudinal Exploration," Information Systems Research, INFORMS, vol. 20(2), pages 237-257, June.
    5. Jörg Henseler & Georg Fassott & Theo K Dijkstra & Bradley Wilson, 2012. "Analysing quadratic effects of formative constructs by means of variance-based structural equation modelling," European Journal of Information Systems, Taylor & Francis Journals, vol. 21(1), pages 99-112, January.
    6. D. Harrison McKnight & Vivek Choudhury & Charles Kacmar, 2002. "Developing and Validating Trust Measures for e-Commerce: An Integrative Typology," Information Systems Research, INFORMS, vol. 13(3), pages 334-359, September.
    7. Wynne W. Chin & Barbara L. Marcolin & Peter R. Newsted, 2003. "A Partial Least Squares Latent Variable Modeling Approach for Measuring Interaction Effects: Results from a Monte Carlo Simulation Study and an Electronic-Mail Emotion/Adoption Study," Information Systems Research, INFORMS, vol. 14(2), pages 189-217, June.
    8. Yan Chen & Dennis F. Galletta & Paul Benjamin Lowry & Xin (Robert) Luo & Gregory D. Moody & Robert Willison, 2021. "Understanding Inconsistent Employee Compliance with Information Security Policies Through the Lens of the Extended Parallel Process Model," Information Systems Research, INFORMS, vol. 32(3), pages 1043-1065, September.
    9. MinJae Lee & JinKyu Lee, 2012. "The impact of information security failure on customer behaviors: A study on a large-scale hacking incident on the internet," Information Systems Frontiers, Springer, vol. 14(2), pages 375-393, April.
    10. Gianfranco Walsh & Edward Shiu & Louise Hassan & Patrick Hille & Ikuo Takahashi, 2019. "Fear of Online Consumer Identity Theft: Cross-Country Application and Short Scale Development," Information Systems Frontiers, Springer, vol. 21(6), pages 1251-1264, December.
    Full references (including those not matched with items on IDEAS)

    Most related items

    These are the items that most often cite the same works as this one and are cited by the same works as this one.
    1. Baozhou Lu & Zhenhua Wang, 2022. "Trust Transfer in Sharing Accommodation: The Moderating Role of Privacy Concerns," Sustainability, MDPI, vol. 14(12), pages 1-18, June.
    2. Ming Yang & Jinglu Jiang & Melody Kiang & Fangyun Yuan, 2022. "Re-Examining the Impact of Multidimensional Trust on Patients’ Online Medical Consultation Service Continuance Decision," Information Systems Frontiers, Springer, vol. 24(3), pages 983-1007, June.
    3. Zhang, Kem Z.K. & Cheung, Christy M.K. & Lee, Matthew K.O., 2014. "Examining the moderating effect of inconsistent reviews and its gender differences on consumers’ online shopping decision," International Journal of Information Management, Elsevier, vol. 34(2), pages 89-98.
    4. Mario Silic & Andrea Back, 2016. "The Influence of Risk Factors in Decision-Making Process for Open Source Software Adoption," International Journal of Information Technology & Decision Making (IJITDM), World Scientific Publishing Co. Pte. Ltd., vol. 15(01), pages 151-185, January.
    5. Wu, Ing-Long & Chen, Kuei-Wan & Chiu, Mai-Lun, 2016. "Defining key drivers of online impulse purchasing: A perspective of both impulse shoppers and system users," International Journal of Information Management, Elsevier, vol. 36(3), pages 284-296.
    6. Romanus Izuchukwu Okeke & Max Hashem Eiza, 2023. "The Application of Role-Based Framework in Preventing Internal Identity Theft Related Crimes: A Qualitative Case Study of UK Retail Companies," Information Systems Frontiers, Springer, vol. 25(2), pages 451-472, April.
    7. Yadgar Taha M. Hamakhan, 2020. "The effect of individual factors on user behaviour and the moderating role of trust: an empirical investigation of consumers’ acceptance of electronic banking in the Kurdistan Region of Iraq," Financial Innovation, Springer;Southwestern University of Finance and Economics, vol. 6(1), pages 1-29, December.
    8. Malhotra, Neeru & Sahadev, Sunil & Purani, Keyoor, 2017. "Psychological contract violation and customer intention to reuse online retailers: Exploring mediating and moderating mechanisms," Journal of Business Research, Elsevier, vol. 75(C), pages 17-28.
    9. Dan J. Kim & Donald L. Ferrin & H. Raghav Rao, 2009. "Trust and Satisfaction, Two Stepping Stones for Successful E-Commerce Relationships: A Longitudinal Exploration," Information Systems Research, INFORMS, vol. 20(2), pages 237-257, June.
    10. Hallikainen, Heli & Laukkanen, Tommi, 2018. "National culture and consumer trust in e-commerce," International Journal of Information Management, Elsevier, vol. 38(1), pages 97-106.
    11. Ramkumar, Bharath & Ellie Jin, Byoungho, 2019. "Examining pre-purchase intention and post-purchase consequences of international online outshopping (IOO): The moderating effect of E-tailer's country image," Journal of Retailing and Consumer Services, Elsevier, vol. 49(C), pages 186-197.
    12. Zhang, Yixiang & Fang, Yulin & Wei, Kwok-Kee & Chen, Huaping, 2010. "Exploring the role of psychological safety in promoting the intention to continue sharing knowledge in virtual communities," International Journal of Information Management, Elsevier, vol. 30(5), pages 425-436.
    13. Paul A. Pavlou & Angelika Dimoka, 2006. "The Nature and Role of Feedback Text Comments in Online Marketplaces: Implications for Trust Building, Price Premiums, and Seller Differentiation," Information Systems Research, INFORMS, vol. 17(4), pages 392-414, December.
    14. Lingling Gao & Kerem Aksel Waechter, 2017. "Examining the role of initial trust in user adoption of mobile payment services: an empirical investigation," Information Systems Frontiers, Springer, vol. 19(3), pages 525-548, June.
    15. Maroufkhani, Parisa & Asadi, Shahla & Ghobakhloo, Morteza & Jannesari, Milad T. & Ismail, Wan Khairuzaman Wan, 2022. "How do interactive voice assistants build brands' loyalty?," Technological Forecasting and Social Change, Elsevier, vol. 183(C).
    16. Wajeeha Aslam & Annas Hussain & Kashif Farhat & Imtiaz Arif, 2020. "Underlying Factors Influencing Consumers’ Trust and Loyalty in E-commerce," Business Perspectives and Research, , vol. 8(2), pages 186-204, July.
    17. Delgosha, Mohammad Soltani & Hajiheydari, Nastaran, 2020. "On-demand service platforms pro/anti adoption cognition: Examining the context-specific reasons," Journal of Business Research, Elsevier, vol. 121(C), pages 180-194.
    18. Beke, Frank T. & Eggers, Felix & Verhoef, Peter C. & Wieringa, Jaap E., 2022. "Consumers’ privacy calculus: The PRICAL index development and validation," International Journal of Research in Marketing, Elsevier, vol. 39(1), pages 20-41.
    19. Cai, Shun & Chen, Xi & Bose, Indranil, 2013. "Exploring the role of IT for environmental sustainability in China: An empirical analysis," International Journal of Production Economics, Elsevier, vol. 146(2), pages 491-500.
    20. Chai, Sangmi & Kim, Minkyun, 2010. "What makes bloggers share knowledge? An investigation on the role of trust," International Journal of Information Management, Elsevier, vol. 30(5), pages 408-415.

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:spr:infosf:v:24:y:2022:i:6:d:10.1007_s10796-021-10194-w. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Sonal Shukla or Springer Nature Abstracting and Indexing (email available below). General contact details of provider: http://www.springer.com .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.