IDEAS home Printed from https://ideas.repec.org/a/inm/orisre/v27y2016i2p219-239.html
   My bibliography  Save this article

Examining the Continuance of Secure Behavior: A Longitudinal Field Study of Mobile Device Authentication

Author

Listed:
  • Paul John Steinbart

    (Department of Information Systems, Arizona State University, Tempe, Arizona 85287)

  • Mark J. Keith

    (Information Systems Department, Brigham Young University, Provo, Utah 84602)

  • Jeffry Babb

    (Department of Computer Information Systems and Decision Management, West Texas A&M University, Canyon, Texas 79016)

Abstract

It is not enough to get information technology (IT) users to adopt a secure behavior. They must also continue to behave securely. Positive outcomes of secure behavior may encourage the continuance of that behavior, whereas negative outcomes may lead users to adopt less-secure behaviors. For example, in the context of authentication, login success rates may determine whether users continue to use a strong credential or switch to less secure behaviors (e.g., storing a credential or changing to a weaker, albeit easier to successfully enter, credential). Authentication is a particularly interesting security behavior for information systems researchers to study because it is affected by an IT artifact (the design of the user interface). Laptops and desktop computers use full-size physical keyboards. However, users are increasingly adopting mobile devices, which provide either miniature physical keypads or touchscreens for entering authentication credentials. The difference in interface design affects the ease of correctly entering authentication credentials. Thus, the move to use of mobile devices to access systems provides an opportunity to study the effects of the user interface on authentication behaviors. We extend existing process models of secure behaviors to explain what influences their (dis)continuance. We conduct a longitudinal field experiment to test our predictions and find that the user interface does affect login success rates. In turn, poor performance (login failures) leads to discontinuance of a secure behavior and the adoption of less-secure behaviors. In summary, we find that a process model reveals important insights about how the IT artifact leads people to (dis)continue secure behaviors.

Suggested Citation

  • Paul John Steinbart & Mark J. Keith & Jeffry Babb, 2016. "Examining the Continuance of Secure Behavior: A Longitudinal Field Study of Mobile Device Authentication," Information Systems Research, INFORMS, vol. 27(2), pages 219-239, June.
  • Handle: RePEc:inm:orisre:v:27:y:2016:i:2:p:219-239
    DOI: 10.1287/isre.2016.0634
    as

    Download full text from publisher

    File URL: http://dx.doi.org/10.1287/isre.2016.0634
    Download Restriction: no

    File URL: https://libkey.io/10.1287/isre.2016.0634?utm_source=ideas
    LibKey link: if access is restricted and if your library uses this service, LibKey will redirect you to where you can use your library subscription to access this item
    ---><---

    References listed on IDEAS

    as
    1. Peter Todd & Izak Benbasat, 1991. "An Experimental Investigation of the Impact of Computer Based Decision Aids on Decision Making Strategies," Information Systems Research, INFORMS, vol. 2(2), pages 87-115, June.
    2. Peter Todd & Izak Benbasat, 1999. "Evaluating the Impact of DSS, Cognitive Effort, and Incentives on Strategy Selection," Information Systems Research, INFORMS, vol. 10(4), pages 356-374, December.
    3. Susan A. Brown & Viswanath Venkatesh & Sandeep Goyal, 2012. "Expectation Confirmation in Technology Use," Information Systems Research, INFORMS, vol. 23(2), pages 474-487, June.
    4. Keller, Kevin Lane, 1987. "Memory Factors in Advertising: The Effect of Advertising Retrieval Cues on Brand Evaluations," Journal of Consumer Research, Journal of Consumer Research Inc., vol. 14(3), pages 316-333, December.
    5. Wynne W. Chin & Barbara L. Marcolin & Peter R. Newsted, 2003. "A Partial Least Squares Latent Variable Modeling Approach for Measuring Interaction Effects: Results from a Monte Carlo Simulation Study and an Electronic-Mail Emotion/Adoption Study," Information Systems Research, INFORMS, vol. 14(2), pages 189-217, June.
    6. Shirley Taylor & Peter A. Todd, 1995. "Understanding Information Technology Usage: A Test of Competing Models," Information Systems Research, INFORMS, vol. 6(2), pages 144-176, June.
    Full references (including those not matched with items on IDEAS)

    Citations

    Citations are extracted by the CitEc Project, subscribe to its RSS feed for this item.
    as


    Cited by:

    1. Jae Kyu Lee & Younghoon Chang & Hun Yeong Kwon & Beopyeon Kim, 2020. "Reconciliation of Privacy with Preventive Cybersecurity: The Bright Internet Approach," Information Systems Frontiers, Springer, vol. 22(1), pages 45-57, February.
    2. Mikhail Lysyakov & Siva Viswanathan, 2023. "Threatened by AI: Analyzing Users’ Responses to the Introduction of AI in a Crowd-Sourcing Platform," Information Systems Research, INFORMS, vol. 34(3), pages 1191-1210, September.
    3. Warut Khern-am-nuai & Matthew J. Hashim & Alain Pinsonneault & Weining Yang & Ninghui Li, 2023. "Augmenting Password Strength Meter Design Using the Elaboration Likelihood Model: Evidence from Randomized Experiments," Information Systems Research, INFORMS, vol. 34(1), pages 157-177, March.

    Most related items

    These are the items that most often cite the same works as this one and are cited by the same works as this one.
    1. Iglesias-Pradas, Santiago & Hernández-García, Ángel & Fernández-Cardador, Pedro, 2015. "Social factors' influences on corporate wiki acceptance and use," Journal of Business Research, Elsevier, vol. 68(7), pages 1481-1487.
    2. Wu, Ing-Long & Chen, Kuei-Wan & Chiu, Mai-Lun, 2016. "Defining key drivers of online impulse purchasing: A perspective of both impulse shoppers and system users," International Journal of Information Management, Elsevier, vol. 36(3), pages 284-296.
    3. Viswanath Venkatesh, 2000. "Determinants of Perceived Ease of Use: Integrating Control, Intrinsic Motivation, and Emotion into the Technology Acceptance Model," Information Systems Research, INFORMS, vol. 11(4), pages 342-365, December.
    4. Namho Chung & Inessa Tyan & Heejeong Han, 2017. "Enhancing the smart tourism experience through geotag," Information Systems Frontiers, Springer, vol. 19(4), pages 731-742, August.
    5. Dennis F. Galletta & Raymond M. Henry & Scott McCoy & Peter Polak, 2006. "When the Wait Isn’t So Bad: The Interacting Effects of Website Delay, Familiarity, and Breadth," Information Systems Research, INFORMS, vol. 17(1), pages 20-37, March.
    6. Long Chen & Chenglu Yang & Peng Jing & Qifen Zha & Xingyue Wang & Weichao Wang, 2023. "Are they willing to switch from non-driving to driving? An exploratory study among Chinese older people," Transportation, Springer, vol. 50(4), pages 1125-1163, August.
    7. O. Alan Tidwell & Paul Gallimore, 2014. "The influence of a decision support tool on real estate valuations," Journal of Property Research, Taylor & Francis Journals, vol. 31(1), pages 45-63, March.
    8. Ann-Frances Cameron & Jane Webster, 2013. "Multicommunicating: Juggling Multiple Conversations in the Workplace," Information Systems Research, INFORMS, vol. 24(2), pages 352-371, June.
    9. Zhong, Yongping & Oh, Segu & Moon, Hee Cheol, 2021. "Service transformation under industry 4.0: Investigating acceptance of facial recognition payment through an extended technology acceptance model," Technology in Society, Elsevier, vol. 64(C).
    10. Josef Frysak & Edward W. N. Bernroider & Konradin Maier, 2017. "An Effort Feedback Perspective on Persuasive Decision Aids for Multi-Attribute Decision-Making," International Journal of Information Technology & Decision Making (IJITDM), World Scientific Publishing Co. Pte. Ltd., vol. 16(01), pages 161-181, January.
    11. Kim, Hyung Jin & Kim, Inchan & Lee, Hogeun, 2016. "Third-party mobile app developers’ continued participation in platform-centric ecosystems: An empirical investigation of two different mechanisms," International Journal of Information Management, Elsevier, vol. 36(1), pages 44-59.
    12. Xiuyuan Gong & Matthew K. O. Lee & Zhiying Liu & Xiabing Zheng, 2020. "Examining the Role of Tie Strength in Users’ Continuance Intention of Second-Generation Mobile Instant Messaging Services," Information Systems Frontiers, Springer, vol. 22(1), pages 149-170, February.
    13. Yun Wang, 2020. "The Roles of Hedonic Value and Fashion Consciousness in Female Shoes Purchase Context: Application of the Theory of Planned Behavior," International Journal of Marketing Studies, Canadian Center of Science and Education, vol. 12(2), pages 1-38, July.
    14. Peng, Zeyu & Sun, Yongqiang & Guo, Xitong, 2018. "Antecedents of employees’ extended use of enterprise systems: An integrative view of person, environment, and technology," International Journal of Information Management, Elsevier, vol. 39(C), pages 104-120.
    15. Yeo, Vincent Cheow Sern & Goh, See-Kwong & Rezaei, Sajad, 2017. "Consumer experiences, attitude and behavioral intention toward online food delivery (OFD) services," Journal of Retailing and Consumer Services, Elsevier, vol. 35(C), pages 150-162.
    16. repec:dau:papers:123456789/8263 is not listed on IDEAS
    17. Mohammad Alamgir Hossain & Shahriar Akter & Shams Rahman, 2022. "Customer behavior of online group buying: an investigation using the transaction cost economics theory perspective," Electronic Markets, Springer;IIM University of St. Gallen, vol. 32(3), pages 1447-1461, September.
    18. Weiyin Hong & Frank K. Y. Chan & James Y. L. Thong & Lewis C. Chasalow & Gurpreet Dhillon, 2014. "A Framework and Guidelines for Context-Specific Theorizing in Information Systems Research," Information Systems Research, INFORMS, vol. 25(1), pages 111-136, March.
    19. Oliveira, Tiago & Faria, Miguel & Thomas, Manoj Abraham & Popovič, Aleš, 2014. "Extending the understanding of mobile banking adoption: When UTAUT meets TTF and ITM," International Journal of Information Management, Elsevier, vol. 34(5), pages 689-703.
    20. Wen-Lung Shiau & Yogesh K. Dwivedi, 2013. "Citation and co-citation analysis to identify core and emerging knowledge in electronic commerce research," Scientometrics, Springer;Akadémiai Kiadó, vol. 94(3), pages 1317-1337, March.
    21. Ravi Bapna & Paulo Goes & Kwok Kee Wei & Zhongju Zhang, 2011. "A Finite Mixture Logit Model to Segment and Predict Electronic Payments System Adoption," Information Systems Research, INFORMS, vol. 22(1), pages 118-133, March.

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:inm:orisre:v:27:y:2016:i:2:p:219-239. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Chris Asher (email available below). General contact details of provider: https://edirc.repec.org/data/inforea.html .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.