Antecedents and Outcome of Deficient Self-Regulation in Unknown Wireless Networks Use Context: An Exploratory Study
- 65 Downloads
Wireless networks are becoming the norm in the society, where hotspots afford users access to the internet through mobile devices. Unknown wireless networks, open public networks with unknown identity, pose threats as hackers can gain unauthorized access to users’ private information stored in their mobile devices. Despite the imminent dangers, individuals continue to use these networks. This study explicates a self-regulation theory model to investigate the antecedents of deficient self-regulation (DSR). We posit that both habit cues and information security experiential factors influence DSR, leading to habitual use of unknown wireless networks. The results show that perceived attachment, perceptions on privacy risk, and information security self-efficacy significantly influence DSR, which subsequently influences habitual use of unknown wireless networks. This study contributes to the literature on self-regulatory theory and privacy, and also provides implications for managers in dealing with vulnerabilities posed by employees using private or corporate mobile devices on unknown wireless network.
KeywordsHabits Cues Security Privacy Unknown wireless networks Deficient self-regulation
- Balachandran, A., Voelker, G. M., & Bahl, P. (2005). Wireless hotspots: current challenges and future directions. Mobile Networks and Applications, 10(3), 265–274.Google Scholar
- Bayer, J. B., & Campbell, S. W. (2012). Texting while driving on automatic: considering the frequency-independent side of habit. Computers in Human Behavior 28(6), 2083–2090.Google Scholar
- Bayer, J. B., Dal Cin, S., Campbell, S. W., & Panek, E. (2016). Consciousness and Self-Regulation in Mobile Communication: Consciousness in Mobile Communication. Human Communication Research, 42(1), 71–97.Google Scholar
- CBS. (2010). Dangers of Free Public Wifi. https://www.cbsnews.com/news/dangers-of-free-public-wifi/. Accessed 15 March 2018.
- Choi, H. S., & Carpenter, D. (2013). Connecting to Unknown Wi-Fi Hotspots - A Risk Taking Perspective, 10.Google Scholar
- Choi, M.-K., Robles, R. J., Hong, C.-H., & Kim, T.-H. (2008). Wireless Network Security: Vulnerabilities, Threats and Countermeasures. International Journal of Multimedia and Ubiquitous Engineering 3(3), 77–86.Google Scholar
- Cisco. (2017). Cisco Visual Networking Index: Global Mobile Data Traffic Forecast Update, 2016–202, 35.Google Scholar
- Cisco. (2018). Five Reasons to Go Wireless. Cisco. https://www.cisco.com/c/en/us/solutions/small-business/resource-center/work-anywhere/why-go-wireless.html. Accessed 25 April 2018.
- Dolly, J. (2018). Why you should never, ever connect to public WiFi | CSO Online. https://www.csoonline.com/article/3246984/wi-fi/why-you-should-never-ever-connect-to-public-wifi.html. Accessed 5 April 2018.
- EFF. (2018). Dark carakal: Cyber-espionage at a Global Scale. Lookout. https://info.lookout.com/rs/051-ESQ-475/images/Lookout_Dark-Caracal_srr_20180118_us_v.1.0.pdf. Accessed 5 April 2018.
- Finjan Mobile. (2018). The Dangers of Using Unsecured Wi-Fi | How Bad is it, Really? https://www.finjanmobile.com/the-dangers-of-using-unsecured-wi-fi/. Accessed 29 March 2018.
- Gast, M. S. (2002). 802.11 Wireless Networks: the definitive guide: [creating and administering Wireless Networks] (1st ed.). Beijing: O’Reilly.Google Scholar
- Groves, P. M., & Thompson, R. F. (1970). Habituation: a dual-process theory. Psychological review, 77(5), 419–450.Google Scholar
- Hagerty, B. M. K., Lynch-Sauer, J., Patusky, K. L., & Bouwsema, M. (1993). An Emerging Theory of Human Relatedness. Image: the Journal of Nursing Scholarship, 25(4), 291–296.Google Scholar
- Higgins, G. E., & Makin, D. A. (2004). Does Social Learning Theory Condition the Effects of Low Self-Control on College Students’ Software Piracy?, 2(2), 1–22.Google Scholar
- Kaspersky. (2016). Public WiFi Risks and what you can do about it | Kaspersky Lab US. https://usa.kaspersky.com/resource-center/preemptive-safety/public-wifi-risks. Accessed 15 April 2018.
- Kindberg, T., Bevan, C., O’Neill, E., Mitchell, J., Grimmett, J., & Woodgate, D. (2009). Authenticating Ubiquitous Services: A Study of Wireless Hotspot Access, 12.Google Scholar
- Klasnja, P., Consolvo, S., Jung, J., Greenstein, B. M., LeGrand, L., Powledge, P., & Wetherall, D. (2009). “When I am on Wi-Fi, I am Fearless:” Privacy Concerns & Practices in Everyday Wi-Fi Use, 10.Google Scholar
- Lee, R. M., Draper, M., & Lee, S. (2001). Social Connectedness, Dysfunctional Interpersonal Behaviors, and Psychological Distress: Testing a Mediator Model, 9.Google Scholar
- Lee, Z. W. Y., Cheung, C. M. K., & Chan, T. K. H. (2016). Technology-Mediated Self-Regulation: An Implication for Preventing Online Gaming Addiction. International Conference on Information Systems, 10.Google Scholar
- MarketWatch. (2018). Global Wi-Fi hotspot Market Growth Expected to be Driven by Increasing Use of Mobile Devices and Smartphones Coupled with Growing Internet Penetration Across the Globe - MarketWatch. https://www.marketwatch.com/story/global-wi-fi-hotspot-market-growth-expected-to-be-driven-by-increasing-use-of-mobile-devices-and-smartphones-coupled-with-growing-internet-penetration-across-the-globe-2018-02-21. Accessed 15 March 2018.
- Noor, M. M., & Hassan, W. H. (2013). Current threats of wireless networks. The Third International Conference on Society of Digital Information Processing and Communications, 704–713.Google Scholar
- Norton. 2017. Norton Wi-Fi Risk Report. https://www.symantec.com/content/dam/symantec/docs/reports/2017-norton-wifi-risk-report-global-results-summary-en.pdf, Accessed 5 April 2018.
- Norton. (2018). The Personal Impact of Cybercrime. https://us.norton.com/internetsecurity-emerging-threats-personal-impact-cybercrime.html. Accessed 25 April 2018.
- Olufon, T., Campbell, C. E.-A., Hole, S., Radhakrishnan, K., & Sedigh, A. (2014). Mitigating External Threats in Wireless Local Area Networks. International Journal of Communication Networks and Information Security, 6(3), 18.Google Scholar
- Richardson, J. (2018). The New Science of Habit Formation and Change. Fire Uo Today. http://fireuptoday.com/the-new-science-of-habit-formation-and-change/. Accessed 15 April 2018.
- Sambamurthy, V., Bharadwaj, A., & Grover, V. (2003). Shaping Agility through Digital Options: Reconceptualizing the Role of Information Technology in Contemporary Firms. MIS Quarterly, 27(2), 237—263.Google Scholar
- Sayette, M. A., & Kasey, G. M. (2004). Self-regulatory failure and addiction (Vol. 2). Handbook of self-regulation: Research, theory, and applications.Google Scholar
- Schlenker, B. R., & Leary, M. R. (1982). Social Anxiety and Self-Presentation: A Conceptualization and Model. Social Anxiety, 29.Google Scholar
- Schlesinger, J. (2016). Most people unaware of the risks of using public Wi-Fi. https://www.cnbc.com/2016/06/28/most-people-unaware-of-the-risks-of-using-public-wi-fi.html. Accessed 29 March 2018.
- Sombatruang, N., Sasse, M. A., & Baddeley, M. (2016). Why do people use unsecure public wi-fi?: an investigation of behaviour and factors driving decisions (pp. 61–72). ACM Press.Google Scholar
- Son, J. Y., & Kim, S. S. (2008). Internet Users’ Information Privacy-Protective Responses: A Taxonomy and a Nomological Model. MIS Quarterly, 32(3), 503—529.Google Scholar
- Soror, A. A., Steelman, Z. R., & Limayem, M. (2012). Discipline Yourself Before Life Disciplines You: DSR and Mobile Phone Unregulated Use. In 2012 45th Hawaii International Conference on System Sciences (pp. 849–858).Google Scholar
- Soror, A. A., Hammer, B. I., Steelman, Z. R., Davis, F. D., & Limayem, M. M. (2015). Good habits gone bad: Explaining negative consequences associated with the use of mobile phones from a dual-systems perspective: Good habits gone bad. Information Systems Journal, 25(4), 403–427.CrossRefGoogle Scholar
- Weber, L., & Rudman, R. J. (2018). Addressing the Incremental Risks Associated with Adopting Bring Your Own Device. Open Access, 11(1), 13.Google Scholar