Advertisement

Antecedents and Outcome of Deficient Self-Regulation in Unknown Wireless Networks Use Context: An Exploratory Study

  • Emmanuel W. Ayaburi
  • James Wairimu
  • Francis Kofi Andoh-BaidooEmail author
Article

Abstract

Wireless networks are becoming the norm in the society, where hotspots afford users access to the internet through mobile devices. Unknown wireless networks, open public networks with unknown identity, pose threats as hackers can gain unauthorized access to users’ private information stored in their mobile devices. Despite the imminent dangers, individuals continue to use these networks. This study explicates a self-regulation theory model to investigate the antecedents of deficient self-regulation (DSR). We posit that both habit cues and information security experiential factors influence DSR, leading to habitual use of unknown wireless networks. The results show that perceived attachment, perceptions on privacy risk, and information security self-efficacy significantly influence DSR, which subsequently influences habitual use of unknown wireless networks. This study contributes to the literature on self-regulatory theory and privacy, and also provides implications for managers in dealing with vulnerabilities posed by employees using private or corporate mobile devices on unknown wireless network.

Keywords

Habits Cues Security Privacy Unknown wireless networks Deficient self-regulation 

Notes

References

  1. Aime, M., Calandriello, G., & Lioy, A. (2007). Dependability in Wireless Networks: Can We Rely on WiFi? IEEE Security and Privacy Magazine, 5(1), 23–29.CrossRefGoogle Scholar
  2. Anderson, B. B., Vance, A., Kirwan, C. B., Jenkins, J. L., & Eargle, D. (2016). From Warning to Wallpaper: Why the Brain Habituates to Security Warnings and What Can Be Done About It. Journal of Management Information Systems, 33(3), 713–743.CrossRefGoogle Scholar
  3. Balachandran, A., Voelker, G. M., & Bahl, P. (2005). Wireless hotspots: current challenges and future directions. Mobile Networks and Applications, 10(3), 265–274.Google Scholar
  4. Bandura, A. (1991). Social Cognitive Theory of Self-Regulation. Organizational Behavior and Human Decision Processes, 50, 248–287.CrossRefGoogle Scholar
  5. Barber, L. K., Munz, D. C., Bagsby, P. G., & Grawitch, M. J. (2009). When does time perspective matter? Self-control as a moderator between time perspective and academic achievement. Personality and Individual Differences, 46(2), 250–253.CrossRefGoogle Scholar
  6. Bayer, J. B., & Campbell, S. W. (2012). Texting while driving on automatic: considering the frequency-independent side of habit. Computers in Human Behavior 28(6), 2083–2090.Google Scholar
  7. Bayer, J. B., Campbell, S. W., & Ling, R. (2016). Connection Cues: Activating the Norms and Habits of Social Connectedness: Connection Cues. Communication Theory, 26(2), 128–149.CrossRefGoogle Scholar
  8. Bayer, J. B., Dal Cin, S., Campbell, S. W., & Panek, E. (2016). Consciousness and Self-Regulation in Mobile Communication: Consciousness in Mobile Communication. Human Communication Research, 42(1), 71–97.Google Scholar
  9. Buhrmester, M., Kwang, T., & Gosling, S. D. (2011). Amazon’s Mechanical Turk: A New Source of Inexpensive, Yet High-Quality, Data? Perspectives on Psychological Science, 6(1), 3–5.CrossRefGoogle Scholar
  10. Caplan, S. E. (2010). Theory and measurement of generalized problematic Internet use: A two-step approach. Computers in Human Behavior, 26(5), 1089–1097.CrossRefGoogle Scholar
  11. CBS. (2010). Dangers of Free Public Wifi. https://www.cbsnews.com/news/dangers-of-free-public-wifi/. Accessed 15 March 2018.
  12. Chen, H.-T., & Chen, W. (2015). Couldn’t or Wouldn’t? The Influence of Privacy Concerns and Self-Efficacy in Privacy Management on Privacy Protection. Cyberpsychology, Behavior, and Social Networking, 18(1), 13–19.CrossRefGoogle Scholar
  13. Choi, H. S., & Carpenter, D. (2013). Connecting to Unknown Wi-Fi Hotspots - A Risk Taking Perspective, 10.Google Scholar
  14. Choi, M.-K., Robles, R. J., Hong, C.-H., & Kim, T.-H. (2008). Wireless Network Security: Vulnerabilities, Threats and Countermeasures. International Journal of Multimedia and Ubiquitous Engineering 3(3), 77–86.Google Scholar
  15. Cisco. (2017). Cisco Visual Networking Index: Global Mobile Data Traffic Forecast Update, 2016–202, 35.Google Scholar
  16. Cisco. (2018). Five Reasons to Go Wireless. Cisco. https://www.cisco.com/c/en/us/solutions/small-business/resource-center/work-anywhere/why-go-wireless.html. Accessed 25 April 2018.
  17. Dolly, J. (2018). Why you should never, ever connect to public WiFi | CSO Online. https://www.csoonline.com/article/3246984/wi-fi/why-you-should-never-ever-connect-to-public-wifi.html. Accessed 5 April 2018.
  18. Eastin, M. S., Glynn, C. J., & Griffiths, R. P. (2007). Psychology of Communication Technology Use in the Workplace. CyberPsychology & Behavior, 10(3), 436–443.CrossRefGoogle Scholar
  19. EFF. (2018). Dark carakal: Cyber-espionage at a Global Scale. Lookout. https://info.lookout.com/rs/051-ESQ-475/images/Lookout_Dark-Caracal_srr_20180118_us_v.1.0.pdf. Accessed 5 April 2018.
  20. Ersche, K. D., Lim, T.-V., Ward, L. H. E., Robbins, T. W., & Stochl, J. (2017). Creature of Habit: A self-report measure of habitual routines and automatic tendencies in everyday life. Personality and Individual Differences, 116, 73–85.CrossRefGoogle Scholar
  21. Finjan Mobile. (2018). The Dangers of Using Unsecured Wi-Fi | How Bad is it, Really? https://www.finjanmobile.com/the-dangers-of-using-unsecured-wi-fi/. Accessed 29 March 2018.
  22. Fullwood, C., Quinn, S., Kaye, L. K., & Redding, C. (2017). My virtual friend: A qualitative analysis of the attitudes and experiences of Smartphone users: Implications for Smartphone attachment. Computers in Human Behavior, 75, 347–355.CrossRefGoogle Scholar
  23. Gast, M. S. (2002). 802.11 Wireless Networks: the definitive guide: [creating and administering Wireless Networks] (1st ed.). Beijing: O’Reilly.Google Scholar
  24. Gillan, C. M., Robbins, T. W., Sahakian, B. J., van den Heuvel, O. A., & van Wingen, G. (2016). The role of habit in compulsivity. European Neuropsychopharmacology, 26(5), 828–840.CrossRefGoogle Scholar
  25. Gökçearslan, Ş., Mumcu, F. K., Haşlaman, T., & Çevik, Y. D. (2016). Modelling smartphone addiction: The role of smartphone usage, self-regulation, general self-efficacy and cyberloafing in university students. Computers in Human Behavior, 63, 639–649.CrossRefGoogle Scholar
  26. Groves, P. M., & Thompson, R. F. (1970). Habituation: a dual-process theory. Psychological review, 77(5), 419–450.Google Scholar
  27. Haagsma, M. C., Caplan, S. E., Peters, O., & Pieterse, M. E. (2013). A cognitive-behavioral model of problematic online gaming in adolescents aged 12–22 years. Computers in Human Behavior, 29(1), 202–209.CrossRefGoogle Scholar
  28. Hagerty, B. M. K., Lynch-Sauer, J., Patusky, K. L., & Bouwsema, M. (1993). An Emerging Theory of Human Relatedness. Image: the Journal of Nursing Scholarship, 25(4), 291–296.Google Scholar
  29. Hair, J. F., Sarstedt, M., Ringle, C. M., & Mena, J. A. (2012). An assessment of the use of partial least squares structural equation modeling in marketing research. Journal of the Academy of Marketing Science, 40(3), 414–433.CrossRefGoogle Scholar
  30. Hampton, K. N., Livio, O., & Sessions Goulet, L. (2009). The Social Life of Wireless Urban Spaces: Internet Use, Social Networks, and the Public Realm. Journal of Communication, 60(4), 701–722.CrossRefGoogle Scholar
  31. Higgins, G. E., & Makin, D. A. (2004). Does Social Learning Theory Condition the Effects of Low Self-Control on College Students’ Software Piracy?, 2(2), 1–22.Google Scholar
  32. Hulland. (1999). Use of Partial Least Squares (PLS) in Strategic Management Research: A Review of Four Recent Studies. Strategic Management Journal, 20(2), 195–204.CrossRefGoogle Scholar
  33. Kaspersky. (2016). Public WiFi Risks and what you can do about it | Kaspersky Lab US. https://usa.kaspersky.com/resource-center/preemptive-safety/public-wifi-risks. Accessed 15 April 2018.
  34. Khang, H., Kim, J. K., & Kim, Y. (2013). Self-traits and motivations as antecedents of digital media flow and addiction: The Internet, mobile phones, and video games. Computers in Human Behavior, 29(6), 2416–2424.CrossRefGoogle Scholar
  35. Kindberg, T., Bevan, C., O’Neill, E., Mitchell, J., Grimmett, J., & Woodgate, D. (2009). Authenticating Ubiquitous Services: A Study of Wireless Hotspot Access, 12.Google Scholar
  36. King, A. L. S., Valença, A. M., Silva, A. C. O., Baczynski, T., Carvalho, M. R., & Nardi, A. E. (2013). Nomophobia: Dependency on virtual environments or social phobia? Computers in Human Behavior, 29(1), 140–144.CrossRefGoogle Scholar
  37. Klasnja, P., Consolvo, S., Jung, J., Greenstein, B. M., LeGrand, L., Powledge, P., & Wetherall, D. (2009). “When I am on Wi-Fi, I am Fearless:” Privacy Concerns & Practices in Everyday Wi-Fi Use, 10.Google Scholar
  38. LaRose, R. (2010). The Problem of Media Habits. Communication Theory, 20(2), 194–222.CrossRefGoogle Scholar
  39. LaRose, R., Lin, C. A., & Eastin, M. S. (2003). Unregulated Internet Usage: Addiction, Habit, or DSR? Media Psychology, 5(3), 225–253.CrossRefGoogle Scholar
  40. Lee, K. C., & Perry, S. D. (2004). Student Instant Message Use in a Ubiquitous Computing Environment: Effects of DSR. Journal of Broadcasting & Electronic Media, 48(3), 399–420.CrossRefGoogle Scholar
  41. Lee, R. M., & Robbins, S. B. (1995). Measuring belongingness: The social connectedness and the social assurance scales. Journal of counseling psychology, 42(2), 232.CrossRefGoogle Scholar
  42. Lee, B. W., & Stapinski, L. A. (2012). Seeking safety on the internet: Relationship between social anxiety and problematic internet use. Journal of Anxiety Disorders, 26(1), 197–205.CrossRefGoogle Scholar
  43. Lee, R. M., Draper, M., & Lee, S. (2001). Social Connectedness, Dysfunctional Interpersonal Behaviors, and Psychological Distress: Testing a Mediator Model, 9.Google Scholar
  44. Lee, Y.-K., Chang, C.-T., Lin, Y., & Cheng, Z.-H. (2014). The dark side of smartphone usage: Psychological traits, compulsive behavior and technostress. Computers in Human Behavior, 31, 373–383.CrossRefGoogle Scholar
  45. Lee, Z. W. Y., Cheung, C. M. K., & Chan, T. K. H. (2016). Technology-Mediated Self-Regulation: An Implication for Preventing Online Gaming Addiction. International Conference on Information Systems, 10.Google Scholar
  46. MarketWatch. (2018). Global Wi-Fi hotspot Market Growth Expected to be Driven by Increasing Use of Mobile Devices and Smartphones Coupled with Growing Internet Penetration Across the Globe - MarketWatch. https://www.marketwatch.com/story/global-wi-fi-hotspot-market-growth-expected-to-be-driven-by-increasing-use-of-mobile-devices-and-smartphones-coupled-with-growing-internet-penetration-across-the-globe-2018-02-21. Accessed 15 March 2018.
  47. McCord, B., Rodebaugh, T. L., & Levinson, C. A. (2014). Facebook: Social uses and anxiety. Computers in Human Behavior, 34, 23–27.CrossRefGoogle Scholar
  48. McIntyre, E., Wiener, K. K. K., & Saliba, A. J. (2015). Compulsive Internet use and relations between social connectedness, and introversion. Computers in Human Behavior, 48, 569–574.CrossRefGoogle Scholar
  49. Noor, M. M., & Hassan, W. H. (2013). Current threats of wireless networks. The Third International Conference on Society of Digital Information Processing and Communications, 704–713.Google Scholar
  50. Norton. (2018). The Personal Impact of Cybercrime. https://us.norton.com/internetsecurity-emerging-threats-personal-impact-cybercrime.html. Accessed 25 April 2018.
  51. Olufon, T., Campbell, C. E.-A., Hole, S., Radhakrishnan, K., & Sedigh, A. (2014). Mitigating External Threats in Wireless Local Area Networks. International Journal of Communication Networks and Information Security, 6(3), 18.Google Scholar
  52. Podsakoff, P. M., MacKenzie, S. B., Lee, J.-Y., & Podsakoff, N. P. (2003). Common method biases in behavioral research: A critical review of the literature and recommended remedies. Journal of Applied Psychology, 88(5), 879–903.CrossRefGoogle Scholar
  53. Polites, G. L., Serrano, C., Thatcher, J. B., & Matthews, K. (2018). Understanding social networking site (SNS) identity from a dual systems perspective: an investigation of the dark side of SNS use. European Journal of Information Systems, 27(5), 600–621.CrossRefGoogle Scholar
  54. Pratt, T. C., & Cullen, F. T. (2000). The empirical status of Gottfredson and Hirschi’s general theory of crime: A meta-analysis. Criminology, 38(3), 931–964.CrossRefGoogle Scholar
  55. Prizant-Passal, S., Shechner, T., & Aderka, I. M. (2016). Social anxiety and internet use – A meta-analysis: What do we know? What are we missing? Computers in Human Behavior, 62, 221–229.CrossRefGoogle Scholar
  56. Rhee, H.-S., Kim, C., & Ryu, Y. U. (2009). Self-efficacy in information security: Its influence on end users’ information security practice behavior. Computers & Security, 28(8), 816–826.CrossRefGoogle Scholar
  57. Richardson, J. (2018). The New Science of Habit Formation and Change. Fire Uo Today. http://fireuptoday.com/the-new-science-of-habit-formation-and-change/. Accessed 15 April 2018.
  58. Ringle, C. M., Da Silva, D., & Bido, D. D. S. (2014). Structural Equation Modeling with the Smartpls. Revista Brasileira de Marketing, 13(02), 56–73.CrossRefGoogle Scholar
  59. Salehan, M., & Negahban, A. (2013). Social networking on smartphones: When mobile phones become addictive. Computers in Human Behavior, 29(6), 2632–2639.CrossRefGoogle Scholar
  60. Sambamurthy, V., Bharadwaj, A., & Grover, V. (2003). Shaping Agility through Digital Options: Reconceptualizing the Role of Information Technology in Contemporary Firms. MIS Quarterly, 27(2), 237—263.Google Scholar
  61. Sayette, M. A., & Kasey, G. M. (2004). Self-regulatory failure and addiction (Vol. 2). Handbook of self-regulation: Research, theory, and applications.Google Scholar
  62. Schlenker, B. R., & Leary, M. R. (1982). Social Anxiety and Self-Presentation: A Conceptualization and Model. Social Anxiety, 29.Google Scholar
  63. Schlesinger, J. (2016). Most people unaware of the risks of using public Wi-Fi. https://www.cnbc.com/2016/06/28/most-people-unaware-of-the-risks-of-using-public-wi-fi.html. Accessed 29 March 2018.
  64. Sicari, S., Cappiello, C., De Pellegrini, F., Miorandi, D., & Coen-Porisini, A. (2016). A security-and quality-aware system architecture for Internet of Things. Information Systems Frontiers, 18(4), 665–677.CrossRefGoogle Scholar
  65. Smith, H. J., Milberg, S. J., & Burke, S. J. (1996). Information Privacy: Measuring Individuals’ Concerns about Organizational Practices. MIS Quarterly, 20(2), 167–196.CrossRefGoogle Scholar
  66. Smith, H. J., Dinev, T., & Xu, H. (2011). Information Privacy Research: An Interdisciplinary Review. MIS Quarterly, 35(4), 989–1016.CrossRefGoogle Scholar
  67. Sokolov, E. N. (1963). Higher Nervous Functions: The Orienting Reflex. Annual Review of Physiology, 25(1), 545–580.CrossRefGoogle Scholar
  68. Sombatruang, N., Sasse, M. A., & Baddeley, M. (2016). Why do people use unsecure public wi-fi?: an investigation of behaviour and factors driving decisions (pp. 61–72). ACM Press.Google Scholar
  69. Son, J. Y., & Kim, S. S. (2008). Internet Users’ Information Privacy-Protective Responses: A Taxonomy and a Nomological Model. MIS Quarterly, 32(3), 503—529.Google Scholar
  70. Soror, A. A., Steelman, Z. R., & Limayem, M. (2012). Discipline Yourself Before Life Disciplines You: DSR and Mobile Phone Unregulated Use. In 2012 45th Hawaii International Conference on System Sciences (pp. 849–858).Google Scholar
  71. Soror, A. A., Hammer, B. I., Steelman, Z. R., Davis, F. D., & Limayem, M. M. (2015). Good habits gone bad: Explaining negative consequences associated with the use of mobile phones from a dual-systems perspective: Good habits gone bad. Information Systems Journal, 25(4), 403–427.CrossRefGoogle Scholar
  72. Turner, P., & Turner, S. (2013). Emotional and aesthetic attachment to digital artefacts. Cognition, Technology & Work, 15(4), 403–414.CrossRefGoogle Scholar
  73. Uzun, A. M., & Kilis, S. (2019). Does persistent involvement in media and technology lead to lower academic performance? Evaluating media and technology use in relation to multitasking, self-regulation and academic performance. Computers in Human Behavior, 90, 196–203.CrossRefGoogle Scholar
  74. van Deursen, A. J. A. M., Bolle, C. L., Hegner, S. M., & Kommers, P. A. M. (2015). Modeling habitual and addictive smartphone behavior. Computers in Human Behavior, 45, 411–420.CrossRefGoogle Scholar
  75. Vance, A., Siponen, M., & Pahnila, S. (2012). Motivating IS security compliance: Insights from Habit and Protection Motivation Theory. Information & Management, 49(3–4), 190–198.CrossRefGoogle Scholar
  76. Wang, C., Lee, M. K. O., & Hua, Z. (2015). A theory of social media dependence: Evidence from microblog users. Decision Support Systems, 69, 40–49.CrossRefGoogle Scholar
  77. Weber, L., & Rudman, R. J. (2018). Addressing the Incremental Risks Associated with Adopting Bring Your Own Device. Open Access, 11(1), 13.Google Scholar
  78. Weller, J. A., Shackleford, C., Dieckmann, N., & Slovic, P. (2013). Possession attachment predicts cell phone use while driving. Health Psychology, 32(4), 379–387.CrossRefGoogle Scholar
  79. Wood, W., & Neal, D. T. (2007). A new look at habits and the habit-goal interface. Psychological Review, 114(4), 843–863.CrossRefGoogle Scholar
  80. Xu, F., Michael, K., & Chen, X. (2013). Factors affecting privacy disclosure on social network sites: an integrated model. Electronic Commerce Research, 13(2), 151–168.CrossRefGoogle Scholar

Copyright information

© Springer Science+Business Media, LLC, part of Springer Nature 2019

Authors and Affiliations

  1. 1.Department of Information SystemsThe University of Texas Rio Grande ValleyEdinburgUSA

Personalised recommendations