Abstract
Online game addiction refers to the excessive and compulsive use of online games, leading to negative consequences in various aspects of people’s life. One concerning aspect is that compulsive players may compromise their security and safety while engaging in gaming activities. Despite the growing concern about this issue, there is still much to understand about providing effective protections and interventions, particularly among adolescents. Thus, this paper aims to investigate the relationship between protection motivation and the severity of online game addiction, with a particular focus on secure intention behavior among adolescents affected by online game addiction. A survey was conducted involving 660 late adolescents (aged 17–19 years) from various Higher Learning Institutions (HLIs) in Peninsular Malaysia. The findings revealed that 35% of the participants were addicted to online games, as assessed by the Online Cognition Scale (OCS) and Online Game Addiction Scale (OGAS). The severity of online game addiction significantly impacted secure intention behavior within the online gaming environment. Additionally, protection motivation emerged as a significant predictor of positive security behavior. These results offer new insights and support the existing hypotheses, emphasizing the importance of investigating the impact of online game addiction severity on secure intention behavior. Understanding the relationship between protection motivation and the severity of online game addiction concerning security intention behavior is crucial to prevent adverse outcomes, such as insecure cyber behavior and vulnerability to cyber threats. The findings from this study can contribute to the development of effective interventions and prevention strategies against cyber threats in the context of online gaming.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Xu, Z., Turel, O., Yuan, Y.: Online game addiction among adolescents: motivation and prevention factors. Eur. J. Inf. Syst. 21, 321–340 (2012). https://doi.org/10.1057/ejis.2011.56
Yaacob, W.M.Y.W., Zakaria, N.H., Aji, Z.M.: Identification of factors contributing to online game addiction among adolescents. Inf. J. Technol. Commun. 4, 565–597 (2021)
Van Rooij, A.J., Schoenmakers, T.M., Vermulst, A.A., Van Den Eijnden, R.J.J.M., Van De Mheen, D.: Online video game addiction: identification of addicted adolescent gamers. Addiction 106, 205–212 (2011). https://doi.org/10.1111/j.1360-0443.2010.03104.x
Kuss, D.J., Louws, J., Wiers, R.W.: Online gaming addiction? Motives predict addictive play behavior in massively multiplayer online role-playing games. Cyberpsychol. Behav. Soc. Netw. 15, 480–485 (2012). https://doi.org/10.1089/cyber.2012.0034
Başol, G., Kaya, A.B.: Motives and consequences of online game addiction: a scale development study. Noropsikiyatri Arsivi. 55, 225–232 (2018). https://doi.org/10.5152/npa.2017.17017
Balakrishnan, J., Griffiths, M.D.: Loyalty towards online games, gaming addiction, and purchase intention towards online mobile in-game features. Comput. Hum. Behav. 87, 238–246 (2018). https://doi.org/10.1016/j.chb.2018.06.002
Kuss, D.J., Griffiths, M.D.: Online social networking and addiction-a review of the psychological literature. Int. J. Environ. Res. Public Health 8, 3528–3552 (2011). https://doi.org/10.3390/ijerph8093528
Kuss, D.J., Griffiths, M.D.: Internet gaming addiction: a systematic review of empirical research. Mental Health Addict. 10, 278–296 (2012). https://doi.org/10.1007/s11469-011-9318-5
Mojika, E.: Spil Games (2019)
Kuss, D.J., Griffiths, M.D.: Internet and gaming addiction: a systematic literature review of neuro imaging studies. Brain Sci. 2, 347–374 (2012). https://doi.org/10.3390/brainsci2030347
Bekir, S., Çelik, E.: Examining the factors contributing to adolescents’ online game addiction. Anales de Psicologia. 35, 444–452 (2019). https://doi.org/10.6018/analesps.35.3.323681
Meschtscherjakov, A., De Ruyte, B., Fuchsberger, V., Murer, M., Tscheligi, M.: Persuasive technology. In: 11th International Conference, Persuasive 2016 Salzburg, Austria, 5–7 April 2016 Proceedings. LNCS (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol. 9638, pp. 288–300. Springer, Cham (2016). https://doi.org/10.1007/978-3-319-31510-2
Ajzen, I.: From intentions to actions: a theory of planned behavior. In: Kuhl, J., Beckmann, J. (eds.) Action control. SSSSP, pp. 11–39. Springer, Heidelberg (1985). https://doi.org/10.1007/978-3-642-69746-3_2
Ajzen, I.: The theory of planned behaviour: reactions and reflections. Psychol. Health 26, 1113–1127 (2011). https://doi.org/10.1080/08870446.2011.613995
Shropshire, J., Warkentin, M., Sharma, S.: Personality, attitudes, and intentions: predicting initial adoption of information security behavior. Comput. Secur. 49, 177–191 (2015). https://doi.org/10.1016/j.cose.2015.01.002
Sheeran, P., Webb, T.L.: The intention-behavior gap. Soc. Personal Psychol. Compass. 10, 503–518 (2016). https://doi.org/10.1111/spc3.12265
Alohali, M., Clarke, N., Furnell, S., Albakri, S.: Information security behavior: recognizing the influencers. In: Proceedings of Computing Conference 2017, 2018 January, pp. 844–853 (2018). https://doi.org/10.1109/SAI.2017.8252194
Briggs, P., Jeske, D., Coventry, L.: Behavior Change Interventions for Cybersecurity. Elsevier Inc., New York (2017)
Jenkins, J.L., Durcikova, A., Nunamaker, J.F.: Mitigating the security intention-behavior gap: the moderating role of required effort on the intention-behavior relationship. J. Assoc. Inf. Syst. 22, 246–272 (2021). https://doi.org/10.17705/1jais.00660
Gratian, M., Bandi, S., Cukier, M., Dykstra, J., Ginther, A.: Correlating human traits and cyber security behavior intentions. Comput. Secur. 73, 345–358 (2018). https://doi.org/10.1016/j.cose.2017.11.015
Yoon, C., Kim, H.: Understanding computer security behavioral intention in the workplace: an empirical study of Korean firms. Inf. Technol. People 26, 401–419 (2013). https://doi.org/10.1108/ITP-12-2012-0147
Jansen, J., van Schaik, P.: Persuading end users to act cautiously online: a fear appeals study on phishing. Inf. Comput. Secur. 26, 264–276 (2018). https://doi.org/10.1108/ICS-03-2018-0038
Shakela, V., Jazri, H.: Assessment of spear phishing user experience and awareness: an evaluation framework model of spear phishing exposure level (SPEL) in the Namibian Financial Industry. In: 2019 - 2nd International Conference on Advances in Big Data, Computing and Data Communication Systems, pp. 1–5 (2019). https://doi.org/10.1109/ICABCD.2019.8851058
Arachchilage, N.A.G., Love, S., Beznosov, K.: Phishing threat avoidance behaviour: an empirical investigation. Comput. Hum. Behav. 60, 185–197 (2016). https://doi.org/10.1016/j.chb.2016.02.065
Lebek, B., Uffen, J., Neumann, M., Hohler, B., Breitner, M.H.: Information security awareness and behavior: a theory-based literature review. Manag. Res. Rev. 37, 1049–1092 (2014). https://doi.org/10.1108/MRR-04-2013-0085
Hazari, S., Hargrave, W., Clenney, B.: An Empirical investigation of factors influencing information security behavior. J. Inf. Privacy Secur. 4, 3–20 (2008). https://doi.org/10.1080/2333696x.2008.10855849
Crossler, R.E., Johnston, A.C., Lowry, P.B., Hu, Q., Warkentin, M., Baskerville, R.: Future directions for behavioral information security research. Comput. Secur. 32, 90–101 (2013). https://doi.org/10.1016/j.cose.2012.09.010
Öʇütçü, G., Testik, Ö.M., Chouseinoglou, O.: Analysis of personal information security behavior and awareness. Comput. Secur. 56, 83–93 (2016). https://doi.org/10.1016/j.cose.2015.10.002
Suarez, L.Y.T.: Young People’s Security Behavior Intentions regarding Cloud Service Use: Suggestions for Better Cloud Services, pp. 1–27 (2015)
Comrey, A.L.: Factor-analytic methods of scale development in personality and clinical psychology. J. Consult. Clin. Psychol. 56, 754–761 (1988). https://doi.org/10.1037/0022-006X.56.5.754
Dwivedi, Y.K., Papazafeiropoulou, A., Brinkman, W.P., Lal, B.: Examining the influence of service quality and secondary influence on the behavioural intention to change Internet service provider. Inf. Syst. Front. 12, 207–217 (2010). https://doi.org/10.1007/s10796-008-9074-7
Hadlington, L.: Cybercognition: Brain, Behaviour and the Digital World. SAGE Publications, London (2017)
Yildiz Durak, H.: Human factors and cybersecurity in online game addiction: an analysis of the relationship between high school students’ online game addiction and the state of providing personal cybersecurity and representing cyber human values in online games. Soc. Sci. Q. 100, 1984–1998 (2019). https://doi.org/10.1111/ssqu.12693
Blackwell, D., Leaman, C., Tramposch, R., Osborne, C., Liss, M.: Extraversion, neuroticism, attachment style and fear of missing out as predictors of social media use and addiction. Personality Individ. Differ. 116, 69–72 (2017). https://doi.org/10.1016/j.paid.2017.04.039
Hadlington, L.: Cybercognition: brain, behaviour, and the digital world. Psychol. Learn. Teach. 17, 323–325 (2018). https://doi.org/10.1177/1475725718787921
Sparrow, B., Liu, J., Wegner, D.M.: Google effects on memory: cognitive consequences of having information at our fingertips. Science 1979(333), 776–778 (2011). https://doi.org/10.1126/science.1207745
Hadlington, L.: Human factors in cybersecurity; examining the link between internet addiction, impulsivity, attitudes towards cybersecurity, and risky cybersecurity behaviours. Heliyon 3, e00346 (2017). https://doi.org/10.1016/j.heliyon.2017.e00346
You, S., Kim, E., Lee, D.: Virtually real: exploring avatar identification in game addiction among massively multiplayer online role-playing games (MMORPG) Players Sukkyung. Games Cult. 12, 56–71 (2017). https://doi.org/10.1177/1555412015581087
Griffiths, M.: A “components” model of addiction within a biopsychosocial framework. J. Subst. Use 10, 191–197 (2005). https://doi.org/10.1080/14659890500114359
Lemmens, J.S., Valkenburg, P.M., Peter, J.: Development and validation of a game addiction scale for adolescents. Media Psychol. 12, 77–95 (2009). https://doi.org/10.1080/15213260802669458
Karen: When Unequal Sample Sizes Are and Are Not a Problem in ANOVA - The Analysis Factor (2017)
Hadlington, L.: The “Human Factor” in cybersecurity. IGI Global 3, 46–63 (2018). https://doi.org/10.4018/978-1-5225-4053-3.ch003
Acknowledgement
This research was supported by Ministry of Higher Education (MoHE) through Fundamental Research Grant Scheme (Ref: FRGS/1/2020/ICT03/UUM/02/1). The content of this article is solely the responsibility of the authors and does not necessarily represent the official views of the MoHE, Malaysia.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2024 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Yaacob, W.M.Y.W., Zakaria, N.H., Aji, Z.M. (2024). Exploring the Relationship Between Protection Motivation and Addiction Severity Towards Secure Intention Behavior in Online Game Addiction Among Adolescents. In: Zakaria, N.H., Mansor, N.S., Husni, H., Mohammed, F. (eds) Computing and Informatics. ICOCI 2023. Communications in Computer and Information Science, vol 2002. Springer, Singapore. https://doi.org/10.1007/978-981-99-9592-9_3
Download citation
DOI: https://doi.org/10.1007/978-981-99-9592-9_3
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-99-9591-2
Online ISBN: 978-981-99-9592-9
eBook Packages: Computer ScienceComputer Science (R0)