Skip to main content

Exploring the Relationship Between Protection Motivation and Addiction Severity Towards Secure Intention Behavior in Online Game Addiction Among Adolescents

  • Conference paper
  • First Online:
Computing and Informatics (ICOCI 2023)

Abstract

Online game addiction refers to the excessive and compulsive use of online games, leading to negative consequences in various aspects of people’s life. One concerning aspect is that compulsive players may compromise their security and safety while engaging in gaming activities. Despite the growing concern about this issue, there is still much to understand about providing effective protections and interventions, particularly among adolescents. Thus, this paper aims to investigate the relationship between protection motivation and the severity of online game addiction, with a particular focus on secure intention behavior among adolescents affected by online game addiction. A survey was conducted involving 660 late adolescents (aged 17–19 years) from various Higher Learning Institutions (HLIs) in Peninsular Malaysia. The findings revealed that 35% of the participants were addicted to online games, as assessed by the Online Cognition Scale (OCS) and Online Game Addiction Scale (OGAS). The severity of online game addiction significantly impacted secure intention behavior within the online gaming environment. Additionally, protection motivation emerged as a significant predictor of positive security behavior. These results offer new insights and support the existing hypotheses, emphasizing the importance of investigating the impact of online game addiction severity on secure intention behavior. Understanding the relationship between protection motivation and the severity of online game addiction concerning security intention behavior is crucial to prevent adverse outcomes, such as insecure cyber behavior and vulnerability to cyber threats. The findings from this study can contribute to the development of effective interventions and prevention strategies against cyber threats in the context of online gaming.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 64.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 84.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Xu, Z., Turel, O., Yuan, Y.: Online game addiction among adolescents: motivation and prevention factors. Eur. J. Inf. Syst. 21, 321–340 (2012). https://doi.org/10.1057/ejis.2011.56

    Article  Google Scholar 

  2. Yaacob, W.M.Y.W., Zakaria, N.H., Aji, Z.M.: Identification of factors contributing to online game addiction among adolescents. Inf. J. Technol. Commun. 4, 565–597 (2021)

    Google Scholar 

  3. Van Rooij, A.J., Schoenmakers, T.M., Vermulst, A.A., Van Den Eijnden, R.J.J.M., Van De Mheen, D.: Online video game addiction: identification of addicted adolescent gamers. Addiction 106, 205–212 (2011). https://doi.org/10.1111/j.1360-0443.2010.03104.x

    Article  Google Scholar 

  4. Kuss, D.J., Louws, J., Wiers, R.W.: Online gaming addiction? Motives predict addictive play behavior in massively multiplayer online role-playing games. Cyberpsychol. Behav. Soc. Netw. 15, 480–485 (2012). https://doi.org/10.1089/cyber.2012.0034

    Article  Google Scholar 

  5. Başol, G., Kaya, A.B.: Motives and consequences of online game addiction: a scale development study. Noropsikiyatri Arsivi. 55, 225–232 (2018). https://doi.org/10.5152/npa.2017.17017

    Article  Google Scholar 

  6. Balakrishnan, J., Griffiths, M.D.: Loyalty towards online games, gaming addiction, and purchase intention towards online mobile in-game features. Comput. Hum. Behav. 87, 238–246 (2018). https://doi.org/10.1016/j.chb.2018.06.002

    Article  Google Scholar 

  7. Kuss, D.J., Griffiths, M.D.: Online social networking and addiction-a review of the psychological literature. Int. J. Environ. Res. Public Health 8, 3528–3552 (2011). https://doi.org/10.3390/ijerph8093528

    Article  Google Scholar 

  8. Kuss, D.J., Griffiths, M.D.: Internet gaming addiction: a systematic review of empirical research. Mental Health Addict. 10, 278–296 (2012). https://doi.org/10.1007/s11469-011-9318-5

    Article  Google Scholar 

  9. Mojika, E.: Spil Games (2019)

    Google Scholar 

  10. Kuss, D.J., Griffiths, M.D.: Internet and gaming addiction: a systematic literature review of neuro imaging studies. Brain Sci. 2, 347–374 (2012). https://doi.org/10.3390/brainsci2030347

    Article  Google Scholar 

  11. Bekir, S., Çelik, E.: Examining the factors contributing to adolescents’ online game addiction. Anales de Psicologia. 35, 444–452 (2019). https://doi.org/10.6018/analesps.35.3.323681

    Article  Google Scholar 

  12. Meschtscherjakov, A., De Ruyte, B., Fuchsberger, V., Murer, M., Tscheligi, M.: Persuasive technology. In: 11th International Conference, Persuasive 2016 Salzburg, Austria, 5–7 April 2016 Proceedings. LNCS (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol. 9638, pp. 288–300. Springer, Cham (2016). https://doi.org/10.1007/978-3-319-31510-2

  13. Ajzen, I.: From intentions to actions: a theory of planned behavior. In: Kuhl, J., Beckmann, J. (eds.) Action control. SSSSP, pp. 11–39. Springer, Heidelberg (1985). https://doi.org/10.1007/978-3-642-69746-3_2

    Chapter  Google Scholar 

  14. Ajzen, I.: The theory of planned behaviour: reactions and reflections. Psychol. Health 26, 1113–1127 (2011). https://doi.org/10.1080/08870446.2011.613995

    Article  Google Scholar 

  15. Shropshire, J., Warkentin, M., Sharma, S.: Personality, attitudes, and intentions: predicting initial adoption of information security behavior. Comput. Secur. 49, 177–191 (2015). https://doi.org/10.1016/j.cose.2015.01.002

    Article  Google Scholar 

  16. Sheeran, P., Webb, T.L.: The intention-behavior gap. Soc. Personal Psychol. Compass. 10, 503–518 (2016). https://doi.org/10.1111/spc3.12265

    Article  Google Scholar 

  17. Alohali, M., Clarke, N., Furnell, S., Albakri, S.: Information security behavior: recognizing the influencers. In: Proceedings of Computing Conference 2017, 2018 January, pp. 844–853 (2018). https://doi.org/10.1109/SAI.2017.8252194

  18. Briggs, P., Jeske, D., Coventry, L.: Behavior Change Interventions for Cybersecurity. Elsevier Inc., New York (2017)

    Google Scholar 

  19. Jenkins, J.L., Durcikova, A., Nunamaker, J.F.: Mitigating the security intention-behavior gap: the moderating role of required effort on the intention-behavior relationship. J. Assoc. Inf. Syst. 22, 246–272 (2021). https://doi.org/10.17705/1jais.00660

  20. Gratian, M., Bandi, S., Cukier, M., Dykstra, J., Ginther, A.: Correlating human traits and cyber security behavior intentions. Comput. Secur. 73, 345–358 (2018). https://doi.org/10.1016/j.cose.2017.11.015

    Article  Google Scholar 

  21. Yoon, C., Kim, H.: Understanding computer security behavioral intention in the workplace: an empirical study of Korean firms. Inf. Technol. People 26, 401–419 (2013). https://doi.org/10.1108/ITP-12-2012-0147

    Article  Google Scholar 

  22. Jansen, J., van Schaik, P.: Persuading end users to act cautiously online: a fear appeals study on phishing. Inf. Comput. Secur. 26, 264–276 (2018). https://doi.org/10.1108/ICS-03-2018-0038

    Article  Google Scholar 

  23. Shakela, V., Jazri, H.: Assessment of spear phishing user experience and awareness: an evaluation framework model of spear phishing exposure level (SPEL) in the Namibian Financial Industry. In: 2019 - 2nd International Conference on Advances in Big Data, Computing and Data Communication Systems, pp. 1–5 (2019). https://doi.org/10.1109/ICABCD.2019.8851058

  24. Arachchilage, N.A.G., Love, S., Beznosov, K.: Phishing threat avoidance behaviour: an empirical investigation. Comput. Hum. Behav. 60, 185–197 (2016). https://doi.org/10.1016/j.chb.2016.02.065

    Article  Google Scholar 

  25. Lebek, B., Uffen, J., Neumann, M., Hohler, B., Breitner, M.H.: Information security awareness and behavior: a theory-based literature review. Manag. Res. Rev. 37, 1049–1092 (2014). https://doi.org/10.1108/MRR-04-2013-0085

    Article  Google Scholar 

  26. Hazari, S., Hargrave, W., Clenney, B.: An Empirical investigation of factors influencing information security behavior. J. Inf. Privacy Secur. 4, 3–20 (2008). https://doi.org/10.1080/2333696x.2008.10855849

    Article  Google Scholar 

  27. Crossler, R.E., Johnston, A.C., Lowry, P.B., Hu, Q., Warkentin, M., Baskerville, R.: Future directions for behavioral information security research. Comput. Secur. 32, 90–101 (2013). https://doi.org/10.1016/j.cose.2012.09.010

    Article  Google Scholar 

  28. Öʇütçü, G., Testik, Ö.M., Chouseinoglou, O.: Analysis of personal information security behavior and awareness. Comput. Secur. 56, 83–93 (2016). https://doi.org/10.1016/j.cose.2015.10.002

    Article  Google Scholar 

  29. Suarez, L.Y.T.: Young People’s Security Behavior Intentions regarding Cloud Service Use: Suggestions for Better Cloud Services, pp. 1–27 (2015)

    Google Scholar 

  30. Comrey, A.L.: Factor-analytic methods of scale development in personality and clinical psychology. J. Consult. Clin. Psychol. 56, 754–761 (1988). https://doi.org/10.1037/0022-006X.56.5.754

    Article  Google Scholar 

  31. Dwivedi, Y.K., Papazafeiropoulou, A., Brinkman, W.P., Lal, B.: Examining the influence of service quality and secondary influence on the behavioural intention to change Internet service provider. Inf. Syst. Front. 12, 207–217 (2010). https://doi.org/10.1007/s10796-008-9074-7

    Article  Google Scholar 

  32. Hadlington, L.: Cybercognition: Brain, Behaviour and the Digital World. SAGE Publications, London (2017)

    Book  Google Scholar 

  33. Yildiz Durak, H.: Human factors and cybersecurity in online game addiction: an analysis of the relationship between high school students’ online game addiction and the state of providing personal cybersecurity and representing cyber human values in online games. Soc. Sci. Q. 100, 1984–1998 (2019). https://doi.org/10.1111/ssqu.12693

    Article  Google Scholar 

  34. Blackwell, D., Leaman, C., Tramposch, R., Osborne, C., Liss, M.: Extraversion, neuroticism, attachment style and fear of missing out as predictors of social media use and addiction. Personality Individ. Differ. 116, 69–72 (2017). https://doi.org/10.1016/j.paid.2017.04.039

  35. Hadlington, L.: Cybercognition: brain, behaviour, and the digital world. Psychol. Learn. Teach. 17, 323–325 (2018). https://doi.org/10.1177/1475725718787921

    Article  Google Scholar 

  36. Sparrow, B., Liu, J., Wegner, D.M.: Google effects on memory: cognitive consequences of having information at our fingertips. Science 1979(333), 776–778 (2011). https://doi.org/10.1126/science.1207745

    Article  Google Scholar 

  37. Hadlington, L.: Human factors in cybersecurity; examining the link between internet addiction, impulsivity, attitudes towards cybersecurity, and risky cybersecurity behaviours. Heliyon 3, e00346 (2017). https://doi.org/10.1016/j.heliyon.2017.e00346

    Article  Google Scholar 

  38. You, S., Kim, E., Lee, D.: Virtually real: exploring avatar identification in game addiction among massively multiplayer online role-playing games (MMORPG) Players Sukkyung. Games Cult. 12, 56–71 (2017). https://doi.org/10.1177/1555412015581087

    Article  Google Scholar 

  39. Griffiths, M.: A “components” model of addiction within a biopsychosocial framework. J. Subst. Use 10, 191–197 (2005). https://doi.org/10.1080/14659890500114359

    Article  Google Scholar 

  40. Lemmens, J.S., Valkenburg, P.M., Peter, J.: Development and validation of a game addiction scale for adolescents. Media Psychol. 12, 77–95 (2009). https://doi.org/10.1080/15213260802669458

    Article  Google Scholar 

  41. Karen: When Unequal Sample Sizes Are and Are Not a Problem in ANOVA - The Analysis Factor (2017)

    Google Scholar 

  42. Hadlington, L.: The “Human Factor” in cybersecurity. IGI Global 3, 46–63 (2018). https://doi.org/10.4018/978-1-5225-4053-3.ch003

    Article  Google Scholar 

Download references

Acknowledgement

This research was supported by Ministry of Higher Education (MoHE) through Fundamental Research Grant Scheme (Ref: FRGS/1/2020/ICT03/UUM/02/1). The content of this article is solely the responsibility of the authors and does not necessarily represent the official views of the MoHE, Malaysia.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Wan Mohd Yusoff Wan Yaacob .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2024 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Yaacob, W.M.Y.W., Zakaria, N.H., Aji, Z.M. (2024). Exploring the Relationship Between Protection Motivation and Addiction Severity Towards Secure Intention Behavior in Online Game Addiction Among Adolescents. In: Zakaria, N.H., Mansor, N.S., Husni, H., Mohammed, F. (eds) Computing and Informatics. ICOCI 2023. Communications in Computer and Information Science, vol 2002. Springer, Singapore. https://doi.org/10.1007/978-981-99-9592-9_3

Download citation

  • DOI: https://doi.org/10.1007/978-981-99-9592-9_3

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-99-9591-2

  • Online ISBN: 978-981-99-9592-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics