{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,27]],"date-time":"2026-03-27T03:55:46Z","timestamp":1774583746423,"version":"3.50.1"},"reference-count":57,"publisher":"Emerald","issue":"3","license":[{"start":{"date-parts":[[2017,7,10]],"date-time":"2017-07-10T00:00:00Z","timestamp":1499644800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.emerald.com\/insight\/site-policies"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["ICS"],"published-print":{"date-parts":[[2017,7,10]]},"abstract":"<jats:sec>\n<jats:title content-type=\"abstract-subheading\">Purpose<\/jats:title>\n<jats:p>Recently, the spread of malicious IT has been causing serious privacy threats to mobile device users, which hampers the efficient use of mobile devices for individual and business. To understand the privacy security assurance behavior of mobile device users, this study aims to develop a theoretical model based on technology threat avoidance theory (TTAT), to capture motivation factors in predicting mobile device user\u2019s voluntary adoption of security defensive software.<\/jats:p>\n<\/jats:sec>\n<jats:sec>\n<jats:title content-type=\"abstract-subheading\">Design\/methodology\/approach<\/jats:title>\n<jats:p>A survey is conducted to validate the proposed research model. A total of 284 valid survey data are collected and partial least square (PLS)-based structural equation modeling is used to test the model.<\/jats:p>\n<\/jats:sec>\n<jats:sec>\n<jats:title content-type=\"abstract-subheading\">Findings<\/jats:title>\n<jats:p>Results highlight that both privacy concern and coping appraisal have a significant impact on the intention to adopt the security defensive software. Meanwhile, privacy security awareness is a crucial determinant to stimulate mobile device user\u2019s threat and coping appraisal processes in the voluntary context. The results indicate that emotional-based coping appraisal of anticipated regret is also imperative to arouse personal intention to adopt the security tool.<\/jats:p>\n<\/jats:sec>\n<jats:sec>\n<jats:title content-type=\"abstract-subheading\">Practical implications<\/jats:title>\n<jats:p>This result should be of interest to practitioners. Information security awareness training and education programs should be developed in a variety of forms to intensify personal security knowledge and skills. Besides, emotion-based warnings can be designed to arouse users\u2019 protection behavior.<\/jats:p>\n<\/jats:sec>\n<jats:sec>\n<jats:title content-type=\"abstract-subheading\">Originality\/value<\/jats:title>\n<jats:p>This paper embeds TTAT theory within the mobile security context. The authors extent TTAT by taking anticipated regret into consideration to capture emotional-based coping appraisal, and information security awareness is employed as the antecedent factor. The extent offers a useful starting point for the further empirical study of emotion elements in the information security context.<\/jats:p>\n<\/jats:sec>","DOI":"10.1108\/ics-04-2016-0027","type":"journal-article","created":{"date-parts":[[2017,5,24]],"date-time":"2017-05-24T19:18:11Z","timestamp":1495653491000},"page":"330-344","source":"Crossref","is-referenced-by-count":42,"title":["Mobile device users\u2019 privacy security assurance behavior"],"prefix":"10.1108","volume":"25","author":[{"given":"Hao","family":"Chen","sequence":"first","affiliation":[]},{"given":"Wenli","family":"Li","sequence":"additional","affiliation":[]}],"member":"140","reference":[{"issue":"4","key":"key2020120619453285700_ref001","doi-asserted-by":"crossref","first-page":"495","DOI":"10.1348\/014466603322595248","article-title":"Acting on intentions: the role of anticipated regret","volume":"42","year":"2003","journal-title":"British Journal of Social Psychology"},{"issue":"2","key":"key2020120619453285700_ref002","first-page":"302","article-title":"Mobile security: security mechanisms and protection of mobile applications","volume":"70","year":"2014","journal-title":"Journal of Theoretical and Applied Information Technology"},{"issue":"4","key":"key2020120619453285700_ref003","doi-asserted-by":"crossref","first-page":"685","DOI":"10.1002\/ejsp.467","article-title":"Future-oriented emotions: conceptualization and behavioral effects","volume":"38","year":"2008","journal-title":"European Journal of Social Psychology"},{"issue":"2","key":"key2020120619453285700_ref004","doi-asserted-by":"crossref","first-page":"157","DOI":"10.1002\/asi.20459","article-title":"Development of measures of online privacy concern and protection for use on the Internet","volume":"58","year":"2007","journal-title":"Journal of the American Society for Information Science and Technology"},{"issue":"3","key":"key2020120619453285700_ref005","doi-asserted-by":"crossref","first-page":"523","DOI":"10.2307\/25750690","article-title":"Information security policy compliance: an empirical study of rationality-based beliefs and information security awareness","volume":"34","year":"2010","journal-title":"MIS Quarterly"},{"issue":"2","key":"key2020120619453285700_ref006","doi-asserted-by":"crossref","first-page":"60","DOI":"10.1145\/293411.293475","article-title":"Internet privacy concerns confirm the case for intervention","volume":"42","year":"1999","journal-title":"Communications of the ACM"},{"issue":"1","key":"key2020120619453285700_ref007","doi-asserted-by":"crossref","first-page":"85","DOI":"10.1348\/135910705X40997","article-title":"Role of anticipated regret, intentions and intention stability in adolescent smoking initiation","volume":"11","year":"2006","journal-title":"British Journal of Health Psychology"},{"issue":"2","key":"key2020120619453285700_ref008","first-page":"84","article-title":"Predicting binge-drinking behaviour using an extended TPB: examining the impact of anticipated regret and descriptive norms","volume":"42","year":"2007","journal-title":"Alcohol and Alcoholism"},{"issue":"2","key":"key2020120619453285700_ref009","first-page":"7","article-title":"Internet privacy concerns and social awareness as determinants of intention to transact","volume":"10","year":"2006","journal-title":"International Journal of Electronic Commerce"},{"issue":"7","key":"key2020120619453285700_ref010","doi-asserted-by":"crossref","first-page":"386","DOI":"10.17705\/1jais.00133","article-title":"The centrality of awareness in the formation of user behavioral intention toward protective information technologies","volume":"8","year":"2007","journal-title":"Journal of the Association for Information Systems"},{"issue":"2","key":"key2020120619453285700_ref011","doi-asserted-by":"crossref","first-page":"407","DOI":"10.1111\/j.1559-1816.2000.tb02323.x","article-title":"A meta-analysis of research on protection motivation theory","volume":"30","year":"2000","journal-title":"Journal of Applied Social Psychology"},{"issue":"4","key":"key2020120619453285700_ref012","doi-asserted-by":"crossref","first-page":"186","DOI":"10.1080\/15536548.2014.974429","article-title":"Comparing the mobile device security behavior of college students and information technology professionals","volume":"10","year":"2014","journal-title":"Journal of Information Privacy and Security"},{"issue":"2","key":"key2020120619453285700_ref013","doi-asserted-by":"crossref","first-page":"154","DOI":"10.1016\/j.dss.2009.02.005","article-title":"Encouraging information security behaviors in organizations: role of penalties, pressures and perceived effectiveness","volume":"47","year":"2009","journal-title":"Decision Support Systems"},{"issue":"1","key":"key2020120619453285700_ref014","doi-asserted-by":"crossref","first-page":"19","DOI":"10.2307\/25148779","article-title":"The value of privacy assurance: an exploratory field experiment","volume":"31","year":"2007","journal-title":"MIS Quarterly"},{"issue":"1","key":"key2020120619453285700_ref015","doi-asserted-by":"crossref","first-page":"83","DOI":"10.1016\/j.cose.2011.10.007","article-title":"Understanding information systems security policy compliance: an integration of the theory of planned behavior and the protection motivation theory","volume":"31","year":"2012","journal-title":"Computers & Security"},{"issue":"3","key":"key2020120619453285700_ref016","doi-asserted-by":"crossref","first-page":"549","DOI":"10.2307\/25750691","article-title":"Fear appeals and information security behaviors: an empirical study","volume":"34","year":"2010","journal-title":"MIS Quarterly"},{"issue":"4","key":"key2020120619453285700_ref017","doi-asserted-by":"crossref","first-page":"387","DOI":"10.1057\/ejis.2008.29","article-title":"Personality traits and concern for privacy: an empirical study in the context of location-based services","volume":"17","year":"2008","journal-title":"European Journal of Information Systems"},{"key":"key2020120619453285700_ref018","article-title":"A privacy framework for mobile health and home-care systems","year":"2009"},{"key":"key2020120619453285700_ref019","article-title":"Why employees do non-work-related computing: an exploratory investigation through multiple theoretical perspectives","year":"2005"},{"issue":"2","key":"key2020120619453285700_ref020","doi-asserted-by":"crossref","first-page":"361","DOI":"10.1016\/j.dss.2010.07.009","article-title":"Understanding anti-plagiarism software adoption: an extended protection motivation theory perspective","volume":"50","year":"2011","journal-title":"Decision Support Systems"},{"key":"key2020120619453285700_ref021","article-title":"Understanding compliance with internet use policy: an integrative model based on command-and-control and self-regulatory approaches","year":"2010"},{"issue":"1","key":"key2020120619453285700_ref022","doi-asserted-by":"crossref","first-page":"105","DOI":"10.1007\/s10899-009-9149-5","article-title":"Anticipated regret, risk perception, or both: which is most likely responsible for our intention to gamble?","volume":"26","year":"2010","journal-title":"Journal of Gambling Studies"},{"key":"key2020120619453285700_ref023","first-page":"289","article-title":"Smartphone: security and","year":"2014","journal-title":"privacy protection, Pervasive Computing and the Networked World"},{"issue":"1","key":"key2020120619453285700_ref024","doi-asserted-by":"crossref","first-page":"71","DOI":"10.2307\/20650279","article-title":"Avoidance of information technology threats: a theoretical perspective","volume":"33","year":"2009","journal-title":"MIS Quarterly"},{"issue":"7","key":"key2020120619453285700_ref025","doi-asserted-by":"crossref","first-page":"394","DOI":"10.17705\/1jais.00232","article-title":"Understanding security behaviors in personal computer usage: a threat avoidance perspective","volume":"11","year":"2010","journal-title":"Journal of the Association for Information Systems"},{"issue":"4","key":"key2020120619453285700_ref026","doi-asserted-by":"crossref","first-page":"336","DOI":"10.1287\/isre.1040.0032","article-title":"Internet user\u2019s information privacy concerns (IUIPC): the construct, the scale, and acausal model","volume":"15","year":"2004","journal-title":"Information Systems Research"},{"key":"key2020120619453285700_ref027","article-title":"An integrative model of information security awareness for assessing information system security risk","year":"2012"},{"issue":"3","key":"key2020120619453285700_ref028","doi-asserted-by":"crossref","first-page":"15","DOI":"10.1002\/dir.20009","article-title":"Strategies for reducing online privacy risks: why consumers read (or don\u2019t read) online privacy notices","volume":"18","year":"2004","journal-title":"Journal of Interactive Marketing"},{"key":"key2020120619453285700_ref029","doi-asserted-by":"crossref","first-page":"47","DOI":"10.1016\/j.cose.2012.11.004","article-title":"Delegate the smartphone user? Security awareness in smartphone platforms","volume":"34","year":"2013","journal-title":"Computers & Security"},{"issue":"4","key":"key2020120619453285700_ref030","doi-asserted-by":"crossref","first-page":"815","DOI":"10.1016\/j.dss.2008.11.010","article-title":"Studying users\u2019 computer security behavior: a health belief perspective","volume":"46","year":"2009","journal-title":"Decision Support Systems"},{"key":"key2020120619453285700_ref031","unstructured":"Norton (2012), \u201cNorton cybercrime report\u201d, available at: http:\/\/now-static.norton.com\/now\/en\/pu\/images\/Promotions\/2012\/cybercrimeReport\/2012_Norton_Cybercrime_Report_Master_FINAL_050912.pdf"},{"issue":"6","key":"key2020120619453285700_ref032","doi-asserted-by":"crossref","first-page":"2067","DOI":"10.1016\/j.chb.2012.06.010","article-title":"Examining priming and gender as a means to reduce risk in a social networking context: can stories change disclosure and privacy setting use when personal profiles are constructed?","volume":"28","year":"2012","journal-title":"Computers in Human Behavior"},{"issue":"4","key":"key2020120619453285700_ref033","doi-asserted-by":"crossref","first-page":"94","DOI":"10.1002\/(SICI)1522-7138(199723)11:4<94::AID-DIR11>3.0.CO;2-F","article-title":"Direct marketing and the use of individual-level consumer information: determining how and when \u2018privacy\u2019 matters","volume":"11","year":"1997","journal-title":"Journal of Direct Marketing"},{"key":"key2020120619453285700_ref034","doi-asserted-by":"crossref","first-page":"741","DOI":"10.1007\/11610496_100","article-title":"WIPI mobile platform with secure service for mobile RFID network environment","volume":"3842","year":"2006","journal-title":"Advanced Web and Network Technologies, and Applications"},{"issue":"1","key":"key2020120619453285700_ref035","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1111\/j.1559-1816.1996.tb01835.x","article-title":"Modifying beliefs and attitudes to exceeding the speed limit: an intervention study based on the theory of planned behaviour","volume":"26","year":"1996","journal-title":"Journal of Applied Social Psychology"},{"key":"key2020120619453285700_ref036","first-page":"181","article-title":"Mobile malware security challeges and cloud-based detection","year":"2014"},{"key":"key2020120619453285700_ref037","volume-title":"Boundaries of Privacy: Dialectics of Disclosure","year":"2002"},{"issue":"8","key":"key2020120619453285700_ref038","doi-asserted-by":"crossref","first-page":"816","DOI":"10.1016\/j.cose.2009.05.008","article-title":"Self-efficacy in information security: Its influence on end users\u2019 information security practice behaviour","volume":"28","year":"2009","journal-title":"Computers & Security"},{"issue":"12","key":"key2020120619453285700_ref039","doi-asserted-by":"crossref","first-page":"2985","DOI":"10.1111\/j.1559-1816.2009.00558.x","article-title":"Expanding the affective and normative components of the theory of planned behavior: a meta-analysis of anticipated affect and moral norms","volume":"39","year":"2009","journal-title":"Journal of Applied Social Psychology"},{"issue":"10","key":"key2020120619453285700_ref040","doi-asserted-by":"crossref","first-page":"2107","DOI":"10.1111\/j.1559-1816.1999.tb02298.x","article-title":"Augmenting the theory of planned behavior: roles for anticipated regret and descriptive norms","volume":"29","year":"1999","journal-title":"Journal of Applied Social Psychology"},{"issue":"6","key":"key2020120619453285700_ref041","doi-asserted-by":"crossref","first-page":"344","DOI":"10.17705\/1jais.00161","article-title":"An experimental study on ubiquitous commerce adoption: Impact of personalization and privacy concerns","volume":"9","year":"2008","journal-title":"Journal of the Association for Information Systems"},{"issue":"2","key":"key2020120619453285700_ref042","doi-asserted-by":"crossref","first-page":"217","DOI":"10.1016\/j.im.2013.08.006","article-title":"Employees\u2019 adherence to information security policies: an exploratory field study","volume":"51","year":"2014","journal-title":"Information & Management"},{"key":"key2020120619453285700_ref043","first-page":"401","article-title":"On the role of human morality in information system security","volume-title":"Information Security for Global Information Infrastructures","year":"2000"},{"issue":"3","key":"key2020120619453285700_ref044","doi-asserted-by":"crossref","first-page":"503","DOI":"10.2307\/25148854","article-title":"Internet users\u2019 information privacy-protective responses: a taxonomy and a nomological model","volume":"32","year":"2008","journal-title":"MIS Quarterly"},{"issue":"4","key":"key2020120619453285700_ref045","doi-asserted-by":"crossref","first-page":"441","DOI":"10.2307\/249551","article-title":"Coping with systems risk: security planning models for management decision making","volume":"22","year":"1998","journal-title":"MIS Quarterly"},{"issue":"9","key":"key2020120619453285700_ref046","first-page":"156","article-title":"An advanced mutual-authentication algorithm using AES for RFID systems","volume":"6","year":"2006","journal-title":"International Journal of Computer Science and Network Security"},{"issue":"3\/4","key":"key2020120619453285700_ref047","first-page":"190","article-title":"Motivating IS security compliance: insights from habit and protection motivation theory","volume":"49","year":"2012","journal-title":"Information & Management"},{"key":"key2020120619453285700_ref048","unstructured":"Websence (2013), \u201c2013 Threats report\u201d, avaiable at: www.websense.com\/assets\/reports\/websense-2013-threat-report.pdf"},{"issue":"1","key":"key2020120619453285700_ref049","doi-asserted-by":"crossref","first-page":"177","DOI":"10.2307\/20650284","article-title":"Using PLS path methoding for assessing hierarchical construct models: guidelines and empirical illustration","volume":"33","year":"2009","journal-title":"MIS Quarterly"},{"issue":"4","key":"key2020120619453285700_ref050","doi-asserted-by":"crossref","first-page":"326","DOI":"10.1108\/09564230710778128","article-title":"Causes and consequences of consumer online privacy concern","volume":"18","year":"2007","journal-title":"International Journal of Service Industry Management"},{"key":"key2020120619453285700_ref051","first-page":"260","article-title":"Quantifying developers\u2019 adoption of security tools","year":"2015"},{"key":"key2020120619453285700_ref052","article-title":"A protection motivation theory approach to home wireless security","year":"2005"},{"key":"key2020120619453285700_ref053","article-title":"Examining the formation of individual\u2019s privacy concerns: toward an integrative view","year":"2008"},{"key":"key2020120619453285700_ref054","article-title":"Measuring mobile users\u2019 concerns for information privacy","year":"2012"},{"issue":"2","key":"key2020120619453285700_ref055","doi-asserted-by":"crossref","first-page":"154","DOI":"10.1504\/IJMC.2009.022440","article-title":"Perceived effectiveness of text vs multimedia location-based advertising messaging","volume":"7","year":"2009","journal-title":"International Journal of Mobile Communications"},{"key":"key2020120619453285700_ref056","first-page":"793","article-title":"Alleviating consumers\u2019 privacy concerns in location-based services: a psychological control perspective","year":"2004"},{"key":"key2020120619453285700_ref057","doi-asserted-by":"crossref","first-page":"93","DOI":"10.1002\/(SICI)1099-0771(199906)12:2<93::AID-BDM311>3.0.CO;2-S","article-title":"Anticipated regret, expected feedback and behavioral decision making","volume":"12","year":"1999","journal-title":"Journal of Behavioral Decision Making"}],"container-title":["Information &amp; Computer Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/ICS-04-2016-0027\/full\/xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/ICS-04-2016-0027\/full\/html","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,25]],"date-time":"2025-07-25T01:22:49Z","timestamp":1753406569000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.emerald.com\/ics\/article\/25\/3\/330-344\/105980"}},"subtitle":["A technology threat avoidance perspective"],"short-title":[],"issued":{"date-parts":[[2017,7,10]]},"references-count":57,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2017,7,10]]}},"alternative-id":["10.1108\/ICS-04-2016-0027"],"URL":"https:\/\/doi.org\/10.1108\/ics-04-2016-0027","relation":{},"ISSN":["2056-4961"],"issn-type":[{"value":"2056-4961","type":"print"}],"subject":[],"published":{"date-parts":[[2017,7,10]]}}}