{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,2]],"date-time":"2025-12-02T06:18:14Z","timestamp":1764656294034,"version":"build-2065373602"},"reference-count":68,"publisher":"Emerald","issue":"3","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,6,13]]},"abstract":"<jats:sec>\n                    <jats:title>Purpose<\/jats:title>\n                    <jats:p>As home users are increasingly responsible for securing their computing devices and home networks, there is a growing need to develop interventions to assist them in protecting their home networking devices, which are vulnerable to attack. To this end, this paper aims to examine the motivating factors that drive South African fibre users to protect their home networking devices.<\/jats:p>\n                  <\/jats:sec>\n                  <jats:sec>\n                    <jats:title>Design\/methodology\/approach<\/jats:title>\n                    <jats:p>Using the protection motivation theory as the primary framework, a measurement instrument comprising 53 questionnaire items was developed to measure 13 constructs. The study collected empirical data from a sample of 392 South African home fibre users and evaluated the research model using structural equation modelling.<\/jats:p>\n                  <\/jats:sec>\n                  <jats:sec>\n                    <jats:title>Findings<\/jats:title>\n                    <jats:p>The evaluation showed a good fit, with 12 out of 15 predicted hypotheses being accepted for the final research model, contributing to the understanding of the factors that motivate home users to protect their home networking devices.<\/jats:p>\n                  <\/jats:sec>\n                  <jats:sec>\n                    <jats:title>Originality\/value<\/jats:title>\n                    <jats:p>To the best of the authors\u2019 knowledge, this study is the first to model the factors that drive South African home fibre users to protect their home networking devices. Knowing these factors could help home internet service providers and security software vendors of home products to develop security interventions that could assist home fibre users to secure their home networking devices.<\/jats:p>\n                  <\/jats:sec>","DOI":"10.1108\/ics-04-2024-0086","type":"journal-article","created":{"date-parts":[[2024,7,29]],"date-time":"2024-07-29T13:43:53Z","timestamp":1722260633000},"page":"287-308","source":"Crossref","is-referenced-by-count":1,"title":["Understanding the factors that motivate South African home fibre users to protect their home networking devices: a protection motivation theory"],"prefix":"10.1108","volume":"33","author":[{"given":"Luzuko","family":"Tekeni","sequence":"first","affiliation":[{"name":"Nelson Mandela University Department of Information Technology, , Gqeberha, and Information Systems Department, , Cape Town,","place":["South Africa South Africa"]},{"name":"University of Cape Town Department of Information Technology, , Gqeberha, and Information Systems Department, , Cape Town,","place":["South Africa South Africa"]}]},{"given":"Reinhardt A.","family":"Botha","sequence":"additional","affiliation":[{"name":"Nelson Mandela University Department of Information Technology, , Gqeberha, and , Oslo,","place":["South Africa Norway"]},{"name":"Noroff University of College Department of Information Technology, , Gqeberha, and , Oslo,","place":["South Africa Norway"]}]}],"member":"140","published-online":{"date-parts":[[2024,7,31]]},"reference":[{"key":"2025110420184173900_ref001","unstructured":"ActionFraud\n           (2020), \u201cCOVID-19 related scams \u2013 news and resources\u201d, available at: www.actionfraud.police.uk\/covid19"},{"issue":"3","key":"2025110420184173900_ref002","doi-asserted-by":"crossref","first-page":"1","DOI":"10.9734\/BJMCS\/2016\/25183","article-title":"Assessing the validity and reliability of a measurement model in structural equation modeling (SEM)","volume":"15","author":"Ahmad","year":"2016","journal-title":"British Journal of Mathematics and Computer Science"},{"issue":"3","key":"2025110420184173900_ref003","doi-asserted-by":"crossref","first-page":"427","DOI":"10.2307\/25148691","article-title":"Moving beyond intentions and toward the theory of trying: effects of work environment and gender on post-adoption information technology use","volume":"29","author":"Ahuja","year":"2005","journal-title":"MIS Quarterly"},{"issue":"2","key":"2025110420184173900_ref004","doi-asserted-by":"crossref","first-page":"179","DOI":"10.1016\/0749-5978(91)90020-T","article-title":"The theory of planned behavior","volume":"50","author":"Ajzen","year":"1991","journal-title":"Organizational Behavior and Human Decision Processes"},{"issue":"2","key":"2025110420184173900_ref005","doi-asserted-by":"crossref","first-page":"130","DOI":"10.1016\/j.technovation.2008.07.004","article-title":"An investigation into the acceptance of online banking in Saudi Arabia","volume":"29","author":"Al-Somali","year":"2009","journal-title":"Technovation"},{"key":"2025110420184173900_ref006","doi-asserted-by":"crossref","first-page":"398","DOI":"10.1109\/WorldS450073.2020.9210363","article-title":"Cybersecurity attacks on smart home during covid-19 pandemic","volume-title":"2020 Fourth World Conference on Smart Trends in Systems, Security and Sustainability (WorldS4)","author":"Andrade","year":"2020"},{"issue":"1","key":"2025110420184173900_ref007","doi-asserted-by":"crossref","first-page":"116","DOI":"10.1016\/j.jfbs.2013.12.002","article-title":"A comparative study of CB-SEM and PLS-SEM for theory development in family firm research","volume":"5","author":"Astrachan","year":"2014","journal-title":"Journal of Family Business Strategy"},{"issue":"3","key":"2025110420184173900_ref008","doi-asserted-by":"crossref","first-page":"393","DOI":"10.1108\/ICS-07-2018-0080","article-title":"Developing cybersecurity education and awareness programmes for small and medium-sized enterprises (SMES)","volume":"27","author":"Bada","year":"2019","journal-title":"Information and Computer Security"},{"issue":"1","key":"2025110420184173900_ref009","doi-asserted-by":"crossref","first-page":"57","DOI":"10.1108\/10662241211199960","article-title":"Social research 2.0: virtual snowball sampling method using facebook","volume":"22","author":"Baltar","year":"2012","journal-title":"Internet Research"},{"issue":"4","key":"2025110420184173900_ref010","doi-asserted-by":"crossref","first-page":"837","DOI":"10.25300\/MISQ\/2015\/39.4.5","article-title":"What do systems users have to fear? Using fear appeals to engender threats and fear that motivate protective security behaviors","volume":"39","author":"Boss","year":"2015","journal-title":"MIS Quarterly"},{"key":"2025110420184173900_ref011","doi-asserted-by":"crossref","first-page":"102","DOI":"10.1016\/j.chb.2017.07.011","article-title":"The influence of the propensity to trust on mobile users' attitudes toward in-app advertisements: an extension of the theory of planned behavior","volume":"76","author":"Cheung","year":"2017","journal-title":"Computers in Human Behavior"},{"issue":"2","key":"2025110420184173900_ref012","doi-asserted-by":"crossref","first-page":"189","DOI":"10.2307\/249688","article-title":"Computer self-efficacy: development of a measure and initial test","volume":"19","author":"Compeau","year":"1995","journal-title":"MIS Quarterly"},{"key":"2025110420184173900_ref013","doi-asserted-by":"crossref","DOI":"10.4324\/9781315827506","volume-title":"A First Course in Factor Analysis","author":"Comrey","year":"2013","edition":"2nd ed.,"},{"key":"2025110420184173900_ref014","first-page":"810","article-title":"Educational research: planning, conducting, and evaluating quantitative and qualitative research","volume":"15","author":"Creswell","year":"2002","journal-title":"The Journal of Educational Issues of Language Minority Students"},{"key":"2025110420184173900_ref015","first-page":"1","article-title":"Protection motivation theory: understanding determinants to backing up personal data","author":"Crossler","year":"2010"},{"issue":"4","key":"2025110420184173900_ref016","doi-asserted-by":"crossref","first-page":"51","DOI":"10.1145\/2691517.2691521","article-title":"An extended perspective on individual security behaviors: protection motivation theory and a unified security practices (USP) instrument","volume":"45","author":"Crossler","year":"2014","journal-title":"ACM SIGMIS Database: The DATABASE for Advances in Information Systems"},{"issue":"3","key":"2025110420184173900_ref017","first-page":"303","article-title":"Cybersecurity threats and countermeasures of the smart home ecosystem","volume":"22","author":"Darem","year":"2022","journal-title":"IJCSNS International Journal of Computer Science and Network Security"},{"issue":"4","key":"2025110420184173900_ref018","doi-asserted-by":"crossref","first-page":"389","DOI":"10.1057\/palgrave.ejis.3000590","article-title":"Privacy calculus model in e-commerce-a study of Italy and the United States","volume":"15","author":"Dinev","year":"2006","journal-title":"European Journal of Information Systems"},{"issue":"3","key":"2025110420184173900_ref019","doi-asserted-by":"crossref","first-page":"201","DOI":"10.2753\/MIS0742-1222280306","article-title":"The influence of individual, contextual, and social factors on perceived behavioral control of information technology: a field theory approach","volume":"28","author":"Elie-Dit-Cosaque","year":"2011","journal-title":"Journal of Management Information Systems"},{"issue":"7\/8","key":"2025110420184173900_ref020","doi-asserted-by":"crossref","first-page":"235","DOI":"10.1016\/j.cose.2008.01.001","article-title":"Security beliefs and barriers for novice internet users","volume":"27","author":"Furnell","year":"2008","journal-title":"Computers and Security"},{"key":"2025110420184173900_ref021","unstructured":"Gartner\n           (2020), \u201cGartner forecasts global government IT spending to decline 0.6% in 2020\u201d, available at: www.gartner.com\/en\/newsroom\/press-releases\/2020-08-05-gartner-forecasts-global-government-it-spending-to-de"},{"issue":"3","key":"2025110420184173900_ref022","doi-asserted-by":"crossref","first-page":"307","DOI":"10.1109\/TEM.2003.817277","article-title":"Inexperience and experience with online stores: the importance of TAM and trust","volume":"50","author":"Gefen","year":"2003","journal-title":"IEEE Transactions on Engineering Management"},{"issue":"3","key":"2025110420184173900_ref023","doi-asserted-by":"crossref","first-page":"266","DOI":"10.1007\/s12124-008-9078-3","article-title":"Quantitative and qualitative research: beyond the debate","volume":"42","author":"Gelo","year":"2008","journal-title":"Integrative Psychological and Behavioral Science"},{"volume-title":"Multivariate Data Analysis: A Global Perspective 7th ed","year":"2010","author":"Hair","key":"2025110420184173900_ref024"},{"issue":"1","key":"2025110420184173900_ref025","doi-asserted-by":"crossref","first-page":"2","DOI":"10.1080\/10580530.2015.1117842","article-title":"Impact of users' security awareness on desktop security behavior: a protection motivation theory perspective","volume":"33","author":"Hanus","year":"2016","journal-title":"Information Systems Management"},{"key":"2025110420184173900_ref026","unstructured":"Herjavec Group\n           (2020), \u201cThe 2020 official annual cybercrime report\u201d, available at: https:\/\/tinyurl.com\/y56trmgv"},{"key":"2025110420184173900_ref027","first-page":"195","article-title":"Evaluating model fit: a synthesis of the structural equation modelling literature","volume-title":"7th European Conference on research methodology for business and management studies","author":"Hooper","year":"2008"},{"key":"2025110420184173900_ref028","first-page":"209","article-title":"The psychology of security for the home computer user","author":"Howe","year":"2012"},{"issue":"2","key":"2025110420184173900_ref029","doi-asserted-by":"crossref","first-page":"225","DOI":"10.1108\/ICS-10-2020-0173","article-title":"Cybersecurity educational games: a theoretical framework","volume":"30","author":"Hwang","year":"2022","journal-title":"Information and Computer Security"},{"key":"2025110420184173900_ref030","unstructured":"ICASA\n           (2020), \u201cState of the ICT sector in South Africa \u2013 2020 report\u201d, available at: www.icasa.org.za\/legislation-and-regulations\/state-of-the-ict-sector-in-south-africa-2020-report"},{"issue":"1","key":"2025110420184173900_ref031","doi-asserted-by":"crossref","first-page":"83","DOI":"10.1016\/j.cose.2011.10.007","article-title":"Understanding information systems security policy compliance: an integration of the theory of planned behavior and the protection motivation theory","volume":"31","author":"Ifinedo","year":"2012","journal-title":"Computers and Security"},{"issue":"5","key":"2025110420184173900_ref032","first-page":"40","article-title":"Book review","volume":"12","author":"Ishtiaq","year":"2019","journal-title":"Research Design: qualitative, Quantitative and Mixed Methods Approaches"},{"issue":"1","key":"2025110420184173900_ref033","doi-asserted-by":"crossref","first-page":"150","DOI":"10.11591\/edulearn.v12i1.7736","article-title":"Evaluation of game-based learning in cybersecurity education for high school students","volume":"12","author":"Jin","year":"2018","journal-title":"Journal of Education and Learning (EduLearn)"},{"key":"2025110420184173900_ref034","doi-asserted-by":"crossref","first-page":"203","DOI":"10.1016\/j.ijhm.2013.06.008","article-title":"The roles of attitude, subjective norm, and perceived behavioral control in the formation of consumers' behavioral intentions to read menu labels in the restaurant industry","volume":"35","author":"Kim","year":"2013","journal-title":"International Journal of Hospitality Management"},{"key":"2025110420184173900_ref035","first-page":"325","volume-title":"Internet of Things. In: Real-Time Systems: Design Principles for Distribute Embedded Applications","author":"Kopetz","year":"2022"},{"issue":"3","key":"2025110420184173900_ref036","doi-asserted-by":"crossref","first-page":"607","DOI":"10.1177\/001316447003000308","article-title":"Determining sample size for research activities","volume":"30","author":"Krejcie","year":"1970","journal-title":"Educational and Psychological Measurement"},{"key":"2025110420184173900_ref037","unstructured":"Lee, B.\n           (2023), \u201cWhat is the California default password law?\u201d, available at: https:\/\/specopssoft.com\/blog\/california-default-password-law\/"},{"issue":"7","key":"2025110420184173900_ref038","doi-asserted-by":"crossref","first-page":"1","DOI":"10.17705\/1jais.00232","article-title":"Understanding security behaviors in personal computer usage: a threat avoidance perspective","volume":"11","author":"Liang","year":"2010","journal-title":"Journal of the Association for Information Systems"},{"key":"2025110420184173900_ref039","doi-asserted-by":"crossref","first-page":"13","DOI":"10.1016\/j.ijinfomgt.2018.10.017","article-title":"Investigating the impact of cybersecurity policy awareness on employees' cybersecurity behavior","volume":"45","author":"Li","year":"2019","journal-title":"International Journal of Information Management"},{"issue":"1","key":"2025110420184173900_ref040","doi-asserted-by":"crossref","DOI":"10.1109\/MSEC.2021.3117371","article-title":"Citizens' cybersecurity behavior: some major challenges","volume":"20","author":"Li","year":"2022","journal-title":"IEEE Security and Privacy"},{"key":"2025110420184173900_ref041","doi-asserted-by":"crossref","first-page":"100165","DOI":"10.1016\/j.chbr.2021.100165","article-title":"The effects of antecedents and mediating factors on cybersecurity protection behavior","volume":"5","author":"Li","year":"2022","journal-title":"Computers in Human Behavior Reports"},{"volume-title":"Marketing Research an Applied Orientation","year":"2011","author":"Malhotra","key":"2025110420184173900_ref042"},{"issue":"3","key":"2025110420184173900_ref043","doi-asserted-by":"crossref","first-page":"709","DOI":"10.2307\/258792","article-title":"An integrative model of organizational trust","volume":"20","author":"Mayer","year":"1995","journal-title":"The Academy of Management Review"},{"key":"2025110420184173900_ref044","first-page":"20","article-title":"A socio-behavioral study of home computer users' intention to practice security","author":"Ng","year":"2005"},{"key":"2025110420184173900_ref045","first-page":"1","article-title":"Training and embedding cybersecurity guardians in older communities","author":"Nicholson","year":"2021"},{"key":"2025110420184173900_ref046","unstructured":"Panda Security\n           (2020), \u201c43 COVID-19 cybersecurity statistics\u201d, available at: www.pandasecurity.com\/en\/mediacenter\/news\/covid-cybersecurity-statistics\/"},{"key":"2025110420184173900_ref047","unstructured":"Ponemon Institute\n           (2020), \u201cCybersecurity in the remote work era: a global risk report\u201d, available at: www.keepersecurity.com\/en_GB\/ponemon2020.html"},{"issue":"1","key":"2025110420184173900_ref048","doi-asserted-by":"crossref","first-page":"93","DOI":"10.1080\/00223980.1975.9915803","article-title":"A protection motivation theory of fear appeals and attitude change1","volume":"91","author":"Rogers","year":"1975","journal-title":"The Journal of Psychology"},{"key":"2025110420184173900_ref049","first-page":"53","article-title":"Cognitive and psychological processes in fear appeals and attitude change: a revised theory of protection motivation","author":"Rogers","year":"1983","journal-title":"Social Psychophysiology: A Sourcebook"},{"issue":"1","key":"2025110420184173900_ref050","doi-asserted-by":"crossref","first-page":"179","DOI":"10.2466\/pr0.1985.56.1.179","article-title":"Attitude change and information integration in fear appeals","volume":"56","author":"Rogers","year":"1985","journal-title":"Psychological Reports"},{"issue":"3","key":"2025110420184173900_ref051","first-page":"1","article-title":"Organizational learning from cybersecurity performance: effects on cybersecurity investment decisions","volume":"26","author":"Shaikh","year":"2023","journal-title":"Information Systems Frontiers"},{"issue":"2","key":"2025110420184173900_ref052","doi-asserted-by":"crossref","first-page":"200","DOI":"10.1108\/ICS-04-2014-0025","article-title":"The sufficiency of the theory of planned behavior for explaining information security policy compliance","volume":"23","author":"Sommestad","year":"2015","journal-title":"Information and Computer Security"},{"key":"2025110420184173900_ref053","unstructured":"Statista\n           (2022c), \u201cNumber of subscriptions for smart home services worldwide from 2016 to 2022, by sensor type (in millions)\u201d, available at: www.statista.com\/statistics\/935864\/worldwide-smart-home-services-number-of-subscription-by-sensor-type\/"},{"key":"2025110420184173900_ref054","unstructured":"Statista\n           (2022a), \u201cGlobal digital population as of April 2022 (in billions)\u201d, available at: www.statista.com\/statistics\/617136\/digital-population-worldwide\/"},{"key":"2025110420184173900_ref055","unstructured":"Statista\n           (2022b), \u201cInternet of Things (IoT) connected devices installed base worldwide from 2015 to 2025 (in billions)\u201d, available at: www.statista.com\/statistics\/471264\/iot-number-of-connected-devices-worldwide\/"},{"key":"2025110420184173900_ref056","doi-asserted-by":"crossref","first-page":"159","DOI":"10.1016\/j.chb.2014.05.027","article-title":"Rationality-based beliefs affecting individual's attitude and intention to use privacy controls on Facebook: an empirical investigation","volume":"38","author":"Taneja","year":"2014","journal-title":"Computers in Human Behavior"},{"issue":"2","key":"2025110420184173900_ref057","doi-asserted-by":"crossref","first-page":"144","DOI":"10.1287\/isre.6.2.144","article-title":"Understanding information technology usage: a test of competing models","volume":"6","author":"Taylor","year":"1995","journal-title":"Information Systems Research"},{"issue":"1","key":"2025110420184173900_ref058","doi-asserted-by":"crossref","first-page":"56","DOI":"10.1109\/TEM.2009.2028320","article-title":"The role of trust in postadoption IT exploration: an empirical examination of knowledge management systems","volume":"58","author":"Thatcher","year":"2010","journal-title":"IEEE Transactions on Engineering Management"},{"issue":"4","key":"2025110420184173900_ref059","doi-asserted-by":"crossref","first-page":"381","DOI":"10.2307\/4132314","article-title":"An empirical examination of individual traits as antecedents to computer anxiety and computer self-efficacy","volume":"26","author":"Thatcher","year":"2002","journal-title":"MIS Quarterly"},{"key":"2025110420184173900_ref060","doi-asserted-by":"crossref","first-page":"376","DOI":"10.1016\/j.cose.2017.07.003","article-title":"\u2018Security begins at home\u2019: determinants of home computer and mobile device security behavior","volume":"70","author":"Thompson","year":"2017","journal-title":"Computers and Security"},{"issue":"2","key":"2025110420184173900_ref061","doi-asserted-by":"crossref","first-page":"141","DOI":"10.1108\/JSIT-09-2014-0066","article-title":"The role of trust in enhancing internet use in a high-risk society","volume":"17","author":"Touray","year":"2015","journal-title":"Journal of Systems and Information Technology"},{"key":"2025110420184173900_ref062","doi-asserted-by":"crossref","first-page":"138","DOI":"10.1016\/j.cose.2016.02.009","article-title":"Understanding online safety behaviors: a protection motivation theory perspective","volume":"59","author":"Tsai","year":"2016","journal-title":"Computers and Security"},{"issue":"3\/4","key":"2025110420184173900_ref063","doi-asserted-by":"crossref","first-page":"190","DOI":"10.1016\/j.im.2012.04.002","article-title":"Motivating is security compliance: insights from habit and protection motivation theory","volume":"49","author":"Vance","year":"2012","journal-title":"Information and Management"},{"key":"2025110420184173900_ref064","first-page":"1","article-title":"Cybersecurity behavior under covid-19 influence","author":"Venard","year":"2021"},{"key":"2025110420184173900_ref065","doi-asserted-by":"crossref","first-page":"860","DOI":"10.1016\/j.cose.2018.03.008","article-title":"Understanding smartphone security behaviors: an extension of the protection motivation theory with anticipated regret","volume":"77","author":"Verkijika","year":"2018","journal-title":"Computers and Security"},{"key":"2025110420184173900_ref066","doi-asserted-by":"crossref","first-page":"869","DOI":"10.1016\/j.jenvman.2018.10.030","article-title":"Understanding scuba divers' response to coral bleaching: an application of protection motivation theory","volume":"231","author":"Verkoeyen","year":"2019","journal-title":"Journal of Environmental Management"},{"issue":"4","key":"2025110420184173900_ref067","doi-asserted-by":"crossref","first-page":"353","DOI":"10.1080\/08874417.2016.1232991","article-title":"Analysis of protective behavior and security incidents for home computers","volume":"57","author":"White","year":"2017","journal-title":"Journal of Computer Information Systems"},{"key":"2025110420184173900_ref068","article-title":"A protection motivation theory approach to home wireless security","volume-title":"ICIS 2005 Proceedings","author":"Woon","year":"2005"}],"container-title":["Information &amp; Computer Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/ICS-04-2024-0086\/full\/xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/ics\/article-pdf\/33\/3\/287\/9745307\/ics-04-2024-0086.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/www.emerald.com\/ics\/article-pdf\/33\/3\/287\/9745307\/ics-04-2024-0086.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,5]],"date-time":"2025-11-05T01:18:57Z","timestamp":1762305537000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.emerald.com\/ics\/article\/33\/3\/287\/1249836\/Understanding-the-factors-that-motivate-South"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,7,31]]},"references-count":68,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2025,6,13]]}},"URL":"https:\/\/doi.org\/10.1108\/ics-04-2024-0086","relation":{},"ISSN":["2056-4961","2056-497X"],"issn-type":[{"type":"print","value":"2056-4961"},{"type":"electronic","value":"2056-497X"}],"subject":[],"published":{"date-parts":[[2024,7,31]]}}}