{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,2]],"date-time":"2026-04-02T06:07:38Z","timestamp":1775110058880,"version":"3.50.1"},"reference-count":110,"publisher":"MDPI AG","issue":"4","license":[{"start":{"date-parts":[[2021,12,3]],"date-time":"2021-12-03T00:00:00Z","timestamp":1638489600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"Greece and the European Union (European Social Fund- ESF)","award":["MIS 5052062"],"award-info":[{"award-number":["MIS 5052062"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["JCP"],"abstract":"<jats:p>Smartphone user authentication based on passwords, PINs, and touch patterns raises several security concerns. Behavioral Biometrics Continuous Authentication (BBCA) technologies provide a promising solution which can increase smartphone security and mitigate users\u2019 concerns. Until now, research in BBCA technologies has mainly focused on developing novel behavioral biometrics continuous authentication systems and their technical characteristics, overlooking users\u2019 attitudes towards BBCA. To address this gap, we conducted a study grounded on a model that integrates users\u2019 privacy concerns, trust in technology, and innovativeness with Protection Motivation Theory. A cross-sectional survey among 778 smartphone users was conducted via Amazon Mechanical Turk (MTurk) to explore the factors which can predict users\u2019 intention to use BBCA technologies. Our findings demonstrate that privacy concerns towards intention to use BBCA technology have a significant impact on all components of PMT. Further to this, another important construct we identified that affects the usage intention of BBCA technology is innovativeness. Our findings posit the view that reliability and trustworthiness of security technologies, such as BBCA are important for users. Together, these results highlighted the importance of addressing users\u2019 perceptions regarding BBCA technology.<\/jats:p>","DOI":"10.3390\/jcp1040036","type":"journal-article","created":{"date-parts":[[2021,12,5]],"date-time":"2021-12-05T20:59:33Z","timestamp":1638737973000},"page":"743-766","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":26,"title":["Users\u2019 Privacy Attitudes towards the Use of Behavioral Biometrics Continuous Authentication (BBCA) Technologies: A Protection Motivation Theory Approach"],"prefix":"10.3390","volume":"1","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-6875-2047","authenticated-orcid":false,"given":"Andreas","family":"Skalkos","sequence":"first","affiliation":[{"name":"Department of Information and Communication Systems Engineering, University of the Aegean, 83200 Samos, Greece"}]},{"given":"Ioannis","family":"Stylios","sequence":"additional","affiliation":[{"name":"Department of Information and Communication Systems Engineering, University of the Aegean, 83200 Samos, Greece"}]},{"given":"Maria","family":"Karyda","sequence":"additional","affiliation":[{"name":"Department of Information and Communication Systems Engineering, University of the Aegean, 83200 Samos, Greece"}]},{"given":"Spyros","family":"Kokolakis","sequence":"additional","affiliation":[{"name":"Department of Information and Communication Systems Engineering, University of the Aegean, 83200 Samos, Greece"}]}],"member":"1968","published-online":{"date-parts":[[2021,12,3]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","first-page":"8851429","DOI":"10.1155\/2020\/8851429","article-title":"Demystifying COVID-19 Digital Contact Tracing: A Survey on Frameworks and Mobile Apps","volume":"2020","author":"Martin","year":"2020","journal-title":"Wirel. Commun. Mob. Comput."},{"key":"ref_2","unstructured":"(2021, October 23). Global Stats Counter. Available online: https:\/\/gs.statcounter.com\/platform-market-share\/desktop-mobile-tablet\/worldwide\/2020."},{"key":"ref_3","unstructured":"Xu, H., Gupta, S., Rosson, M.B., and Carroll, J.M. (2012). Measuring Mobile Users\u2019 Concerns for Information Privacy, Citeseer."},{"key":"ref_4","doi-asserted-by":"crossref","unstructured":"Kurkovsky, S., and Syta, E. (2010, January 7\u20139). Digital natives and mobile phones: A survey of practices and attitudes about privacy and security. Proceedings of the 2010 IEEE International Symposium on Technology and Society, Wollongong, NSW, Australia.","DOI":"10.1109\/ISTAS.2010.5514610"},{"key":"ref_5","doi-asserted-by":"crossref","unstructured":"Feng, T., Liu, Z., Kwon, K.A., Shi, W., Carbunar, B., Jiang, Y., and Nguyen, N. (2012, January 13\u201315). Continuous mobile authentication using touchscreen gestures. Proceedings of the 2012 IEEE Conference on Technologies for Homeland Security (HST), Waltham, MA, USA.","DOI":"10.1109\/THS.2012.6459891"},{"key":"ref_6","doi-asserted-by":"crossref","first-page":"130","DOI":"10.1016\/j.chb.2015.02.059","article-title":"Exploring the dimensions of nomophobia: Development and validation of a self-reported questionnaire","volume":"49","author":"Yildirim","year":"2015","journal-title":"Comput. Hum. Behav."},{"key":"ref_7","doi-asserted-by":"crossref","unstructured":"Aguilera-Manrique, G., M\u00e1rquez-Hern\u00e1ndez, V.V., Alcaraz-C\u00f3rdoba, T., Granados-G\u00e1mez, G., Gutierrez-Puertas, V., and Guti\u00e9rrez-Puertas, L. (2018). The relationship between nomophobia and the distraction associated with smartphone use among nursing students in their clinical practicum. PLoS ONE, 13.","DOI":"10.1371\/journal.pone.0202953"},{"key":"ref_8","doi-asserted-by":"crossref","first-page":"100025","DOI":"10.1016\/j.chbr.2020.100025","article-title":"Nomophobia and lifestyle: Smartphone use and its relationship to psychopathologies","volume":"2","author":"Dias","year":"2020","journal-title":"Comput. Hum. Behav. Rep."},{"key":"ref_9","doi-asserted-by":"crossref","first-page":"8","DOI":"10.1016\/S0969-4765(20)30134-X","article-title":"Behavioural biometrics in action","volume":"2020","author":"Bhattacharya","year":"2020","journal-title":"Biomed. Technol. Today"},{"key":"ref_10","doi-asserted-by":"crossref","unstructured":"Clarke, N. (2011). Transparent User Authentication: Biometrics, RFID and Behavioural Profiling, Springer Science & Business Media.","DOI":"10.1007\/978-0-85729-805-8"},{"key":"ref_11","unstructured":"Ben-Asher, N., Kirschnick, N., Sieger, H., Meyer, J., Ben-Oved, A., and M\u00f6ller, S. (September, January 30). On the need for different security methods on mobile phones. Proceedings of the 13th International Conference on Human Computer Interaction with Mobile Devices and Services, Stockholm, Sweden."},{"key":"ref_12","doi-asserted-by":"crossref","first-page":"519","DOI":"10.1016\/j.cose.2005.08.003","article-title":"Authentication of users on mobile telephones\u2014A survey of attitudes and practices","volume":"24","author":"Clarke","year":"2005","journal-title":"Comput. Secur."},{"key":"ref_13","unstructured":"Ahern, S., Eckles, D., Good, N.S., King, S., Naaman, M., and Nair, R. (May, January 28). Over-exposed? Privacy patterns and considerations in online and mobile photo sharing. Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, San Jose, CA, USA."},{"key":"ref_14","doi-asserted-by":"crossref","first-page":"1163","DOI":"10.1016\/j.ijhcs.2013.08.016","article-title":"Information disclosure on mobile devices: Re-examining privacy calculus with actual user behavior","volume":"71","author":"Keith","year":"2013","journal-title":"Int. J. Hum. Comput. Stud."},{"key":"ref_15","doi-asserted-by":"crossref","first-page":"76","DOI":"10.1016\/j.inffus.2020.08.021","article-title":"Behavioral biometrics & continuous user authentication on mobile devices: A survey","volume":"66","author":"Stylios","year":"2020","journal-title":"Inf. Fusion"},{"key":"ref_16","doi-asserted-by":"crossref","unstructured":"Crowston, K. (2012). Amazon Mechanical Turk: A Research Tool for Organizations and Information Systems Scholars, Springer.","DOI":"10.1007\/978-3-642-35142-6_14"},{"key":"ref_17","doi-asserted-by":"crossref","first-page":"877","DOI":"10.1109\/TIFS.2015.2506542","article-title":"HMOG: New Behavioral Biometric Features for Continuous Authentication of Smartphone Users","volume":"11","author":"Sitova","year":"2015","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"ref_18","doi-asserted-by":"crossref","unstructured":"Mahbub, U., Patel, V.M., Chandra, D., Barbello, B., and Chellappa, R. (2016, January 25\u201328). Partial face detection for continuous authentication. Proceedings of the 2016 IEEE International Conference on Image Processing (ICIP), Phoenix, AZ, USA.","DOI":"10.1109\/ICIP.2016.7532908"},{"key":"ref_19","doi-asserted-by":"crossref","first-page":"5008","DOI":"10.1109\/JIOT.2020.2975779","article-title":"AUToSen: Deep-Learning-Based Implicit Continuous Authentication Using Smartphone Sensors","volume":"7","author":"Abuhamad","year":"2020","journal-title":"IEEE Internet Things J."},{"key":"ref_20","doi-asserted-by":"crossref","first-page":"65","DOI":"10.1109\/JIOT.2020.3020076","article-title":"Sensor-Based Continuous Authentication of Smartphones\u2019 Users Using Behavioral Biometrics: A Contemporary Survey","volume":"8","author":"Abuhamad","year":"2020","journal-title":"IEEE Internet Things J."},{"key":"ref_21","doi-asserted-by":"crossref","unstructured":"Stylios, I., Thanou, O., Androulidakis, I., and Zaitseva, E. (2016, January 25\u201327). A Review of Continuous Authentication Using Behavioral Biometrics. Proceedings of the SouthEast European Design Automation, Computer Engineering, Computer Networks and Social Media Conference, Kastoria, Greece.","DOI":"10.1145\/2984393.2984403"},{"key":"ref_22","doi-asserted-by":"crossref","first-page":"92","DOI":"10.1109\/MC.2015.333","article-title":"Expanding Continuous Authentication with Mobile Devices","volume":"48","author":"Schaffer","year":"2015","journal-title":"Computer"},{"key":"ref_23","doi-asserted-by":"crossref","first-page":"49","DOI":"10.1109\/MSP.2016.2555335","article-title":"Continuous User Authentication on Mobile Devices: Recent progress and remaining challenges","volume":"33","author":"Patel","year":"2016","journal-title":"IEEE Signal Process. Mag."},{"key":"ref_24","doi-asserted-by":"crossref","unstructured":"Buriro, A., Crispo, B., Del Frari, F., Klardie, J., and Wrona, K. (2016). ITSME: Multi-Modal and Unobtrusive Behavioural User Authentication for Smartphones, Springer.","DOI":"10.1007\/978-3-319-29938-9_4"},{"key":"ref_25","doi-asserted-by":"crossref","unstructured":"Saevanee, H., Clarke, N.L., and Furnell, S.M. (2012). Multi-modal behavioural biometric authentication for mobile devices. IFIP International Information Security Conference, Springer.","DOI":"10.1007\/978-3-642-30436-1_38"},{"key":"ref_26","unstructured":"Stylios, I., Skalkos, A., Kokolakis, S., and Karyda, M. (2021, January 4\u20138). BioPrivacy: Development of a Keystroke Dynamics Continuous Authentication System. Proceedings of the 5th International Workshop on SECurity and Privacy Requirements Engineering SECPRE, Online."},{"key":"ref_27","first-page":"67","article-title":"The perceptions towards mobile services: An empirical analysis of the role of use facilitators","volume":"12","author":"Ristola","year":"2006","journal-title":"Pers. Ubiquitous Comput."},{"key":"ref_28","unstructured":"Hom, E. (2021, January 08). Mobile Device Security: Startling Statistics on Data Loss and Data Breaches. Available online: https:\/\/www.channelpronetwork.com\/article\/mobile-device-security-startling-statistics-data-loss-and-data-breaches."},{"key":"ref_29","first-page":"65","article-title":"A Biometric Approach for Continuous User Authentication by Fusing Hard and Soft Traits","volume":"16","author":"Prakash","year":"2014","journal-title":"IJ Netw. Secur."},{"key":"ref_30","unstructured":"Shnidman, R. (2021, January 11). Biometric Authentication: The How and Why. Available online: https:\/\/about-fraud.com\/biometric-authentication."},{"key":"ref_31","doi-asserted-by":"crossref","first-page":"9128","DOI":"10.1109\/JIOT.2020.3004077","article-title":"Behavioral Biometrics for Continuous Authentication in the Internet-of-Things Era: An Artificial Intelligence Perspective","volume":"7","author":"Liang","year":"2020","journal-title":"IEEE Internet Things J."},{"key":"ref_32","doi-asserted-by":"crossref","first-page":"1998","DOI":"10.1109\/COMST.2016.2537748","article-title":"Authentication of Smartphone Users Using Behavioral Biometrics","volume":"18","author":"Alzubaidi","year":"2016","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"ref_33","doi-asserted-by":"crossref","first-page":"127","DOI":"10.1016\/j.cose.2013.05.005","article-title":"A framework for continuous, transparent mobile device authentication","volume":"39","author":"Crawford","year":"2013","journal-title":"Comput. Secur."},{"key":"ref_34","doi-asserted-by":"crossref","first-page":"391","DOI":"10.1007\/s00779-004-0308-5","article-title":"Security in the wild: User strategies for managing security as an everyday, practical problem","volume":"8","author":"Dourish","year":"2004","journal-title":"Pers. Ubiquitous Comput."},{"key":"ref_35","doi-asserted-by":"crossref","first-page":"9","DOI":"10.4067\/S0718-27242013000200005","article-title":"Consumers Acceptance and Use of Information and Communications Technology: A UTAUT and Flow Based Theoretical Model","volume":"8","author":"Alwahaishi","year":"2013","journal-title":"J. Technol. Manag. Innov."},{"key":"ref_36","doi-asserted-by":"crossref","first-page":"276","DOI":"10.1016\/j.cose.2006.11.004","article-title":"A qualitative study of users view on information security","volume":"26","author":"Albrechtsen","year":"2007","journal-title":"Comput. Secur."},{"key":"ref_37","doi-asserted-by":"crossref","unstructured":"Gerber, N., Zimmermann, V., and Volkamer, M. (2019, January 17\u201319). Why johnny fails to protect his privacy. Proceedings of the 2019 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW), Stockholm, Sweden.","DOI":"10.1109\/EuroSPW.2019.00019"},{"key":"ref_38","doi-asserted-by":"crossref","unstructured":"Alkaldi, N., and Renaud, K. (2016, January 19\u201321). Why do people adopt or reject smartphone security tools?. Proceedings of the Tenth International Symposium on Human Aspects of Information Security & Assurance, HAISA 2016, Frankfurt, Germany.","DOI":"10.14722\/eurousec.2016.23011"},{"key":"ref_39","doi-asserted-by":"crossref","unstructured":"Volkamer, M., and Renaud, K. (2013). Mental models\u2014General introduction and review of their application to human-centred security. Number Theory and Cryptography, Springer.","DOI":"10.1007\/978-3-642-42001-6_18"},{"key":"ref_40","doi-asserted-by":"crossref","first-page":"330","DOI":"10.1108\/ICS-04-2016-0027","article-title":"Mobile device users\u2019 privacy security assurance behavior","volume":"25","author":"Chen","year":"2017","journal-title":"Inf. Comput. Secur."},{"key":"ref_41","doi-asserted-by":"crossref","first-page":"529","DOI":"10.1016\/S0167-4048(00)06027-2","article-title":"Authentication and Supervision: A Survey of User Attitudes","volume":"19","author":"Furnell","year":"2000","journal-title":"Comput. Secur."},{"key":"ref_42","unstructured":"Karatzouni, S., Furnell, S.M., Clarke, N.L., and Botha, R.A. (2007, January 11\u201313). Perceptions of User Authentication on Mobile Devices. Proceedings of the 6th Annual ISOnEworld Conference, Las Vegas, NV, USA."},{"key":"ref_43","doi-asserted-by":"crossref","first-page":"793","DOI":"10.7763\/IJCTE.2013.V5.798","article-title":"Users Perceptions of Mobile Phone Security: A Survey Study in the Kingdom of Saudi Arabia","volume":"5","author":"Alhussain","year":"2013","journal-title":"Int. J. Comput. Theory Eng."},{"key":"ref_44","doi-asserted-by":"crossref","unstructured":"Guerra-Casanova, J., R\u00edos-S\u00e1nchez, B., Viana-Matesanz, M., Bailador, G., Sanchez-Avila, C., and De Giles, M.J.M. (2016, January 26). Comfort and security perception of biometrics in mobile phones with widespread sensors. Proceedings of the 2016 IEEE 35th Symposium on Reliable Distributed Systems Workshops (SRDSW), Budapest, Hungary.","DOI":"10.1109\/SRDSW.2016.13"},{"key":"ref_45","doi-asserted-by":"crossref","first-page":"177","DOI":"10.1016\/j.procs.2019.08.027","article-title":"Towards Continuous Authentication on Mobile Phones using Deep Learning Models","volume":"155","author":"Volaka","year":"2019","journal-title":"Procedia Comput. Sci."},{"key":"ref_46","doi-asserted-by":"crossref","first-page":"543","DOI":"10.1016\/j.ifacol.2019.12.602","article-title":"Application of biometric models of authentication in mobile equipment","volume":"52","author":"Abazi","year":"2019","journal-title":"IFAC-PapersOnLine"},{"key":"ref_47","unstructured":"Khan, H., Hengartner, U., and Vogel, D. (2015, January 22\u201324). Usability and security perceptions of implicit authentication: Convenient, secure, sometimes annoying. Proceedings of the Eleventh USENIX Conference on Usable Privacy and Security (SOUPS \u201815), USENIX Association, Ottawa, ON, Canada."},{"key":"ref_48","doi-asserted-by":"crossref","unstructured":"Rasnayaka, S., and Sim, T. (2018, January 22\u201325). Who wants Continuous Authentication on Mobile Devices?. Proceedings of the 2018 IEEE 9th International Conference on Biometrics Theory, Applications and Systems (BTAS), Redondo Beach, CA, USA.","DOI":"10.1109\/BTAS.2018.8698599"},{"key":"ref_49","doi-asserted-by":"crossref","first-page":"93","DOI":"10.1080\/00223980.1975.9915803","article-title":"A Protection Motivation Theory of Fear Appeals and Attitude Change1","volume":"91","author":"Rogers","year":"1975","journal-title":"J. Psychol."},{"key":"ref_50","doi-asserted-by":"crossref","first-page":"190","DOI":"10.1016\/j.im.2012.04.002","article-title":"Motivating IS security compliance: Insights from Habit and Protection Motivation Theory","volume":"49","author":"Vance","year":"2012","journal-title":"Inf. Manag."},{"key":"ref_51","doi-asserted-by":"crossref","unstructured":"Gochman, D.S. (1997). Protection motivation theory. Handbook of Health Behavior Research 1: Personal and Socialdeterminants, Plenum Press.","DOI":"10.1007\/978-1-4899-1757-7"},{"key":"ref_52","doi-asserted-by":"crossref","first-page":"407","DOI":"10.1111\/j.1559-1816.2000.tb02323.x","article-title":"A Meta-Analysis of Research on Protection Motivation Theory","volume":"30","author":"Floyd","year":"2000","journal-title":"J. Appl. Soc. Psychol."},{"key":"ref_53","doi-asserted-by":"crossref","first-page":"449","DOI":"10.1111\/j.1745-6606.2009.01148.x","article-title":"Toward an Understanding of the Online Consumer\u2019s Risky Behavior and Protection Practices","volume":"43","author":"Milne","year":"2009","journal-title":"J. Consum. Aff."},{"key":"ref_54","doi-asserted-by":"crossref","first-page":"253","DOI":"10.1080\/08870449408407485","article-title":"Exploring teenagers\u2019 adaptive and maladaptive thinking in relation to the threat of hiv infection","volume":"9","author":"Abraham","year":"1994","journal-title":"Psychol. Health"},{"key":"ref_55","doi-asserted-by":"crossref","first-page":"2","DOI":"10.1080\/10580530.2015.1117842","article-title":"Impact of Users\u2019 Security Awareness on Desktop Security Behavior: A Protection Motivation Theory Perspective","volume":"33","author":"Hanus","year":"2015","journal-title":"Inf. Syst. Manag."},{"key":"ref_56","doi-asserted-by":"crossref","first-page":"83","DOI":"10.1016\/j.cose.2011.10.007","article-title":"Understanding information systems security policy compliance: An integration of the theory of planned behavior and the protection motivation theory","volume":"31","author":"Ifinedo","year":"2012","journal-title":"Comput. Secur."},{"key":"ref_57","doi-asserted-by":"crossref","first-page":"138","DOI":"10.1016\/j.cose.2016.02.009","article-title":"Understanding online safety behaviors: A protection motivation theory perspective","volume":"59","author":"Tsai","year":"2016","journal-title":"Comput. Secur."},{"key":"ref_58","doi-asserted-by":"crossref","first-page":"860","DOI":"10.1016\/j.cose.2018.03.008","article-title":"Understanding smartphone security behaviors: An extension of the protection motivation theory with anticipated regret","volume":"77","author":"Verkijika","year":"2018","journal-title":"Comput. Secur."},{"key":"ref_59","unstructured":"Jansen, J., and Van Schaik, P. (2016, January 19\u201321). Understanding Precautionary Online Behavioural Intentions: A Comparison of Three Models. Proceedings of the Tenth International Symposium on Human Aspects of Information Security & Assurance, HAISA 2016, Frankfurt, Germany."},{"key":"ref_60","doi-asserted-by":"crossref","first-page":"424","DOI":"10.1037\/0278-6133.22.4.424","article-title":"Some problems with social cognition models: A pragmatic and conceptual analysis","volume":"22","author":"Ogden","year":"2003","journal-title":"Health Psychol."},{"key":"ref_61","doi-asserted-by":"crossref","first-page":"613","DOI":"10.2307\/25750694","article-title":"Practicing Safe Computing: A Multimethod Empirical Examination of Home Computer User Security Behavioral Intentions","volume":"34","author":"Anderson","year":"2010","journal-title":"MIS Q."},{"key":"ref_62","doi-asserted-by":"crossref","first-page":"240","DOI":"10.1037\/0033-2909.124.2.240","article-title":"Self-efficacy and work-related performance: A meta-analysis","volume":"124","author":"Stajkovic","year":"1998","journal-title":"Psychol. Bull."},{"key":"ref_63","doi-asserted-by":"crossref","unstructured":"Campisi, P. (2013). Security and Privacy in Biometrics: Towards a Holistic Approach, Springer.","DOI":"10.1007\/978-1-4471-5230-9"},{"key":"ref_64","doi-asserted-by":"crossref","first-page":"179","DOI":"10.1109\/OJCS.2021.3068385","article-title":"Biometrics and Privacy-Preservation: How Do They Evolve?","volume":"2","author":"Tran","year":"2021","journal-title":"IEEE Open J. Comput. Soc."},{"key":"ref_65","unstructured":"Cacioppo, J., and Petty, R. (1983). Cognitive and physiological processes in fear-based attitude change: A revised theory of protection motivation. Social Psychophysiology: A Sourcebook, Guilford Press."},{"key":"ref_66","unstructured":"Woon, I.M.Y., Tan, G.W., and Low, R.T. (2005, January 11\u201314). A protection motivation theory approach to home wireless security. Proceedings of the International Conference on Information Systems, ICIS 2005, Las Vegas, NV, USA."},{"key":"ref_67","doi-asserted-by":"crossref","first-page":"596","DOI":"10.1037\/0022-3514.52.3.596","article-title":"Effects of Components of Protection-Motivation Theory on Adaptive and Maladaptive Coping with a Health Threat","volume":"52","author":"Rippetoe","year":"1987","journal-title":"J. Personal. Soc. Psychol."},{"key":"ref_68","doi-asserted-by":"crossref","first-page":"453","DOI":"10.1037\/0278-6133.6.5.453","article-title":"Relative Contributions of Protection Motivation Theory Components in Predicting Exercise Intentions and Behavior","volume":"6","author":"Wurtele","year":"1987","journal-title":"Health Psychol."},{"key":"ref_69","doi-asserted-by":"crossref","first-page":"815","DOI":"10.1016\/j.dss.2008.11.010","article-title":"Studying users\u2019 computer security behavior: A health belief perspective","volume":"46","author":"Ng","year":"2009","journal-title":"Decis. Support Syst."},{"key":"ref_70","doi-asserted-by":"crossref","first-page":"816","DOI":"10.1016\/j.cose.2009.05.008","article-title":"Self-efficacy in information security: Its influence on end users\u2019 information security practice behavior","volume":"28","author":"Rhee","year":"2009","journal-title":"Comput. Secur."},{"key":"ref_71","doi-asserted-by":"crossref","first-page":"204","DOI":"10.1287\/isre.9.2.204","article-title":"A Conceptual and Operational Definition of Personal Innovativeness in the Domain of Information Technology","volume":"9","author":"Agarwal","year":"1998","journal-title":"Inf. Syst. Res."},{"key":"ref_72","doi-asserted-by":"crossref","unstructured":"Xiao, S., Witschey, J., and Murphy-Hill, E. (2014, January 15\u201319). Social influences on secure development tool adoption: Why security tools spread. Proceedings of the 17th ACM conference on Computer Supported Cooperative Work & Social Computing, Baltimore, MD, USA.","DOI":"10.1145\/2531602.2531722"},{"key":"ref_73","unstructured":"Rogers, E.M. (2010). Diffusion of Innovations, Simon and Schuster."},{"key":"ref_74","unstructured":"Ware, W.H. (1973). Records, Computers, and the Rights of Citizens: Report."},{"key":"ref_75","doi-asserted-by":"crossref","first-page":"638","DOI":"10.2307\/2065073","article-title":"Review of the Environment and Social Behavior: Privacy, Personal Space, Territory, Crowding., by I. Altman","volume":"7","author":"Gove","year":"1978","journal-title":"Contemp. Sociol."},{"key":"ref_76","doi-asserted-by":"crossref","first-page":"336","DOI":"10.1287\/isre.1040.0032","article-title":"Internet users\u2019 information privacy concerns (IUIPC): The construct, the scale and a causal model","volume":"15","author":"Malhorta","year":"2004","journal-title":"Inf. Syst. Res."},{"key":"ref_77","doi-asserted-by":"crossref","first-page":"503","DOI":"10.2307\/25148854","article-title":"Internet users\u2019 information privacy-protective responses: A taxonomy and a nomological model","volume":"32","author":"Son","year":"2008","journal-title":"MIS Q."},{"key":"ref_78","doi-asserted-by":"crossref","first-page":"37","DOI":"10.1080\/00913367.1999.10673588","article-title":"Flaming, Complaining, Abstaining: How Online Users Respond to Privacy Concerns","volume":"28","author":"Sheehan","year":"1999","journal-title":"J. Advert."},{"key":"ref_79","doi-asserted-by":"crossref","first-page":"763","DOI":"10.1089\/cpb.2007.0240","article-title":"Gender and Online Privacy among Teens: Risk Perception, Privacy Concerns, and Protection Behaviors","volume":"11","author":"Youn","year":"2008","journal-title":"Cyber Psychol. Behav."},{"key":"ref_80","doi-asserted-by":"crossref","first-page":"13","DOI":"10.1089\/cyber.2014.0456","article-title":"Couldn\u2019t or Wouldn\u2019t? The Influence of Privacy Concerns and Self-Efficacy in Privacy Management on Privacy Protection","volume":"18","author":"Chen","year":"2015","journal-title":"Cyber Psychol. Behav. Soc. Netw."},{"key":"ref_81","doi-asserted-by":"crossref","first-page":"100034","DOI":"10.1016\/j.chbr.2020.100034","article-title":"Identifying the values associated with users\u2019 behavior towards anonymity tools through means-end analysis","volume":"2","author":"Skalkos","year":"2020","journal-title":"Comput. Hum. Behav. Rep."},{"key":"ref_82","doi-asserted-by":"crossref","first-page":"980","DOI":"10.1108\/IJoEM-07-2017-0234","article-title":"Building technology trust in ICT application at a university","volume":"13","author":"Ejdys","year":"2018","journal-title":"Int. J. Emerg. Mark."},{"key":"ref_83","doi-asserted-by":"crossref","first-page":"73","DOI":"10.2753\/MIS0742-1222240403","article-title":"Examining Trust in Information Technology Artifacts: The Effects of System Quality and Culture","volume":"24","author":"Vance","year":"2008","journal-title":"J. Manag. Inf. Syst."},{"key":"ref_84","doi-asserted-by":"crossref","first-page":"127","DOI":"10.1007\/s12599-012-0216-6","article-title":"Self-disclosure and Privacy Calculus on Social Networking Sites: The Role of Culture","volume":"4","author":"Krasnova","year":"2012","journal-title":"Bus. Inf. Syst. Eng."},{"key":"ref_85","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/S1471-7727(01)00007-0","article-title":"The importance of trust in software engineers\u2019 assessment and choice of information sources","volume":"12","author":"Hertzum","year":"2002","journal-title":"Inf. Organ."},{"key":"ref_86","doi-asserted-by":"crossref","first-page":"103","DOI":"10.1016\/j.dss.2013.05.010","article-title":"Determinants of end-user acceptance of biometrics: Integrating the \u201cBig 3\u201d of technology acceptance with privacy context","volume":"56","author":"Miltgen","year":"2013","journal-title":"Decis. Support Syst."},{"key":"ref_87","doi-asserted-by":"crossref","first-page":"189","DOI":"10.1287\/isre.14.2.189.16018","article-title":"A Partial Least Squares Latent Variable Modeling Approach for Measuring Interaction Effects: Results from a Monte Carlo Simulation Study and an Electronic-Mail Emotion\/Adoption Study","volume":"14","author":"Chin","year":"2003","journal-title":"Inf. Syst. Res."},{"key":"ref_88","unstructured":"Hair, J.F., Hult, G.T.M., Ringle, C., and Sarstedt, M. (2016). A Primer on Partial Least Squares Structural Equation Modeling (PLS-SEM), Sage Publications."},{"key":"ref_89","unstructured":"Ringle, C.M., Wende, S., and Becker, J.M. (2015). SmartPLS 3, SmartPLS GmbH."},{"key":"ref_90","doi-asserted-by":"crossref","first-page":"53","DOI":"10.5116\/ijme.4dfb.8dfd","article-title":"Making sense of Cronbach\u2019s alpha","volume":"2","author":"Tavakol","year":"2011","journal-title":"Int. J. Med. Educ."},{"key":"ref_91","first-page":"1","article-title":"Alpha, Omega, and H Internal Consistency Reliability Estimates: Reviewing These Options and When to Use Them","volume":"12","author":"Kalkbrenner","year":"2021","journal-title":"Couns. Outcome Res. Eval."},{"key":"ref_92","doi-asserted-by":"crossref","first-page":"1","DOI":"10.9734\/BJMCS\/2016\/25183","article-title":"Assessing the Validity and Reliability of a Measurement Model in Structural Equation Modeling (SEM)","volume":"15","author":"Ahmad","year":"2016","journal-title":"Br. J. Math. Comput. Sci."},{"key":"ref_93","doi-asserted-by":"crossref","first-page":"185","DOI":"10.1111\/dsji.12097","article-title":"The Determinants of Students\u2019 Perceived Learning Outcomes and Satisfaction in University Online Education: An Update","volume":"14","author":"Eom","year":"2016","journal-title":"Decis. Sci. J. Innov. Educ."},{"key":"ref_94","doi-asserted-by":"crossref","first-page":"297","DOI":"10.1007\/BF02310555","article-title":"Coefficient alpha and the internal structure of tests","volume":"16","author":"Cronbach","year":"1951","journal-title":"Psychometrika"},{"key":"ref_95","doi-asserted-by":"crossref","first-page":"339","DOI":"10.1111\/j.1745-6606.2005.00018.x","article-title":"Your Privacy Is Sealed: Effects of Web Privacy Seals on Trust and Personal Disclosures","volume":"39","author":"Rifon","year":"2005","journal-title":"J. Consum. Aff."},{"key":"ref_96","doi-asserted-by":"crossref","first-page":"837","DOI":"10.25300\/MISQ\/2015\/39.4.5","article-title":"What Do Systems Users Have to Fear? Using Fear Appeals to Engender Threats and Fear that Motivate Protective Security Behaviors","volume":"39","author":"Boss","year":"2015","journal-title":"MIS Q."},{"key":"ref_97","doi-asserted-by":"crossref","first-page":"350","DOI":"10.1016\/j.im.2005.08.006","article-title":"Understanding information technology acceptance by individual professionals: Toward an integrative view","volume":"43","author":"Yi","year":"2006","journal-title":"Inf. Manag."},{"key":"ref_98","doi-asserted-by":"crossref","first-page":"409","DOI":"10.1348\/096317902321119574","article-title":"Implicating trust in the innovation process","volume":"75","author":"Clegg","year":"2002","journal-title":"J. Occup. Organ. Psychol."},{"key":"ref_99","doi-asserted-by":"crossref","first-page":"96","DOI":"10.1080\/08911762.2017.1412552","article-title":"Users\u2019 Information Privacy Concerns and Privacy Protection Behaviors in Social Networks","volume":"31","author":"Adhikari","year":"2018","journal-title":"J. Glob. Mark."},{"key":"ref_100","doi-asserted-by":"crossref","first-page":"101","DOI":"10.1080\/10864415.2003.11044275","article-title":"Consumer Acceptance of Electronic Commerce: Integrating Trust and Risk with the Technology Acceptance Model","volume":"7","author":"Pavlou","year":"2003","journal-title":"Int. J. Electron. Commer."},{"key":"ref_101","doi-asserted-by":"crossref","first-page":"39","DOI":"10.1016\/j.jsis.2008.01.001","article-title":"Why do we trust new technology? A study of initial trust formation with organizational information systems","volume":"17","author":"Li","year":"2008","journal-title":"J. Strat. Inf. Syst."},{"key":"ref_102","doi-asserted-by":"crossref","first-page":"2366","DOI":"10.1016\/j.chb.2012.07.008","article-title":"Information privacy concerns, antecedents and privacy measure use in social networking sites: Evidence from Malaysia","volume":"28","author":"Mohamed","year":"2012","journal-title":"Comput. Hum. Behav."},{"key":"ref_103","first-page":"394","article-title":"Understanding security behaviors in personal computer usage: A threat avoidance perspective","volume":"11","author":"Liang","year":"2010","journal-title":"J. Assoc. Inf. Syst."},{"key":"ref_104","first-page":"737","article-title":"Risk and anxiety: A theory of data-breach harms","volume":"96","author":"Solove","year":"2017","journal-title":"Tex. L. Rev."},{"key":"ref_105","doi-asserted-by":"crossref","first-page":"603","DOI":"10.1504\/IJMC.2014.064915","article-title":"Understanding user behaviour in coping with security threats of mobile device loss and theft","volume":"12","author":"Tu","year":"2014","journal-title":"Int. J. Mob. Commun."},{"key":"ref_106","doi-asserted-by":"crossref","unstructured":"Tassabehji, R., and Kamala, M.A. (2009, January 20\u201323). Improving E-Banking Security with Biometrics: Modelling User Attitudes and Acceptance. Proceedings of the 2009 3rd International Conference on New Technologies, Mobility and Security, Cairo, Egypt.","DOI":"10.1109\/NTMS.2009.5384806"},{"key":"ref_107","doi-asserted-by":"crossref","first-page":"2799","DOI":"10.1016\/j.chb.2008.04.005","article-title":"Security lapses and the omission of information security measures: A threat control model and empirical test","volume":"24","author":"Workman","year":"2008","journal-title":"Comput. Hum. Behav."},{"key":"ref_108","doi-asserted-by":"crossref","first-page":"194","DOI":"10.1080\/17538157.2016.1200053","article-title":"User acceptance of mobile health services from users\u2019 perspectives: The role of self-efficacy and response-efficacy in technology acceptance","volume":"42","author":"Zhang","year":"2016","journal-title":"Inform. Health Soc. Care"},{"key":"ref_109","unstructured":"Grimmelmann, J. (2010). Some skepticism about search neutrality. The Next Digital Decade: Essays on the Future of the Internet, TechFreedom."},{"key":"ref_110","doi-asserted-by":"crossref","first-page":"319","DOI":"10.2307\/249008","article-title":"Perceived usefulness, perceived ease of use, and user acceptance of information technology","volume":"13","author":"Davis","year":"1989","journal-title":"MIS Q."}],"container-title":["Journal of Cybersecurity and Privacy"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/2624-800X\/1\/4\/36\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T07:39:31Z","timestamp":1760168371000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/2624-800X\/1\/4\/36"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,12,3]]},"references-count":110,"journal-issue":{"issue":"4","published-online":{"date-parts":[[2021,12]]}},"alternative-id":["jcp1040036"],"URL":"https:\/\/doi.org\/10.3390\/jcp1040036","relation":{},"ISSN":["2624-800X"],"issn-type":[{"value":"2624-800X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,12,3]]}}}