Skip to main content

Advertisement

Log in

Risk Taking Behaviors Using Public Wi-Fi™

  • Published:
Information Systems Frontiers Aims and scope Submit manuscript

Abstract

Dramatic increases in public Wi-Fi™ (hereafter referred to as Wi-Fi) availability have occurred over the last decade. Although Wi-Fi provides convenient network connectivity, it has significant security vulnerabilities. Despite widespread knowledge of potential vulnerabilities of public Wi-Fi, most people simply connect to it in public places. We investigated the individual calculus behind risk-taking behavior based on the theoretical foundations of risk taking behavior, technology threat avoidance theory, prospect theory, and self-determination theory. Using survey data collected from 1313 respondents in the United States, this study found that avoidance motivation, risk averting propensity, and intrinsic and extrinsic motivations affect intention to use public Wi-Fi. In addition, our results indicate that avoidance motivation is related to safeguard effectiveness, safeguard cost, and perceived threat, while risk averting propensity is associated with positive outcome history, age, gender, and education attainment.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2

Similar content being viewed by others

Notes

  1. The difference in Chi-squares is 391.33 with 98 degrees of freedom, which is not significant.

References

  • Aime, C., & Lioy. (2007). Dependability in wireless networks: Can we rely on Wifi? IEEE SECURITY & PRIVACY, 5, 23–29.

    Article  Google Scholar 

  • Anderson, & Agarwal. (2011). The digitization of healthcare: Boundary risks, emotion, and consumer willingness to disclose personal health information. Information Systems Research, 22(3), 469–490.

    Article  Google Scholar 

  • Arachchilage, & Love. (2013). A game design framework for avoiding phishing attacks. Computers in Human Behavior, 29(3), 706–714.

    Article  Google Scholar 

  • Arachchilage, & Love. (2014). Security awareness of computer users: A phishing threat avoidance perspective. Computers in Human Behavior, 38, 304–312.

    Article  Google Scholar 

  • Bachmann, M. (2010). The risk propensity and rationality of computer hackers. International Journal of Cyber Criminology, 4(1/2), 643–656.

    Google Scholar 

  • Barlow, W., Ormond, & Dennis. (2013). Don't make excuses! Discouraging neutralization to reduce it policy violation. Computers & Security, 39, 145–159.

    Article  Google Scholar 

  • Becker, D., Sorensen, G., Borch-Johnsen, M., et al. (1996). Prediction of risk of liver disease by alcohol intake, sex, and age: A prospective population study. Hepatology, 23(5), 1025–1029.

    Article  Google Scholar 

  • Bencie (2017). Why You Really Need to Stop Using Public Wi-Fi. https://hbr.org/2017/05/why-you-really-need-to-stop-using-public-wi-fi. Accessed March 20 2019.

  • Blank, G., Bolsover, G., & Dubois, E. (2014, August). A new privacy paradox: Young people and privacy on social network sites. In Prepared for the Annual Meeting of the American Sociological Association (Vol. 17). (see https://papers.ssrn.com/sol3/papers.cfm?abstract_id=2479938).

  • Braverman, & Frost. (2012). Matching the graphical display of data to avoidance versus approach motivation increases outcome expectancies. The Journal of Social Psychology, 152(2), 228–245.

    Article  Google Scholar 

  • Buhrmester, K., & Gosling. (2011). Amazon's mechanical Turk: A new source of inexpensive, yet high-quality, data? Perspectives on Psychological Science, 6(1), 3–5.

    Article  Google Scholar 

  • Byrne. (2005). How do consumers evaluate risk in financial products? Journal of Financial Services Marketing, 10(1), 21–36.

    Article  Google Scholar 

  • Carpenter, Y., Barrett, & McLeod. (2019). Refining technology threat avoidance theory. Communications of the Association for Information Systems, 44(1), 22.

    Google Scholar 

  • CBSNEWS (2010). Dangers of Free Public Wifi. http://www.cbsnews.com/2100-501083_162-6657962.html.

  • Chang, D. V., & Chiremba. (2004). Determinants of subjective and objective risk tolerance. Journal of Personal Finance, 3(3), 53–67.

    Google Scholar 

  • Chin, W. W. (2010). How to write up and report PLS analyses. In Handbook of partial least squares (pp. 655–690). Springer, Berlin, Heidelberg.

  • CISCO (2012). The Future of Hotspots: Making Wi-Fi as Secure and Easy to Use as Cellular. https://www.icg.isy.liu.se/exjobb/doc/ext/white_paper_c11-649337.pdf.

  • Correal (2020). Just a Quarter of New York’s Wi-Fi Kiosks Are Up. Guess Where. https://www.nytimes.com/2019/12/06/nyregion/linknyc-wifi-connections.html#:~:text=The%20company%20behind%20LinkNYC%2C%20CityBridge,of%20the%207%2C500%20promised%20kiosks. Accessed August 26 2020.

  • Cox. (2012). Information systems user security: A structured model of the knowing–doing gap. Computers in Human Behavior, 28(5), 1849–1858.

    Article  Google Scholar 

  • Crossler, L., Loraas, & Trinkle. (2014). Understanding compliance with bring your own device policies utilizing protection motivation theory: Bridging the intention-behavior gap. Journal of Information Systems, 28(1), 209–226.

    Article  Google Scholar 

  • Curry, G., & McBride. (1997). Reasons for quitting: Intrinsic and extrinsic motivation for smoking cessation in a population-based sample of smokers. Addictive Behaviors, 22(6), 727–739.

    Article  Google Scholar 

  • Cutler, D. M., & Lleras-Muney, A. (2006). Education and health: evaluating theories and evidence. In National Poverty Center Working Paper Series# 06-19. National Poverty Center, University of Michigan.

  • Das, & Teng. (2001). Strategic risk behaviour and its temporalities: Between risk propensity and decision context. Journal of Management Studies, 38(4), 515–534.

    Article  Google Scholar 

  • Davis, B., & Warshaw. (1992). Extrinsic and intrinsic motivation to use computers in the workplace 1. Journal of Applied Social Psychology, 22(14), 1111–1132.

    Article  Google Scholar 

  • den Broeck, V., Poels, & Walrave. (2015). Older and Wiser? Facebook Use, Privacy Concern, and Privacy Protection in the Life Stages of Emerging, Young, and Middle Adulthood. Social Media+ Society, 1(2), 2056305115616149.

    Google Scholar 

  • der Heijden, V. (2004). User acceptance of hedonic information systems. MIS Quarterly, 28, 695–704.

    Article  Google Scholar 

  • Dewett. (2006). Exploring the role of risk in employee creativity. The Journal of Creative Behavior, 40(1), 27–45.

    Article  Google Scholar 

  • Dinev, & Hart. (2006). An extended privacy Calculus model for E-commerce transactions. Information Systems Research, 17(1), 61–80,100.

    Article  Google Scholar 

  • Dinev, H., & Mullen. (2008). Internet privacy concerns and beliefs about government surveillance–an empirical investigation. The Journal of Strategic Information Systems, 17(3), 214–233.

    Article  Google Scholar 

  • Dulebohn, & Murray. (2007). Retirement savings behavior of higher education employees. Research in Higher Education, 48(5), 545–582.

    Article  Google Scholar 

  • Dymond, S., Roche, D. H., & Freegard. (2012). Safe from harm: Learned, instructed, and symbolic generalization pathways of human threat-avoidance. PLoS One, 7(10), e47539.

    Article  Google Scholar 

  • Elliot, E., & Harmon-Jones. (2013). Approach–avoidance motivation and emotion: Convergence and divergence. Emotion Review, 5(3), 308–311.

    Article  Google Scholar 

  • Farahmand, & Spafford. (2013). Understanding insiders: An analysis of risk-taking behavior. Information Systems Frontiers, 15(1), 5–15.

    Article  Google Scholar 

  • Ferro, & Potorti. (2005). Bluetooth and Wi-fi wireless protocols: A survey and a comparison. Wireless Communications, IEEE, 12(1), 12–26. https://doi.org/10.1109/mwc.2005.1404569.

    Article  Google Scholar 

  • Fornell, & Larcker. (1981). Structural equation models with unobservable variables and measurement error: Algebra and statistics. Journal of Marketing Research, 382–388.

  • Foster, S., & Goff. (2009). Why do narcissists take more risks? Testing the roles of perceived risks and benefits of risky behaviors. Personality and Individual Differences, 47(8), 885–889.

    Article  Google Scholar 

  • Gnambs, A., & Oeberst. (2015). Red color and risk-taking behavior in online environments. PLoS One, 10(7), e0134033.

    Article  Google Scholar 

  • Gold. (2011). Cracking wireless networks. Network Security, 2011(11), 14–18. https://doi.org/10.1016/s1353-4858(11)70120-9.

    Article  Google Scholar 

  • Granié. (2009). Effects of gender, sex-stereotype conformity, age and internalization on risk-taking among adolescent pedestrians. Safety Science, 47(9), 1277–1283.

    Article  Google Scholar 

  • Guardian (2011). Wi-Fi Security Flaw for Smartphones Puts Your Credit Cards at Risk. http://www.guardian.co.uk/technology/2011/apr/25/wifi-security-flaw-smartphones-risk. Accessed March 25 2019.

  • Hamid, R., Taib, & Thurasamy. (2014). The relationship between risk propensity, risk perception and risk-taking behaviour in an emerging market. International Journal of Banking and Finance, 10(1), 134–147.

    Google Scholar 

  • He, & Mittal. (2007). The effect of decision risk and project stage on escalation of commitment. Organizational Behavior and Human Decision Processes, 103(2), 225–237. https://doi.org/10.1016/j.obhdp.2007.01.002.

    Article  Google Scholar 

  • HelpNetSecurity (2016). Public Wi-Fi: Users’ Habits and Perceptions of Risk. https://www.helpnetsecurity.com/2016/10/19/public-wi-fi-users-habits-risk/. Accessed Janunary 19 2020.

  • Herath, C., Wang, B., Wilbur, & Rao. (2014). Security services as coping mechanisms: An investigation into user intention to adopt an email authentication service. Information Systems Journal, 24(1), 61–84.

    Article  Google Scholar 

  • Hoffman (2017). Wi-Fi Vs. Ethernet: How Much Better Is a Wired Connection? https://www.howtogeek.com/217463/wi-fi-vs.-ethernet-how-much-better-is-a-wired-connection/. Accessed March 20 2019.

  • Holden, D., & Hicks. (2013). Assessing the reliability of the M5-120 on Amazon’s mechanical Turk. Computers in Human Behavior, 29(4), 1749–1754.

    Article  Google Scholar 

  • Hongsranagon, K., Hongpukdee, H., & Deelertyuenyong. (2011). Traffic risk behavior and perceptions of Thai motorcyclists: A case study. IATSS research, 35(1), 30–33.

    Article  Google Scholar 

  • Hoy, & Milne. (2010). Gender differences in privacy-related measures for young adult Facebook users. Journal of Interactive Advertising, 10(2), 28–45.

    Article  Google Scholar 

  • Huff, & Prybutok. (2008). Information systems Project Management decision making: The influence of experience and risk propensity. Project Management Journal, 39(2), 34–47.

    Article  Google Scholar 

  • Hulland. (1999). Use of partial least squares (Pls) in strategic management research: A review of four recent studies. Strategic Management Journal, 20, 195–204.

    Article  Google Scholar 

  • Iscrupe (2019). Is Public Wi-Fi Safe? No, but It Is Necessary. https://www.allconnect.com/blog/is-public-wifi-safe. Accessed January 19 2020.

  • Jardine. (2020). The case against commercial antivirus software: Risk homeostasis and information problems in Cybersecurity. Risk Analysis., 40, 1571–1588.

    Article  Google Scholar 

  • Jonah. (1986). Accident risk and risk-taking behaviour among young drivers. Accident Analysis & Prevention, 18(4), 255–271.

    Article  Google Scholar 

  • Keil, W., Turk, D.-R., & Nulden. (2000). An investigation of risk perception and risk propensity on the decision to continue a software development project. Journal of Systems and Software, 53(2), 145–157.

    Article  Google Scholar 

  • Kelleher (2019). Why You Should Never Use Free Airport Wi-Fi. https://www.forbes.com/sites/suzannerowankelleher/2019/09/24/why-you-should-never-use-free-airport-wi-fi/#7dc14bd97d3a. Accessed August 26 2020.

  • Kim (2019). The Hidden Costs of ‘Free’ Wifi. https://www.webroot.com/blog/2019/03/13/the-hidden-costs-of-free-wifi/. Accessed August 26 2020.

  • Kindberg, T., O'Neill, E., Bevan, C., Kostakos, V., Stanton Fraser, D., & Jay, T. (2008, April). Measuring trust in wi-fi hotspots. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (pp. 173–182).

  • Kirby. (2001). Understanding what works and what Doesn't in reducing adolescent sexual risk-taking. Family Planning Perspectives, 33(6), 276–281.

    Article  Google Scholar 

  • Klasnja, C., Jung, G., LeGrand, P., et al. (2009). "When I Am on Wi-Fi, I Am Fearless": Privacy Concerns & Practices in Eeryday Wi-Fi Use. Paper presented at the proceedings of the SIGCHI conference on human factors in computing systems. Boston: MA, USA.

    Book  Google Scholar 

  • Korzaan, B., & Greer. (2009). Demystifying personality and privacy: An empirical investigation into antecedents of concerns for information privacy. Journal of Behavioral Studies in Business, 1, 1.

    Google Scholar 

  • Laric, P., & Katsanis. (2009). Consumer concerns for healthcare information privacy: A comparison of us and Canadian perspectives. Research in Healthcare Financial Management, 12(1), 93.

    Google Scholar 

  • Leavitt. (2011). Mobile security: Finally a serious problem? Computer, 44(6), 11–14. https://doi.org/10.1109/mc.2011.184.

    Article  Google Scholar 

  • Lee, C., & Chen. (2005). Acceptance of internet-based learning medium: The role of extrinsic and intrinsic motivation. Information & Management, 42(8), 1095–1104.

    Article  Google Scholar 

  • Lehr, & McKnight. (2003). Wireless internet access: 3g Vs. Wifi? Telecommunications Policy, 27(5–6), 351–370. https://doi.org/10.1016/s0308-5961(03)00004-1.

    Article  Google Scholar 

  • Lemstra, & Hayes. (2009). License-exempt: Wi-fi complement to 3g. Telematics and Informatics, 26(3), 227–239. https://doi.org/10.1016/j.tele.2008.11.003.

    Article  Google Scholar 

  • Li, S., & Xu. (2011). The role of affect and cognition on online Consumers’ decision to disclose personal information to unfamiliar online vendors. Decision Support Systems, 51(3), 434–445.

    Article  Google Scholar 

  • Li, L., Steinberg, K.-C., Kim-Spoon, & Deater-Deckard. (2019). Longitudinal link between trait motivation and risk-taking behaviors via neural risk processing. Developmental Cognitive Neuroscience, 40, 100725.

    Article  Google Scholar 

  • Liang, & Xue. (2009). Avoidance of information Tehchnology threats: A theoretical perspective. [article]. MIS Quarterly, 33(1), 71–90.

    Article  Google Scholar 

  • Liang, & Xue. (2010). Understanding security behaviors in personal computer usage: A threat avoidance perspective*. Journal of the Association for Information Systems, 11(7), 394–413.

    Article  Google Scholar 

  • Lin, F. T. (2009). Does the risk aversion vary with different background risk of households. International Research Journal of Finance and Economics, 34(34), 69–82.

    Google Scholar 

  • Luarn, & Lin. (2005). Toward an understanding of the behavioral intention to use Mobile banking. Computers in Human Behavior, 21(6), 873–891.

    Article  Google Scholar 

  • MacCrimmon, & Wehrung. (1990). Characteristics of risk taking executives. Management Science, 36(4), 422–435. https://doi.org/10.2307/2632007.

    Article  Google Scholar 

  • McCormac, Z., Parsons, C., Butavicius, & Pattinson. (2017). Individual differences and information security awareness. Computers in Human Behavior, 69, 151–156.

    Article  Google Scholar 

  • Miller. (2001). Facing the challenge of wireless security. Computer, 34(7), 16–18. https://doi.org/10.1109/2.933495.

    Article  Google Scholar 

  • Miltgen, & Peyrat-Guillard. (2014). Cultural and generational influences on privacy concerns: A qualitative study in seven European countries. European Journal of Information Systems, 23(2), 103–125.

    Article  Google Scholar 

  • Mongin. (1997). Expected Utility Theory (Handbook of Economic Methodology). London: Edward Elgar.

    Google Scholar 

  • Moody, G., & Dunn. (2017). Which phish get caught? An exploratory study of individuals′ susceptibility to phishing. European Journal of Information Systems, 26(6), 564–584.

    Article  Google Scholar 

  • Mun, & Hwang. (2003). Predicting the use of web-based information systems: Self-efficacy, enjoyment, learning goal orientation, and the technology acceptance model. International Journal of Human-Computer Studies, 59(4), 431–449.

    Article  Google Scholar 

  • Murty, V., & Rao. (2012). Performance evaluation of Wi-fi comparison with Wimax networks. International Journal of Distributed and Parallel Systems (IJDPS), 3(1), 321–329.

    Article  Google Scholar 

  • Nobles, P., & Horrocks, P. A. (2004). Vulnerability of IEEE802. 11 WLANs to MAC layer DoS attacks.

    Google Scholar 

  • Pablo. (1997). Reconciling predictions of decision making under risk: Insights from a Reconceptualized model of risk behaviour. Journal of Managerial Psychology, 12(1), 4–20.

    Article  Google Scholar 

  • Peace, G., & Thong. (2003). Software piracy in the workplace: A model and empirical test. Journal of Management Information Systems, 20(1), 153–178.

    Article  Google Scholar 

  • Pelletier, F., Vallerand, T., Briere, & Blais. (1995). Toward a new measure of intrinsic motivation, extrinsic motivation, and Amotivation in sports: The sport motivation scale (Sms). Journal of Sport and Exercise Psychology, 17, 35–35 53.

    Article  Google Scholar 

  • Podsakoff, T., Grover, & Huber. (1984). Situational moderators of leader reward and punishment behaviors: Fact or fiction? Organizational Behavior and Human Performance, 34(1), 21–63.

    Article  Google Scholar 

  • Powell, & Ansic. (1997). Gender differences in risk behaviour in financial decision-making: An experimental analysis. Journal of Economic Psychology, 18(6), 605–628.

    Article  Google Scholar 

  • PRNewswire (2012). Almost 80% Believe Free Wi-Fi Can Lead to Identity Theft, Study Finds. http://www.prnewswire.com/news-releases/almost-80-believe-free-wi-fi-can-lead-to-identity-theft-study-finds-174740441.html. Accessed May 13 2015.

  • Raghunathan. (1999). Impact of information quality and decision-maker quality on decision quality: A theoretical model and simulation analysis. Decision Support Systems, 26(4), 275–286.

    Article  Google Scholar 

  • Rainie, L., Kiesler, S., Kang, R., Madden, M., Duggan, M., Brown, S., & Dabbish, L. (2013). Anonymity, privacy, and security online. Pew Research Center, 5.

  • Reddy, S, R., Rijutha, A., & Reddy (2010). Wireless Hacking - a Wifi Hack by Cracking Wep. In Education Technology and Computer (ICETC), 2010 2nd International Conference on, 22–24 June 2010 2010 (Vol. 1, pp. 189–193). https://doi.org/10.1109/icetc.2010.5529269.

  • Ruedl, P., Sommersacher, G., Kopp, N., et al. (2010). Factors associated with self-reported risk-taking behaviour on ski slopes. British Journal of Sports Medicine, 44(3), 204–206.

    Article  Google Scholar 

  • Ryan, & Deci. (2000). Intrinsic and extrinsic motivations: Classic definitions and new directions. Contemporary Educational Psychology, 25(1), 54–67.

    Article  Google Scholar 

  • Satz, M., Miller, S., McArthur, C., et al. (1993). Low. Education as a Possible Risk Factor for Cognitive Abnormalities in Hiv-1: Findings from the Multicenter Aids Cohort Study (Macs)., 6(5), 503–511.

    Google Scholar 

  • Schoemaker. (1982). The expected utility model: Its variants, purposes, evidence and limitations. Journal of Economic Literature, 20(2), 529–563.

    Google Scholar 

  • Schomakers, L., Müllmann, & Ziefle. (2019). Internet users’ perceptions of information sensitivity–insights from Germany. International Journal of Information Management, 46, 142–150.

    Article  Google Scholar 

  • Scott, B., Andersen, W., Voeks, D., et al. (2007). Testing the risk compensation hypothesis for safety helmets in Alpine skiing and snowboarding. Injury Prevention, 13(3), 173–177.

    Article  Google Scholar 

  • Sebbar, Boulahya, Mezzour, & Boulmalf (2016). An Empirical Study of Wifi Security and Performance in Morocco-Wardriving in Rabat. In 2016 International Conference on Electrical and Information Technologies (ICEIT), 2016 (pp. 362–367): IEEE.

  • Shadish, W. R., Cook, T. D., & Campbell, D. T. (2002). Experimental and quasi-experimental designs for generalized causal inference, by William R. Shedish, Thomas D. Cook, Donald T. Campbell. Boston Houghton Mifflin.

  • Sharma, Y., & Crawford. (2009). Estimating the effect of common method variance: The method—Method pair technique with an illustration from tam research. MIS Quarterly, 33, 473–490.

    Article  Google Scholar 

  • Sheehan. (1999). An investigation of gender differences in on-line privacy concerns and resultant behaviors. Journal of Interactive Marketing, 13(4), 24–38.

    Article  Google Scholar 

  • Shim, C., & Lee. (2009). Empirical analysis of risk-taking behavior in it platform migration decisions. Computers in Human Behavior, 25(6), 1290–1305.

    Article  Google Scholar 

  • Simbana, S., Lopez, G., Tipantuna, C., & Sanchez, F. (2018). Vulnerability analysis toolkit for IEEE 802.11 wireless networks: a practical approach. In 2018 International Conference on Information Systems and Computer Science (INCISCOS) (pp. 227–232). IEEE.

  • Sitkin, & Weingart. (1995). Determinants of risky decision making behaviors: A test of the mediating role of risk perceptions and propensity. [article]. Academy of Management Journal, 38(6), 1573–1592. https://doi.org/10.2307/256844.

    Article  Google Scholar 

  • Small, S. A., & Luster, T. (1994). Adolescent sexual activity: An ecological, risk-factor approach. Journal of Marriage and the Family, 181–192.

  • Statista (2019). Number of Public Wi-Fi Hotspots Worldwide from 2016 to 2022. https://www.statista.com/statistics/677108/global-public-wi-fi-hotspots/. Accessed January 23 2019.

  • Straub, L., & Karahanna-Evaristo. (1995). Measuring system usage: Implications for is theory testing. Management Science, 41(8), 1328–1342.

    Article  Google Scholar 

  • Sun, A., & Koong (2011). The more secure the better? A Study of Information Security Readiness. Industrial Management & Data Systems.

  • Swanson, U., & Lank. (2010). Naïve security in a Wi-fi world. In M. Nishigaki, A. Jøsang, Y. Murayama, & S. Marsh (Eds.), Trust Management Iv (Vol. 321, pp. 32-47, Ifip advances in information and communication technology). Berlin Heidelberg: Springer.

    Google Scholar 

  • Swierczek, & Ha. (2003). Entrepreneurial orientation, uncertainty avoidance and firm performance: An analysis of Thai and Vietnamese Smes. The International Journal of Entrepreneurship Innovation, 4(1), 46–58.

    Article  Google Scholar 

  • Symantec (2018). 2017 Norton Wi-Fi Risk Report. https://www.symantec.com/content/dam/symantec/docs/reports/2017-norton-wifi-risk-report-global-results-summary-en.pdf. Accessed March 25 2019.

  • Taylor, & Strutton. (2010). Has E-marketing come of age? Modeling historical influences on post-adoption era internet consumer behaviors. Journal of Business Research, 63(9), 950–956.

    Article  Google Scholar 

  • Taylor, & Todd. (1995). Understanding information technology usage: A test of competing models. Information Systems Research, 6(2), 144–176.

    Article  Google Scholar 

  • TeleGeography (2017). Kt Opens up Access to 100,000 Wi-Fi Hotspots. https://www.telegeography.com/products/commsupdate/articles/2017/08/14/kt-opens-up-access-to-100000-wi-fi-hotspots/. Accessed January 23 2019.

  • Teo, L., & Lai. (1999). Intrinsic and extrinsic motivation in internet usage. Omega, 27(1), 25–37.

    Article  Google Scholar 

  • Tu, Z., & Yuan, Y. (2012). Understanding user's behaviors in coping with security threat of mobile devices Loss and theft. In 2012 45th Hawaii International Conference on System Sciences (pp. 1393-1402). IEEE.

  • Turner, & McClure. (2003). Age and gender differences in risk-taking behaviour as an explanation for high incidence of motor vehicle crashes as a driver in young males. Injury Control and Safety Promotion, 10(3), 123–130.

    Article  Google Scholar 

  • Tversky, & Kahneman. (1992). Advances in Prospect theory: Cumulative representation of uncertainty. Journal of Risk uncertainty, 5(4), 297–323.

    Article  Google Scholar 

  • Vansteenkiste, L., & Deci. (2006). Intrinsic versus extrinsic goal contents in self-determination theory: Another look at the quality of academic motivation. Educational Psychologist, 41(1), 19–31.

    Article  Google Scholar 

  • Vater, M., & Roepke. (2018). Does a narcissism epidemic exist in modern Western societies? Comparing narcissism and self-esteem in east and West Germany. PLoS One, 13(1), e0188287.

    Article  Google Scholar 

  • Venkatesh. (1999). Creation of favorable user perceptions: Exploring the role of intrinsic motivation. MIS Quarterly, 23(2), 239–260.

    Article  Google Scholar 

  • Venkatesh, M., Davis, & Davis. (2003). User acceptance of information technology: Toward a unified view. MIS Quarterly, 27(3), 425–478.

    Article  Google Scholar 

  • Warkentin, & Siponen. (2015). An enhanced fear appeal rhetorical framework: Leveraging threats to the human asset through sanctioning rhetoric. MIS Quarterly, 39(1), 113–134.

    Article  Google Scholar 

  • Watts. (2016). Secure authentication is the only solution for vulnerable public Wifi. Computer Fraud & Security, 2016(1), 18–20.

    Article  Google Scholar 

  • Witemyre, S. J., Abegaz, T. T., Payne, B. R., & Mady, A. (2018). Hijacking wireless communications using WiFi Pineapple NANO as a rogue access point. 2018 Kennesaw State University Conference on Cybersecurity Education.

  • Wolburg. (2001). The “risky business” of binge drinking among college students: Using risk models for Psas and anti-drinking campaigns. Journal of Advertising, 30(4), 23–39.

    Article  Google Scholar 

  • Wong. (2005). The role of risk in making decisions under escalation situations. Applied Psychology, 54(4), 584–607.

    Article  Google Scholar 

  • Woon, I., Tan, G. W., & Low, R. (2005). A protection motivation theory approach to home wireless security. 2005 International Conference on Information Systems (ICIS).

  • Workman, B., & Straub. (2008). Security lapses and the omission of information security measures: A threat control model and empirical test. Computers in Human Behavior, 24(6), 2799–2816.

    Article  Google Scholar 

  • Woyke (2017). The Startup Behind Nyc’s Plan to Replace Phone Booths with 7,500 Connected Kiosks. https://www.technologyreview.com/s/608281/the-startup-behind-nycs-plan-to-replace-phone-booths-with-7500-connected-kiosks/. Accessed January 23 2019.

  • Yao, S., & Wang. (2011). Decomposing the age effect on risk tolerance. The Journal of Socio-Economics, 40(6), 879–887.

    Article  Google Scholar 

  • Yim, & Han. (2013). An Investigation of the Factors That Influence the Compliance to Information Security Policy: From Risk Compensation Theory. The Journal of Digital Policy and Management, 11(10), 153–168.

    Google Scholar 

  • Yoon, & Kim. (2013). Understanding computer security behavioral intention in the workplace: An empirical study of Korean firms. Information Technology People, 26(4), 401–419.

    Article  Google Scholar 

  • Yordanova, I., & Alexandrova-Boshnakova, I. (2011). Gender effects on risk-taking of entrepreneurs: Evidence from Bulgaria. International Journal of Entrepreneurial Behavior Research, 17(3), 272–295.

    Article  Google Scholar 

  • Youn. (2009). Determinants of online privacy concern and its influence on privacy protection behaviors among young adolescents. Journal of Consumer Affairs, 43(3), 389–418.

    Article  Google Scholar 

  • Zafft, & Agu (2012). Malicious Wifi Networks: A First Look. In Local Computer Networks Workshops (LCN Workshops), 2012 IEEE 37th Conference on, 22–25 Oct. 2012 2012 (pp. 1038–1043). https://doi.org/10.1109/LCNW.2012.6424041.

  • Zhang, R., & Li. (2009). Impact of perceived technical protection on security behaviors. Information Management & Computer Security., 17, 330–340.

    Article  Google Scholar 

  • Ziegler (2016). Avast Wi-Fi Hack Experiment Demonstrates “Reckless” Behavior of Mobile World Congress Attendees. https://www.businesswire.com/news/home/20160222005555/en/Avast-Wi-Fi-Hack-Experiment-Demonstrates-%E2%80%9CReckless%E2%80%9D-Behavior. Accessed August 26 2020.

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Hoon S. Choi.

Additional information

Publisher’s Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Appendix 1

Appendix 1

Table 6 Cross Factor Loadings

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Choi, H.S., Carpenter, D. & Ko, M.S. Risk Taking Behaviors Using Public Wi-Fi™. Inf Syst Front 24, 965–982 (2022). https://doi.org/10.1007/s10796-021-10119-7

Download citation

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10796-021-10119-7

Keywords

Navigation