Abstract
Wireless networks are becoming the norm in the society, where hotspots afford users access to the internet through mobile devices. Unknown wireless networks, open public networks with unknown identity, pose threats as hackers can gain unauthorized access to users’ private information stored in their mobile devices. Despite the imminent dangers, individuals continue to use these networks. This study explicates a self-regulation theory model to investigate the antecedents of deficient self-regulation (DSR). We posit that both habit cues and information security experiential factors influence DSR, leading to habitual use of unknown wireless networks. The results show that perceived attachment, perceptions on privacy risk, and information security self-efficacy significantly influence DSR, which subsequently influences habitual use of unknown wireless networks. This study contributes to the literature on self-regulatory theory and privacy, and also provides implications for managers in dealing with vulnerabilities posed by employees using private or corporate mobile devices on unknown wireless network.
Similar content being viewed by others
References
Aime, M., Calandriello, G., & Lioy, A. (2007). Dependability in Wireless Networks: Can We Rely on WiFi? IEEE Security and Privacy Magazine, 5(1), 23–29.
Anderson, B. B., Vance, A., Kirwan, C. B., Jenkins, J. L., & Eargle, D. (2016). From Warning to Wallpaper: Why the Brain Habituates to Security Warnings and What Can Be Done About It. Journal of Management Information Systems, 33(3), 713–743.
Balachandran, A., Voelker, G. M., & Bahl, P. (2005). Wireless hotspots: current challenges and future directions. Mobile Networks and Applications, 10(3), 265–274.
Bandura, A. (1991). Social Cognitive Theory of Self-Regulation. Organizational Behavior and Human Decision Processes, 50, 248–287.
Barber, L. K., Munz, D. C., Bagsby, P. G., & Grawitch, M. J. (2009). When does time perspective matter? Self-control as a moderator between time perspective and academic achievement. Personality and Individual Differences, 46(2), 250–253.
Bayer, J. B., & Campbell, S. W. (2012). Texting while driving on automatic: considering the frequency-independent side of habit. Computers in Human Behavior 28(6), 2083–2090.
Bayer, J. B., Campbell, S. W., & Ling, R. (2016). Connection Cues: Activating the Norms and Habits of Social Connectedness: Connection Cues. Communication Theory, 26(2), 128–149.
Bayer, J. B., Dal Cin, S., Campbell, S. W., & Panek, E. (2016). Consciousness and Self-Regulation in Mobile Communication: Consciousness in Mobile Communication. Human Communication Research, 42(1), 71–97.
Buhrmester, M., Kwang, T., & Gosling, S. D. (2011). Amazon’s Mechanical Turk: A New Source of Inexpensive, Yet High-Quality, Data? Perspectives on Psychological Science, 6(1), 3–5.
Caplan, S. E. (2010). Theory and measurement of generalized problematic Internet use: A two-step approach. Computers in Human Behavior, 26(5), 1089–1097.
CBS. (2010). Dangers of Free Public Wifi. https://www.cbsnews.com/news/dangers-of-free-public-wifi/. Accessed 15 March 2018.
Chen, H.-T., & Chen, W. (2015). Couldn’t or Wouldn’t? The Influence of Privacy Concerns and Self-Efficacy in Privacy Management on Privacy Protection. Cyberpsychology, Behavior, and Social Networking, 18(1), 13–19.
Choi, H. S., & Carpenter, D. (2013). Connecting to Unknown Wi-Fi Hotspots - A Risk Taking Perspective, 10.
Choi, M.-K., Robles, R. J., Hong, C.-H., & Kim, T.-H. (2008). Wireless Network Security: Vulnerabilities, Threats and Countermeasures. International Journal of Multimedia and Ubiquitous Engineering 3(3), 77–86.
Cisco. (2017). Cisco Visual Networking Index: Global Mobile Data Traffic Forecast Update, 2016–202, 35.
Cisco. (2018). Five Reasons to Go Wireless. Cisco. https://www.cisco.com/c/en/us/solutions/small-business/resource-center/work-anywhere/why-go-wireless.html. Accessed 25 April 2018.
Dolly, J. (2018). Why you should never, ever connect to public WiFi | CSO Online. https://www.csoonline.com/article/3246984/wi-fi/why-you-should-never-ever-connect-to-public-wifi.html. Accessed 5 April 2018.
Eastin, M. S., Glynn, C. J., & Griffiths, R. P. (2007). Psychology of Communication Technology Use in the Workplace. CyberPsychology & Behavior, 10(3), 436–443.
EFF. (2018). Dark carakal: Cyber-espionage at a Global Scale. Lookout. https://info.lookout.com/rs/051-ESQ-475/images/Lookout_Dark-Caracal_srr_20180118_us_v.1.0.pdf. Accessed 5 April 2018.
Ersche, K. D., Lim, T.-V., Ward, L. H. E., Robbins, T. W., & Stochl, J. (2017). Creature of Habit: A self-report measure of habitual routines and automatic tendencies in everyday life. Personality and Individual Differences, 116, 73–85.
Finjan Mobile. (2018). The Dangers of Using Unsecured Wi-Fi | How Bad is it, Really? https://www.finjanmobile.com/the-dangers-of-using-unsecured-wi-fi/. Accessed 29 March 2018.
Fullwood, C., Quinn, S., Kaye, L. K., & Redding, C. (2017). My virtual friend: A qualitative analysis of the attitudes and experiences of Smartphone users: Implications for Smartphone attachment. Computers in Human Behavior, 75, 347–355.
Gast, M. S. (2002). 802.11 Wireless Networks: the definitive guide: [creating and administering Wireless Networks] (1st ed.). Beijing: O’Reilly.
Gillan, C. M., Robbins, T. W., Sahakian, B. J., van den Heuvel, O. A., & van Wingen, G. (2016). The role of habit in compulsivity. European Neuropsychopharmacology, 26(5), 828–840.
Gökçearslan, Ş., Mumcu, F. K., Haşlaman, T., & Çevik, Y. D. (2016). Modelling smartphone addiction: The role of smartphone usage, self-regulation, general self-efficacy and cyberloafing in university students. Computers in Human Behavior, 63, 639–649.
Groves, P. M., & Thompson, R. F. (1970). Habituation: a dual-process theory. Psychological review, 77(5), 419–450.
Haagsma, M. C., Caplan, S. E., Peters, O., & Pieterse, M. E. (2013). A cognitive-behavioral model of problematic online gaming in adolescents aged 12–22 years. Computers in Human Behavior, 29(1), 202–209.
Hagerty, B. M. K., Lynch-Sauer, J., Patusky, K. L., & Bouwsema, M. (1993). An Emerging Theory of Human Relatedness. Image: the Journal of Nursing Scholarship, 25(4), 291–296.
Hair, J. F., Sarstedt, M., Ringle, C. M., & Mena, J. A. (2012). An assessment of the use of partial least squares structural equation modeling in marketing research. Journal of the Academy of Marketing Science, 40(3), 414–433.
Hampton, K. N., Livio, O., & Sessions Goulet, L. (2009). The Social Life of Wireless Urban Spaces: Internet Use, Social Networks, and the Public Realm. Journal of Communication, 60(4), 701–722.
Higgins, G. E., & Makin, D. A. (2004). Does Social Learning Theory Condition the Effects of Low Self-Control on College Students’ Software Piracy?, 2(2), 1–22.
Hulland. (1999). Use of Partial Least Squares (PLS) in Strategic Management Research: A Review of Four Recent Studies. Strategic Management Journal, 20(2), 195–204.
Kaspersky. (2016). Public WiFi Risks and what you can do about it | Kaspersky Lab US. https://usa.kaspersky.com/resource-center/preemptive-safety/public-wifi-risks. Accessed 15 April 2018.
Khang, H., Kim, J. K., & Kim, Y. (2013). Self-traits and motivations as antecedents of digital media flow and addiction: The Internet, mobile phones, and video games. Computers in Human Behavior, 29(6), 2416–2424.
Kindberg, T., Bevan, C., O’Neill, E., Mitchell, J., Grimmett, J., & Woodgate, D. (2009). Authenticating Ubiquitous Services: A Study of Wireless Hotspot Access, 12.
King, A. L. S., Valença, A. M., Silva, A. C. O., Baczynski, T., Carvalho, M. R., & Nardi, A. E. (2013). Nomophobia: Dependency on virtual environments or social phobia? Computers in Human Behavior, 29(1), 140–144.
Klasnja, P., Consolvo, S., Jung, J., Greenstein, B. M., LeGrand, L., Powledge, P., & Wetherall, D. (2009). “When I am on Wi-Fi, I am Fearless:” Privacy Concerns & Practices in Everyday Wi-Fi Use, 10.
LaRose, R. (2010). The Problem of Media Habits. Communication Theory, 20(2), 194–222.
LaRose, R., Lin, C. A., & Eastin, M. S. (2003). Unregulated Internet Usage: Addiction, Habit, or DSR? Media Psychology, 5(3), 225–253.
Lee, K. C., & Perry, S. D. (2004). Student Instant Message Use in a Ubiquitous Computing Environment: Effects of DSR. Journal of Broadcasting & Electronic Media, 48(3), 399–420.
Lee, R. M., & Robbins, S. B. (1995). Measuring belongingness: The social connectedness and the social assurance scales. Journal of counseling psychology, 42(2), 232.
Lee, B. W., & Stapinski, L. A. (2012). Seeking safety on the internet: Relationship between social anxiety and problematic internet use. Journal of Anxiety Disorders, 26(1), 197–205.
Lee, R. M., Draper, M., & Lee, S. (2001). Social Connectedness, Dysfunctional Interpersonal Behaviors, and Psychological Distress: Testing a Mediator Model, 9.
Lee, Y.-K., Chang, C.-T., Lin, Y., & Cheng, Z.-H. (2014). The dark side of smartphone usage: Psychological traits, compulsive behavior and technostress. Computers in Human Behavior, 31, 373–383.
Lee, Z. W. Y., Cheung, C. M. K., & Chan, T. K. H. (2016). Technology-Mediated Self-Regulation: An Implication for Preventing Online Gaming Addiction. International Conference on Information Systems, 10.
MarketWatch. (2018). Global Wi-Fi hotspot Market Growth Expected to be Driven by Increasing Use of Mobile Devices and Smartphones Coupled with Growing Internet Penetration Across the Globe - MarketWatch. https://www.marketwatch.com/story/global-wi-fi-hotspot-market-growth-expected-to-be-driven-by-increasing-use-of-mobile-devices-and-smartphones-coupled-with-growing-internet-penetration-across-the-globe-2018-02-21. Accessed 15 March 2018.
McCord, B., Rodebaugh, T. L., & Levinson, C. A. (2014). Facebook: Social uses and anxiety. Computers in Human Behavior, 34, 23–27.
McIntyre, E., Wiener, K. K. K., & Saliba, A. J. (2015). Compulsive Internet use and relations between social connectedness, and introversion. Computers in Human Behavior, 48, 569–574.
Noor, M. M., & Hassan, W. H. (2013). Current threats of wireless networks. The Third International Conference on Society of Digital Information Processing and Communications, 704–713.
Norton. 2017. Norton Wi-Fi Risk Report. https://www.symantec.com/content/dam/symantec/docs/reports/2017-norton-wifi-risk-report-global-results-summary-en.pdf, Accessed 5 April 2018.
Norton. (2018). The Personal Impact of Cybercrime. https://us.norton.com/internetsecurity-emerging-threats-personal-impact-cybercrime.html. Accessed 25 April 2018.
Olufon, T., Campbell, C. E.-A., Hole, S., Radhakrishnan, K., & Sedigh, A. (2014). Mitigating External Threats in Wireless Local Area Networks. International Journal of Communication Networks and Information Security, 6(3), 18.
Podsakoff, P. M., MacKenzie, S. B., Lee, J.-Y., & Podsakoff, N. P. (2003). Common method biases in behavioral research: A critical review of the literature and recommended remedies. Journal of Applied Psychology, 88(5), 879–903.
Polites, G. L., Serrano, C., Thatcher, J. B., & Matthews, K. (2018). Understanding social networking site (SNS) identity from a dual systems perspective: an investigation of the dark side of SNS use. European Journal of Information Systems, 27(5), 600–621.
Pratt, T. C., & Cullen, F. T. (2000). The empirical status of Gottfredson and Hirschi’s general theory of crime: A meta-analysis. Criminology, 38(3), 931–964.
Prizant-Passal, S., Shechner, T., & Aderka, I. M. (2016). Social anxiety and internet use – A meta-analysis: What do we know? What are we missing? Computers in Human Behavior, 62, 221–229.
Rhee, H.-S., Kim, C., & Ryu, Y. U. (2009). Self-efficacy in information security: Its influence on end users’ information security practice behavior. Computers & Security, 28(8), 816–826.
Richardson, J. (2018). The New Science of Habit Formation and Change. Fire Uo Today. http://fireuptoday.com/the-new-science-of-habit-formation-and-change/. Accessed 15 April 2018.
Ringle, C. M., Da Silva, D., & Bido, D. D. S. (2014). Structural Equation Modeling with the Smartpls. Revista Brasileira de Marketing, 13(02), 56–73.
Salehan, M., & Negahban, A. (2013). Social networking on smartphones: When mobile phones become addictive. Computers in Human Behavior, 29(6), 2632–2639.
Sambamurthy, V., Bharadwaj, A., & Grover, V. (2003). Shaping Agility through Digital Options: Reconceptualizing the Role of Information Technology in Contemporary Firms. MIS Quarterly, 27(2), 237—263.
Sayette, M. A., & Kasey, G. M. (2004). Self-regulatory failure and addiction (Vol. 2). Handbook of self-regulation: Research, theory, and applications.
Schlenker, B. R., & Leary, M. R. (1982). Social Anxiety and Self-Presentation: A Conceptualization and Model. Social Anxiety, 29.
Schlesinger, J. (2016). Most people unaware of the risks of using public Wi-Fi. https://www.cnbc.com/2016/06/28/most-people-unaware-of-the-risks-of-using-public-wi-fi.html. Accessed 29 March 2018.
Sicari, S., Cappiello, C., De Pellegrini, F., Miorandi, D., & Coen-Porisini, A. (2016). A security-and quality-aware system architecture for Internet of Things. Information Systems Frontiers, 18(4), 665–677.
Smith, H. J., Milberg, S. J., & Burke, S. J. (1996). Information Privacy: Measuring Individuals’ Concerns about Organizational Practices. MIS Quarterly, 20(2), 167–196.
Smith, H. J., Dinev, T., & Xu, H. (2011). Information Privacy Research: An Interdisciplinary Review. MIS Quarterly, 35(4), 989–1016.
Sokolov, E. N. (1963). Higher Nervous Functions: The Orienting Reflex. Annual Review of Physiology, 25(1), 545–580.
Sombatruang, N., Sasse, M. A., & Baddeley, M. (2016). Why do people use unsecure public wi-fi?: an investigation of behaviour and factors driving decisions (pp. 61–72). ACM Press.
Son, J. Y., & Kim, S. S. (2008). Internet Users’ Information Privacy-Protective Responses: A Taxonomy and a Nomological Model. MIS Quarterly, 32(3), 503—529.
Soror, A. A., Steelman, Z. R., & Limayem, M. (2012). Discipline Yourself Before Life Disciplines You: DSR and Mobile Phone Unregulated Use. In 2012 45th Hawaii International Conference on System Sciences (pp. 849–858).
Soror, A. A., Hammer, B. I., Steelman, Z. R., Davis, F. D., & Limayem, M. M. (2015). Good habits gone bad: Explaining negative consequences associated with the use of mobile phones from a dual-systems perspective: Good habits gone bad. Information Systems Journal, 25(4), 403–427.
Turner, P., & Turner, S. (2013). Emotional and aesthetic attachment to digital artefacts. Cognition, Technology & Work, 15(4), 403–414.
Uzun, A. M., & Kilis, S. (2019). Does persistent involvement in media and technology lead to lower academic performance? Evaluating media and technology use in relation to multitasking, self-regulation and academic performance. Computers in Human Behavior, 90, 196–203.
van Deursen, A. J. A. M., Bolle, C. L., Hegner, S. M., & Kommers, P. A. M. (2015). Modeling habitual and addictive smartphone behavior. Computers in Human Behavior, 45, 411–420.
Vance, A., Siponen, M., & Pahnila, S. (2012). Motivating IS security compliance: Insights from Habit and Protection Motivation Theory. Information & Management, 49(3–4), 190–198.
Wang, C., Lee, M. K. O., & Hua, Z. (2015). A theory of social media dependence: Evidence from microblog users. Decision Support Systems, 69, 40–49.
Weber, L., & Rudman, R. J. (2018). Addressing the Incremental Risks Associated with Adopting Bring Your Own Device. Open Access, 11(1), 13.
Weller, J. A., Shackleford, C., Dieckmann, N., & Slovic, P. (2013). Possession attachment predicts cell phone use while driving. Health Psychology, 32(4), 379–387.
Wood, W., & Neal, D. T. (2007). A new look at habits and the habit-goal interface. Psychological Review, 114(4), 843–863.
Xu, F., Michael, K., & Chen, X. (2013). Factors affecting privacy disclosure on social network sites: an integrated model. Electronic Commerce Research, 13(2), 151–168.
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher’s Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Appendices
Appendix 1
1.1 Survey Items
Appendix 2
Rights and permissions
About this article
Cite this article
Ayaburi, E.W., Wairimu, J. & Andoh-Baidoo, F.K. Antecedents and Outcome of Deficient Self-Regulation in Unknown Wireless Networks Use Context: An Exploratory Study. Inf Syst Front 21, 1213–1229 (2019). https://doi.org/10.1007/s10796-019-09942-w
Published:
Issue Date:
DOI: https://doi.org/10.1007/s10796-019-09942-w