Skip to main content
Log in

Fear of Online Consumer Identity Theft: Cross-Country Application and Short Scale Development

  • Published:
Information Systems Frontiers Aims and scope Submit manuscript

Abstract

The growing internationalization of electronic commerce demands the establishment of the cross-national validity of theoretical concepts. An important concept in e-commerce is consumers’ fear of online identity theft (FOIT), which impedes consumers’ willingness to engage in online transactions and can negatively affect e-commerce revenues. The present study validates the consumer FOIT scale developed in Germany by Hille et al. (2015) in a cross-cultural setting and proposes an abbreviated version of the scale, which is approximately 35% shorter than the original. Established validation procedures with samples of online consumers from Germany, the United States, and Japan demonstrate the reliability, validity, and cross-national applicability of the short FOIT scale. In particular, this study extends Hille et al. (2015) research by examining and revealing the impact of FOIT on consumers’ prevention-focused responses. This research offers implications for both research and e-commerce managers.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1

Similar content being viewed by others

References

  • Albashrawi, M., & Motiwalla, L. (2019). Privacy and personalization in continued usage intention of mobile banking: An integrative perspective. Information Systems Frontiers, 21(5), 1031–1043.

    Google Scholar 

  • Avasthy, D. (2014). German police uncover data theft involving 18 million emails and passwords. International Business Times. http://www.ibtimes.co.uk/german-police-uncover-data-theft-involving-18-million-emails-passwords-1443336. Accessed 28 January 2019.

  • Bellman, S., Johnson, E. J., Kobrin, S. J., & Lohse, G. L. (2004). International differences in information privacy concerns: A global survey of consumers. The Information Society: An International Journal, 20(5), 313–324.

    Google Scholar 

  • Berendt, B., Günther, O., & Spiekermann, S. (2005). Privacy in e-commerce: Stated preferences vs. actual behavior. Communications of the ACM, 48(4), 101–106.

    Google Scholar 

  • Berthon, P., Pitt, L., Ewing, M., & Carr, C. L. (2002). Potential research space in MIS: A framework for envisioning and evaluating research replication, extension, and generation. Information Systems Research, 13(4), 416–427.

    Google Scholar 

  • Bonett, D. G. (2012). Replication-extension studies. Current Directions in Psychological Science, 21(6), 409–412.

    Google Scholar 

  • Breaugh, J. A., & Colihan, J. P. (1994). Measuring facets of job ambiguity: Construct validity evidence. Journal of Applied Psychology, 79(2), 191–202.

    Google Scholar 

  • Casler, K., Bickel, L., & Hackett, E. E. (2013). Separate but equal? A comparison of participants and data gathered via Amazon’s MTurk, social media, and face-to-face behavioral testing. Computers in Human Behavior, 29(6), 2156–2160.

    Google Scholar 

  • Crossler, R. E., Bélanger, F., & Ormond, D. (2019). The quest for complete security: An empirical analysis of users’ multi-layered protection from security threats. Information Systems Frontiers, 21(2), 343–357.

    Google Scholar 

  • Cyr, D. (2014). Return visits: A review of how web site design can engender visitor loyalty. Journal of Information Technology, 29(1), 1–26.

    Google Scholar 

  • Cyr, D., Head, M., & Larios, H. (2010). Colour appeal in website design within and across cultures: A multi-method evaluation. International Journal of Human-Computer Studies, 68(1), 1–21.

    Google Scholar 

  • Davis, L., Wang, S., & Lindridge, A. (2008). Culture influences on emotional responses to on-line store atmospheric cues. Journal of Business Research, 61(8), 806–812.

    Google Scholar 

  • Edwards, P., Roberts, I., Sandercock, P., & Frost, C. (2004). Follow-up by mail in clinical trials: Does questionnaire length matter? Controlled Clinical Trials, 25(1), 31–52.

    Google Scholar 

  • ENISA (2014). 16 million e-identities and passwords theft. News Flash, January 22, 2014. European Union Agency for Network and Information Security. https://www.enisa.europa.eu/media/news-items/news-flash-statement-re-16-million-e-identities-passwords-theft. Accessed 27 January 2019.

  • European Commission (2018). European Commission – Statement. http://europa.eu/rapid/press-release_STATEMENT-18-4548_en.htm. Accessed 1 November 2018.

  • Federal Office for Information Security (2018). The State of IT Security in Germany 2018. https://www.bsi.bund.de/SharedDocs/Downloads/EN/BSI/Publications/Securitysituation/IT-Security-Situation-in-Germany-2018.pdf?__blob=publicationFile&v=3. Accessed 12 February 2019.

  • Fico (2017). FICO Survey: US Consumers Fear Bank Fraud and ID Theft More than Terrorist Attack. https://www.fico.com/en/newsroom/fico-survey-us-consumers-fear-bank-fraud-and-id-theft-more-than-terrorist-attack-07-27-2017. Accessed 18 January 2019.

  • Fornell, C., & Larcker, D. F. (1981). Evaluating structural equation models with unobservable variables and measurement error. Journal of Marketing Research, 18(1), 39–50.

    Google Scholar 

  • FTC (Federal Trade Commission) (2018). FTC Releases Annual Summary of Consumer Complaints, https://www.ftc.gov/news-events/press-releases/2018/03/ftc-releases-annual-summary-complaints-reported-consumers. Accessed 4 January 2019.

  • Green, D., & Hanbury, M. (2018). If you shopped at these 16 stores in the last year, your data might have been stolen. Business Insider, Aug 22, 2018. https://www.businessinsider.com/data-breaches-2018-4?r=US&IR=T. Accessed 10 December 2018.

  • Gupta, B., Iyer, L. S., & Weisskirch, R. S. (2010). Facilitating global e-commerce: A comparison of consumers’ willingness to disclose personal information online in the US and in India. Journal of Electronic Commerce Research, 11(1), 41–52.

    Google Scholar 

  • Henningham, J. P. (1996). A 12-item scale of social conservatism. Personality and Individual Differences, 20(4), 517–519.

    Google Scholar 

  • Henseler, J., Ringle, C. M., & Sarstedt, M. (2015). A new criterion for assessing discriminant validity in variance-based structural equation modeling. Journal of the Academy of Marketing Science, 43(1), 115–135.

    Google Scholar 

  • Herpin, T. (2018). The top 10 E-Commerce markets you should target in the world. Aug 7, 2018. E-commerce Nation (ECN). https://www.ecommerce-nation.com/the-top-10-e-commerce-markets-you-should-target-in-the-world/. Accessed 5 December 2018.

  • Hille, P., Walsh, G., & Cleveland, M. (2015). Consumer fear of online identity theft: Scale development and validation. Journal of Interactive Marketing, 30(May), 1–19.

    Google Scholar 

  • Hinkin, T. R. (1995). A review of scale development practices in the study of organizations. Journal of Management, 21(5), 967–988.

    Google Scholar 

  • Hinz, O., Nofer, M., Schiereck, D., & Trillig, J. (2015). The influence of data theft on the share prices and systematic risk of consumer electronics companies. Information & Management, 52(3), 337–347.

    Google Scholar 

  • Ho, S. M., & Warkentin, M. (2017). Leader’s dilemma game: An experimental design for cyber insider threat research. Information Systems Frontiers, 19(2), 377–396.

    Google Scholar 

  • Hofstede, G. (2001). Culture’s consequences: Comparing values, behaviors, institutions, and organization across nations. Thousand Oaks: Sage.

    Google Scholar 

  • Hofstede, G. (2019). Hofstede Insights. https://www.hofstede-insights.com/product/compare-countries/. Accessed 1 February 2019.

  • Jevtic, A. (2015). 11 countries with the highest rates of identity theft in the world. http://www.insidermonkey.com/blog/11-countries-with-the-highest-rates-of-identity-theft-in-the-world-351940/. Accessed 26 December 2018.

  • Kulach, K. (2019). What turned ASOS online store into a global ecommerce giant? https://www.webinterpret.com/us/blog/asos-online-store-global-ecommerce-success/. Accessed 22 September 2019.

  • Lee, M., & Lee, J. (2012). The impact of information security failure on customer behaviors: A study on a large-scale hacking incident on the internet. Information Systems Frontiers, 14(2), 375–393.

    Google Scholar 

  • Lee, G.-G., & Lin, H.-F. (2005). Customer perceptions of e-service quality in online shopping. International Journal of Retail & Distribution Management, 33(2), 161–176.

    Google Scholar 

  • Lin, W. H., Wang, P., & Tsai, C. F. (2016). Face recognition using support vector model classifier for user authentication. Electronic Commerce Research and Applications, 18, 71–82.

    Google Scholar 

  • Littleton, C. (2017). HBO Invests Big in Europe, Asia and Latin American Channels. https://variety.com/2017/tv/news/hbo-networks-europe-asia-latin-america-1202590526/. Accessed 18 December 2018.

  • Macy’s (2016). International Shipping, https://www.customerservice-macys.com/app/answers/detail/a_id/5361/~/how-can-i-get-more-information-about-international-orders%3F. Accessed 9 February 2019.

  • Madden, M. (2014). More online Americans say they’ve experienced a personal data breach. PewReseachCenter, http://www.pewresearch.org/fact-tank/2014/04/14/more-online-americans-say-theyve-experienced-a-personal-data-breach/. Accessed 4 January 2019.

  • Malhotra, N. K., Kim, S. S., & Agarwal, J. (2004). Internet users’ information privacy concerns (IUIPC): The construct, the scale, and a causal model. Information Systems Research, 15(4), 336–355.

    Google Scholar 

  • Martin, K. D., & Murphy, P. E. (2017). The role of data privacy in marketing. Journal of the Academy of Marketing Science, 45, 135–155.

    Google Scholar 

  • Martin, K. D., Borah, A., & Palmatier, R. W. (2017). Data privacy: Effects on customer and firm performance. Journal of Marketing, 81(1), 36–58.

    Google Scholar 

  • Matsumoto, D. (1992). More evidence for the universality of a contempt expression. Motivation & Emotion, 16(4), 363–368.

    Google Scholar 

  • Mazaheri, E., Richard, M. O., Laroche, M., & Ueltschy, L. C. (2014). The influence of culture, emotions, intangibility, and atmospheric cues on online behavior. Journal of Business Research, 67(3), 253–259.

    Google Scholar 

  • Nenkov, G. Y., Morrin, M., Schwartz, B., Ward, A., & Hulland, J. (2008). A short form of the maximization scale: Factor structure, reliability and validity studies. Judgment and Decision making, 3(5), 371–388.

    Google Scholar 

  • Pascual, A., Marchini, K., & Miller, S. (2018). 2018 Identity Fraud: Fraud Enters a New Era of Complexity, https://www.javelinstrategy.com/coverage-area/2018-identity-fraud-fraud-enters-new-era-complexity. Accessed 12 February 2019.

  • Postmes, T., Haslam, S. A., & Jans, L. (2013). A single-item measure of social identification: Reliability, validity, and utility. British Journal of Social Psychology, 52(4), 597–617.

    Google Scholar 

  • Rigby, C. (2019). Gear4Music to improve its distribution processes as it looks to deal with its fast growth. Internet Retailing, https://internetretailing.net/strategy-and-innovation/strategy-and-innovation/gear4music-to-improve-its-distribution-processes-as-it-looks-to-deal-with-its-fast-growth-19384. Accessed 8 September 2019.

  • Riquelme, I. P., & Román, S. (2014). Is the influence of privacy and security on online trust the same for all type of consumers? Electronic Markets, 24(2), 135–149.

    Google Scholar 

  • Roberts, L. D., Indermaur, D., & Spiranovic, C. (2013). Fear of cyber-identity theft and related fraudulent activity. Psychiatry, Psychology and Law, 20(3), 315–328.

    Google Scholar 

  • Ruvio, A., Shoham, A., & Makovec Brencic, M. (2008). Consumers’ need for uniqueness: Short-form scale development and cross-cultural validation. International Marketing Review, 25(1), 33–53.

    Google Scholar 

  • Smith, G. T., McCarthy, D. M., & Anderson, K. G. (2000). On the sins of short-form development. Psychological Assessment, 12(1), 102–111.

    Google Scholar 

  • Smith, R., Deitz, G., Royne, M. B., Hansen, J. D., Grünhagen, M., & Witte, C. (2013). Cross-cultural examination of online shopping behavior: A comparison of Norway, Germany, and the United States. Journal of Business Research, 66(3), 328–335.

    Google Scholar 

  • Stahl, G. K., & Caligiuri, P. (2005). The effectiveness of expatriate coping strategies: The moderating role of cultural distance, position level, and time on the international assignment. Journal of Applied Psychology, 90(4), 603–615.

    Google Scholar 

  • Steenkamp, J. B. E., & Baumgartner, H. (1998). Assessing measurement invariance in cross-national consumer research. Journal of Consumer Research, 25(1), 78–107.

    Google Scholar 

  • Sun, T. (2011). The roles of trust and experience in consumer confidence in conducting e-commerce: A cross-cultural comparison between France and Germany. International Journal of Consumer Studies, 35(3), 330–337.

    Google Scholar 

  • Targett, E. (2018). 6 Months, 945 Data Breaches, 4.5 Billion Records, Computer Business Review, https://www.cbronline.com/news/global-data-breaches-2018. Accessed 16 September 2019.

  • The Japan Times (2013). Yahoo Japan suspects vast ID theft, May 18, http://www.japantimes.co.jp/news/2013/05/18/national/crime-legal/yahoo-japan-suspects-vast-id-theft/. Accessed 22 January 2016.

  • The Japan Times (2016). At least 2 million sets of personal data feared stolen in 2015 cyberattacks. January 4, http://www.japantimes.co.jp/news/2016/01/04/national/least-2-million-sets-personal-data-feared-leaked-cyberattacks-2015/. Accessed 22 November 2018.

  • The Japan Times (2018). 320,000 pieces of customer data stolen from 400 lodging providers in Japan. June 28, https://www.japantimes.co.jp/news/2018/06/28/national/crime-legal/320000-bits-customer-info-lodging-providers-japan-stolen/#.XGK8pHd2t2M. Accessed 12 February 2019.

  • Tsai, J. Y., Egelman, S., Cranor, L., & Acquisti, A. (2011). The effect of online privacy information on purchasing behavior: An experimental study. Information Systems Research, 22(2), 254–268.

    Google Scholar 

  • Van Auken, S., Barry, T. E., & Bagozzi, R. P. (2006). A cross-country construct validation of cognitive age. Journal of the Academy of Marketing Science, 34(3), 439–455.

    Google Scholar 

  • Vernuccio, M., Pagani, M., Barbarossa, C., & Pastore, A. (2015). Antecedents of brand love in online network-based communities. A social identity perspective. Journal of Product & Brand Management, 24(7), 706–719.

    Google Scholar 

  • Walsh, G., Beatty, S. E., & Shiu, E. M. (2009). The customer-based corporate reputation scale: Replication and short form. Journal of Business Research, 62(10), 924–930.

    Google Scholar 

  • Walsh, G., Northington, W. M., Hille, P., & Dose, D. (2015). Service employees’ willingness to report complaints scale: Cross-country application and replication. Journal of Business Research, 68(3), 500–506.

    Google Scholar 

  • Walsh, G., Schaarschmidt, M., & Von Kortzfleisch, H. (2016). Employees’ company reputation-related social media competence: Scale development and validation. Journal of Interactive Marketing, 36, 46–59.

    Google Scholar 

  • Weijters, B., Geuens, M., & Schillewaert, N. (2009). The proximity effect: The role of inter-item distance on reverse-item bias. International Journal of Research in Marketing, 26(1), 2–12.

    Google Scholar 

  • Wirtz, J., & Lwin, M. O. (2009). Regulatory focus theory, trust, and privacy concern. Journal of Service Research, 12(2), 190–207.

    Google Scholar 

  • Xu, H., & Gupta, S. (2009). The effects of privacy concerns and personal innovativeness on potential and experienced customers’ adoption of location-based services. Electronic Markets, 19(2–3), 137–149.

    Google Scholar 

  • Xu, F., Luo, X. R., Zhang, H., Liu, S., & Huang, W. W. (2019). Do strategy and timing in IT security investments matter? An empirical investigation of the alignment effect. Information Systems Frontiers, 21(5), 1069–1083.

    Google Scholar 

  • Zafar, H., Ko, M., & Osei-Bryson, K. (2012). Financial impact of information security breaches on breached firms and their non-breached competitors. Information Resources Management Journal, 25(1), 21–37.

    Google Scholar 

  • Zafar, H., Ko, M. S., & Osei-Bryson, K. M. (2016). The value of the CIO in the top management team on performance in the case of information security breaches. Information Systems Frontiers, 18(6), 1205–1215.

    Google Scholar 

  • Ziegler, M., Kemper, C. J., & Kruyen, P. (2014). Short scales – Five misunderstandings and ways to overcome them. Journal of Individual Differences, 35(4), 185–189.

    Google Scholar 

Download references

Acknowledgements

This research was partly funded by the German Research Foundation (Deutsche Forschungsgemeinschaft); WA 1568/9-1 - AOBJ: 568047.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Gianfranco Walsh.

Additional information

Publisher’s Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Appendices

Appendix 1

Table 6 Readability assessment (means), item-to-subscale correlations, and item-to-total correlation

Appendix 2

Table 7 Discriminant validity between FFL and FRD (HTMT ratios)

Appendix 3

Table 8 Average factor loadings

Appendix 4

Table 9 Standardized CFA factor loadings and summary psychometric data for outcome constructs

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Walsh, G., Shiu, E., Hassan, L. et al. Fear of Online Consumer Identity Theft: Cross-Country Application and Short Scale Development. Inf Syst Front 21, 1251–1264 (2019). https://doi.org/10.1007/s10796-019-09958-2

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10796-019-09958-2

Keywords

Navigation