skip to main content
10.1145/3417113.3422150acmconferencesArticle/Chapter ViewAbstractPublication PagesaseConference Proceedingsconference-collections
short-paper

Zimbabwean non-uptake of protective point-of-sale behaviours: is this a risk homeostasis response?

Published:22 January 2021Publication History

ABSTRACT

In a world which is increasingly relying on debit and credit cards to effect transactions, people are entering PINs in a wide range of situations and contexts. We all know we ought to shield PIN entry, and check for skimmers if we are using magnetic stripe cards. Yet previous studies have found that a minority of card users shield their PINs at Points of Sale (PoS). Previous studies into the incidence of PIN shielding have taken place in Europe, with stable currencies and relative wealth.

Zimbabwe, in 2019, presented us with a unique opportunity to carry out a replication study that is essentially a "natural experiment" i.e. we can study behaviours in interesting contexts which happen by chance, not by design. The context of interest is one where the country's currency is devaluing steeply, and creating a great deal of uncertainty and hardship. This occurred because Zimbabwe introduced a number of currency reforms in a short period of time. Protection Motivation Theory (PMT) suggests that people engage in a calculus based on their threat and coping appraisals. The devaluing currency ought to heighten threat appraisals (loss being much harder to bear) and the protective action's cost is relatively low (using a hand to shield a PIN). We ought, therefore, to see a higher incidence of protective behaviours in Zimbabwe.

Our observation and interview study surprisingly found lower levels of PIN shielding at Points of Sale (PoS) than in previous European studies. We also found that those participants who did not take protective behaviours tended to know how to recover from card fraud.

The low incidence we observed contradicted our PMT-based predictions. A possible explanation is that we are observing a risk homeostasis response, which suggests that having a "safety net" (being able to get your money back) might make people decide not to make the effort to take protective actions.

References

  1. I. Ajzen. The theory of planned behavior. Organizational Behavior and Human Decision Processes, 50(2):179--211, 1991.Google ScholarGoogle ScholarCross RefCross Ref
  2. A. Bandura. Social cognitive theory: An agentic perspective. Annual Review of Psychology, 52(1):1--26, 2001.Google ScholarGoogle ScholarCross RefCross Ref
  3. A. Bandura and R. H. Walters. Social learning theory, volume 1. Prentice-hall, Englewood Cliffs, NJ, 1977.Google ScholarGoogle Scholar
  4. A. Chaparadza. POS Transactions Volume & Value Massively Increases In Q1, 2019, 2019. Aug 16 https://www.techzim.co.zw/2019/08/pos-transactions-volume-value-massively-increases-in-q1-2019/.Google ScholarGoogle Scholar
  5. C. Cross. No laughing matter: Blaming the victim of online fraud. International Review of Victimology, 21(2):187--204, 2015.Google ScholarGoogle ScholarCross RefCross Ref
  6. F. D. Davis. A technology acceptance model for empirically testing new end-user information systems: Theory and results. PhD thesis, Sloan School of Management, Massachusetts Institute of Technology, 1985.Google ScholarGoogle Scholar
  7. A. De Luca, M. Langheinrich, and H. Hussmann. Towards understanding ATM security: a field study of real world ATM use. In Proceedings of the Sixth Symposium on Usable Privacy and Security (SOUPS), page 16, San Fransisco, 2010. ACM.Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. J. Diamond and J. A. Robinson. Natural experiments of history. Harvard University Press, 2010.Google ScholarGoogle Scholar
  9. R. J. Fisher. Social desirability bias and the validity of indirect questioning. Journal of Consumer Research, 20(2):303--315, 1993.Google ScholarGoogle ScholarCross RefCross Ref
  10. C. T. Fosnot and R. S. Perry. Constructivism: A psychological theory of learning. Constructivism: Theory, perspectives, and practice, 2:8--33, 1996.Google ScholarGoogle Scholar
  11. J. L. Hale, B. J. Householder, and K. L. Greene. The theory of reasoned action. The persuasion handbook: Developments in theory and practice, 14:259--286, 2002.Google ScholarGoogle Scholar
  12. S. Hanke. Zimbabwe introduces a new currency and a maxi-devaluation, 2019. Feb 22 https://www.forbes.com/sites/stevehanke/2019/02/22/zimbabwe-introduces-a-new-currency-and-maxi-devaluation/#3afed7a17e05.Google ScholarGoogle Scholar
  13. R. Iphofen. Research ethics in ethnography/anthropology, 2013. European Commission http://ec.europa.eu/research/participants/data/ref/h2020/other/hi/ethics-guide-ethnog-anthrop_en.pdf.Google ScholarGoogle Scholar
  14. N. Kaseke. Cash or Plastic Money-an investigation into the payment mode post multi-currency period in Zimbabwe. International Journal of Advanced Research in Management and Social Sciences, 1(6):102--119, 2012.Google ScholarGoogle Scholar
  15. C. Kuyedzwa. Zimbabwe's cash shortage sparks rise in bank card fraud, 2018. July 2 https://www.fin24.com/Economy/Africa/zimbabwes-cash-shortage-sparks-rise-in-bank-card-fraud-20180702.Google ScholarGoogle Scholar
  16. B. Lebek, J. Uffen, M. Neumann, B. Hohler, and M. H. Breitner. Information security awareness and behavior: a theory-based literature review. Management Research Review, 37(12):1049--1092, 2014.Google ScholarGoogle ScholarCross RefCross Ref
  17. A. Lindesmith, A. Strauss, and N. Renzin. Social Psychology. New York: Holt, 1975.Google ScholarGoogle Scholar
  18. macrotrends. Zimbabwe crime rate & statistics 1990-2020, 2020. https://www.macrotrends.net/countries/ZWE/zimbabwe/crime-rate-statistics.Google ScholarGoogle Scholar
  19. G. Masiyiwa and L. Mujuru. Zimbabwe: When the value of money changes daily, what does it cost to live?, 2019. June 5 https://globalpressjournal.com/africa/zimbabwe/zimbabwe-value-money-changes-daily-cost-live/.Google ScholarGoogle Scholar
  20. F. Mudzingwa. Bulawayo citizen loses $40 000 to card cloning scheme, 2019. March 16 https://www.techzim.co.zw/2019/03/bulawayo-citizen-loses-40-000-to-card-cloning-scheme/.Google ScholarGoogle Scholar
  21. D. S. Nagin and G. Pogarsky. Integrating celerity, impulsivity, and extralegal sanction threats into a model of general deterrence: Theory and evidence. Criminology, 39(4):865--892, 2001.Google ScholarGoogle ScholarCross RefCross Ref
  22. M. Ncube. Introducing a new currency was Zimbabwe's only viable option, 2019. Aug 29 https://nehandaradio.com/2019/08/29/mthuli-ncube-introducing-a-new-currency-was-zimbabwes-only-viable-option/.Google ScholarGoogle Scholar
  23. NewsDay. Banks accountable for fraudulent use of cards, 2017. https://www.newsday.co.zw/2017/07/banks-accountable-fraudulent-use-cards/.Google ScholarGoogle Scholar
  24. P. A. Norberg, D. R. Horne, and D. A. Horne. The privacy paradox: Personal information disclosure intentions versus behaviors. Journal of Consumer Affairs, 41(1):100--126, 2007.Google ScholarGoogle ScholarCross RefCross Ref
  25. P. Norman, H. Boer, and E. R. Seydel. Protection motivation theory. In M. Conner and P. Norman, editors, Predicting Health Behaviour, pages 81--126. Berkshire, United Kingdom: Open University Press, 2005.Google ScholarGoogle Scholar
  26. S. Nyoka. Zimbabwe after Mugabe: The country where pensions have disappeared, 2019. Aug 13 https://www.bbc.co.uk/news/world-africa-49317593.Google ScholarGoogle Scholar
  27. T. Nyoni. Towards a cashless Zimbabwe: An Empricial Analysis. International Journal of Marketing & Financial Management, 6(1):32--44, 2018.Google ScholarGoogle Scholar
  28. S. Pelzman. The effects of automobile safety regulation. Journal of Political Economy, 83(4):677--726, 1975.Google ScholarGoogle ScholarCross RefCross Ref
  29. F. Razemba. Card cloning on the increase, police warn public, 2018. June 18 https://zimbabwe-today.com/card-cloning-on-the-increase-police-warn-public-2/.Google ScholarGoogle Scholar
  30. Reserve Bank of Zimbabwe. First quarter ending 31 march 2019 highlights report. national payment systems, 2018. https://www.rbz.co.zw/documents/nps/quarterly/2019/NPS-First-Quarter-Activity-Report-March-2019.pdf.Google ScholarGoogle Scholar
  31. R. W. Rogers. A protection motivation theory of fear appeals and attitude change. The Journal of Psychology, 91(1):93--114, 1975.Google ScholarGoogle ScholarCross RefCross Ref
  32. R. M. Sutton and S. Farrall. Gender, socially desirable responding and the fear of crime: Are women really more anxious about crime? British Journal of Criminology, 45(2):212--224, 2004.Google ScholarGoogle ScholarCross RefCross Ref
  33. TechnoMag. Card cloning still a nightmare, 2019. April 23 https://www.technomag.co.zw/2019/05/03/card-cloning-still-a-nightmare.Google ScholarGoogle Scholar
  34. N. Tshili. Banks move to arrest card cloning incidents, 2019. April 23 https://www.chronicle.co.zw/banks-move-to-arrest-card-cloning-incidents/.Google ScholarGoogle Scholar
  35. M. Volkamer, A. Gutmann, K. Renaud, P. Gerber, and P. Mayer. Replication Study: A Cross-Country Field Observation Study of Real World PIN Usage at ATMs and in Various Electronic Payment Scenarios. In Fourteenth Symposium on Usable Privacy and Security (SOUPS 2018), pages 1--11, 2018.Google ScholarGoogle Scholar
  36. G. J. S. Wilde. Risk homeostasis theory and traffic accidents: propositions, deductions and discussion of dissension in recent reactions. Ergonomics, 31(4):441--468, 1988.Google ScholarGoogle ScholarCross RefCross Ref
  37. Zimbabwe Situation. Bank card fraud on the rise, 2018. https://www.zimbabwesituation.com/news/bank-card-fraud-on-the-rise/.Google ScholarGoogle Scholar

Index Terms

  1. Zimbabwean non-uptake of protective point-of-sale behaviours: is this a risk homeostasis response?
      Index terms have been assigned to the content through auto-classification.

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in
      • Published in

        cover image ACM Conferences
        ASE '20: Proceedings of the 35th IEEE/ACM International Conference on Automated Software Engineering
        September 2020
        195 pages
        ISBN:9781450381284
        DOI:10.1145/3417113

        Copyright © 2020 ACM

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 22 January 2021

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • short-paper

        Acceptance Rates

        Overall Acceptance Rate82of337submissions,24%

        Upcoming Conference

      • Article Metrics

        • Downloads (Last 12 months)14
        • Downloads (Last 6 weeks)1

        Other Metrics

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader