Skip to main content

ORIGINAL RESEARCH article

Front. Psychol., 12 June 2020
Sec. Health Psychology

Risk Awareness, Self-Efficacy, and Social Support Predict Secure Smartphone Usage

  • 1Beijing Key Laboratory of Behavior and Mental Health, School of Psychological and Cognitive Sciences, Peking University, Beijing, China
  • 2Department of Education and Psychology, Health Psychology, Freie Universität Berlin, Berlin, Germany
  • 3SWPS University of Social Sciences and Humanities, Wrocław, Poland

It is widely acknowledged that non-compliance with smartphone security behaviors is widespread and may cause severe harm to people and devices. In addition to device-based security issues, there are psychological factors involved in these behaviors such as self-efficacy, risk awareness, and social support. The present study examines associations of these three factors with smartphone security behaviors and explores possible mechanisms among these variables. In a longitudinal survey with 192 Chinese college students (73.4% women, mean age 24.46 years, SD = 5.15), self-efficacy, risk awareness, and social support were assessed with psychometric scales at two points in time, 2 weeks apart. Hierarchical regression analyses were performed with follow-up smartphone security behaviors as the dependent variable, controlling for baseline values and demographic and IT-related covariates. Main effects of self-efficacy, risk awareness, and social support on smartphone security behaviors were identified. Moreover, a triple interaction among the three predictors emerged in a synergistic way, indicating that their combination yielded more favorable levels of secure smartphone use. The total model accounted for 50% of the behavioral variance, with all covariates included, and the triple interaction among self-efficacy, risk awareness, and social support accounted for 2.3% of variance. Results document that psychological factors are involved in smartphone security behaviors beyond demographic and IT-related covariates. Interventions could be designed to improve smartphone security behaviors not only by developing privacy-enhancing technologies but also by considering psychological factors such as self-efficacy, risk awareness, and social support.

Introduction

A smartphone is a multifunctional mobile device with a particular operating system, which could have high-speed Internet access, and mobile applications in addition to basic features of a traditional telephone (Wang et al., 2014; Hossain and Ahmed, 2016). The number of smartphone users has increased rapidly in the past decade. By the end of 2018, there have been 3 billion smartphone users worldwide and 783 million of them in China (Emma, 2018). Along with the extensive smartphone usage, a growing number of security issues have surfaced, especially for malicious interception of personal information, which led to data hacking, and property damage (Zhang et al., 2017). Smartphone malware attacks are consistently reported in forms of viruses, worms, Trojan horses, phishing messages, and spyware (Leavitt, 2005; Wang et al., 2012; Jones and Chin, 2015), which could result not only in impaired services and poor mobile phone performance but also in jeopardized resources (Wang et al., 2012).

Numerous prior studies have claimed the significance of complying with smartphone security behaviors to protect information security (Jones and Heinrichs, 2012; Wang et al., 2012; Das and Khan, 2016; van Schaik et al., 2018). Various available security behaviors have been strongly recommended by computer professionals. These measures have included installing antivirus applications (Jones and Heinrichs, 2012), taking precautions through phone settings such as passwords, remote services, data backup, and personal blacklists (Das and Khan, 2016; Zhang et al., 2017), as well as avoiding harmful or suspicious web links, Wi-Fi, and Bluetooth transmissions (Wang et al., 2012). A study identified 28 cybersecurity behaviors and practices, which smartphone users should follow to improve cybersecurity (Shah and Agarwal, 2020). In reality, many smartphone consumers do not adopt appropriate security behaviors in spite of their knowledge of smartphone security threats.

A great number of studies have concentrated on the determinants of online information security with computer use. Although security laws and organizational policies have been widely used to prevent the occurrence of security risk–taking and damaging behaviors in companies and work situations (Guo, 2013), the role of personal factors remains unclear. Other than policy-impelled contexts, this study explores self-directed smartphone security behavior and its possible mechanisms in everyday usage. Among personal factors are social-cognitive constructs such as risk awareness, social support, and self-efficacy. At the individual level, self-efficacy, and appraisal of potential threats are considered to impact the adoption of secure computer usage. Self-efficacy pertains to one’s optimistic belief in being able to overcome barriers or meet challenges while pursuing a goal. When it comes to taking security precautions, self-efficacy refers to one’s belief in being competent to employ appropriate measures to counteract a smartphone security risk. Research has shown that self-efficacy was associated with an Internet consumer’s intention to adopt secure behaviors (Ng et al., 2009). Response self-efficacy, which was interpreted as a measure of one’s perceived resources, tended to boost precautionary online behaviors (Jansen and Van Schaik, 2017), and to reduce the probability of information security behavior lapses (Workman et al., 2008).

Another prerequisite for taking precautions is the awareness of risk. Research has shown that threat appraisal played an important role in determining security behavior. Perceived susceptibility of a security threat and perceived benefit of a security behavior were associated with decisions about the handling of email attachments (Ng et al., 2009). Consistently, perceived susceptibility and severity of security threatening factors had positive associations with secure smartphone usage (Verkijika, 2018).

In addition to self-efficacy and risk awareness, social support from family members, friends, or co-workers might be facilitators for secure smartphone usage. Although there is no direct evidence on the relationship between social support and information security behaviors, some studies give a hint in this direction. For instance, an employee’s involvement in a group might motivate help-seeking behaviors when being confronted with an IT security dilemma (Dang-Pham et al., 2019). Another study found that smartphone users’ behavioral intent of applying anti-spy services was associated with social contexts that were supportive to implementing secure measures (Bulgurcu et al., 2010; Johnston and Warkentin, 2010). To further examine the role of social support in secure smartphone usage, empirical research with social support as a predictor is needed.

Aims

The current study aims at examining social-cognitive antecedents involved in secure smartphone usage, namely risk awareness, self-efficacy, and social support. We expect positive associations (main effects) of all three factors on secure smartphone use. Security behavior requires some level of risk awareness; otherwise, one is hardly motivated to make a change. Also, self-efficacy, i.e., feeling competent to execute such action, needs to be present to some degree; otherwise, people would not take initiative. Moreover, social support constitutes a facilitating factor, making it easier to implement protective measures. In addition to these hypothesized three main effects, we will examine interactions among the predictors to uncover patterns that may shed light on possible mechanisms in the security behavior adoption process.

Materials and Methods

Participants

College students from a university located in Beijing, China, were invited to attend a two-wave survey during class breaks. A total of 192 students gave their consent and completed a battery of questionnaires at baseline (Time 1) regarding Internet and smartphone usage. There were 173 (90.10%) of them retained to report their smartphone security behavior after 2 weeks (Time 2). Psychosocial variables related to smartphone security use including self-efficacy, risk awareness, and social support were assessed at Time 1, as well as demographic information. Smartphone security behavior was assessed at both time points. Approximately 3 United States dollars (20 RMB) was given to participants who completed the whole study as appreciation of their efforts. The study protocol has been approved by the Human Research Ethics Committee at the School of Psychological and Cognitive Sciences of Peking University.

Measures

Measurement of smartphone security use behavior was adapted from Zhang et al. (2017) scale on information security behaviors of smartphone users in China. For simplicity, one item from avoidance of harmful behaviors and two items from use of phone settings and add-on utilities were used in the current study. A similar scale has been adapted in India (Shah and Agarwal, 2020). Social-cognitive variables including self-efficacy, risk awareness, and social support were assessed with tools adapted from previous research concerning health behaviors such as dietary behavior and facemask wearing (Zhou et al., 2015, 2016). Based on previous empirical studies inspired by the health action process approach (HAPA; Schwarzer, 2008), we modified at least five items to tap each social-cognitive variable to the context of smartphone security usage. All measures are provided in the section Appendix.

Self-Efficacy

Self-efficacy of smartphone security use pertained to the perception of an individual’s capability to take precautions, for example, to lower hacker attacks in daily smartphone usage. Self-efficacy was assessed with four items at Time 1. One sample item was “It’s easy for me to adhere to sound and secure behaviors when using my smartphone.” Responses were rated on a five-point scale from 1 (completely disagree) to 5 (completely agree). A total score was calculated by summing up the four items. A higher sum score indicated higher self-efficacy to use the smartphone properly. Cronbach’s α in the current sample was.88.

Risk Awareness

Risk awareness referred to one’s perception of how harmful it could be in the case of not using the smartphone securely. It was measured with three items at Time 1. One sample item was “If I don’t take any security precaution in using my smartphone, my private information will be hacked.” Each item was rated on a five-point scale from 1 (completely disagree) to 5 (completely agree). The three items were summed up to a total score. A higher sum score indicated higher risk awareness. Cronbach’s α of the scale in the current sample was.73.

Social Support

Three items were adopted to assess received social support at Time 1 regarding smartphone security use during the past week. An example item was “My friends or family members reminded me to take specific precautious measures in smartphone usage.” Items were rated on a five-point scale with 1 = completely disagree and 5 = completely agree. The three items were summed up to a total score. A higher sum score indicated a higher level of social support. Cronbach’s α of the social support scale in the current study was.87.

Secure Smartphone Usage

Secure smartphone usage was assessed with a behavioral index at Time 1 and Time 2. The behavioral index was composed of three items to assess smartphone behaviors in different aspects in the past week. These aspects included the updating of antivirus programs, security evaluation before installing an application, and disabling Global Position System (GPS)/Bluetooth while not in use. A sample item was “I verified its source and checked its evaluation before installing a new App.” All items were rated from 1 = completely disagree to 5 = completely agree. A total score was calculated by summing up the three items. A higher score indicated safer smartphone usage.

Potential Covariates

Potential covariates including demographic information, data plan purchase, hacker attack experience, experience of property damage due to smartphone security vulnerabilities, smartphone use experience, Internet use experience, and operating system of the smartphone were assessed. To be more specific, data plan purchase, hacker attack experience, and experience of property damage due to smartphone security vulnerabilities were each measured with a dichotomous item. To control for the experience of using smartphones and the Internet, the following question was included: “How many years have you been using a smartphone/the Internet?”

Data Analysis

First, descriptive analyses for baseline and follow-up samples were performed. Second, an attrition analysis was conducted to examine the difference between participants who dropped out and those who were retained. Third, bivariate correlations were calculated among the main variables. Finally, hierarchical regression analyses were carried out with self-efficacy, risk awareness, social support, and a triple interaction of three social-cognitive variables as independent variables, and smartphone security behavior as the dependent variable. The estimates of coefficients and bootstrapped 95% confidence intervals (CIs) were based on 5,000 resamples. A p-value less than.05 or a CI not including 0 was the indicator of statistical significance. There were less than 7% missing values, and Little’s Missing Completely at Random (MCAR) test was not significant. Missing data were imputed by the expectation maximization (EM) procedure. All analyses were performed with SPSS 25 and the SPSS PROCESS macro (Hayes, 2013).

Results

Descriptive Statistics

Of the study population, 141 participants (73.40%) were women, with a mean age of 24.46 years (SD = 5.15). Half of the participants (n = 98, 51%) majored in humanities and social sciences. There were 20 participants (10.40%) who majored in information security. The majority of participants (n = 173, 90.10%) purchased a data plan. A small number of participants had been hacked (n = 13, 6.80%) or experienced damage to properties due to insecure smartphone use (n = 12, 6.30%). The average time span of smartphone and Internet use were 5.83 years (SD = 2.50) and 10.92 years (SD = 3.62), respectively. Their smartphone operating system included Android (n = 49, 25.50%), iOS (n = 81, 42.20%), and Windows (n = 61, 31.80%). Detailed descriptive statistics are shown in Table 1.

TABLE 1
www.frontiersin.org

Table 1. Descriptive statistics of participants, social-cognitive variables, and behaviors.

Attrition Analysis

At Time 2, 19 (9.9%) participants dropped out from the study. Attrition analysis reveals that there were no significant differences between participants who completed the study and those who dropped out in terms of most variables measured at Time 1. For exceptions, participants who completed the survey were significantly older (t = 4.49, p < 0.01), and less likely to be majoring in science and technology (χ2 = 12.93, p < 0.01) than those who dropped out. Moreover, participants who completed the study reported better baseline values in smartphone security behavior (t = 2.01, p < 0.05).

Associations Among Key Variables

There was a significant association between secure smartphone usage at Time 1 and Time 2 (r = 0.57, p < 0.01). Social-cognitive variables at Time 1, including self-efficacy (r = 0.32, p < 0.01), risk awareness (r = 0.39, p < 0.01), and social support (r = 0.43, p < 0.01), were positively correlated with secure smartphone usage at Time 2. No gender differences emerged. Older individuals had more smartphone and Internet experience than younger ones, and they reported a higher frequency of property damage and higher levels of social support (see Table 2).

TABLE 2
www.frontiersin.org

Table 2. Correlation matrix of main variables (N = 173).

The Joint Associations of Social-Cognitive Predictors With Secure Smartphone Usage

A hierarchical regression analysis was performed to examine the effects of psychosocial determinants of secure smartphone usage. In the first step, baseline variables including gender, age, data plan purchase, hacked experience, property damage, smartphone use experience, Internet use experience, and secure smartphone usage were regressed on smartphone security usage at Time 2, accounting for 35% of the behavioral variance (p < 0.001). In the second step, self-efficacy, risk awareness, and social support at Time 1 were added as independent variables, accounting for an additional 14% of behavior variance (p < 0.001). In the third step, a triple interaction of social-cognitive variables was added, accounting for 2.3% of additional variance (ΔR2 = 0.023, p = 0.005). The regression model totally explained 50% of the variance in behavior at Time 2 with all covariates included. Without covariates, the model with three predictors accounted for 33% of the variance. Results of the hierarchical model are displayed in Table 3.

TABLE 3
www.frontiersin.org

Table 3. Secure smartphone usage at Time 2 regressed on self-efficacy, risk awareness, social support, and a triple interaction of the social-cognitive variables at Time 1, controlling for age, sex, smartphone experience, and baseline behavior.

Figure 1 displays the pattern of the triple interaction among three social-cognitive variables in predicting secure smartphone usage. High self-efficacy, high risk awareness, and high social support were associated with more secure smartphone usage. Lack of self-efficacy and risk awareness indicated the lowest level of secure smartphone usage in all three panels. Moreover, the patterns of simple slopes differed among levels of independent variables. In the leftmost panel, in the subgroup of participants with lower support, there was an ordinal interaction between self-efficacy and risk awareness in a synergistic manner, meaning that the combination of both predictors yielded the highest level of secure smartphone usage, although it was lower than in the other panels. The variance was highest in individuals with high self-efficacy, whereas in the rightmost panel, the variance was highest in those with low self-efficacy. In this high-support group, the most secure smartphone usage was found, but only when self-efficacy was also high.

FIGURE 1
www.frontiersin.org

Figure 1. Triple interaction among self-efficacy, risk awareness, and social support in secure smartphone usage at Time 2, controlling for sex, age, data plan purchase, hacked experience, property damage, smartphone use experience, Internet use experience, and secure smartphone usage at Time 1.

Discussion

This study focused on social-cognitive determinants of secure smartphone usage within a longitudinal research design. Results indicated that self-efficacy, risk awareness, and social support significantly predicted smartphone security behavior. Moreover, a triple interaction of the three social-cognitive variables on secure smartphone usage emerged. Different levels of secure smartphone behavior appeared in various patterns of self-efficacy, risk awareness, and social support.

The main finding of this study was the direct effects of self-efficacy, risk awareness, and social support on secure smartphone usage. The overall regression model revealed a positive prediction of self-efficacy, risk awareness, and social support at Time 1 for the prediction of Time 2 smartphone security behavior, as well as an explanation of 50% of the variance of Time 2 smartphone security behavior including covariates, 33% without covariates. Security behavior seems to benefit from a certain level of risk awareness because without any awareness, people are hardly motivated to make a change in their daily smartphone use. Moreover, feeling competent to execute preventive actions (self-efficacy) facilitates one’s motivation to take initiative. Being embedded in a social network that provides information and tangible support makes it easier to implement protective measures.

The findings are consistent with previous work that reported positive associations between self-efficacy and secure behavior (Workman et al., 2008; Das and Khan, 2016; Jansen and Van Schaik, 2017). Also, risk awareness and perceived threat were associated with smartphone security behaviors (Ng et al., 2009) and, in addition, interactions and joint effects of these two factors (Fenz et al., 2014; Das and Khan, 2016). In the interpersonal context, social support from family, friends, and colleagues was related to a higher level of individuals’ smartphone security behavior. This finding could be regarded as an implication of social norms and the organizational socialization in companies, resulting in the collective adoption of smartphone security behaviors (Johnston and Warkentin, 2010; Alsaleh et al., 2017; McGill and Thompson, 2017; Dang-Pham et al., 2019). Due to social support by close families and friends and particular recommendations of adopting smartphone security behaviors, a feeling of immersion and having the concerned of others may explain the elevated smartphone security behavior. This, way, social support could trigger normative beliefs about smartphone security use behaviors.

The subsequently identified triple interaction qualified the main effects in a synergistic manner because a combination of the single associations resulted in a higher level of secure smartphone use. This finding was a validation of determining effects of self-efficacy, threat severity, and social influence in human–computer interactions (Johnston and Warkentin, 2010). In spite of the low amount of explained variance, there was still a clear tendency for the joint effects of self-efficacy and risk awareness to vary from low to high social support levels, as displayed in Figure 1, with a divergent pattern of low social support and a convergent one of high social support. In general, people with higher risk awareness (Albrechtsen and Hovden, 2010), or self-efficacy (Arachchilage and Love, 2014) obtain a higher level of smartphone security use. The slope for low risk awareness became steeper when medium or high social support was reported, which may reflect a compensation of interpersonal support for personal deficits. In the situation of medium social support, the interaction between self-efficacy and risk awareness disappeared. In consideration of practical implications, the promotion of smartphone security behavior should highlight the importance of risk awareness for users with high self-efficacy and the beneficial effect of social support for users with low risk awareness.

There are several limitations of this study that should be addressed in future research. First, the sample consisted of Chinese students with a mean age of 24.46 years (SD = 5.15), and there may be different effects in other-generation samples. Second, all data were self-reported, and it would be superior to add objective data on smartphone security behaviors. However, recording or observing such objective data requires a complicated and resource-demanding research design. Third, the reliability coefficients of the adapted scales were a bit lower than ideal, and one would like to obtain more advanced measurement tools. Further, this was a longitudinal research design that does not allow for causal inferences. Moving forward to design a randomized controlled trial would be an advantage.

Nevertheless, the present data may stimulate further research on the psychosocial mechanisms that are involved in the adoption and maintenance of smartphone security behaviors. Including self-efficacy, risk awareness, and social support in such research appears to be valuable. Moreover, when it comes to intervention designs, one could point out to customers the objective levels of security risks along with instilling optimistic self-beliefs on how to cope with such challenges. Mobilizing and providing social support to prevent a security risk or to adopt precautions would be a good idea. Developing privacy-enhancing technologies would facilitate the personal efforts to implement secure smartphone use.

Data Availability Statement

The datasets generated for this study are available on request to the corresponding author.

Ethics Statement

The studies involving human participants were reviewed and approved by the Institutional Review Board at Peking University School of Psychological and Cognitive Sciences. The patients/participants provided their written informed consent to participate in this study.

Author Contributions

GZ, YG, and RS constructed the study protocol. GZ secured the grant. MG analyzed the data and initially drafted the manuscript. RS also made great contributions to editions and valuable comments.

Funding

PKU Startup Grant.

Conflict of Interest

The authors declare that the research was conducted in the absence of any commercial or financial relationships that could be construed as a potential conflict of interest.

Acknowledgments

The authors would like to thank the students affiliated with YG’s lab for data collection.

References

Albrechtsen, E., and Hovden, J. (2010). Improving information security awareness and behaviour through dialogue, participation and collective reflection. An intervention study. Comput. Secur. 29, 432–445. doi: 10.1016/j.cose.2009.12.005

CrossRef Full Text | Google Scholar

Alsaleh, M., Alomar, N., and Alarifi, A. (2017). Smartphone users: understanding how security mechanisms are perceived and new persuasive methods. PLoS One 12:e0173284. doi: 10.1371/journal.pone.0173284

PubMed Abstract | CrossRef Full Text | Google Scholar

Arachchilage, N. A. G., and Love, S. (2014). Security awareness of computer users: a phishing threat avoidance perspective. Comput. Hum. Behav. 38, 304–312. doi: 10.1016/j.chb.2014.05.046

CrossRef Full Text | Google Scholar

Bulgurcu, B., Cavusoglu, H., and Benbasat, I. (2010). Information security policy compliance: an empirical study of rationality-based beliefs and information security awareness. MIS Quart. 34, 523–548. doi: 10.2307/25750690

CrossRef Full Text | Google Scholar

Dang-Pham, D., Kautz, K., Pittayachawan, S., and Bruno, V. (2019). Explaining the development of information security climate and an information security support network: a longitudinal social network analysis. Austr. J Informat. Syst. 23, 1–28. doi: 10.3127/ajis.v23i0.1822

CrossRef Full Text | Google Scholar

Das, A., and Khan, H. U. (2016). Security behaviors of smartphone users. Informat. Comput. Secur. 24, 116–134. doi: 10.1108/ICS-04-2015-0018

CrossRef Full Text | Google Scholar

Emma, C. (2018). Report of Global Mobile Market, 2018. Available online at: https://t.qianzhan.com/caijing/detail/180912-03e0ef14.html (accessed May 25, 2020).

Google Scholar

Fenz, S., Heurix, J., Neubauer, T., and Pechstein, F. (2014). Current challenges in information security risk management. Informat. Manag. Comput. Secur. 22, 410–430. doi: 10.1108/IMCS-07-2013-0053

CrossRef Full Text | Google Scholar

Guo, K. H. (2013). Security-related behavior in using information systems in the workplace: a review and synthesis. Comput Secur. 32, 242–251. doi: 10.1016/j.cose.2012.10.003

PubMed Abstract | CrossRef Full Text | Google Scholar

Hayes, A. F. (2013). Introduction to Mediation, Moderation and Conditional Process Analysis: A Regression-Based Approach. New York, NY: Guilford Press.

Google Scholar

Hossain, M. E., and Ahmed, S. M. Z. (2016). Academic use of smartphones by university students: a developing country perspective. Electron. Library 34, 651–665. doi: 10.1108/EL-07-2015-0112

CrossRef Full Text | Google Scholar

Jansen, J., and Van Schaik, P. (2017). Comparing three models to explain precautionary online behavioural intentions. Informat. Comput. Secur. 25, 165–180. doi: 10.1108/ICS-03-2017-0018

CrossRef Full Text | Google Scholar

Johnston, A. C., and Warkentin, M. (2010). Fear appeals and information security behaviors: an empirical study. MIS Quart. 34, 549–566. doi: 10.2307/25750691

PubMed Abstract | CrossRef Full Text | Google Scholar

Jones, B. H., and Chin, A. G. (2015). On the efficacy of smartphone security: a critical analysis of modifications in business students’ practices over time. Int. J. Inf. Manage. 35, 561–571. doi: 10.1016/j.ijinfomgt.2015.06.003

CrossRef Full Text | Google Scholar

Jones, B. H., and Heinrichs, L. R. (2012). Do business students practice smartphone security? J. Comput. Inf. Syst. 53, 22–30. doi: 10.1080/08874417.2012.11645611

CrossRef Full Text | Google Scholar

Leavitt, N. (2005). Mobile phones: the next frontier for hackers? Computer 38, 20–23. doi: 10.1109/MC.2005.134

CrossRef Full Text | Google Scholar

McGill, T., and Thompson, N. (2017). Old risks, new challenges: exploring differences in security between home computer and mobile device use. Behav. Inf. Technol. 36, 1111–1124. doi: 10.1080/0144929X.2017.1352028

CrossRef Full Text | Google Scholar

Ng, B., Kankanhalli, A., and Xu, Y. (2009). Studying users’ computer security behavior: a health belief perspective. Decis. Support Syst. 46, 815–825. doi: 10.1016/j.dss.2008.11.010

CrossRef Full Text | Google Scholar

Schwarzer, R. (2008). Modeling health behavior change: how to predict and modify the adoption and maintenance of health behaviors. Appl. Psychol.Int. Rev. 57, 1–29. doi: 10.1111/j.1464-0597.2007.00325.x

CrossRef Full Text | Google Scholar

Shah, P., and Agarwal, A. (2020). Cybersecurity behaviour of smartphone users in India: an empirical analysis. Informat. Comput. Secur. [Epub ahead of print].

Google Scholar

van Schaik, P., Jansen, J., Onibokun, J., Camp, J., and Kusev, P. (2018). Security and privacy in online social networking: risk perceptions and precautionary behaviour. Comput. Hum. Behav. 78, 283–297. doi: 10.1016/j.chb.2017.10.007

CrossRef Full Text | Google Scholar

Verkijika, S. F. (2018). Understanding smartphone security behaviors: an extension of the protection motivation theory with anticipated regret. Comput. Secur. 77, 860–870. doi: 10.1016/j.cose.2018.03.008

CrossRef Full Text | Google Scholar

Wang, D., Xiang, Z., and Fesenmaier, D. R. (2014). Adapting to the mobile world: a model of smartphone use. Ann. Touris. Res. 48, 11–26. doi: 10.1016/j.annals.2014.04.008

CrossRef Full Text | Google Scholar

Wang, Y., Streff, K., and Raman, S. (2012). Smartphone security challenges. Computer 45, 52–58. doi: 10.1109/MC.2012.288

CrossRef Full Text | Google Scholar

Workman, M., Bommer, W. H., and Straub, D. (2008). Security lapses and the omission of information security measures: a threat control model and empirical test. Comput. Hum. Behav. 24, 2799–2816. doi: 10.1016/j.chb.2008.04.005

CrossRef Full Text | Google Scholar

Zhang, X. J., Li, Z., and Deng, H. (2017). Information security behaviors of smartphone users in China: an empirical analysis. Electron Library 35, 1177–1190. doi: 10.1108/EL-09-2016-0183

CrossRef Full Text | Google Scholar

Zhou, G., Gan, Y., Ke, Q., Knoll, N., Lonsdale, C., and Schwarzer, R. (2016). Avoiding exposure to air pollution by using filtering facemask respirators: an application of the health action process approach. Health Psychol. 35, 141–147. doi: 10.1037/hea0000264

PubMed Abstract | CrossRef Full Text | Google Scholar

Zhou, G., Gan, Y., Miao, M., Hamilton, K., Knoll, N., and Schwarzer, R. (2015). The role of action control and action planning on fruit and vegetable consumption. Appetite 91, 64–68. doi: 10.1016/j.appet.2015.03.022

PubMed Abstract | CrossRef Full Text | Google Scholar

Appendix

English translation of scales (item responses range from 1 = completely disagree to 5 = completely agree):

Smartphone Security Behavior

In the past month, what did you do to make sure that your smartphone was safe?

1. I frequently updated the operating system and antivirus software in my phone.

2. Before installing an App, I always read the comments to find out if it’s safe.

3. I always turn off GPS/Bluetooth when it’s not in use.

In the following statements, “smartphone security behavior” mainly refers to the timely update of the system and anti-virus software, not downloading and installing potential risky applications (Apps), and timely shutdown of GPS/Bluetooth.

Risk Perception

What harm do you think it will do if you don’t practice smartphone security behaviors?

If I don’t take safety precautions, then.

1. My phone will run slowly.

2. My privacy will be at risk.

3. My money will be lost.

Self-Efficacy

To what extent do you believe you can successfully adopt smartphone security behavior?

1. I have the necessary knowledge and skills to protect my mobile phone.

2. Adopting smartphone protection is easy for me.

3. I believe I am capable of protecting my phone from hackers.

4. Adopting smartphone protection is under my control.

Social Support

To what extent do your friends or family support your adoption of mobile security behavior?

In the last month, my friends or family.

1. Reminded me to take smartphone security precautions.

2. Helped me with my smartphone security behavior.

3. Joined me in adopting smartphone security behavior.

Keywords: self-efficacy, risk awareness, social support, smartphone security behaviors, information security

Citation: Zhou G, Gou M, Gan Y and Schwarzer R (2020) Risk Awareness, Self-Efficacy, and Social Support Predict Secure Smartphone Usage. Front. Psychol. 11:1066. doi: 10.3389/fpsyg.2020.01066

Received: 28 February 2020; Accepted: 27 April 2020;
Published: 12 June 2020.

Edited by:

Feng Kong, Shaanxi Normal University, China

Reviewed by:

David Alexander Ellis, University of Bath, United Kingdom
Efrat Neter, Ruppin Academic Center, Israel

Copyright © 2020 Zhou, Gou, Gan and Schwarzer. This is an open-access article distributed under the terms of the Creative Commons Attribution License (CC BY). The use, distribution or reproduction in other forums is permitted, provided the original author(s) and the copyright owner(s) are credited and that the original publication in this journal is cited, in accordance with accepted academic practice. No use, distribution or reproduction is permitted which does not comply with these terms.

*Correspondence: Guangyu Zhou, gyzhou@pku.edu.cn; Yiqun Gan, ygan@pku.edu.cn

Disclaimer: All claims expressed in this article are solely those of the authors and do not necessarily represent those of their affiliated organizations, or those of the publisher, the editors and the reviewers. Any product that may be evaluated in this article or claim that may be made by its manufacturer is not guaranteed or endorsed by the publisher.