IDEAS home Printed from https://ideas.repec.org/a/spr/infosf/v14y2012i2d10.1007_s10796-010-9253-1.html
   My bibliography  Save this article

The impact of information security failure on customer behaviors: A study on a large-scale hacking incident on the internet

Author

Listed:
  • MinJae Lee

    (Kyung Hee University)

  • JinKyu Lee

    (Oklahoma State University)

Abstract

This research examines the responses of online customers to a publicized information security incident and develops a model of retreative behaviors triggered by such a security incident. The model is empirically tested using survey data from 192 users of a recently compromised website. The results of the data analyses suggest that an information security incident can cause a measurable negative impact on customer behaviors, although the impact seems to be largely limited to that particular website. The tested model of retreative behaviors indicates that perceived damage and availability of alternative shopping sources can significantly increase retreative behaviors of victimized customers, while perceived relative usefulness and ease-of-use of the website show limited effects in reducing such behaviors.

Suggested Citation

  • MinJae Lee & JinKyu Lee, 2012. "The impact of information security failure on customer behaviors: A study on a large-scale hacking incident on the internet," Information Systems Frontiers, Springer, vol. 14(2), pages 375-393, April.
  • Handle: RePEc:spr:infosf:v:14:y:2012:i:2:d:10.1007_s10796-010-9253-1
    DOI: 10.1007/s10796-010-9253-1
    as

    Download full text from publisher

    File URL: http://link.springer.com/10.1007/s10796-010-9253-1
    File Function: Abstract
    Download Restriction: Access to the full text of the articles in this series is restricted.

    File URL: https://libkey.io/10.1007/s10796-010-9253-1?utm_source=ideas
    LibKey link: if access is restricted and if your library uses this service, LibKey will redirect you to where you can use your library subscription to access this item
    ---><---

    As the access to this document is restricted, you may want to search for a different version of it.

    References listed on IDEAS

    as
    1. Paul Hart & Carol Saunders, 1997. "Power and Trust: Critical Factors in the Adoption and Use of Electronic Data Interchange," Organization Science, INFORMS, vol. 8(1), pages 23-42, February.
    2. Tversky, Amos & Kahneman, Daniel, 1992. "Advances in Prospect Theory: Cumulative Representation of Uncertainty," Journal of Risk and Uncertainty, Springer, vol. 5(4), pages 297-323, October.
    3. Kieran Mathieson, 1991. "Predicting User Intentions: Comparing the Technology Acceptance Model with the Theory of Planned Behavior," Information Systems Research, INFORMS, vol. 2(3), pages 173-191, September.
    4. Madhavan Parthasarathy & Anol Bhattacherjee, 1998. "Understanding Post-Adoption Behavior in the Context of Online Services," Information Systems Research, INFORMS, vol. 9(4), pages 362-379, December.
    5. Dowling, Grahame R & Staelin, Richard, 1994. "A Model of Perceived Risk and Intended Risk-Handling Activity," Journal of Consumer Research, Journal of Consumer Research Inc., vol. 21(1), pages 119-134, June.
    6. Ajzen, Icek, 1991. "The theory of planned behavior," Organizational Behavior and Human Decision Processes, Elsevier, vol. 50(2), pages 179-211, December.
    7. Tversky, Amos & Slovic, Paul & Kahneman, Daniel, 1990. "The Causes of Preference Reversal," American Economic Review, American Economic Association, vol. 80(1), pages 204-217, March.
    8. Pei-Yu (Sharon) Chen & Lorin M. Hitt, 2002. "Measuring Switching Costs and the Determinants of Customer Retention in Internet-Enabled Businesses: A Study of the Online Brokerage Industry," Information Systems Research, INFORMS, vol. 13(3), pages 255-274, September.
    9. Eastlick, Mary Ann & Lotz, Sherry L. & Warrington, Patricia, 2006. "Understanding online B-to-C relationships: An integrated model of privacy concerns, trust, and commitment," Journal of Business Research, Elsevier, vol. 59(8), pages 877-886, August.
    10. Daniel Kahneman & Amos Tversky, 2013. "Prospect Theory: An Analysis of Decision Under Risk," World Scientific Book Chapters, in: Leonard C MacLean & William T Ziemba (ed.), HANDBOOK OF THE FUNDAMENTALS OF FINANCIAL DECISION MAKING Part I, chapter 6, pages 99-127, World Scientific Publishing Co. Pte. Ltd..
    11. Dhami, Sanjit & al-Nowaihi, Ali, 2007. "Why do people pay taxes? Prospect theory versus expected utility theory," Journal of Economic Behavior & Organization, Elsevier, vol. 64(1), pages 171-192, September.
    12. Forsythe, Sandra M. & Shi, Bo, 2003. "Consumer patronage and risk perceptions in Internet shopping," Journal of Business Research, Elsevier, vol. 56(11), pages 867-875, November.
    13. D. Harrison McKnight & Vivek Choudhury & Charles Kacmar, 2002. "Developing and Validating Trust Measures for e-Commerce: An Integrative Typology," Information Systems Research, INFORMS, vol. 13(3), pages 334-359, September.
    14. Shirley Taylor & Peter A. Todd, 1995. "Understanding Information Technology Usage: A Test of Competing Models," Information Systems Research, INFORMS, vol. 6(2), pages 144-176, June.
    15. Dahui Li & Glenn J. Browne & James C. Wetherbe, 2007. "Online Consumers' Switching Behavior: A Buyer-Seller Relationship Perspective," Journal of Electronic Commerce in Organizations (JECO), IGI Global, vol. 5(1), pages 30-42, January.
    16. Yang, Bijou & Lester, David, 2008. "Reflections on rational choice--The existence of systematic irrationality," Journal of Behavioral and Experimental Economics (formerly The Journal of Socio-Economics), Elsevier, vol. 37(3), pages 1218-1233, June.
    17. Kimberly Moreno & Thomas Kida & James F. Smith, 2002. "The Impact of Affective Reactions on Risky Decision Making in Accounting Contexts," Journal of Accounting Research, Wiley Blackwell, vol. 40(5), pages 1331-1349, December.
    18. Tversky, Amos & Kahneman, Daniel, 1986. "Rational Choice and the Framing of Decisions," The Journal of Business, University of Chicago Press, vol. 59(4), pages 251-278, October.
    19. Viswanath Venkatesh & Ritu Agarwal, 2006. "Turning Visitors into Customers: A Usability-Centric Perspective on Purchase Behavior in Electronic Channels," Management Science, INFORMS, vol. 52(3), pages 367-382, March.
    20. Gerald Häubl & Valerie Trifts, 2000. "Consumer Decision Making in Online Shopping Environments: The Effects of Interactive Decision Aids," Marketing Science, INFORMS, vol. 19(1), pages 4-21, May.
    Full references (including those not matched with items on IDEAS)

    Citations

    Citations are extracted by the CitEc Project, subscribe to its RSS feed for this item.
    as


    Cited by:

    1. David Chavanne, 2018. "Generalized Trust, Need for Cognitive Closure, and the Perceived Acceptability of Personal Data Collection," Games, MDPI, vol. 9(2), pages 1-18, April.
    2. Robert E. Crossler & France Bélanger & Dustin Ormond, 2019. "The quest for complete security: An empirical analysis of users’ multi-layered protection from security threats," Information Systems Frontiers, Springer, vol. 21(2), pages 343-357, April.
    3. Gianfranco Walsh & Edward Shiu & Louise Hassan & Patrick Hille & Ikuo Takahashi, 2019. "Fear of Online Consumer Identity Theft: Cross-Country Application and Short Scale Development," Information Systems Frontiers, Springer, vol. 21(6), pages 1251-1264, December.
    4. Tao Zhou & Yaobin Lu & Bin Wang, 2016. "Examining online consumers’ initial trust building from an elaboration likelihood model perspective," Information Systems Frontiers, Springer, vol. 18(2), pages 265-275, April.
    5. A. F. Salam & Hua Dai & Lei Wang, 2022. "Online Users’ Identity Theft and Coping Strategies, Attribution and Sense of Urgency: A Non-Linear Quadratic Effect Assessment," Information Systems Frontiers, Springer, vol. 24(6), pages 1929-1948, December.
    6. Davit Marikyan & Savvas Papagiannidis & Eleftherios Alamanos, 2023. "Cognitive Dissonance in Technology Adoption: A Study of Smart Home Users," Information Systems Frontiers, Springer, vol. 25(3), pages 1101-1123, June.
    7. Xing Gao & Weijun Zhong & Shue Mei, 2015. "Security investment and information sharing under an alternative security breach probability function," Information Systems Frontiers, Springer, vol. 17(2), pages 423-438, April.
    8. Obi M. Ogbanufe & Corey Baham, 2023. "Using Multi-Factor Authentication for Online Account Security: Examining the Influence of Anticipated Regret," Information Systems Frontiers, Springer, vol. 25(2), pages 897-916, April.
    9. Kweku-Muata Osei-Bryson, 2015. "A hybrid decision support framework for generating & selecting causal explanatory regression splines models for information systems research," Information Systems Frontiers, Springer, vol. 17(4), pages 845-856, August.
    10. Feng Xu & Xin (Robert) Luo & Hongyun Zhang & Shan Liu & Wei (Wayne) Huang, 2019. "Do Strategy and Timing in IT Security Investments Matter? An Empirical Investigation of the Alignment Effect," Information Systems Frontiers, Springer, vol. 21(5), pages 1069-1083, October.
    11. Jae Kyu Lee & Younghoon Chang & Hun Yeong Kwon & Beopyeon Kim, 2020. "Reconciliation of Privacy with Preventive Cybersecurity: The Bright Internet Approach," Information Systems Frontiers, Springer, vol. 22(1), pages 45-57, February.
    12. Jinlou Zhao & Hongyu Gao & Yongli Li & Jiaguo Liu, 2017. "Which factors affect the duration of hot topics on social media platforms?," Quality & Quantity: International Journal of Methodology, Springer, vol. 51(5), pages 2395-2407, September.
    13. Chulhwan Chris Bang, 2015. "Information systems frontiers: Keyword analysis and classification," Information Systems Frontiers, Springer, vol. 17(1), pages 217-237, February.
    14. Xing Gao & Weijun Zhong, 2016. "A differential game approach to security investment and information sharing in a competitive environment," IISE Transactions, Taylor & Francis Journals, vol. 48(6), pages 511-526, June.

    Most related items

    These are the items that most often cite the same works as this one and are cited by the same works as this one.
    1. Marzieh Zendehdel & Laily Hj Paim & Syuhaily Bint Osman, 2015. "Students’ online purchasing behavior in Malaysia: Understanding online shopping attitude," Cogent Business & Management, Taylor & Francis Journals, vol. 2(1), pages 1078428-107, December.
    2. Hasan Zahid & Badariah Haji Din, 2019. "Determinants of Intention to Adopt E-Government Services in Pakistan: An Imperative for Sustainable Development," Resources, MDPI, vol. 8(3), pages 1-25, July.
    3. Ding, David K. & Charoenwong, Charlie & Seetoh, Raymond, 2004. "Prospect theory, analyst forecasts, and stock returns," Journal of Multinational Financial Management, Elsevier, vol. 14(4-5), pages 425-442.
    4. Sumeet Gupta & Haejung Yun & Heng Xu & Hee-Woong Kim, 2017. "An exploratory study on mobile banking adoption in Indian metropolitan and urban areas: a scenario-based experiment," Information Technology for Development, Taylor & Francis Journals, vol. 23(1), pages 127-152, January.
    5. Zamri Ahmad & Haslindar Ibrahim & Jasman Tuyon, 2017. "Institutional investor behavioral biases: syntheses of theory and evidence," Management Research Review, Emerald Group Publishing Limited, vol. 40(5), pages 578-603, May.
    6. Chris Starmer, 1999. "Cycling with Rules of Thumb: An Experimental Test for a new form of Non-Transitive Behaviour," Theory and Decision, Springer, vol. 46(2), pages 139-157, April.
    7. Roth, Gerrit, 2006. "Predicting the Gap between Willingness to Accept and Willingness to Pay," Munich Dissertations in Economics 4901, University of Munich, Department of Economics.
    8. Schwanen, Tim & Ettema, Dick, 2009. "Coping with unreliable transportation when collecting children: Examining parents' behavior with cumulative prospect theory," Transportation Research Part A: Policy and Practice, Elsevier, vol. 43(5), pages 511-525, June.
    9. Nahid Malazizi & Habib Alipour & Hossein Olya, 2018. "Risk Perceptions of Airbnb Hosts: Evidence from a Mediterranean Island," Sustainability, MDPI, vol. 10(5), pages 1-23, April.
    10. Yu-Jin Choi & Jin-Woo Park, 2020. "Investigating Factors Influencing the Behavioral Intention of Online Duty-Free Shop Users," Sustainability, MDPI, vol. 12(17), pages 1-20, August.
    11. repec:cup:judgdm:v:3:y:2008:i:7:p:528-546 is not listed on IDEAS
    12. Rajak, Manindra & Shaw, Krishnendu, 2021. "An extension of technology acceptance model for mHealth user adoption," Technology in Society, Elsevier, vol. 67(C).
    13. Dhami, Sanjit & Al-Nowaihi, Ali, 2010. "Optimal taxation in the presence of tax evasion: Expected utility versus prospect theory," Journal of Economic Behavior & Organization, Elsevier, vol. 75(2), pages 313-337, August.
    14. Angshuman Ghosh & Sanjeev Varshney & Pingali Venugopal, 2014. "Social Media WOM: Definition, Consequences and Inter-relationships," Management and Labour Studies, XLRI Jamshedpur, School of Business Management & Human Resources, vol. 39(3), pages 293-308, August.
    15. Floris Heukelom, 2007. "Who are the Behavioral Economists and what do they say?," Tinbergen Institute Discussion Papers 07-020/1, Tinbergen Institute.
    16. Taylor, David G. & Strutton, David, 2010. "Has e-marketing come of age? Modeling historical influences on post-adoption era Internet consumer behaviors," Journal of Business Research, Elsevier, vol. 63(9-10), pages 950-956, September.
    17. Delgosha, Mohammad Soltani & Hajiheydari, Nastaran, 2020. "On-demand service platforms pro/anti adoption cognition: Examining the context-specific reasons," Journal of Business Research, Elsevier, vol. 121(C), pages 180-194.
    18. Rose McDermott, 2001. "The Psychological Ideas of Amos Tversky and Their Relevance for Political Science," Journal of Theoretical Politics, , vol. 13(1), pages 5-33, January.
    19. Michael H. Birnbaum & Kathleen Johnson & Jay-Lee Longbottom, 2008. "Tests of Cumulative Prospect Theory with graphical displays of probability," Judgment and Decision Making, Society for Judgment and Decision Making, vol. 3(7), pages 528-546, October.
    20. Malaquias, Rodrigo Fernandes & Silva, Altieres Frances, 2020. "Understanding the use of mobile banking in rural areas of Brazil," Technology in Society, Elsevier, vol. 62(C).
    21. Herzfeld, Thomas & Jongeneel, Roel, 2012. "Why do farmers behave as they do? Understanding compliance with rural, agricultural, and food attribute standards," EconStor Open Access Articles and Book Chapters, ZBW - Leibniz Information Centre for Economics, vol. 29(1), pages 250-260.

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:spr:infosf:v:14:y:2012:i:2:d:10.1007_s10796-010-9253-1. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Sonal Shukla or Springer Nature Abstracting and Indexing (email available below). General contact details of provider: http://www.springer.com .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.