IDEAS home Printed from https://ideas.repec.org/a/spr/infosf/v24y2022i3d10.1007_s10796-021-10119-7.html
   My bibliography  Save this article

Risk Taking Behaviors Using Public Wi-Fi™

Author

Listed:
  • Hoon S. Choi

    (Appalachian State University)

  • Darrell Carpenter

    (Longwood University)

  • Myung S. Ko

    (The University of Texas at San Antonio)

Abstract

Dramatic increases in public Wi-Fi™ (hereafter referred to as Wi-Fi) availability have occurred over the last decade. Although Wi-Fi provides convenient network connectivity, it has significant security vulnerabilities. Despite widespread knowledge of potential vulnerabilities of public Wi-Fi, most people simply connect to it in public places. We investigated the individual calculus behind risk-taking behavior based on the theoretical foundations of risk taking behavior, technology threat avoidance theory, prospect theory, and self-determination theory. Using survey data collected from 1313 respondents in the United States, this study found that avoidance motivation, risk averting propensity, and intrinsic and extrinsic motivations affect intention to use public Wi-Fi. In addition, our results indicate that avoidance motivation is related to safeguard effectiveness, safeguard cost, and perceived threat, while risk averting propensity is associated with positive outcome history, age, gender, and education attainment.

Suggested Citation

  • Hoon S. Choi & Darrell Carpenter & Myung S. Ko, 2022. "Risk Taking Behaviors Using Public Wi-Fi™," Information Systems Frontiers, Springer, vol. 24(3), pages 965-982, June.
  • Handle: RePEc:spr:infosf:v:24:y:2022:i:3:d:10.1007_s10796-021-10119-7
    DOI: 10.1007/s10796-021-10119-7
    as

    Download full text from publisher

    File URL: http://link.springer.com/10.1007/s10796-021-10119-7
    File Function: Abstract
    Download Restriction: Access to the full text of the articles in this series is restricted.

    File URL: https://libkey.io/10.1007/s10796-021-10119-7?utm_source=ideas
    LibKey link: if access is restricted and if your library uses this service, LibKey will redirect you to where you can use your library subscription to access this item
    ---><---

    As the access to this document is restricted, you may want to search for a different version of it.

    References listed on IDEAS

    as
    1. Detmar Straub & Moez Limayem & Elena Karahanna-Evaristo, 1995. "Measuring System Usage: Implications for IS Theory Testing," Management Science, INFORMS, vol. 41(8), pages 1328-1342, August.
    2. Yao, Rui & Sharpe, Deanna L. & Wang, Feifei, 2011. "Decomposing the age effect on risk tolerance," Journal of Behavioral and Experimental Economics (formerly The Journal of Socio-Economics), Elsevier, vol. 40(6), pages 879-887.
    3. Kenneth R. MacCrimmon & Donald A. Wehrung, 1990. "Characteristics of Risk Taking Executives," Management Science, INFORMS, vol. 36(4), pages 422-435, April.
    4. Tversky, Amos & Kahneman, Daniel, 1992. "Advances in Prospect Theory: Cumulative Representation of Uncertainty," Journal of Risk and Uncertainty, Springer, vol. 5(4), pages 297-323, October.
    5. David M. Cutler & Adriana Lleras-Muney, 2006. "Education and Health: Evaluating Theories and Evidence," NBER Working Papers 12352, National Bureau of Economic Research, Inc.
    6. Powell, Melanie & Ansic, David, 1997. "Gender differences in risk behaviour in financial decision-making: An experimental analysis," Journal of Economic Psychology, Elsevier, vol. 18(6), pages 605-628, November.
    7. Fariborz Farahmand & Eugene H. Spafford, 2013. "Understanding insiders: An analysis of risk-taking behavior," Information Systems Frontiers, Springer, vol. 15(1), pages 5-15, March.
    8. He, Xin & Mittal, Vikas, 2007. "The effect of decision risk and project stage on escalation of commitment," Organizational Behavior and Human Decision Processes, Elsevier, vol. 103(2), pages 225-237, July.
    9. Taylor, David G. & Strutton, David, 2010. "Has e-marketing come of age? Modeling historical influences on post-adoption era Internet consumer behaviors," Journal of Business Research, Elsevier, vol. 63(9-10), pages 950-956, September.
    10. T. K. Das & Bing‐Sheng Teng, 2001. "Strategic risk behaviour and its temporalities: between risk propensity and decision context," Journal of Management Studies, Wiley Blackwell, vol. 38(4), pages 515-534, June.
    11. Eric Jardine, 2020. "The Case against Commercial Antivirus Software: Risk Homeostasis and Information Problems in Cybersecurity," Risk Analysis, John Wiley & Sons, vol. 40(8), pages 1571-1588, August.
    12. Catherine L. Anderson & Ritu Agarwal, 2011. "The Digitization of Healthcare: Boundary Risks, Emotion, and Consumer Willingness to Disclose Personal Health Information," Information Systems Research, INFORMS, vol. 22(3), pages 469-490, September.
    13. Schoemaker, Paul J H, 1982. "The Expected Utility Model: Its Variants, Purposes, Evidence and Limitations," Journal of Economic Literature, American Economic Association, vol. 20(2), pages 529-563, June.
    14. John Hulland, 1999. "Use of partial least squares (PLS) in strategic management research: a review of four recent studies," Strategic Management Journal, Wiley Blackwell, vol. 20(2), pages 195-204, February.
    15. Tamara Dinev & Paul Hart, 2006. "An Extended Privacy Calculus Model for E-Commerce Transactions," Information Systems Research, INFORMS, vol. 17(1), pages 61-80, March.
    16. Shirley Taylor & Peter A. Todd, 1995. "Understanding Information Technology Usage: A Test of Competing Models," Information Systems Research, INFORMS, vol. 6(2), pages 144-176, June.
    17. Caroline Lancelot Miltgen & Dominique Peyrat-Guillard, 2014. "Cultural and generational influences on privacy concerns: a qualitative study in seven european countries," Post-Print hal-01116067, HAL.
    18. Timo Gnambs & Markus Appel & Aileen Oeberst, 2015. "Red Color and Risk-Taking Behavior in Online Environments," PLOS ONE, Public Library of Science, vol. 10(7), pages 1-12, July.
    Full references (including those not matched with items on IDEAS)

    Most related items

    These are the items that most often cite the same works as this one and are cited by the same works as this one.
    1. Christopher R. Plouffe & John S. Hulland & Mark Vandenbosch, 2001. "Research Report: Richness Versus Parsimony in Modeling Technology Adoption Decisions—Understanding Merchant Adoption of a Smart Card-Based Payment System," Information Systems Research, INFORMS, vol. 12(2), pages 208-222, June.
    2. Grace Fox & Tabitha L. James, 2021. "Toward an Understanding of the Antecedents to Health Information Privacy Concern: A Mixed Methods Study," Information Systems Frontiers, Springer, vol. 23(6), pages 1537-1562, December.
    3. Okazaki, Shintaro & Eisend, Martin & Plangger, Kirk & de Ruyter, Ko & Grewal, Dhruv, 2020. "Understanding the Strategic Consequences of Customer Privacy Concerns: A Meta-Analytic Review," Journal of Retailing, Elsevier, vol. 96(4), pages 458-473.
    4. Caroline Lancelot Miltgen & H. Jeff Smith, 2019. "Falsifying and withholding: exploring individuals’ contextual privacy-related decision-making," Post-Print hal-02156671, HAL.
    5. Steudner, Tobias, 2021. "Consumer Groups and their Risk Perception in a Data Sharing Cooperation between Two Firms," ITS Conference, Online Event 2020 224876, International Telecommunications Society (ITS), revised 2021.
    6. Luís Santos-Pinto & Adrian Bruhin & José Mata & Thomas Åstebro, 2015. "Detecting heterogeneous risk attitudes with mixed gambles," Theory and Decision, Springer, vol. 79(4), pages 573-600, December.
    7. Zhenhui (Jack) Jiang & Cheng Suang Heng & Ben C. F. Choi, 2013. "Research Note —Privacy Concerns and Privacy-Protective Behavior in Synchronous Online Social Interactions," Information Systems Research, INFORMS, vol. 24(3), pages 579-595, September.
    8. Renata Benigna Gonçalves & Júlio César Bastos Figueiredo, 2022. "Effects of perceived risks and benefits in the formation of the consumption privacy paradox: a study of the use of wearables in people practicing physical activities," Electronic Markets, Springer;IIM University of St. Gallen, vol. 32(3), pages 1485-1499, September.
    9. Andrea Lippi & Laura Barbieri & Mariacristina Piva & Werner De Bondt, 2018. "Time-varying risk behavior and prior investment outcomes: Evidence from Italy," Judgment and Decision Making, Society for Judgment and Decision Making, vol. 13(5), pages 471-483, September.
    10. Arun Rai & Sandra S. Lang & Robert B. Welker, 2002. "Assessing the Validity of IS Success Models: An Empirical Test and Theoretical Analysis," Information Systems Research, INFORMS, vol. 13(1), pages 50-69, March.
    11. Viswanath Venkatesh, 2000. "Determinants of Perceived Ease of Use: Integrating Control, Intrinsic Motivation, and Emotion into the Technology Acceptance Model," Information Systems Research, INFORMS, vol. 11(4), pages 342-365, December.
    12. Samuel Shye & Ido Haber, 2020. "Risk as Challenge: A Dual System Stochastic Model for Binary Choice Behavior," Applied Economics and Finance, Redfame publishing, vol. 7(2), pages 33-50, March.
    13. repec:dau:papers:123456789/5246 is not listed on IDEAS
    14. repec:cup:judgdm:v:7:y:2012:i:4:p:462-471 is not listed on IDEAS
    15. Sumeet Gupta & Haejung Yun & Heng Xu & Hee-Woong Kim, 2017. "An exploratory study on mobile banking adoption in Indian metropolitan and urban areas: a scenario-based experiment," Information Technology for Development, Taylor & Francis Journals, vol. 23(1), pages 127-152, January.
    16. Laddawan Kaewkitipong & Charlie Chen & Jiangxue Han & Peter Ractham, 2022. "Human–Computer Interaction (HCI) and Trust Factors for the Continuance Intention of Mobile Payment Services," Sustainability, MDPI, vol. 14(21), pages 1-15, November.
    17. Ann-Renée Blais & Elke U. Weber, 2006. "A Domain-Specific Risk-Taking (DOSPERT)Scale for Adult Populations," CIRANO Working Papers 2006s-24, CIRANO.
    18. Leoneti, Alexandre Bevilacqua & Gomes, Luiz Flavio Autran Monteiro, 2021. "Modeling multicriteria group decision making as games from enhanced pairwise comparisons," Operations Research Perspectives, Elsevier, vol. 8(C).
    19. Tawfiq Alashoor & Mark Keil & H. Jeff Smith & Allen R. McConnell, 2023. "Too Tired and in Too Good of a Mood to Worry About Privacy: Explaining the Privacy Paradox Through the Lens of Effort Level in Information Processing," Information Systems Research, INFORMS, vol. 34(4), pages 1415-1436, December.
    20. William Harbaugh & Kate Krause & Lise Vesterlund, 2002. "Risk Attitudes of Children and Adults: Choices Over Small and Large Probability Gains and Losses," Experimental Economics, Springer;Economic Science Association, vol. 5(1), pages 53-84, June.
    21. Xiaoxiao Hu & Xiaofei Xie, 2012. "Validation of the Domain-Specific Risk-Taking Scale in Chinese college students," Judgment and Decision Making, Society for Judgment and Decision Making, vol. 7(2), pages 181-188, March.
    22. Harin, Alexander, 2014. "Problems of utility and prospect theories. A discontinuity of Prelec’s function," MPRA Paper 61027, University Library of Munich, Germany.

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:spr:infosf:v:24:y:2022:i:3:d:10.1007_s10796-021-10119-7. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Sonal Shukla or Springer Nature Abstracting and Indexing (email available below). General contact details of provider: http://www.springer.com .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.