IDEAS home Printed from https://ideas.repec.org/a/spr/infosf/v24y2022i6d10.1007_s10796-021-10194-w.html
   My bibliography  Save this article

Online Users’ Identity Theft and Coping Strategies, Attribution and Sense of Urgency: A Non-Linear Quadratic Effect Assessment

Author

Listed:
  • A. F. Salam

    (The University of North Carolina at Greensboro)

  • Hua Dai

    (California State University Channel Islands)

  • Lei Wang

    (Penn State University)

Abstract

Defined as someone using other’s personally identifiable information to make profit or commit crimes, identity theft has become a critical problem for the whole society. The development of Internet technology has made this problem worse. Results of empirical assessment including non-linear quadratic effect prove that when users have the perception of more control over the identity theft threat, they are likely to find solutions, feel it is their responsibility and has more intentions for identity theft prevention actions to prevent identity theft. Interestingly, our theory and empirical results suggest that quadratic effect exist among critical constructs in our theoretical model and that the underlying complexity require further investigation and that linear models may not be necessarily sufficient. We further contribute by developing theory and empirical validation of non-linear quadratic effect among key constructs related to Identity theft in the context of IT security literature.

Suggested Citation

  • A. F. Salam & Hua Dai & Lei Wang, 2022. "Online Users’ Identity Theft and Coping Strategies, Attribution and Sense of Urgency: A Non-Linear Quadratic Effect Assessment," Information Systems Frontiers, Springer, vol. 24(6), pages 1929-1948, December.
  • Handle: RePEc:spr:infosf:v:24:y:2022:i:6:d:10.1007_s10796-021-10194-w
    DOI: 10.1007/s10796-021-10194-w
    as

    Download full text from publisher

    File URL: http://link.springer.com/10.1007/s10796-021-10194-w
    File Function: Abstract
    Download Restriction: Access to the full text of the articles in this series is restricted.

    File URL: https://libkey.io/10.1007/s10796-021-10194-w?utm_source=ideas
    LibKey link: if access is restricted and if your library uses this service, LibKey will redirect you to where you can use your library subscription to access this item
    ---><---

    As the access to this document is restricted, you may want to search for a different version of it.

    References listed on IDEAS

    as
    1. Kahn, Charles M. & Roberds, William, 2008. "Credit and identity theft," Journal of Monetary Economics, Elsevier, vol. 55(2), pages 251-264, March.
    2. Richard F. J. Haans & Constant Pieters & Zi-Lin He, 2016. "Thinking about U: Theorizing and testing U- and inverted U-shaped relationships in strategy research," Strategic Management Journal, Wiley Blackwell, vol. 37(7), pages 1177-1195, July.
    3. D. Harrison McKnight & Vivek Choudhury & Charles Kacmar, 2002. "Developing and Validating Trust Measures for e-Commerce: An Integrative Typology," Information Systems Research, INFORMS, vol. 13(3), pages 334-359, September.
    4. Matejkovic, John E. & Lahey, Karen Eilers, 2001. "Identity theft: no help for consumers," Financial Services Review, Elsevier, vol. 10(1-4), pages 221-235.
    5. Wynne W. Chin & Barbara L. Marcolin & Peter R. Newsted, 2003. "A Partial Least Squares Latent Variable Modeling Approach for Measuring Interaction Effects: Results from a Monte Carlo Simulation Study and an Electronic-Mail Emotion/Adoption Study," Information Systems Research, INFORMS, vol. 14(2), pages 189-217, June.
    6. Dan J. Kim & Donald L. Ferrin & H. Raghav Rao, 2009. "Trust and Satisfaction, Two Stepping Stones for Successful E-Commerce Relationships: A Longitudinal Exploration," Information Systems Research, INFORMS, vol. 20(2), pages 237-257, June.
    7. Yan Chen & Dennis F. Galletta & Paul Benjamin Lowry & Xin (Robert) Luo & Gregory D. Moody & Robert Willison, 2021. "Understanding Inconsistent Employee Compliance with Information Security Policies Through the Lens of the Extended Parallel Process Model," Information Systems Research, INFORMS, vol. 32(3), pages 1043-1065, September.
    8. MinJae Lee & JinKyu Lee, 2012. "The impact of information security failure on customer behaviors: A study on a large-scale hacking incident on the internet," Information Systems Frontiers, Springer, vol. 14(2), pages 375-393, April.
    9. Jörg Henseler & Georg Fassott & Theo K Dijkstra & Bradley Wilson, 2012. "Analysing quadratic effects of formative constructs by means of variance-based structural equation modelling," European Journal of Information Systems, Taylor & Francis Journals, vol. 21(1), pages 99-112, January.
    10. Gianfranco Walsh & Edward Shiu & Louise Hassan & Patrick Hille & Ikuo Takahashi, 2019. "Fear of Online Consumer Identity Theft: Cross-Country Application and Short Scale Development," Information Systems Frontiers, Springer, vol. 21(6), pages 1251-1264, December.
    Full references (including those not matched with items on IDEAS)

    Most related items

    These are the items that most often cite the same works as this one and are cited by the same works as this one.
    1. Ming Yang & Jinglu Jiang & Melody Kiang & Fangyun Yuan, 2022. "Re-Examining the Impact of Multidimensional Trust on Patients’ Online Medical Consultation Service Continuance Decision," Information Systems Frontiers, Springer, vol. 24(3), pages 983-1007, June.
    2. Baozhou Lu & Zhenhua Wang, 2022. "Trust Transfer in Sharing Accommodation: The Moderating Role of Privacy Concerns," Sustainability, MDPI, vol. 14(12), pages 1-18, June.
    3. Zhang, Kem Z.K. & Cheung, Christy M.K. & Lee, Matthew K.O., 2014. "Examining the moderating effect of inconsistent reviews and its gender differences on consumers’ online shopping decision," International Journal of Information Management, Elsevier, vol. 34(2), pages 89-98.
    4. Mario Silic & Andrea Back, 2016. "The Influence of Risk Factors in Decision-Making Process for Open Source Software Adoption," International Journal of Information Technology & Decision Making (IJITDM), World Scientific Publishing Co. Pte. Ltd., vol. 15(01), pages 151-185, January.
    5. Song, Lianlian & Hu, Baixue & Mou, Jian, 2021. "Investigating consumer binge-watching behavior: A valence framework perspective," Journal of Retailing and Consumer Services, Elsevier, vol. 62(C).
    6. Lingling Gao & Kerem Aksel Waechter, 0. "Examining the role of initial trust in user adoption of mobile payment services: an empirical investigation," Information Systems Frontiers, Springer, vol. 0, pages 1-24.
    7. Goode, Sigi & Lin, Chinho & Fernandez, Walter & Jiang, James J., 2014. "Exploring two explanations of loyalty in application service provision," European Journal of Operational Research, Elsevier, vol. 237(2), pages 649-657.
    8. Ben Q. Liu & Dale L. Goodhue, 2012. "Two Worlds of Trust for Potential E-Commerce Users: Humans as Cognitive Misers," Information Systems Research, INFORMS, vol. 23(4), pages 1246-1262, December.
    9. Wu, Ing-Long & Chen, Kuei-Wan & Chiu, Mai-Lun, 2016. "Defining key drivers of online impulse purchasing: A perspective of both impulse shoppers and system users," International Journal of Information Management, Elsevier, vol. 36(3), pages 284-296.
    10. Romanus Izuchukwu Okeke & Max Hashem Eiza, 2023. "The Application of Role-Based Framework in Preventing Internal Identity Theft Related Crimes: A Qualitative Case Study of UK Retail Companies," Information Systems Frontiers, Springer, vol. 25(2), pages 451-472, April.
    11. Yadgar Taha M. Hamakhan, 2020. "The effect of individual factors on user behaviour and the moderating role of trust: an empirical investigation of consumers’ acceptance of electronic banking in the Kurdistan Region of Iraq," Financial Innovation, Springer;Southwestern University of Finance and Economics, vol. 6(1), pages 1-29, December.
    12. Hu, Bo & Liu, Yu-li & Yan, Wenjia, 2021. "Should I scan my face? The influence of perceived value and trust on Chinese users' intention to use facial recognition payment," 23rd ITS Biennial Conference, Online Conference / Gothenburg 2021. Digital societies and industrial transformations: Policies, markets, and technologies in a post-Covid world 238028, International Telecommunications Society (ITS).
    13. Malhotra, Neeru & Sahadev, Sunil & Purani, Keyoor, 2017. "Psychological contract violation and customer intention to reuse online retailers: Exploring mediating and moderating mechanisms," Journal of Business Research, Elsevier, vol. 75(C), pages 17-28.
    14. repec:dau:papers:123456789/2723 is not listed on IDEAS
    15. Dan J. Kim & Donald L. Ferrin & H. Raghav Rao, 2009. "Trust and Satisfaction, Two Stepping Stones for Successful E-Commerce Relationships: A Longitudinal Exploration," Information Systems Research, INFORMS, vol. 20(2), pages 237-257, June.
    16. Hallikainen, Heli & Laukkanen, Tommi, 2018. "National culture and consumer trust in e-commerce," International Journal of Information Management, Elsevier, vol. 38(1), pages 97-106.
    17. Ramkumar, Bharath & Ellie Jin, Byoungho, 2019. "Examining pre-purchase intention and post-purchase consequences of international online outshopping (IOO): The moderating effect of E-tailer's country image," Journal of Retailing and Consumer Services, Elsevier, vol. 49(C), pages 186-197.
    18. Marzieh Soleimani, 2022. "Buyers' trust and mistrust in e-commerce platforms: a synthesizing literature review," Information Systems and e-Business Management, Springer, vol. 20(1), pages 57-78, March.
    19. Mosteller, Jill & Poddar, Amit, 2017. "To Share and Protect: Using Regulatory Focus Theory to Examine the Privacy Paradox of Consumers' Social Media Engagement and Online Privacy Protection Behaviors," Journal of Interactive Marketing, Elsevier, vol. 39(C), pages 27-38.
    20. Zhang, Yixiang & Fang, Yulin & Wei, Kwok-Kee & Chen, Huaping, 2010. "Exploring the role of psychological safety in promoting the intention to continue sharing knowledge in virtual communities," International Journal of Information Management, Elsevier, vol. 30(5), pages 425-436.
    21. Paul A. Pavlou & Angelika Dimoka, 2006. "The Nature and Role of Feedback Text Comments in Online Marketplaces: Implications for Trust Building, Price Premiums, and Seller Differentiation," Information Systems Research, INFORMS, vol. 17(4), pages 392-414, December.

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:spr:infosf:v:24:y:2022:i:6:d:10.1007_s10796-021-10194-w. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Sonal Shukla or Springer Nature Abstracting and Indexing (email available below). General contact details of provider: http://www.springer.com .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.