IS

Keith, Mark J.

Topic Weight Topic Terms
0.275 behavior behaviors behavioral study individuals affect model outcomes psychological individual responses negative influence explain hypotheses
0.183 mobile telecommunications devices wireless application computing physical voice phones purchases ubiquitous applications conceptualization secure pervasive
0.136 model use theory technology intention information attitude acceptance behavioral behavior intentions research understanding systems continuance
0.122 interface user users interaction design visual interfaces human-computer navigation human need cues studies guidelines laboratory

Focal Researcher     Coauthors of Focal Researcher (1st degree)     Coauthors of Coauthors (2nd degree)

Note: click on a node to go to a researcher's profile page. Drag a node to reallocate. Number on the edge is the number of co-authorships.

Babb, Jeffry 1 Steinbart, Paul John 1
authentication 1 continuance of security behavior 1 field experiment 1 longitudinal research 1
mobile computing 1 password 1 passphrase 1 security behaviors 1
smartphone 1 usability 1 user interface 1

Articles (1)

Examining the Continuance of Secure Behavior: A Longitudinal Field Study of Mobile Device Authentication (Information Systems Research, 2016)
Authors: Abstract:
    It is not enough to get information technology (IT) users to adopt a secure behavior. They must also continue to behave securely. Positive outcomes of secure behavior may encourage the continuance of that behavior, whereas negative outcomes may lead users to adopt less-secure behaviors. For example, in the context of authentication, login success rates may determine whether users continue to use a strong credential or switch to less secure behaviors (e.g., storing a credential or changing to a weaker, albeit easier to successfully enter, credential). Authentication is a particularly interesting security behavior for information systems researchers to study because it is affected by an IT artifact (the design of the user interface). Laptops and desktop computers use full-size physical keyboards. However, users are increasingly adopting mobile devices, which provide either miniature physical keypads or touchscreens for entering authentication credentials. The difference in interface design affects the ease of correctly entering authentication credentials. Thus, the move to use of mobile devices to access systems provides an opportunity to study the effects of the user interface on authentication behaviors. We extend existing process models of secure behaviors to explain what influences their (dis)continuance. We conduct a longitudinal field experiment to test our predictions and find that the user interface does affect login success rates. In turn, poor performance (login failures) leads to discontinuance of a secure behavior and the adoption of less-secure behaviors. In summary, we find that a process model reveals important insights about how the IT artifact leads people to (dis)continue secure behaviors.