Author List: Steinbart, Paul John; Keith, Mark J.; Babb, Jeffry;
Information Systems Research, 2016, Volume 27, Issue 2, Page 219-239.
It is not enough to get information technology (IT) users to adopt a secure behavior. They must also continue to behave securely. Positive outcomes of secure behavior may encourage the continuance of that behavior, whereas negative outcomes may lead users to adopt less-secure behaviors. For example, in the context of authentication, login success rates may determine whether users continue to use a strong credential or switch to less secure behaviors (e.g., storing a credential or changing to a weaker, albeit easier to successfully enter, credential). Authentication is a particularly interesting security behavior for information systems researchers to study because it is affected by an IT artifact (the design of the user interface). Laptops and desktop computers use full-size physical keyboards. However, users are increasingly adopting mobile devices, which provide either miniature physical keypads or touchscreens for entering authentication credentials. The difference in interface design affects the ease of correctly entering authentication credentials. Thus, the move to use of mobile devices to access systems provides an opportunity to study the effects of the user interface on authentication behaviors. We extend existing process models of secure behaviors to explain what influences their (dis)continuance. We conduct a longitudinal field experiment to test our predictions and find that the user interface does affect login success rates. In turn, poor performance (login failures) leads to discontinuance of a secure behavior and the adoption of less-secure behaviors. In summary, we find that a process model reveals important insights about how the IT artifact leads people to (dis)continue secure behaviors.
Keywords: continuance of security behavior ; security behaviors ; authentication ; password ; passphrase ; mobile computing ; smartphone ; usability ; user interface ; longitudinal research ; field experiment
Algorithm:

List of Topics

#75 0.275 behavior behaviors behavioral study individuals affect model outcomes psychological individual responses negative influence explain hypotheses expected theories consequences impact theory
#160 0.183 mobile telecommunications devices wireless application computing physical voice phones purchases ubiquitous applications conceptualization secure pervasive differential usability increasing local location
#140 0.136 model use theory technology intention information attitude acceptance behavioral behavior intentions research understanding systems continuance models planned percent attitudes predict
#283 0.122 interface user users interaction design visual interfaces human-computer navigation human need cues studies guidelines laboratory functional developed restricted know guided
#116 0.091 research study influence effects literature theoretical use understanding theory using impact behavior insights examine influences mechanisms specifically context perspective findings
#49 0.067 adoption diffusion technology adopters innovation adopt process information potential innovations influence new characteristics early adopting set compatibility time initial current
#73 0.063 security threat information users detection coping configuration avoidance response firm malicious attack intrusion appraisal countermeasures benefit costs threats ability rate