A Separate Phone to Work and Play: Protection Motivation Theory and Smartphone Security Behaviour

Holly Mason, Kathryn Parsons, Dragana Calic, Clemence Due

Research output: Contribution to conferencePaperpeer-review

6 Downloads (Pure)

Abstract

Smartphone security is a growing concern. In this study, we use the Protection Motivation Theory (PMT) to explore users’ attitudes, perceptions and behaviours towards the security of their work provided and personal smartphones. Australian employees from an insurance company participated in in-depth semi-structured interviews focussed on their behaviours. Data was analysed using deductive and inductive thematic analysis, guided by PMT to explore the comparisons between personal and work devices. The main overarching theme was that people behave more safely on their work smartphones compared to on their personal smartphones. Results suggest that perceived vulnerability, perceived reward, response cost, self-efficacy and social influence largely contributed to a lack of protective behaviours displayed when using personal smartphones. Despite the safe behaviour reported for work smartphones, these behaviours appear to be motivated by organisational controls, rather than intrinsically. This research has applied implications for education, relevant to both personal and workplace contexts.

Original languageEnglish
Number of pages13
Publication statusPublished - Dec 2022
Externally publishedYes
Event33rd Australasian Conference on Information Systems: The Changing Face of IS, ACIS 2022 - Melbourne, Australia
Duration: 4 Dec 20227 Dec 2022

Conference

Conference33rd Australasian Conference on Information Systems: The Changing Face of IS, ACIS 2022
Country/TerritoryAustralia
CityMelbourne
Period4/12/227/12/22

Keywords

  • Personal smartphone
  • Protection Motivation Theory
  • Security behaviour
  • Smartphone
  • Work smartphone

Fingerprint

Dive into the research topics of 'A Separate Phone to Work and Play: Protection Motivation Theory and Smartphone Security Behaviour'. Together they form a unique fingerprint.

Cite this