Examining the Continuance of Secure Behavior: A Longitudinal Field Study of Mobile Device Authentication
Paul John Steinbart (),
Mark J. Keith () and
Jeffry Babb ()
Additional contact information
Paul John Steinbart: Department of Information Systems, Arizona State University, Tempe, Arizona 85287
Mark J. Keith: Information Systems Department, Brigham Young University, Provo, Utah 84602
Jeffry Babb: Department of Computer Information Systems and Decision Management, West Texas A&M University, Canyon, Texas 79016
Information Systems Research, 2016, vol. 27, issue 2, 219-239
Abstract:
It is not enough to get information technology (IT) users to adopt a secure behavior. They must also continue to behave securely. Positive outcomes of secure behavior may encourage the continuance of that behavior, whereas negative outcomes may lead users to adopt less-secure behaviors. For example, in the context of authentication, login success rates may determine whether users continue to use a strong credential or switch to less secure behaviors (e.g., storing a credential or changing to a weaker, albeit easier to successfully enter, credential). Authentication is a particularly interesting security behavior for information systems researchers to study because it is affected by an IT artifact (the design of the user interface). Laptops and desktop computers use full-size physical keyboards. However, users are increasingly adopting mobile devices, which provide either miniature physical keypads or touchscreens for entering authentication credentials. The difference in interface design affects the ease of correctly entering authentication credentials. Thus, the move to use of mobile devices to access systems provides an opportunity to study the effects of the user interface on authentication behaviors. We extend existing process models of secure behaviors to explain what influences their (dis)continuance. We conduct a longitudinal field experiment to test our predictions and find that the user interface does affect login success rates. In turn, poor performance (login failures) leads to discontinuance of a secure behavior and the adoption of less-secure behaviors. In summary, we find that a process model reveals important insights about how the IT artifact leads people to (dis)continue secure behaviors.
Keywords: continuance of security behavior; security behaviors; authentication; password; passphrase; mobile computing; smartphone; usability; user interface; longitudinal research; field experiment (search for similar items in EconPapers)
Date: 2016
References: View references in EconPapers View complete reference list from CitEc
Citations: View citations in EconPapers (4)
Downloads: (external link)
http://dx.doi.org/10.1287/isre.2016.0634 (application/pdf)
Related works:
This item may be available elsewhere in EconPapers: Search for items with the same title.
Export reference: BibTeX
RIS (EndNote, ProCite, RefMan)
HTML/Text
Persistent link: https://EconPapers.repec.org/RePEc:inm:orisre:v:27:y:2016:i:2:p:219-239
Access Statistics for this article
More articles in Information Systems Research from INFORMS Contact information at EDIRC.
Bibliographic data for series maintained by Chris Asher ().