TY - JOUR
T1 - Online Users’ Identity Theft and Coping Strategies, Attribution and Sense of Urgency
T2 - A Non-Linear Quadratic Effect Assessment
AU - Salam, A. F.
AU - Dai, Hua
AU - Wang, Lei
N1 - Publisher Copyright:
© 2021, The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature.
PY - 2022/12
Y1 - 2022/12
N2 - Defined as someone using other’s personally identifiable information to make profit or commit crimes, identity theft has become a critical problem for the whole society. The development of Internet technology has made this problem worse. Results of empirical assessment including non-linear quadratic effect prove that when users have the perception of more control over the identity theft threat, they are likely to find solutions, feel it is their responsibility and has more intentions for identity theft prevention actions to prevent identity theft. Interestingly, our theory and empirical results suggest that quadratic effect exist among critical constructs in our theoretical model and that the underlying complexity require further investigation and that linear models may not be necessarily sufficient. We further contribute by developing theory and empirical validation of non-linear quadratic effect among key constructs related to Identity theft in the context of IT security literature.
AB - Defined as someone using other’s personally identifiable information to make profit or commit crimes, identity theft has become a critical problem for the whole society. The development of Internet technology has made this problem worse. Results of empirical assessment including non-linear quadratic effect prove that when users have the perception of more control over the identity theft threat, they are likely to find solutions, feel it is their responsibility and has more intentions for identity theft prevention actions to prevent identity theft. Interestingly, our theory and empirical results suggest that quadratic effect exist among critical constructs in our theoretical model and that the underlying complexity require further investigation and that linear models may not be necessarily sufficient. We further contribute by developing theory and empirical validation of non-linear quadratic effect among key constructs related to Identity theft in the context of IT security literature.
UR - http://www.scopus.com/inward/record.url?scp=85117845076&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=85117845076&partnerID=8YFLogxK
U2 - 10.1007/s10796-021-10194-w
DO - 10.1007/s10796-021-10194-w
M3 - Article
AN - SCOPUS:85117845076
SN - 1387-3326
VL - 24
SP - 1929
EP - 1948
JO - Information Systems Frontiers
JF - Information Systems Frontiers
IS - 6
ER -