The role of security notices and online consumer behaviour: An empirical study of social networking users

Vladlena Benson* (Corresponding Author), George Saridakis, Hemamali Tennakoon, Jean Noel Ezingeard

*Corresponding author for this work

Research output: Contribution to journalArticlepeer-review

41 Citations (Scopus)

Abstract

This paper uses a survey of social networking users to empirically explore their perceptions of security notices – independently verified artefacts informing internet site users that security measures are taken by the site owner. We investigate such factors as purchase experience, purchase intention, risk propensity, usage of various social network categories and user victimisation. The results suggest a strong positive link between purchase intention and paying attention to security notices/features on social networks. We find that higher use of narrow-purpose social networking services has a negative association with paying attention to security notices. We also show that users with higher risk propensity pay less attention to security notices/features. Finally, we find no association between purchase experience, user victimisation and perception of security notices/features. Our results provide new, and possibly more refined, evidence of the factors that influence the attention paid to security notices/features by social media users. The results have important implications for theory development, policyand practice.

Original languageEnglish
Pages (from-to)36-44
Number of pages9
JournalInternational Journal of Human Computer Studies
Volume80
Early online date20 Mar 2015
DOIs
Publication statusPublished - 1 Aug 2015

Keywords

  • Cybercrime victimisation
  • Information security
  • Personal information privacy
  • Security notices
  • Security seals
  • Social learning
  • Social media

Fingerprint

Dive into the research topics of 'The role of security notices and online consumer behaviour: An empirical study of social networking users'. Together they form a unique fingerprint.

Cite this