You are on page 1of 6

The Paradox of Social Media Security:

Users’ Perceptions versus Behaviors


Zahra Alqubaiti Lei Li Jing He
Kennesaw State University Kennesaw State University Kennesaw State University
1100 South Marietta Pkwy 1100 South Marietta Pkwy 1100 South Marietta Pkwy
Marietta, GA 30060 Marietta, GA 30060 Marietta, GA 30060
001-470-578-3915 001-470-578-3915 001-470-578-6039
zalqubai@students.kennesaw.edu lli13@kennesaw.edu jhe4@kennesaw.edu

ABSTRACT Based on the statistics released by Internet World Stats in


Social networking sites have become major targets for cyber- 2015, the number of global Internet users has reached
security attacks due to their massive user base. Many studies 3,366,261,156 worldwide; this demonstrates a total growth
investigated the security vulnerabilities and privacy issues of of 832.5% since 2000 [3]. Nearly two-thirds of American
social networking sites and made recommendations on how to adults (65%) regularly use social networking web sites, up
mitigate security risks. Users are an integral part of any security from 7% (Figure 1) when the Pew Research Center began
mix. In this paper, we explore the relationship between users’
systematically tracking social media usage in 2005 [4]. The
security perceptions and their actual behavior on social
networking sites. Protection motivation theory (PMT), initially
Pew Research Center [4] has found that Facebook remains
was developed to study fear appeals, and has been widely used to by far the most popular social media site in 2014. Other
examine people’s behavior in information security domains. We platforms like Twitter, Instagram, and LinkedIn saw
propose that PMT theory can also be adapted to explain and significant increases over the past year in the proportion of
predict social media users’ behaviors that have security American adults who now use their sites (Figure 2) [5].
implications. We plan to use a web-based survey to measure
users’ security awareness on social networking sites and collect
data on their actual behavior. The research design and plan are
presented in accordance to our research.

Keywords
Social media security, perceptions, behavior, protection
motivation theory.

1. INTRODUCTION Figure 1. Percentage of all American adults and internet-using


Social media has become an integral part of human society. adults who use at least one social networking site [4]
As web-based services that allow individuals to
communicate with each other via the Internet, social media
can be classified into a number of groups, including:
collaborative projects (e.g. Wikipedia), blogs and
microblogs (e.g. Twitter), social networking sites (e.g.
Facebook, LinkedIn, MySpace), content communities (e.g.
YouTube, Flickr), virtual social worlds (e.g. Second Life)
[1] [2], and virtual game worlds (e.g. C.O.D, “World of
Warcraft”, Sony’s EverQuest) [2].

Permission to make digital or hard copies of all or part of this work for Figure 2. Percentage of online adults who use social media
personal or classroom use is granted without fee provided that copies are websites, 2012-2014 [5]
not made or distributed for profit or commercial advantage and that
copies bear this notice and the full citation on the first page. Copyrights As part of people’s “online lives,” social networking sites
for components of this work owned by others than ACM must be offer many benefits, ranging from keeping everyone
honored. Abstracting with credit is permitted. To copy otherwise, or
republish, to post on servers or to redistribute to lists, requires prior
connected to others anywhere and anytime, to being an
specific permission and/or a fee. Request permissions from outlet for the latest information on breaking news and
Permissions@acm.org. trends, to creating new business opportunities for
RIIT'16, September 28-October 01 2016, Boston, MA, USA individuals and organizations. At the same time, social
© 2016 ACM. ISBN 978-1-4503-4453-1/16/09…$15.00 media also introduces risks to our community. Social media
DOI: http://dx.doi.org/10.1145/2978178.2978187 sites, as part of the World Wide Web, are inherently subject

29
to security vulnerability imposed by the Web. User privacy study how users’ behavior is impacted by their perception
is another important part of social network security of security threats.
management [6]. People are constantly posting messages,
The paper is organized as follows: The Literature Review
updating their status, liking or disliking other postings, and
section presents current literature on social media security
sharing photos and videos. However, what individuals post
vulnerabilities and mitigation techniques, and the
or share could potentially violate their privacy and security
relationship between users’ perceptions and behavior. The
on the Web.
next section presents our research hypothesis and the
Internet Crime Complaint Center (IC3) complaint data research questions we addressed. The Research Design
showed 12% of the complaints submitted in 2014 contained section introduces our research design and research plan.
a social media aspect. Complaints involving social media Finally, we conclude the paper in Discussion section.
have quadrupled over the last five years [7]. In most cases,
victims’ personal information was exploited through 2. LITERATURE REVIEW
compromised accounts or social engineering. A report 2.1 Overview of Research on Social Media
published by the Guardian [8] stated that the phenomenon Security
of social networking crime was comparatively minor in Many studies have been conducted on the security
2008 with 556 reports made to police, according to the vulnerabilities of social networks. For example, Fokes and
statistics released by 29 police forces in England, Scotland Li [14] surveyed the common security threats to Facebook
and Wales. While in 2011, there were 4,908 reports in and offered some suggestions on how to stay safe on
which Facebook and Twitter were a factor. This illustrates Facebook. Oehri and Teufel [6] discussed how to form a
an increase by 780% in just four years, resulting in security culture in the social networks. Nemati et al. [15]
approximately 650 people being charged in 2011. compared privacy issues among social media users in the
Moreover, the National White Collar Crime Center United States and China and explored privacy issues among
(NW3C) provides a list of crimes linked to social media; it users with different levels of Internet addiction and
includes: burglary, phishing & social engineering, malware, different online identity perceptions. Based on the literature
identity theft, and cyberstalking [9]. According to the reviews, we divided the security threats of social media into
National Cyber Security Alliance (NCSA) in 2011, 15% of two main categories: platform related and user related.
Americans have never checked their social networking
privacy and security account settings [10], while 49% of 2.1.1 Platform Related Social Media Threats
social media users have changed their passwords once or In using social network platforms, the user decides how
more in 2012, with 6% changing passwords weekly, and at much private data he or she is willing to share with others.
the same time, 42% have never changed their social media Most social networks allow a user to set different privacy
passwords [11]. According to the Cisco 2013 Annual settings for confirmed friends in contrast to public strangers
Security Report, the highest concentrations of online [16]. Zhao et al. [17] assessed the security and vulnerability
security threats are on mass audience sites, including social of 50 social media sites in terms of (1) privacy and security
media. The report revealed that online advertisements are policies and their implementation, (2) network information
182 times more likely to deliver malicious content than availability of social media sites, and (3) computer network
pornography sites [12]. system vulnerability to cyber intrusions and attacks.
As a vital part of the security solution for social media, On a Facebook survey study, Fokes and Li [14] found a
users need to be educated on the threats and vulnerabilities number of platform related vulnerabilities, which should be
of social networking sites. More importantly, users’ addressed by Facebook Inc., including: SMS verification
awareness of the threats should lead to safer online weaknesses, social authentication, vulnerabilities from
behavior. However, the correlation between social media applications, and puppetnets. In late November 2012,
users’ awareness of security and their actual online hackers had stolen usernames and passwords for nearly two
behavior has yet to be investigated. Protection motivation million accounts at Facebook, Google, Twitter, Yahoo and
theory (PMT) [13], initially was developed to study fear other websites, as researchers at Trustwave said that the
appeals by psychologists, and has been widely used to massive data breach was a result of keylogging software
examine people’s behavior in information security domains. maliciously installed on an untold number of computers
In this research, we adopt the PMT theory to explore the around the world. The virus was capturing log-in
relationship of users’ security perceptions and their actual credentials for key websites over a month and sending those
behavior on social networking sites. We plan to use a web- usernames and passwords to a server controlled by the
based survey to measure users’ security awareness of social hackers [18].
networking sites and collect data on their actual behavior to

30
2.1.2 User Related Social Media Threats risks for organizations; thus, from a survey conducted to
In 2011, a survey of nearly 4,000 social network users in determine social media guidelines, Oehri and Teuel [6]
the U.S., U.K., and Australia found that the number of developed a management model for creating, monitoring
people affected by Koobface and other social networking and controlling social media security culture.
malwares reached 18%, compared with 13% in 2010 and In summary, many security threats target the users on the
8% in 2009 [19]. FarmVille, which is a popular application social networking sites due to the nature of their large user
game on Facebook with currently more than 60 million base. Researchers have developed tools and methodologies
active users per month [19], allows users to buy in-game to help the users be aware of the threats and risks on the
coins with real money from a credit card to buy cattle or social networking sites.
equipment to gain bigger harvests and so on. For users who
do not want to spend real money, many websites offer 2.2 Users Perceptions on Security Threats and
cheating tools for the game. These “helper tools” are often Behavior
just standard Trojans that will not help in the game at all, One of the most widely used theories to study users’
but covertly steal passwords and other information from the perception and their behavior in the information security
user [19]. domain is protection motivation theory (PMT) [13]. PMT
Researchers at Alexandru Ioan Cuza University, Romania, was originally proposed to help clarify fear appeals. It
conducted a study on 628 students from the Faculty of provides a conceptual framework to study individuals' fear
Economy and Business Administration and 200 students appeal and behavioral change [23] [24]. According to
specializing in Accounting and Information Systems. The Rogers [13], an individual’s intention to protect him or
study aimed to analyze the degree in which the students are herself depends on four factors: (1) the perceived severity
aware of the general dangers to which they expose of a threatening event; (2) the perceived probability of the
themselves when using social media and to discover the occurrence; (3) the efficacy of the recommended preventive
security measures they use [20]. Many participants in the behavior that an individual expects to carry out; and (4) the
Popescul and Georgescu study were unaware of the individual’s perceived self-efficacy [13] [24].
technical security threat dangers, such as spoofing, The PMT emphasizes two independent cognitive processes
clickjacking, tag-jacking, phishing, etc. The participants mediating protection motivation: threat appraisals and
admitted that they don’t have knowledge about these types coping appraisals [25]. Threat appraisal evaluates
of attacks. Interestingly, more than half of the participants maladaptive behavior; assesses the severity of the situation
understood that Facebook can use their data without their and examines how serious the situation is [25]. Coping
knowledge, that they are not the real owners of their data appraisal involves the assessment of self-efficacy in
and that they can be easily manipulated on Facebook. carrying out adaptive protection behavior as well as
The user related vulnerabilities, which can be thwarted by perceived response-efficacy [25], where efficacy is the
the users themselves include: fake profiles, Sybil attack, individual's expectancy that carrying out recommendations
identity theft, and accessing user accounts even when can remove the threat, and self-efficacy is the belief in one's
blocked [14]. Many times, social networking users are ability to execute the recommended courses of action
unaware that security vulnerability poses a serious threat to successfully.
themselves and to their friends on the site. Gundecha et al. Using different applications and tools via the Internet allow
[21] stated that three measures can be taken to reduce a users to experience a variety of online security threats that
user's vulnerability; (1) the user's privacy settings are require them to enact safety precautions. PMT is a
effectively set to protect personal information, (2) the user potentially valuable framework for predicting adoption of
has adequate means to protect their friends, (3) the user's protective technologies and a leading theoretical foundation
friends must have intentions to protect the user. The study in information security research, which helps users avoid
proposed a methodology and measures for evaluating the harm from a growing number of negative technologies by
vulnerable user and how to adjust a user's network to best changing their security related behaviors to protect
deal with threats presented by vulnerable friends [21]. themselves and their organizations [26].
Liu and Maes [22] addressed the problem of lack of privacy Built on PMT, Jenkins et al. [27] proposed a solution to
awareness and large number of social network profiles deter password reuse through detection and mitigation. The
where people describe themselves using a rich vocabulary researchers hypothesized that introducing just-in-time fear
of their passions and interests. These issues strengthen the appeals when a violation is detected will likely decrease
need for vulnerability research on a social networking site password reuse. In their study, Jenkins et al. [27] found
to make users aware of privacy risks. Even in business that, 88.41% of users who received a fear appeal
environments, which are also affected by social media subsequently created unique passwords, whereas only
networks, social media provides both opportunities and

31
4.45% of users who did not receive a fear appeal created extension models were extensively used to predict users’
unique passwords [27]. acceptance of technology based on their perceptions. In the
security domain, protection motivation theory (PMT) [13]
In an investigative study of the influence of fear appeals on
was widely adopted by researchers to explain users’
the compliance of end users, Johnston and Warkentin [28]
behaviors related to information security: examination of
suggested that fear appeals do impact end user behavioral
the users’ intentions to adopt anti-spyware software [31];
intentions to comply with recommended individual acts of
enforcement of security compliance in organizations [29],
security, but the impact is not uniform across all end users.
[32]; reduction of the password reuse among users [27]; and
Based on an evaluation of the effect of organizational
improvement of web users’ online privacy and safety [33].
commitment on employee security compliance intentions,
Herath and Rao [29] suggested that (1) threat perceptions While protection motivation theory hasn’t been used to
about the severity of breaches and response perceptions of study the users’ security related behaviors on social
response efficacy, self-efficacy, and response costs are networking sites, we believe that it provides a sound
likely to affect policy attitudes; (2) organizational theoretical framework to do so given its success in
commitment and social influence have a significant impact information security research. Social networking sites are
on compliance intentions; and (3) resource availability is a part of the World Wide Web. Social media users share
significant factor in enhancing self-efficacy, which in turn, many common characteristics as the users of other websites
is a significant predictor of policy compliance intentions. or information systems. We argue that the four dimensions
The researchers found that employees in their sample of PMT, including threat severity, threat vulnerability,
underestimated the probability of security breaches. response efficacy, and self-efficacy hold similar predicting
power to explain the users’ behavior in social networking
Another survey study by Chai et al. [24] provided a
sites. This leads to following hypotheses:
research framework explaining an internet user’s
information privacy protection behavior, and found that H1. The users’ level of perception of security severity
internet users’ information privacy behaviors are affected will positively correlate to the users’ safe behavior on social
by two significant factors: (1) users’ perceived importance networking sites.
of information privacy and (2) information privacy self-
H2. The users’ level of perception of the probability of
efficacy. Researchers also found that users believe in the
an occurrence of security threats will positively correlate to
value of online information privacy and that information
the users’ safe behavior on social networking sites.
privacy protection behavior varies by gender. Their
findings indicate that educational opportunities regarding H3. The users’ perception of the level of difficulty on
internet privacy and computer security, as well as concerns the response efficacy of security threats will negatively
from other reference groups (e.g., peer, teacher, and correlate to the users’ safe behavior on social networking
parents), play an important role in positively affecting the sites.
internet users’ protective behavior regarding online privacy.
H4. The users’ level of perception of self-efficacy in
3. RESEARCH QUESTIONS AND information security will positively correlate to the users’
safe behavior on social networking sites.
HYPOTHESIS
This paper aims to examine the relationship between users’ Alternatively, users’ behaviors have distinctive patterns
security awareness and their actual activities on social when using social networking sites comparing to their
networking sites. Specifically, we propose to investigate the behavior on other sites such as e-commence websites. Users
following research questions: engage in a social media site to interact with their friends.
They may feel peer pressure to share information or
RQ1: What is the users’ level of awareness on security
respond to the postings made by their friends. The sharing
vulnerabilities in the social networking sites and how do we
environment may significantly increase the difficulty level
measure such awareness?
of the response efficacy. In other words, even if a user
RQ2: How do the users behave in the social knows a particular activity (e.g., posting a picture with geo-
networking sites when their activities have security tag on it) may violate his/her privacy, the user may still post
implications? the picture because of the strong desire to share with friends
and family members. Therefore, we argue that response
RQ3: What is the correlation between users’ efficacy will have stronger predicting power than the three
perceptions and their actual behavior on social networking other dimensions of PMT theory.
sites?
H5. The response efficacy will have more power to
Many studies investigated the users’ perceptions and their predict users’ security related behavior on social
behaviors. The Technology Acceptance Model [30] and its

32
networking sites than threat severity, self-efficacy, or behaviors that have security implications. A web-based
security threat probability. survey is developed to test our research hypotheses.

4. RESEARCH DESIGN The study is research in progress. Once completed, this


In this paper, we use a web-based survey as the main paper will extend the application of PMT to the social
research method. We propose to use Facebook as the social media domain, fill the gaps in user behavior research in the
media platform as it is one of most popular social social media security field, and build a strong base to
networking sites. Undergraduate students and graduate promote safe user behavior on social networking sites.
students from a large public university in the southeast of
the United States will be recruited as research subjects. 6. REFERENCES
College students not only provide a convenient sample pool
and but are a good representation of social media users. [1] D. M. Boyd and N. B. Ellison, “Social Network Sites:
Definition, History, and Scholarship,” J. Comput.-Mediat.
A web-based questionnaire will be developed to collect Commun., vol. 13, no. 1, pp. 210–230, Nov. 2007.
data in two categories: [4] Kaplan, A. M., and Haenlein, M. 2010. Users of the world,
unite! The challenges and opportunities of Social Media.
1). Users’ demographic or background information.
Business horizons (53:1), pp. 59-68.
We will collect the participants’ usage pattern of social [5] Internet World Stats 2015. World Internet Usage and
networking sites and their personal experience of security Population Statistics. November 30, 2015 - Update.
breaches. The latter factor could have significant impact on http://www.internetworldstats.com/stats.htm, Retrieved on:
the individual’ security awareness. May 3, 2016.
[3] Perrin, A. 2015. Social Media Usage: 2005-2015. October
2). Social media users’ perception of security 8, 2015. Pew Research Center. Available at:
vulnerabilities and behavior. The security awareness http://www.pewinternet.org/2015/10/08/2015/Social-
construct will be developed based on the protection Networking-Usage-2005-2015/, Retrieved on: May 3,
motivation theory. Specifically, we will adopt the survey 2016.
instrument used by Jenkins et al. [27], and measure the [2] Duggan, M., Ellison, N.B., Lampe, C., Lenhart, A., and
participants’ self-efficacy on security. To measure three Madden, M. 2015. Social Media Update 2014. Pew
other factors of PMT and users’ behavior, we will design Research Center. Available at:
two simulated scenarios that present activities that have http://www.pewinternet.org/2015/01/09/social-media-
update-2014/, Retrieve on: May 3, 2016.
security implications on social networking sites.
[6] C. Oehri and S. Teufel, “Social media security culture -
Furthermore, the scenarios will have different levels of The Human Dimension in Social Media Management,” Inf.
response efficacy to counter the security implications. The Secur. South Afr., vol. 4, no. 1, pp. 1–5.
participants will be asked to assess the severity of the [7] Internet Crime Complaint Center, “Internet Crime Report
security threats and the probability of the occurrence and 2014,” Internet Crime Complaint Center (IC3), 2014.
indicate their decision on whether to perform the activities. [8] Press Association, “Social media-related crime reports up
780% in four years,” The Guardian, Dec-2012. [Online].
The survey questionnaire will be tested on a small group of Available:
students in a pilot study. The instrument will then be http://www.theguardian.com/media/2012/dec/27/social-
revised based on the findings of the pilot study. The validity media-crime-facebook-twitter. [Accessed: 18-May-2016].
and reliability of the instrument will also be tested. The [9] National White Collar Crime Center, “Criminal Use of
modified instrument will be administrated to a large group Social Media (2013),” The National White Collar Crime
of students. The survey results will be analyzed to test the Center (NW3C), 2013.
[10] National Cyber Security Alliance, “2011 NCSA / McAfee
research hypothesis stated in the previous section.
Internet Home Users Survey,” National Cyber Security
Alliance, Oct. 2011.
5. DISCUSSION AND CONCLUSION [11] National Cyber Security Alliance, “2012 NCSA / McAfee
While playing an essential role in connecting people in the Online Safety Survey,” National Cyber Security Alliance,
modern society, social networking sites have become major Oct. 2012.
targets for cyber-attacks due to their massive user base. In [12] W. Ashford, “Social media: A security challenge and
this paper, we analyze the security threats on social media opportunity,” ComputerWeekly, 2013. [Online]. Available:
and mitigation techniques. We argue that studying the http://www.computerweekly.com/feature/Social-media-a-
connection between users’ awareness of security threats and security-challenge-and-opportunity. [Accessed: 20-Apr-
their corresponding behavior is a vital component in social 2016].
[13] R. W. Rogers, “A Protection Motivation Theory of Fear
media security. Protection motivation theory has been
Appeals and Attitude Change,” J. Psychol., vol. 91, no. 1,
widely used to examine people’s behavior in information p. 93, Sep. 1975.
security domain. We propose that PMT theory can also be
adapted to explain and predict social media users’

33
[14] E. Fokes and L. Li, “A survey of security vulnerabilities in weight sensations on threat-appraisal, coping-appraisal,
social networking media,” Proc. 3rd Annu. Conf. Res. Inf. and protection motivation. Studia Psychologica: Journal
Technol., p. 57, Oct. 2014. for Basic Research in Psychological Sciences. 4 (2015),
[15] H. Nemati, J. D. Wall, and A. Chow, “Privacy Coping and 301.
Information-Sharing Behaviors in Social Media: A [26] S. R. Boss, D. F. Galletta, P. B. Lowry, G. D. Moody, and
Comparison of Chinese and U.S. Users,” J. Glob. Inf. P. Polak, “What Do Systems Users Have to Fear? Using
Technol. Manag., vol. 17, no. 4, p. 228, Oct. 2014. Fear Appeals to Engender Threats and Fear that Motivate
[16] C. Wueest, “The risks of social networking,” Symantec Protective Security Behaviors,” Social Science Research
Corporation, 2010. Network, Rochester, NY, SSRN Scholarly Paper ID
[17] J. Zhao and S. Y. Zhao, “Security and Vulnerability 2607190, Dec. 2015.
Assessment of Social Media Sites: An Exploratory Study,” [27] J. L. Jenkins, M. Grimes, J. G. Proudfoot, and P. B. Lowry,
J. Educ. Bus., vol. 90, no. 8, pp. 458–466, Jan. 2015. “Improving Password Cyber-Security Through Inexpensive
[18] J. Pagliery, “Two million Facebook, Gmail and Twitter and Minimally Invasive Means: Detecting and Deterring
passwords stolen in massive hack,” CNN, Dec-2013. Password Reuse Through Keystroke-Dynamics Monitoring
[Online]. Available: and Just-in-Time Fear Appeals,” Social Science Research
http://money.cnn.com/2013/12/04/technology/security/pass Network, Rochester, NY, SSRN Scholarly Paper ID
words-stolen/. [Accessed: 18-May-2016]. 2292761, Apr. 2014.
[19] L. Whitney, “More cyberattacks hitting social networks,” [28] A. C. Johnston and M. Warkentin, “Fear Appeals and
CNET, Aug-2011. [Online]. Available: Information Security Behaviors: An Empirical Study,” MIS
http://www.cnet.com/news/more-cyberattacks-hitting- Q., vol. 34, no. 3, pp. 549-A4, Sep. 2010.
social-networks/. [Accessed: 31-May-2016]. [29] T. Herath and H. R. Rao, “Protection motivation and
[20] D. Popescul and M. Georgescu, “Social Networks Security deterrence: a framework for security policy compliance in
in Universities: Challenges and Solutions,” Sci. Ann. organisations,” Eur. J. Inf. Syst., vol. 18, no. 2, pp. 106–
Alexandru Ioan Cuza Univ. Iasi Econ. Sci. Ser., vol. 62, 125, Apr. 2009.
pp. 53–63, Dec. 2015. [30] F. D. Davis, “Perceived usefulness, perceived ease of use,
[21] P. Gundecha, G. Barbier, and H. Liu, “Exploiting and user acceptance of information technology,” MIS Q.,
vulnerability to secure user privacy on a social networking vol. 13, no. 1, pp. 319–340, 1989.
site,” Proc. 17th ACM SIGKDD Int. Conf. Knowl. Discov. [31] T. Chenoweth, R. Minch, and T. Gattiker, “Application of
Data Min., p. 511, Aug. 2011. protection motivation theory to adoption of protective
[22] H. Liu and P. Maes, “InterestMap: Harvesting Social technologies,” in Proceedings of the 42nd Annual Hawaii
Network Profiles for Recommendations,” Pers.-IUI, pp. International Conference on System Sciences, HICSS,
56–66, 2005. 2009.
[23] Y. Li, “Theories in online information privacy research: A [32] M. Siponen, S. Pahnila, and A. Mahmood, “Factors
critical review and an integrated framework,” Decis. Influencing Protection Motivation and IS Security Policy
Support Syst., vol. 54, pp. 471–481, Dec. 2012. Compliance,” in 2006 Innovations in Information
[24] Sangmi Chai, C. Morrell, S. Bagchi-Sen, H. r. Rao, and S. Technology, 2006, pp. 1–5.
J. Upadhyaya, “Internet and online information privacy: an [33] H. S. Tsai, M. Jiang, S. Alhabash, R. LaRose, N. J. Rifon,
exploratory study or preteens and early teens,” IEEE and S. R. Cotten, “Understanding online safety behaviors:
Trans. Prof. Commun., no. 2, p. 167, 2009. A protection motivation theory perspective,” Comput.
[12] Kaspar, K. 2015. An embodiment perspective on Secur., vol. 59, pp. 138–150, Jun. 2016.
protection motivation theory: the impact of incidental

34

You might also like