User Awareness Design for Electronic Money User Using Protection Motivation Theory and NIST 800-50 Framework

Christian Andrean Pradigdya, Raden Venantius Hari Ginardi

Abstract


Electronic money has emerged as the payment method. It becomes more popular because it is convenient and ubiquitous. However, the popularity has caused new security threats for the the user of electronic money. Personal data and financial information are the main target of the threats. Individuals need to protect and have certain responsibilities regarding their personal data and financial information used for electronic money services. Technology alone is unable to prevent the threats. Human behavior also becomes crucial factor to protect people against the threats and plays essential role in safe guarding personal data and financial information. This study uses Protection Motivation Theory (PMT) as a theoretical framework to empirically test why people do precautionary behavior on electronic money transaction. PMT is a social-cognitive model to predict and explain prevention behavior. Empirical research is conducted using survey methodology and collecting data from 186 respondents using online forms. Partial Least Square structural equation modelling provides support for factors influencing protection motivation in electronic money context. The results provide support for the use of threat and coping appraisal, in particular perceived security vulnerabilities, perceived security threat and perceived response efficacy to influence precautionary behavior in the context of electronic money. Those results contributes to the design of user awareness programs using NIST Special Publication 800-50. The awareness programs aimed at precaution behavior, thereby empowering electronic money user to protect themselves

Keywords


electronic money; information security; NIST 800-50; partial least square; protection motivation theory

Full Text:

PDF

References


R. E. Crossler, “Protection motivation theory: Understanding determinants to backing up personal data,” in Proceedings of the Annual Hawaii International Conference on System Sciences, 2010.

Bank Indonesia, “Peraturan Bank Indonesia Nomor 20/6/PBI/2018, Tentang Uang Elektronik.” Jakarta.

M. Wilson and J. Hash, “SP 800-50, Building an Information Technology Security Awareness and Training Program,” Washington D.C., 2003.

R. LaRose, N. J. Rifon, and R. Enbody, “Promoting personal responsibility for internet safety,” Commun. ACM, vol. 51, no. 3, pp. 71–76, 2008.

D. J. C. Brosdahl and J. M. Carpenter, “Shopping orientations of US males: A generational cohort comparison,” J. Retail. Consum. Serv., vol. 18, no. 6, pp. 548–554, 2011.

R. N. Bolton et al., “Understanding Generation Y and their use of social media: A review and research agenda,” J. Serv. Manag., vol. 24, no. 3, pp. 245–267, 2013.

European Payment Council, “Payment Threats and Fraud Trends Report,” 2018. [Online]. Available: availableat:https://www.europeanpaymentscouncil.eu. [Accessed: 24-Apr-2019].

M. Bada, A. M. Sasse, and J. R. C. Nurse, “Cyber security awareness campaigns: Why do they fail to change behaviour?,” in International Conference on Cyber Security for Sustainable Society, 2015.

Techinasia.com, “Connecting Asia’s Startup Ecosystem,” Tech in Asia, 2019. [Online]. Available: https://www.techinasia.com/fake-qr-code-scams-china. [Accessed: 18-Jun-2019].

ELSAM Multimedia, “Infografis Kasus Penyalahgunaan Data Pribadi Sepanjang 2013-2017,” ELSAM Multimedia, 2019. [Online]. Available: https://multimedia.elsam.or.id/infografis-kasus-penyalahgunaan-data-pribadi-sepanjang-2013-2017/. [Accessed: 13-Jun-2019].

Stay Safe Online, “Get Online Safety Resources From the National Cyber Security Alliance,” 2019. [Online]. Available: https://staysafeonline.org/. [Accessed: 13-Jun-2019].

I-SAFE.org, “i-SAFE Home Content | iSAFE Ventures,” 2019. [Online]. Available: http://www.isafe.org/. [Accessed: 13-Jun-2019].

J. Abawajy, “User preference of cyber security awareness delivery methods,” J. Behav. Inf. Technol., vol. 33, no. 3, pp. 237–248, 2014.

V. Thomas and B. Gardner, Building an Information Security Awareness Program: Defending Against Social Engineering Hacks and Technical Threats. Waltham, MA: Syngress Publishing, 2014.




DOI: http://dx.doi.org/10.12962/j23546026.y2019i5.6380

Refbacks

  • There are currently no refbacks.


View my Stat: Click Here

Creative Commons License
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.