比较移动设备建模者和非建模者的安全感知和关系配置

IF 4.9 3区 管理学 Q1 INFORMATION SCIENCE & LIBRARY SCIENCE Information Technology & People Pub Date : 2023-09-28 DOI:10.1108/itp-06-2022-0416
Sigi Goode, Amir Riaz
{"title":"比较移动设备建模者和非建模者的安全感知和关系配置","authors":"Sigi Goode, Amir Riaz","doi":"10.1108/itp-06-2022-0416","DOIUrl":null,"url":null,"abstract":"Purpose It is becoming easier for end-users to modify their information system, sometimes against the wishes of management or the original manufacturer. In the mobile device context, “modding”, “jailbreaking” or “rooting” allows a mobile phone user to select operating software and network providers other than those mandated by the original provider. Prior studies have theorised that modders and non-modders possess different perspectives on the relationship between them and their device provider. However, these differences have not been empirically demonstrated in prior work. This paper aims to test theoretical pathways to explain the behavioural relationship effects of security within the modding context. Design/methodology/approach This study models four relationship conceptualisations from prior research. The study tests this model using a survey of 464 mobile device users to compare the user attitudes of modders and non-modders. Findings Modder and non-modder relationships differ. Both groups value security, but in different ways: modder relationships are governed by satisfaction and commitment, while non-modder relationships are governed more by trust. Originality/value To the best of the authors’ knowledge, this is the first study to empirically demonstrate the relationship differences between IS modifiers and non-modifiers. Most published work has focused on IS that are unmodified. Incorporating device modification may improve behavioural understanding of end-users.","PeriodicalId":47740,"journal":{"name":"Information Technology & People","volume":"24 1","pages":"0"},"PeriodicalIF":4.9000,"publicationDate":"2023-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Comparing security perceptions and relationship configurations of mobile device modders and non-modders\",\"authors\":\"Sigi Goode, Amir Riaz\",\"doi\":\"10.1108/itp-06-2022-0416\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Purpose It is becoming easier for end-users to modify their information system, sometimes against the wishes of management or the original manufacturer. In the mobile device context, “modding”, “jailbreaking” or “rooting” allows a mobile phone user to select operating software and network providers other than those mandated by the original provider. Prior studies have theorised that modders and non-modders possess different perspectives on the relationship between them and their device provider. However, these differences have not been empirically demonstrated in prior work. This paper aims to test theoretical pathways to explain the behavioural relationship effects of security within the modding context. Design/methodology/approach This study models four relationship conceptualisations from prior research. The study tests this model using a survey of 464 mobile device users to compare the user attitudes of modders and non-modders. Findings Modder and non-modder relationships differ. Both groups value security, but in different ways: modder relationships are governed by satisfaction and commitment, while non-modder relationships are governed more by trust. Originality/value To the best of the authors’ knowledge, this is the first study to empirically demonstrate the relationship differences between IS modifiers and non-modifiers. Most published work has focused on IS that are unmodified. Incorporating device modification may improve behavioural understanding of end-users.\",\"PeriodicalId\":47740,\"journal\":{\"name\":\"Information Technology & People\",\"volume\":\"24 1\",\"pages\":\"0\"},\"PeriodicalIF\":4.9000,\"publicationDate\":\"2023-09-28\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Information Technology & People\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1108/itp-06-2022-0416\",\"RegionNum\":3,\"RegionCategory\":\"管理学\",\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q1\",\"JCRName\":\"INFORMATION SCIENCE & LIBRARY SCIENCE\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Information Technology & People","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1108/itp-06-2022-0416","RegionNum":3,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"INFORMATION SCIENCE & LIBRARY SCIENCE","Score":null,"Total":0}
引用次数: 0

摘要

最终用户修改其信息系统变得越来越容易,有时违背管理部门或原始制造商的意愿。在移动设备上下文中,“modding”、“jailbreaking”或“root”允许移动电话用户选择除原始提供商授权之外的操作软件和网络提供商。先前的研究表明,modder和非modder对他们与设备提供商之间的关系有着不同的看法。然而,这些差异并没有在以往的工作中得到实证证明。本文旨在测试在建模背景下解释安全行为关系效应的理论途径。本研究从先前的研究中建立了四个关系概念模型。该研究通过对464名移动设备用户的调查来验证这一模型,并比较了mod爱好者和非mod爱好者的用户态度。Modder和非Modder关系不同。这两个群体都重视安全感,但以不同的方式:现代关系受满意度和承诺的支配,而非现代关系更多地受信任的支配。据作者所知,这是第一个实证证明is修饰语和非修饰语之间关系差异的研究。大多数已发表的工作都集中在未修改的IS上。结合设备修改可以提高最终用户的行为理解。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
Comparing security perceptions and relationship configurations of mobile device modders and non-modders
Purpose It is becoming easier for end-users to modify their information system, sometimes against the wishes of management or the original manufacturer. In the mobile device context, “modding”, “jailbreaking” or “rooting” allows a mobile phone user to select operating software and network providers other than those mandated by the original provider. Prior studies have theorised that modders and non-modders possess different perspectives on the relationship between them and their device provider. However, these differences have not been empirically demonstrated in prior work. This paper aims to test theoretical pathways to explain the behavioural relationship effects of security within the modding context. Design/methodology/approach This study models four relationship conceptualisations from prior research. The study tests this model using a survey of 464 mobile device users to compare the user attitudes of modders and non-modders. Findings Modder and non-modder relationships differ. Both groups value security, but in different ways: modder relationships are governed by satisfaction and commitment, while non-modder relationships are governed more by trust. Originality/value To the best of the authors’ knowledge, this is the first study to empirically demonstrate the relationship differences between IS modifiers and non-modifiers. Most published work has focused on IS that are unmodified. Incorporating device modification may improve behavioural understanding of end-users.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
Information Technology & People
Information Technology & People INFORMATION SCIENCE & LIBRARY SCIENCE-
CiteScore
8.20
自引率
13.60%
发文量
121
期刊介绍: Information Technology & People publishes work that is dedicated to understanding the implications of information technology as a tool, resource and format for people in their daily work in organizations. Impact on performance is part of this, since it is essential to the well being of employees and organizations alike. Contributions to the journal include case studies, comparative theory, and quantitative research, as well as inquiries into systems development methods and practice.
期刊最新文献
Unraveling real-time mobile connectivity paradox and emotional ambivalence: a quasi-experimental design from a multi-source perspective Understanding consumers' interest in social commerce: the role of privacy, trust and security Evaluating compliance for organizational information security and business continuity: three strata of ventriloqual agency The configurational effects of artificial intelligence-based hiring decisions on applicants' justice perception and organisational commitment Bridging the adoption gap for cryptocurrencies: understanding the affordances that impact approach–avoidance behavior for potential users and continuation usage for actual users
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1