Personality Traits and Cognitive Determinants—An Empirical Investigation of the Use of Smartphone Security Measures


In the last years, increasing smartphones’ capabilities have caused a paradigm shift in the way of users’ view and using mobile devices. Although researchers have started to focus on behavioral models to explain and predict human behavior, there is limited empirical research about the influence of smartphone users’ individual differences on the usage of security measures. The aim of this study is to examine the influence of individual differences on cognitive determinants of behavioral intention to use security measures. Individual differences are measured by the Five-Factor Model; cognitive determinants of behavioral intention are adapted from the validated behavioral models theory of planned behavior and technology acceptance model. An explorative, quantitative survey of 435 smartphone users is served as data basis. The results suggest that multiple facets of smartphone user’s personalities significantly affect the cognitive determinants, which indicate the behavioral intention to use security measures. From these findings, practical and theoretical implications for companies, organizations, and researchers are derived and discussed.

Share and Cite:

J. Uffen, N. Kaemmerer and M. Breitner, "Personality Traits and Cognitive Determinants—An Empirical Investigation of the Use of Smartphone Security Measures," Journal of Information Security, Vol. 4 No. 4, 2013, pp. 203-212. doi: 10.4236/jis.2013.44023.

Conflicts of Interest

The authors declare no conflicts of interest.


[1] J. Shropshire, M. Warkentin, A. C. Johnston and M. B. Schmidt, “Personality and IT security: An Application of the Five-Factor Model,” Proceedings of the 12th Americas Conference on Information Systems, Acapulco (Mexico), Acapulco, 4-6 August 2006, pp. 3443-3449.
[2] W. Wang, “How Personality Factors Affects Continuance Intention: An Empirical Investigation of Instant Messaging,” Proceedings of the 14th Pacific Asia Conference on Information Systems, Taipei, 9-12 July 2010, p. 113.
[3] H. H. Teo, K. K. Wei and I. Benbasat, “Predicting Intention to Adopt Interorganizational Linkages: An Institutional Perspective,” MIS Quarterly, Vol. 27, No. 1, 2003, pp. 19-49.
[4] C. L. Anderson and R. Agarwal, “Practicing Safe Computing: A Multimethod Empirical Examination of Home Computer User Behavioral Intention,” MIS Quarterly, Vol. 34, No. 4, 2010, pp. 613-643.
[5] B. Lebek, J. Uffen, M. Neumann, B. Hohler and M. H. Breitner, “Employees’ Information Security Awareness and Behavior: A Literature Review,” Proceedings of the 45th Hawaii International Conference on System Science, Maui (USA), Wailea, 7-10 January 2013, pp. 2978-2987.
[6] M. Fishbein and I. Ajzen, “Belief, Attitude, Intention and Behavior,” John Wiley, New York, 1975.
[7] I. Ajzen, “Theory of Planned Behavior,” Organizational Behavior and Human Decision Processes, Vol. 50, No. 2, 1991, pp. 179-211.
[8] S. Devaraj, R. F. Easley and J. M. Crant, “How Does Personalty Matter? Relating Five-Factor Model to Technology Acceptance and Use,” Information Systems Research, Vol. 19, No. 1, 2008, pp. 93-115.
[9] O. Nov and C. Ye, “Personality and Technology Acceptance: Personal Innovativeness in IT, Openness and Resistance to Change,” Proceedings of the 41st Hawaii International Conference on System Science, Big Island (USA), Waikoloa, 7-10 January 2008, p. 448.
[10] O. P. John, E. M. Donahue and R. L. Kentle, “The Big Five Inventory—Version 4a und 54,” Institute of Personality and Social Research, University of California, Berkeley, 1991.
[11] R. A. Botha, S. M. Furnell and N. L. Clarke, “From Desktop to Mobile: Examining the Security Experience,” Computer and Security, Vol. 28, No. 3-4, 2009, pp. 130-137. j.cose.2008.11.001
[12] Z. Tu and Y. Yuan, “Understanding User’s Behaviours in Coping with Security Threat of Mobile Devices Loss and Theft,” Proceedings of the 45th Hawaii International Conference on System Science, Maui, 4-7 January 2012, pp. 1393-1402.
[13] R. W. Smith and A. Pridgen, “STAAF: Scaling Android Application Analysis with a Modular Framework,” Proceedings of the 45th Hawaii International Conference on System Sciences, Maui, 4-7 January 2012, pp. 5432-5440.
[14] J. D’Arcy, A. Hovav and D. Galletta, “User Awareness of Security Countermeasures and Its Impact on Information Systems Misuse,” Information Systems Research, Vol. 20, No. 1, 2009, pp. 79-98.
[15] N. L. Clarke andS. M. Furnell, “Authentication of Users on Mobile Telephones—A Survey of Attitudes and Practices,” Computer & Security, Vol. 24, No. 7, 2005, pp. 519-527. j.cose.2005.08.003
[16] N. Ben-Asher, N. Kirschnick, H. Sieger, J. Meyer and S. M?ller, “On the Need for Different Security Methods on Mobile Phones,” Proceedings of the 13th International Conference on Human Computer Interaction with Mobile Devices and Services, Stockholm, 30 August-2 September 2011, pp. 465-473.
[17] P. Costa, R. McCrae and D. Dye, “Facet Scales for Agreeableness and Conscientiousness: A Revision of the NEO Personality Inventory,” Personality Individual Differences, Vol. 9, No. 12, 1991, pp. 887-898.
[18] G. W. Allport, “Pattern and Growth in Personality,” Holt, Rinehart & Winston, New York, 1961.
[19] M. R. Barrick, M. K. Mount and T. A. Judge, “Personality and Performance at the Beginning of the New Millennium: What Do We Know and Where Do We Go Next?” International Journal of Selection & Assessment, Vol. 9, No. 1-2, 2001, pp. 9-29.
[20] T. A. Judge, J. E. Bono, R. Ilies and M. W. Gerhardt, “Personality and Leadership: A Qualitative and Quantitative Review,” Journal of Applied Psychology, Vol. 87, No. 4, 2002, pp. 765-780.
[21] F. D. Davis, “Perceived Usefulness, Perceived Ease of Use, and User Acceptance of Information Technology,” MIS Quarterly, Vol. 13, No. 3, 1989, pp. 319-339.
[22] I. Junglas, N. Johnson and C. Spitzmüller, “Personality Traits and Concern of Privacy: An empirical Study in the Context of Location-Based Services,” European Journal of Information Systems, Vol. 17, No. 4, 2008, pp. 387-402.
[23] Y. Lee, K. A. Kozar and K. R. T. Larsen, “The Technology Acceptance Model: Past, Present, and Future,” Communications of the AIS, Vol. 12, 2003, pp. 752-780.
[24] V. Venkatesh, M. G. Morris, G. B. Davis and F. D. Davis, “User Acceptance of Information Technology: Toward a Unified View,” MIS Quarterly, Vol. 27, 3, 2003, pp. 425-478.
[25] R. Sharma and P. Yetton, “The Contingent Effects of Management Support and Task Interdependence on Successful IS Implementation,” MIS Quarterly, Vol. 27, No. 4, 2003, pp. 533-556.
[26] B. Bulgurcu, H. Cavusoglu and I. Benbasat, “Information Security Policy Compliance: An Empirical Study of Rationality-Based Beliefs and Information Security Awareness,” MIS Quarterly, Vol. 34, No. 3, 2010, pp. 523-548.
[27] S. Goswami, H. H. Teo and H. C. Chan, “Decision-Maker Mindfulness in IT Adoption: The Role of Informed Culture and Individual Personality,” Proceedings of the 30th International Conference on Information Systems, Phoenix, 15-18 December 2009, p. 203.
[28] D. R. Compeau and C. A. Higgins, “Computer Self-Efficacy: Development of a Measure and Initial Test,” MIS Quarterly, Vol. 19, No. 2, 1995, pp. 189-211.
[29] Q. Hu, T. Dinev, P. Hart and D. Cooke, “Top Management Championship and Individual Behavior towards Information Security: An Integrative Model,” Proceedings of the 16th European Conference on Information Systems, Galway, 9-11 June 2008, pp. 1310-1321.
[30] G. Bansal, “Security Concerns in the Nomological Network of Trust and Big5: First Order vs. Second Order,” Proceedings of the 32nd International Conference on Information Systems, Shanghai, 7 December 2011, Paper 9.
[31] J. C. McElroy, A. R. Hendrickson, A. M. Townsend and S. M. DeMarie, “Dispositional Factors in Internet Use: Personality versus Cognitive Styles,” MIS Quarterly, Vol. 31, No. 4, 2007, pp. 809-820.
[32] A. R. Korukonda, “Differences that do Matter: A Dialectic Analysis of Individual Characteristics and Personality Dimensions Contributing to Computer Anxiety,” Computers in Human Behavior, Vol. 23, No. 4, 2007, pp. 1921-1942.
[33] A. G. Kotulic and J. G. Clark, “Why There Aren’t More Information Security Research Studies,” Information & Management, Vol. 41, No. 5, 2004, pp. 597-607.
[34] S. Okazaki, “What Do We Know About Mobile Internet Adopters? A Cluster Analysis,” Information and Management, Vol. 43, No. 2, 2006, pp. 127-141.
[35] H. Dai, A. F. Salam and R. King, “Service Convenience and Relational Exchange in Electronic Mediated Environment: An Empirical Investigation,” Proceedings of the 29th International Conference on Information Systems, Paris, 14-17 December 2008, pp. 1-20.
[36] A. C. Johnston and M. Warkentin, “Fear Appeals and Information Security Behaviours: An Empirical Study,” MIS Quarterly, Vol. 34, No. 3, 2010, pp. 549-566.
[37] C. B. Jarvis, S. B. MacKenzie and P. M. Podsakoff, “A Critical Review of Construct Indicators and Measurement Model Misspecification in Marketing and Consumer Research,” Journal of Consumer Research, Vol. 30, No. 2, 2003, pp. 199-218.
[38] W. W. Chin, “Issues and Opinion on Structural Equation Modeling,” MIS Quarterly, Vol. 29, No. 3, 1998, pp. 7-16.
[39] S. Petter, D. Straub and A. Rai, “Specifying Formative Constructs in Information Systems Research,” MIS Quarterly, Vol. 31, No. 4, 2007, pp. 623-656.
[40] W. Straub, M. C. Boudreau and D. Gefen, “Validation Guidelines for IS Positivist Research,” Communications of the AIS, Vol. 13, No. 24, 2004, pp. 380-427.
[41] W. Renner, “A Psychometric Analysis of the NEO FiveFactor Inventory in an Austrian Sample,” Review of Psychology, Vol. 9, No. 1, 2002, pp. 25-31.
[42] D. Gefen, D. W. Straub and M. C. Boudreau, “Structural Equation Modeling and Regression: Guidelines for Research Practice,” Communications of the AIS, Vol. 4, No. 7, 2000, pp. 1-80.
[43] V. Venkatesh and H. Bala, “Technology Acceptance Model 3 and a Research Agenda on Interventions,” Decision Sciences, Vol. 39, No. 2, 2008, pp. 273-315. j.1540-5915.2008.00192.x
[44] F. Weiβ and J. M. Leimeister, “Consumerization-IT Innovations from the Consumer Market as a Challenge for Corporate IT,” Business and Information Systems Engineering, Vol. 4, No. 6, 2012, pp. 363-366.

Copyright © 2024 by authors and Scientific Research Publishing Inc.

Creative Commons License

This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.