EXAMINING THE IMPACT OF FEAR OF CYBERCRIME ON INTERNET USERS’ BEHAVIORAL ADAPTATIONS, PRIVACY CALCULUS AND SECURITY INTENTIONS

This empirical study examined the impact of fear of cybercrime on Internet users’ online shopping safeguarding behaviors, online security measures, password management strategies and online privacy calculus. Exploring the predictors of fear of cybercrime was another goal of this study. To these ends, nationally representative data set of Crime Survey for England and Wales 2014/2015 was analyzed. Bivariate analyses results suggested the absence of gender differences in fear of cybercrime. This finding contradicts the existing fear of crime studies arguing that females are more fearful. Age and social status (education and income) emerged as significant correlates of fear of cybercrime. Internet users with higher income and higher education level reported significantly higher degrees of fear of cybercrime. Additionally, older Internet users emerged to be more fearful of cybercrime, when compared to middle-aged and younger Internet users. Multivariate analysis demonstrated that Internet users continued online shopping and employed approach-avoidance strategies despite high levels of fear cybercrime. This result contradicts approach-avoidance paradigm, which posits fear of crime fosters avoidant behavior. Young Internet users emerged to be more cautious about online shopping. This finding is also another novel contribution of this study since the existing research depicts young users as compulsive buyers. Additionally, fear of cybercrime predicted limiting online self-disclosure. Internet users with higher degrees of fear of cybercrime refrained from disclosing their personal information online. Finally, fear of cybercrime promoted the application of online safeguarding measures.

___

Accenture. (2019). Ninth Annual Cost of Cybercrime Study. Available at: https://www.accenture.com/us-en/insights/security/cost-cybercrime-study (accessed 12 Decembre 2019).

Anderson, R., Barton, C., Bölme, R., Clayton, R., Ganán, C., Grasso, T., Levi, M., Moore, T. & Vasek, M. (2019). Measuring the Changing Cost of Cybercrime. Available at: http://orca.cf.ac.uk/122684/ (accessed 07 January 2020).

Arachchilage, N. & Love, S. (2014). "Security Awareness of Computer Users: A Phishing Threat Avoidance Perspective". Computers in Human Behavior, 38 (1): 304-312.

Backe, E. L., Lilleston, P. & Mccleary-Sills, J. (2018). "Networked Individuals, Gendered Violence: A Literature Review of Cyberviolence". Violence and Gender, 5 (3): 135-146.

Başaranel, B.U. (2017). Online Terrorist Financing. M.Conway, L. Jarvis, O. Lehane, S. Macdonal ve L. Nouri (Eds.) Terrorist’s Use of the Internet: Assessment and Response, 136, 95-108. Amsterdam: IOS Press.

Bernik, I., Dobovšek, B. & Markelj, B. (2013). "To Fear or Not to Fear on Cybercrime". Innovative Issues and Approaches in Social Sciences, 6 (3): 1-17.

Bidgoli, M., Knijnenburg, B. P. & Grossklags, J. (2016). When Cybercrimes Strike Undergraduates. Electronic Crime Research (eCrime), 2016 APWG Symposium, IEEE, pp. 1-10.

Blaikie, N. (2003). Analyzing Quantitative Data: From Description to Explanation. London:Sage.

Blank, G., Bolsover, G. & Dubois, E. (2014). A New Privacy Paradox: Young People and Privacy on Social Network Sites. Prepared for the Annual Meeting of the American Sociological Association.

Boateng, F. D. (2016). "Fearfulness in the Community: Empirical Assessments of Influential Factors". Journal of Interpersonal Violence, 34(3): 562-562.

Böhme, R. & Moore, T. (2012). How Do Consumers React to Cybercrime?. eCrime Researchers Summit (eCrime).IEEE.

Brands, J. & Van Wilsem, J. (2019). "Connected and Fearful? Exploring Fear of Online Financial Crime, Internet Behaviour and Their Relationship". European Journal of Criminology, 2019(1): 1-22.

Britt, C. L. & Weisburd, D. (2010). Logistic Regression Models for Categorical Outcome Variables. In: Piquero A., Weisburd D. (Eds.) Handbook of Quantitative Criminology. Springer, New York, NY, 649-682.

Button, M., Nicholls, C. M., Kerr, J. & Owen, R. (2014). "Online Frauds: Learning from Victims Why They Fall for These Scams". Australian & New Zealand Journal of Criminology, 47 (3): 391-408.

Chang, M. L. & Wu, W. Y. (2012). "Revisiting Perceived Risk in the Context of Online Shopping: An Alternative Perspective of Decision‐Making Styles". Psychology & Marketing, 29 (5): 378-400.

Churchill, G. A. & Doerge, R. W. (1994). "Empirical Threshold Values for Quantitative Trait Mapping". Genetics, 138 (3): 963-971.

Claar, C. L. & Johnson, J. (2012). "Analyzing Home Pc Security Adoption Behavior". Journal of Computer Information Systems, 52 (4): 20-29.

Clough, J. (2011). "Cybercrime". Commonwealth Law Bulletin, 37 (4): 671-680.

CNBC. (2017). Cybercrime Costs the Global Economy $450 Billion. Available at: https://www.cnbc.com/2017/02/07/cybercrime-costs-the-global-economy-450-billion-ceo.html (accessed 06 August 2019).

Corre, K., Barais, O., Sunyé, G., Frey, V. & Crom, J.-M. (2017). "Why Can’t Users Choose Their Identity Providers on the Web?". Proceedings on Privacy Enhancing Technologies, 3: 72-86.

Culnan, M. J. & Armstrong, P. K. (1999). "Information Privacy Concerns, Procedural Fairness, and Impersonal Trust: An Empirical Investigation". Organization Science, 10 (1): 104-115.

Dai, B., Forsythe, S. & Kwon, W.-S. (2014). "The Impact of Online Shopping Experience on Risk Perceptions and Online Purchase Intentions: Does Product Category Matter?". Journal of Electronic Commerce Research, 15 (1): 13.

Das, A., Bonneau, J., Caesar, M., Borisov, N. & Wang, X. (2014). "The Tangled Web of Password Reuse", NDSS Conference, pp. 23-26.

Denis, D. J. (2015). Applied Univariate, Bivariate, and Multivariate Statistics. John Wiley & Sons.

Dienlin, T. & Metzger, M. J. (2016). "An Extended Privacy Calculus Model for Snss: Analyzing Self-Disclosure and Self-Withdrawal in a Representative Us Sample". Journal of Computer-Mediated Communication, 21 (5): 368-383.

Engel, B. & Keen, A. (1994). "A Simple Approach for the Analysis of Generalizea Linear Mixed Models". Statistica Neerlandica, 48 (1): 1-22.

Field, A. (2009). Discovering Statistics Using Spss. USA: Sage Publications.

Fisher, B. S. & Sloan, J. J. (2003). "Unraveling the Fear of Victimization among College Women: Is the “Shadow of Sexual Assault Hypothesis” Supported?". Justice Quarterly, 20 (3): 633-659.

Forsythe, S., Liu, C., Shannon, D. & Gardner, L. C. (2006). "Development of a Scale to Measure the Perceived Benefits and Risks of Online Shopping". Journal of Interactive Marketing, 20 (2): 55-75.

Gruzd, A., Hernández-García, Á. (2018). "Privacy Concerns and Self-Disclosure in Private and Public Uses of Social Media". Cyberpsychology, Behavior and Social Networking, 21 (7): 418-428.

Gutt, T. A. & Randa, R. (2016). "The Influence of an Empathetic Adult on the Relationship between Bullying Victimization and Fear at School". Journal of Crime and Justice, 39 (2): 282-302.

Guleryuz, I., & Dalkilic Surgevil, O. (2019). "A Research On Determining The Effect Of Corporate Social Responsibility Projects On The Corporate Reputation." Social Science Studies Journal, 5(33), 2089-2098.

Henson, B., Reyns, B. W. & Fisher, B. S. (2013). "Fear of Crime Online? Examining the Effect of Risk, Previous Victimization, and Exposure on Fear of Online Interpersonal Victimization". Journal of Contemporary Criminal Justice, 29 (4): 475-497.

Hernandez-Castro, J. & Boiten, E. (2014). "Cybercrime Prevalence and Impact in the UK". Computer Fraud & Security, (2): 5-8.

Hille, P., Walsh, G. & Cleveland, M. (2015). "Consumer Fear of Online Identity Theft: Scale Development and Validation". Journal of Interactive Marketing, 30: 1-19.

Holt, T. J. & Morris, R. G. (2009). "An Exploration of the Relationship between Mp3 Player Ownership and Digital Piracy". Criminal Justice Studies, 22 (4): 381-392.

Howe, A. E., Ray, I., Roberts, M., Urbanska, M. & Byrne, Z. (2012). "The Psychology of Security for the Home Computer User", 2012 IEEE Symposium on Security and Privacy: IEEE, pp. 209-223.

Hyslip, T. & Holt, T. (2019). "Examining the Correlates of Failed Drdos Attacks". Journal of Digital Forensics, Security Law, 14 (2): 2.

Jansen, J. & Van Schaik, P. (2018). "Persuading End Users to Act Cautiously Online: A Fear Appeals Study on Phishing". Information & Computer Security, 26 (3): 264-276.

Jordan, G., Leskovar, R. & Marič, M. (2018). "Impact of Fear of Identity Theft and Perceived Risk on Online Purchase Intention". Organizacija, 51 (2): 146-155.

Kimble, M. (2016), Online Gendered Harassment and Violence: Naming the Harm and Punishing the Behavior.Unpublished Thesis, University of Michigan, US.

Krasnova, H., Veltri, N. F. & Günther, O. (2012). "Self-Disclosure and Privacy Calculus on Social Networking Sites: The Role of Culture". Business & Information Systems Engineering, 4 (3): 127-135.

Kumar, H., Garg, R., Kumar, P. & Chhikara, R. (2020). A Qualitative Insight into the Personal Factors Impacting Online Impulse Behavior. Strategies and Tools for Managing Connected Consumers. IGI Global.pp. 279-291.

Kuo, F.-Y., Tseng, C.-Y., Tseng, F.-C. & Lin, C. S. (2013). "A Study of Social Information Control Affordances and Gender Difference in Facebook Self-Presentation". Cyberpsychology Behavior Social Networking, 16 (9): 635-644.

Lazarus, R. S. (2006). "Emotions and Interpersonal Relationships: Toward a Person‐Centered Conceptualization of Emotions and Coping". Journal of Personality, 74 (1): 9-46.

Lazarus, R. S. & Folkman, S. (1984). Stress, Appraisal, and Coping. Springer Publishing Company.

Lee, S.-S., Choi, K.-S., Choi, S. & Englander, E. (2019). "A Test of Structural Model for Fear of Crime in Social Networking Sites". International Journal of Cybersecurity Intelligence Cybercrime, 2 (2): 5-22.

Lin, Y.-H., Chen, C.-Y. (2012). "Adolescents'impulse Buying: Susceptibility to Interpersonal Influence and Fear of Negative Evaluation". Social Behavior and Personality, 40 (3): 353-358.

Lutz, C. & Strathoff, P. (2014). "Privacy Concerns and Online Behavior–Not So Paradoxical after All? Viewing the Privacy Paradox through Different Theoretical Lenses". Available at SSRN: https://ssrn.com/abstract=2425132 (accessed 17 January 2020).

Maddison, J. & Jeske, D. (2014). "Fear and Perceived Likelihood of Victimization in Traditional and Cyber Settings". International Journal of Cyber Behavior, Psychology and Learning (IJCBPL), 4 (4): 23-40.

Malhotra, N. & Birks, D. F. (2012). Marketing Research: An Applied Approach. Harlow: Harlow : Financial Times/Prentice Hall.

Marcum, C. D., Higgins, G. E., Ricketts, M. L. & Wolfe, S. E. (2014). "Hacking in High School: Cybercrime Perpetration by Juveniles". Deviant Behavior, 35 (7): 581-591.

May, D. C., Rader, N. E. & Goodrum, S. (2010). "A Gendered Assessment of the ‘‘Threat of Victimization’’: Examining Gender Differences in Fear of Crime, Perceived Risk, Avoidance, and Defensive Behaviors". Criminal Justice Review, 35 (2): 159-182.

Moore, S. & Shepherd, J. (2006). "The Elements and Prevalence of Fear". British Journal of Criminology, 47 (1): 154-162.

Mwagwabi, F., Mcgill, T. & Dixon, M. (2014). "Improving Compliance with Password Guidelines: How User Perceptions of Passwords and Security Threats Affect Compliance with Guidelines", 47th Hawaii International Conference on System Sciences (HICSS), IEEE, pp. 3188-3197.

Navarro, J. N. & Jasinski, J. L. (2013). "Why Girls? Using Routine Activities Theory to Predict Cyberbullying Experiences between Girls and Boys". Women Criminal Justice, 23 (4): 286-303.

Office for National Statistics. (2016), Crime Survey for England and Wales, 2014-2015. UK Data Service. SN: 7889.

Office for National Statistics. (2016b). Crime Survey for England and Wales Technical Report 2014/15. Available at: http://doc.ukdataservice.ac.uk/doc/7889/mrdoc/pdf/7889_csew_technical_report.pdf (accessed 01 July 2016).

Payton, M. E., Greenstone, M. H. & Schenker, N. (2003). "Overlapping Confidence Intervals or Standard Error Intervals: What Do They Mean in Terms of Statistical Significance?". Journal of Insect Science, 3 (1): 34.

Pereira, F. & Matos, M. (2016). "Cyber-Stalking Victimization: What Predicts Fear among Portuguese Adolescents?". European Journal on Criminal Policy and Research, 22 (2): 253-270.

Pereira, F., Spitzberg, B. H. & Matos, M. (2016). "Cyber-Harassment Victimization in Portugal: Prevalence, Fear and Help-Seeking among Adolescents". Computers in Human Behavior, 62(1): 136-146.

Pituch, K. A. & Stevens, J. P. (2016). Applied Multivariate Statistics for the Social Sciences: Analyses with SAS and IBM's SPSS. London:Routledge.

Putnik, N. & Boskovic, M. (2015). "The Impact of Media on Students’ Perception of the Security Risks Associated with Internet Social Networking-a Case Study". Croatian Journal of Education, 17 (2): 569-595.

Reyns, B. W. (2015). "A Routine Activity Perspective on Online Victimisation: Results from the Canadian General Social Survey". Journal of Financial Crime, 22 (4): 396-411.

Reyns, B. W., Fisher, B. S., Bossler, A. M. & Holt, T. J. (2019). "Opportunity and Self-Control: Do They Predict Multiple Forms of Online Victimization?". American Journal of Criminal Justice, 44 (1): 63-82.

Riek, M., Bohme, R. & Moore, T. (2016). "Measuring the Influence of Perceived Cybercrime Risk on Online Service Avoidance". IEEE Transactions on Dependable and Secure Computing, 13 (2): 261-273.

Riek, M., Böhme, R. & Moore, T. (2014). "Understanding the Influence of Cybercrime Risk on the E-Service Adoption of European Internet Users", Proceedings of the 13th Workshop on the Economics of Information Security (WEIS), Citeseer.

Riskiq. (2019). The Evil Internet Minute 2019. Available at: https://www.riskiq.com/infographic/evil-internet-minute-2019/ (accessed 01 Decembre 2019).

Roberts, L. D., Indermaur, D. & Spiranovic, C. (2013). "Fear of Cyber-Identity Theft and Related Fraudulent Activity". Psychiatry, Psychology and Law, 20 (3): 315-328.

Roth, S. & Cohen, L. J. (1986). "Approach, Avoidance, and Coping with Stress". American psychologist, 41 (7): 813.

Salleh, N., Hussein, R., Mohamed, N. & Aditiawarman, U. (2013). "An Empirical Study of the Factors Influencing Information Disclosure Behaviour in Social Networking Sites", Advanced Computer Science Applications and Technologies (ACSAT), 2013 International Conference IEEE, pp. 181-185.

Salleh, N., Hussein, R., Mohamed, N., Karim, N. S. A., Ahlan, A. R. & Aditiawarman, U. (2012). "Examining Information Disclosure Behavior on Social Network Sites Using Protection Motivation Theory, Trust and Risk". Journal of Internet Social Networking & Virtual Communities, 2012: 1-12.

Skogan, W. (1986). "Fear of Crime and Neighborhood Change". Crime and Justice, 8: 203-229.

Speelman, D. (2014). "Logistic Regression". Corpus Methods for Semantics: Quantitative Studies in Polysemy Synonymy, 43: 487-533.

Thompson, W. E. & Gibbs, J. C. (2016). Deviance and Deviants: A Sociological Approach. John Wiley & Sons.

Trepte, S., Reinecke, L., Ellison, N. B., Quiring, O., Yao, M. Z. & Ziegele, M. (2017). "A Cross-Cultural Perspective on the Privacy Calculus". Social Media + Society, 3 (1): 1-13.

Tsai, H.-Y. S., Jiang, M., Alhabash, S., Larose, R., Rifon, N. J. & Cotten, S. R. (2016). "Understanding Online Safety Behaviors: A Protection Motivation Theory Perspective". Computers & Security, 59: 138-150.

Van Der Meulen, N. S. (2013). "You've Been Warned: Consumer Liability in Internet Banking Fraud". Computer Law & Security Review, 29 (6): 713-718.

Van Eijk, G. (2017). "Between Risk and Resistance: Gender Socialization, Equality, and Ambiguous Norms in Fear of Crime and Safekeeping". Feminist Criminology, 12 (2): 103-124.

Verma, J. (2012). Data Analysis in Management with SPSS Software. Springer Science & Business Media.

Virtanen, S. M. (2017). "Fear of Cybercrime in Europe: Examining the Effects of Victimization and Vulnerabilities". Psychiatry, Psychology and Law, 24 (3): 323-338.

Wall, D. S. (2010). Criminalising Cyberspace: The Rise of the Internet as a ‘Crime Problem’. In: Jewkes, Y. & Yar, M. (Eds.) Handbook of Internet Crime. Cullompton: Cullompton : Willan.pp. 88-103.

Wall, D. S. (2011). "Cybercrime and the Culture of Fear: Social Science Fiction (s) and the Production of Knowledge About Cybercrime (Revised Feb. 2011)". Information, Communication & Society, 11 (6): 861-884.

Wall, D. S. (2015). The Internet as a Conduit for Criminal Activity. In: Pattavina, A. (Ed.) Information Technology and the Criminal Justice System. USA: Sage.pp. 77-98.

Warr, M. (2000). "Fear of Crime in the United States: Avenues for Research and Policy". Criminal Justice, 4 (4): 451-489.

Wu, P.-T. & Lee, C.-J. (2016). "Impulse Buying Behaviour in Cosmetics Marketing Activities". Total Quality Management Business Excellence, 27 (9-10): 1091-1111.

Xie, W. & Kang, C. (2015). "See You, See Me: Teenagers' Self-Disclosure and Regret of Posting on Social Network Site". Computers in Human Behavior. 52: 398-407.

Youn, S. (2005). "Teenagers' Perceptions of Online Privacy and Coping Behaviors: A Risk-Benefit Appraisal Approach". Journal of Broadcasting & Electronic Media, 49 (1): 86-110.

Yu, S. (2014). "Fear of Cyber Crime among College Students in the United States: An Exploratory Study". International Journal of Cyber Criminology, 8 (1): 36-46.