| Literature DB >> 35719729 |
Zhenya Tang1, Andrew S Miller1, Zhongyun Zhou2, Merrill Warkentin1.
Abstract
Cybercriminals are taking advantage of the COVID-19 outbreak and offering COVID-19-related scams to unsuspecting people. Currently, there is a lack of studies that focus on protecting people from COVID-19-related cybercrimes. Drawing upon Cultivation Theory and Protection Motivation Theory, we develop a research model to examine the cultivation effect of government social media on peoples' information security behavior towards COVID-19 scams. We employ structural equation modeling to analyze 240 survey responses collected from social media followers of government accounts. Our results suggest that government social media account followers' participation influences their information security behavior through perceived severity, perceived vulnerability, self-efficacy, and response efficacy. Our study highlights the importance of government social media for information security management during crises.Entities:
Keywords: COVID-19; Cultivation theory; Cybercrime; Government social media; Information security; Protection motivation theory
Year: 2021 PMID: 35719729 PMCID: PMC9188430 DOI: 10.1016/j.giq.2021.101572
Source DB: PubMed Journal: Gov Inf Q ISSN: 0740-624X
Fig. 1Example of GSM.
Summary of GSM research.
| Articles | Research findings | Theory |
|---|---|---|
| Chinese citizens' participatory behaviors on GSM after 2015 Tianjin explosions are motivated by external political efficacy, emotional support, civic skills, mobilization, and rumor control. | Civic voluntarism model | |
| Governmental Facebook account actions can be grouped into four categories: providing official situational updates, responding to victims' inquiries, providing advice, and providing information for recovery. | Structuration theory | |
| This study examines how media richness, dialogic loop, and content type impact citizen engagement with GSM during the COVID-19 crisis. | Media richness theory, dialogic communication theory | |
| Governmental agencies frequently post situational awareness information and protective action messages prior to security events transpiring. | N/A | |
| GSMs post different types of information pre-, during-, and post-crisis due to evolving information needs. | Structuration theory | |
| Governments should create multiple social media accounts to create a positive network effect to diffuse disaster information. | Organization theory of information processing | |
| By analyzing 67 GSMs during a three-week period, this study identifies three messaging strategies: instructing information, adjusting information, and debunking inaccurate information. | Situational crisis communication theory | |
| Using the 2013 Seoul Floods as an example, this study states that obtaining timely, reliable information decreases anxiety and motivates users to participate in GSM. | N/A |
Fig. 2Research model.
Measures.
| Constructs | Item No. | Measurement | Sources |
|---|---|---|---|
| Perceived severity | PS1 | I think COVID-19 scams are a severe problem. | Partially adapted from |
| PS2 | I think COVID-19 scams are having a severe impact. | ||
| PS3 | If I fall for a COVID-19 scam, the consequences would be severe. | ||
| PS4 | If I fall for a COVID-19 scam, my property loss would be significant. | ||
| PS5 | If I fall for a COVID-19 scam, I would be frustrated. | ||
| Perceived vulnerability | PV1 | If I do not pay attention, it is easy to fall for COVID-19 scams. | |
| PV2 | If I do not pay attention, I may become a victim of COVID-19 scams. | ||
| PV3 | If I do not pay attention, the possibility of falling for COVID-19 scams is high. | ||
| Self-efficacy | EFF1 | Taking the necessary security measures against COVID-19 scams is easy for me. | |
| EFF2 | I feel comfortable taking the necessary security measures against COVID-19 scams. | ||
| EFF3 | I can take the necessary security measures against COVID-19 scams without much effort. | ||
| Response efficacy | RE1 | Security measures against COVID-19 scams are valuable for protection. | |
| RE2 | Security measures against COVID-19 scams work for protection. | ||
| RE3 | Security measures against COVID-19 scams are effective for protection. | ||
| RE4 | If I follow the security measures, my chance of falling for COVID-19 scams is reduced. | ||
| GSM participation | PAR1 | I always read the articles posted by the GSM. | |
| PAR2 | I always share the articles posted by the GSM. | ||
| PAR3 | I always recommend the articles posted by the GSM to my friends. | ||
| Information security behavior towards COVID-19 scams | ISB1 | I predict I will think before clicking the COVID-19 related links from unknown sources. | Partially adapted from |
| ISB2 | I predict I will think before donating to COVID-19 related online funds from unknown sources. | ||
| ISB3 | I predict I will think before purchasing medical supplies from unknown online parties. |
Demographic profile of the respondents.
| Characteristic | Items | Count | Percent |
|---|---|---|---|
| ( | |||
| Gender | Male | 100 | 41.67% |
| Female | 140 | 58.33% | |
| Age | 18–20 | 9 | 3.75% |
| 21–25 | 94 | 39.17% | |
| 26–30 | 69 | 28.75% | |
| 31–40 | 44 | 18.33% | |
| 41–65 | 24 | 10.00% | |
| Education | High school or below | 62 | 25.83% |
| Junior college | 53 | 22.08% | |
| Undergraduate | 106 | 44.17% | |
| Graduate or above | 19 | 7.92% | |
| Occupation | Student | 55 | 22.92% |
| Non-student | 185 | 77.08% | |
| Monthly income | Less than ¥ 4000 | 85 | 35.42% |
| 4001–8000 | 66 | 27.50% | |
| 8000–15,000 | 82 | 34.17% | |
| Above 15,000 | 7 | 2.92% | |
Psychometric table of measurement.
| Constructs | Item No. | Factor loadings (CFA) | Mean | T-statistics | SD | VIF |
|---|---|---|---|---|---|---|
| Perceived severity (CR = 0.880, AVE = 0.595) | PS1 | 0.772 | 5.340 | 24.017 | 1.399 | 2.146 |
| PS2 | 0.767 | 5.260 | 20.445 | 1.560 | 2.038 | |
| PS3 | 0.747 | 5.190 | 23.357 | 1.456 | 1.856 | |
| PS4 | 0.759 | 5.030 | 22.729 | 1.559 | 2.140 | |
| PS5 | 0.812 | 5.380 | 29.976 | 1.429 | 2.384 | |
| Perceived vulnerability (CR = 0.868, AVE = 0.688) | PV1 | 0.806 | 4.990 | 23.402 | 1.443 | 1.940 |
| PV2 | 0.815 | 4.790 | 26.703 | 1.541 | 1.861 | |
| PV3 | 0.867 | 4.920 | 44.546 | 1.442 | 2.088 | |
| Self-efficacy (CR = 0.847, AVE = 0.649) | EFF1 | 0.817 | 4.890 | 28.099 | 1.465 | 1.829 |
| EFF2 | 0.794 | 4.940 | 20.473 | 1.390 | 1.719 | |
| EFF3 | 0.807 | 4.860 | 25.542 | 1.434 | 1.725 | |
| Response efficacy (CR = 0.858, AVE = 0.602) | RE1 | 0.813 | 5.030 | 32.069 | 1.477 | 2.094 |
| RE2 | 0.798 | 5.110 | 28.207 | 1.445 | 1.937 | |
| RE3 | 0.779 | 5.180 | 21.545 | 1.429 | 1.782 | |
| RE4 | 0.711 | 5.180 | 12.590 | 1.405 | 1.654 | |
| GSM participation (CR = 0.807, AVE = 0.583) | PAR1 | 0.722 | 4.570 | 13.089 | 1.398 | 1.455 |
| PAR2 | 0.762 | 4.600 | 16.144 | 1.508 | 1.503 | |
| PAR3 | 0.806 | 4.670 | 20.883 | 1.505 | 1.579 | |
| Information security behavior (CR = 0.824, AVE = 0.607) | ISB1 | 0.717 | 5.060 | 15.657 | 1.468 | 1.813 |
| ISB2 | 0.824 | 5.130 | 35.977 | 1.441 | 2.146 | |
| ISB3 | 0.794 | 5.310 | 25.393 | 1.460 | 1.852 |
Correlation matrix and square roots of the AVEs.
| PS | PV | EFF | RE | PAR | ISB | |
|---|---|---|---|---|---|---|
| PS | ||||||
| PV | 0.530 | |||||
| EFF | 0.473 | 0.372 | ||||
| RE | 0.652 | 0.511 | 0.499 | |||
| PAR | 0.287 | 0.476 | 0.352 | 0.390 | ||
| ISB | 0.667 | 0.553 | 0.553 | 0.597 | 0.382 |
Fig. 3Structural model results.
Note: ⁎p < 0.05; ⁎⁎p < 0.01; ⁎⁎⁎p < 0.001.
Results of the structural model.
| Hypothesis | Path coefficient | T value | S.E. | Conclusion |
|---|---|---|---|---|
| H1 | β = 0.352⁎⁎⁎ | 4.676 | 0.074 | Supported |
| H2 | β = 0.202⁎⁎ | 3.094 | 0.066 | Supported |
| H3 | β = 0.251⁎⁎⁎ | 4.631 | 0.052 | Supported |
| H4 | β = 0.150⁎ | 2.129 | 0.071 | Supported |
| H5 | β = 0.288⁎⁎⁎ | 4.783 | 0.063 | Supported |
| H6 | β = 0.477⁎⁎⁎ | 8.453 | 0.053 | Supported |
| H7 | β = 0.353⁎⁎⁎ | 5.826 | 0.066 | Supported |
| H8 | β = 0.391⁎⁎⁎ | 6.844 | 0.055 | Supported |
⁎p < 0.05; ⁎⁎p < 0.01; ⁎⁎⁎p < 0.001.