Comparing security perceptions and relationship configurations of mobile device modders and non-modders

IF 4.9 3区 管理学 Q1 INFORMATION SCIENCE & LIBRARY SCIENCE
Sigi Goode, Amir Riaz
{"title":"Comparing security perceptions and relationship configurations of mobile device modders and non-modders","authors":"Sigi Goode, Amir Riaz","doi":"10.1108/itp-06-2022-0416","DOIUrl":null,"url":null,"abstract":"Purpose It is becoming easier for end-users to modify their information system, sometimes against the wishes of management or the original manufacturer. In the mobile device context, “modding”, “jailbreaking” or “rooting” allows a mobile phone user to select operating software and network providers other than those mandated by the original provider. Prior studies have theorised that modders and non-modders possess different perspectives on the relationship between them and their device provider. However, these differences have not been empirically demonstrated in prior work. This paper aims to test theoretical pathways to explain the behavioural relationship effects of security within the modding context. Design/methodology/approach This study models four relationship conceptualisations from prior research. The study tests this model using a survey of 464 mobile device users to compare the user attitudes of modders and non-modders. Findings Modder and non-modder relationships differ. Both groups value security, but in different ways: modder relationships are governed by satisfaction and commitment, while non-modder relationships are governed more by trust. Originality/value To the best of the authors’ knowledge, this is the first study to empirically demonstrate the relationship differences between IS modifiers and non-modifiers. Most published work has focused on IS that are unmodified. Incorporating device modification may improve behavioural understanding of end-users.","PeriodicalId":47740,"journal":{"name":"Information Technology & People","volume":"24 1","pages":"0"},"PeriodicalIF":4.9000,"publicationDate":"2023-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Information Technology & People","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1108/itp-06-2022-0416","RegionNum":3,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"INFORMATION SCIENCE & LIBRARY SCIENCE","Score":null,"Total":0}
引用次数: 0

Abstract

Purpose It is becoming easier for end-users to modify their information system, sometimes against the wishes of management or the original manufacturer. In the mobile device context, “modding”, “jailbreaking” or “rooting” allows a mobile phone user to select operating software and network providers other than those mandated by the original provider. Prior studies have theorised that modders and non-modders possess different perspectives on the relationship between them and their device provider. However, these differences have not been empirically demonstrated in prior work. This paper aims to test theoretical pathways to explain the behavioural relationship effects of security within the modding context. Design/methodology/approach This study models four relationship conceptualisations from prior research. The study tests this model using a survey of 464 mobile device users to compare the user attitudes of modders and non-modders. Findings Modder and non-modder relationships differ. Both groups value security, but in different ways: modder relationships are governed by satisfaction and commitment, while non-modder relationships are governed more by trust. Originality/value To the best of the authors’ knowledge, this is the first study to empirically demonstrate the relationship differences between IS modifiers and non-modifiers. Most published work has focused on IS that are unmodified. Incorporating device modification may improve behavioural understanding of end-users.
比较移动设备建模者和非建模者的安全感知和关系配置
最终用户修改其信息系统变得越来越容易,有时违背管理部门或原始制造商的意愿。在移动设备上下文中,“modding”、“jailbreaking”或“root”允许移动电话用户选择除原始提供商授权之外的操作软件和网络提供商。先前的研究表明,modder和非modder对他们与设备提供商之间的关系有着不同的看法。然而,这些差异并没有在以往的工作中得到实证证明。本文旨在测试在建模背景下解释安全行为关系效应的理论途径。本研究从先前的研究中建立了四个关系概念模型。该研究通过对464名移动设备用户的调查来验证这一模型,并比较了mod爱好者和非mod爱好者的用户态度。Modder和非Modder关系不同。这两个群体都重视安全感,但以不同的方式:现代关系受满意度和承诺的支配,而非现代关系更多地受信任的支配。据作者所知,这是第一个实证证明is修饰语和非修饰语之间关系差异的研究。大多数已发表的工作都集中在未修改的IS上。结合设备修改可以提高最终用户的行为理解。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
Information Technology & People
Information Technology & People INFORMATION SCIENCE & LIBRARY SCIENCE-
CiteScore
8.20
自引率
13.60%
发文量
121
期刊介绍: Information Technology & People publishes work that is dedicated to understanding the implications of information technology as a tool, resource and format for people in their daily work in organizations. Impact on performance is part of this, since it is essential to the well being of employees and organizations alike. Contributions to the journal include case studies, comparative theory, and quantitative research, as well as inquiries into systems development methods and practice.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信