Skip to main content
Log in

Applying the Theory of Planned Behaviour to predicting online safety behaviour

  • Original Article
  • Published:
Crime Prevention and Community Safety Aims and scope

Abstract

A widely promoted preventative measure against becoming a victim of cybercrime is the control of personal information online; however, little is known about what predicts the use of this type of protective safety behaviour. This study examines the utility of the Theory of Planned Behaviour in predicting online protective behaviours. Participants (N=150) completed measures of online privacy attitudes, normative influence, perceived behavioural control (PBC), intention to use and actual use of online protective behaviours. Path analysis indicated the effects of online privacy attitudes and normative beliefs on online protective safety behaviours were mediated through intention, while PBC had a significant direct effect on online protective safety behaviours. The model explained 81 per cent of the variance in protective online safety behaviours. The results of this study facilitate understanding of the psychological processes underlying the use of online protective behaviours, and can be used in the development of educational materials and cyber-identity theft prevention strategies.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Figure 1
Figure 2
Figure 3

Similar content being viewed by others

References

  • Ajzen, I. (1991) The theory of planned behaviour. Organisational Behaviour and Human Decision Processes 50 (2): 179–211.

    Article  Google Scholar 

  • Ajzen, I. (2002) Residual effects of past on later behaviour: Habituation and reasoned action perspectives. Personality and Social Psychology Review 6 (2): 107–122.

    Article  Google Scholar 

  • Ajzen, I. (2006) Theory of planned behaviour, http://people.umass.edu/aizen/index.html, accessed 19 February 2009.

  • Ajzen, I. and Fishbein, M. (1980) Understanding Attitudes and Predicting Social Behaviour. Englewood Cliffs, NJ: Prentice-Hall.

    Google Scholar 

  • Ajzen, I. and Madden, T.J. (1986) Prediction of goal-directed behavior: Attitudes, intentions, and perceived behavioral control. Journal of Experimental Social Psychology 22 (5): 453–474.

    Article  Google Scholar 

  • Alkaabi, A., Mohay, G.M., McCullagh, A.J. and Chantler, A.N. (2010) Dealing with the problem of cybercrime. In: Conference Proceedings of 2nd International ICST Conference on Digital Forensics & Cyber Crime, 4–6 October, Abu Dhabi.

  • Armitage, C.J. and Conner, M. (2001) Efficacy of the theory of planned behavior: A meta-analytic review. British Journal of Social Psychology 40 (4): 471–499.

    Article  Google Scholar 

  • Baron, R.M. and Kenny, D.A. (1986) The moderator-mediator variable distinction in social psychological research: Conceptual, strategic, and statistical considerations. Journal of Personality and Social Psychology 51 (6): 1173–1182.

    Article  Google Scholar 

  • Benet-Martínez, V. and Karakitapoglu-Aygün, Z. (2003) The interplay of cultural syndromes and personality in predicting life satisfaction. Journal of Cross-cultural Psychology 34 (1): 38–60.

    Article  Google Scholar 

  • Buchanan, T., Paine, C., Joinson, A.N. and Reips, U. (2007) Development of measures of online privacy concern and protection for use on the internet. Journal of the American Society for Information Science and Technology 58 (2): 157–165.

    Article  Google Scholar 

  • Cho, H., Lee, J.S. and Chung, S. (2010) Optimistic bias about online privacy risks: Testing the moderating effects of perceived controllability and prior experience. Computers in Human Behaviour 26 (5): 987–995.

    Article  Google Scholar 

  • Cho, H., Rivera-Sanchez, M. and Lim, S.S. (2009) A multinational study on online privacy: Global concerns and local responses. New Media & Society 11 (3): 395–416.

    Article  Google Scholar 

  • Cohen, J.A. (1992) A power primer. Psychological Bulletin 112 (1): 155–159.

    Article  Google Scholar 

  • Dinev, T., Goo, J.M., Hu, Q. and Nam, K. (2009) User behaviour towards protective information technologies: The role of national cultural differences. Information Systems Journal 19 (4): 391–412.

    Article  Google Scholar 

  • Dinev, T. and Hu, Q. (2007) The centrality of awareness in the formation of user behavioral intention toward protective information technologies. Journal of the Association for Information Systems 8 (7): 386–408.

    Google Scholar 

  • Goritz, A.S. (2006) Incentives in web studies: Methodological issues and a review. International Journal of Internet Science 1 (1): 58–70.

    Google Scholar 

  • Henson, B., Reyns, B.W. and Fisher, B.S. (2011) Security in the 21st century. Criminal Justice Review 36 (3): 253–268.

    Article  Google Scholar 

  • Higgins, G.E. and Blakely, C.R. (2010) Cybercrime: An Introduction to an Emerging Phenomenon. New York: McGraw-Hill Higher Education.

    Google Scholar 

  • Kline, R.B. (2005) Principles and Practice of Structural Equation Modelling, 2nd edn. New York: Guilford Press.

    Google Scholar 

  • Koops, B. (2010) The internet and its opportunities for cybercrime. In: M. Herzog-Evans (ed.) Transnational Criminology Manual. Nijmegen: WLP, pp. 735–754.

    Google Scholar 

  • Koops, B. and Brenner, S.W. (2006) Cybercrime jurisdiction: An introduction. Cybercrime and Jurisdiction: A Global Survey. The Hague, The Netherlands: TMC Asser Press, pp. 1–7.

    Chapter  Google Scholar 

  • Lewis, K., Kaufman, J. and Christakis, N. (2008) The taste for privacy: An analysis of college student privacy settings in an online social network. Journal of Computer-mediated Communication 14 (1): 79–100.

    Article  Google Scholar 

  • Lewis, S. and Lewis, D.A. (2011) Digitalizing crime prevention theories: How technology affects victim and offender behavior. International Journal of Criminology and Sociological Theory 4 (2): 756–769.

    Google Scholar 

  • LoPucki, L.M. (2001) Human identification theory and the identity theft problem. Texas Law Review 80 (1): 89–135.

    Google Scholar 

  • Marsh, H.W., Hau, K.T. and Wen, Z. (2004) In search of golden rules: Comment on hypothesis-testing approaches to setting cutoff values for fit indexes and dangers in overgeneralizing Hu and Bentler's (1999) findings. Structural Equation Modeling 11 (3): 320–341.

    Article  Google Scholar 

  • Martin, N. and Rice, J. (2010) Building better Government IT: Understanding community beliefs and attitudes towards smart card technologies. Behaviour and Information Technology 29 (4): 433–444.

    Article  Google Scholar 

  • Martin, N. and Rice, J. (2011) Cybercrime: Understanding and addressing the concerns of stakeholders. Computers & Security 30 (8): 803–814.

    Article  Google Scholar 

  • Metzger, M. and Docter, S. (2003) Public opinion and policy initiatives for online privacy protection. Journal of Broadcasting and Electronic Media 47 (3): 350–374.

    Article  Google Scholar 

  • Milne, G. and Culnan, M. (2004) Strategies for reducing online privacy risks: Why consumers read (or don’t read) online privacy notices. Journal of Interactive Marketing 18 (3): 15–29.

    Article  Google Scholar 

  • Milne, G.R., Rohm, A.J. and Bahl, S. (2004) Consumers’ protection of online privacy and identity. Journal of Consumer Affairs 38 (2): 217–232.

    Article  Google Scholar 

  • Miyazaki, A.D. and Fernandez, A. (2001) Consumer perceptions of privacy and security risks for online shopping. Journal of Consumer Affairs 35 (1): 27–44.

    Article  Google Scholar 

  • Ngo, F.T. and Paternoster, R. (2011) Cybercrime victimization: An examination of individual and situational level factors. International Journal of Cyber Criminology 5 (1): 773–793.

    Google Scholar 

  • Norberg, P.A., Horne, D.R. and Horne, D.A. (2007) The privacy paradox: Personal information disclosure intentions versus behaviours. Journal of Consumer Affairs 41 (1): 100–126.

    Article  Google Scholar 

  • O'Neil, D. (2001) Analysis of internet users’ level of online privacy concerns. Social Science Computer Review 19 (1): 17–31.

    Article  Google Scholar 

  • Ouellette, J.A. and Wood, W. (1998) Habit and intention in everyday life: The multiple processes by which past behaviour predicts future behaviour. Psychological Bulletin 124 (1): 54–74.

    Article  Google Scholar 

  • Phair, N. (2007) Cybercrime: The Reality of the Threat. Kambah, Australia: Nigel Phair.

    Google Scholar 

  • Reyns, B.W. (2010) A situational crime prevention approach to cyberstalking victimization: Preventive tactics for Internet users and online place managers. Crime Prevention and Community Safety 12 (2): 99–118.

    Article  Google Scholar 

  • Reyns, B.W. (2011) Online routines and identity theft victimization: Further expanding routine activity theory beyond direct-contact offenses. Journal of Research in Crime and Delinquency, published online 8 November. doi: 10.1177/0022427811425539.

  • Rhodes, R.E. and Courneya, K.S. (2003) Modelling the theory of planned behaviour and past behaviour. Psychology, Health and Medicine 8 (1): 57–68.

    Article  Google Scholar 

  • Roberts, L. (2008) Cyber-victimisation in Australia: Extent, Impact on Individuals and Responses. Briefing Paper no. 6: Tasmanian Institute of Law Enforcement Studies.

  • Roberts, L. (2009a) Cyber-victimisation. In: R. Luppicini and R. Adell (eds.) Handbook of Research on Technoethics. New York: Information Science Reference, pp. 575–592.

    Chapter  Google Scholar 

  • Roberts, L. (2009b) Cyber identity theft. In: R. Luppicini and R. Adell (eds.) Handbook of Research on Technoethics. New York: Information Science Reference, pp. 542–557.

    Chapter  Google Scholar 

  • Schoeman, F. (1984) Philosophical Dimensions of Privacy. Cambridge: Cambridge University Press.

    Book  Google Scholar 

  • Sharp, T., Shreve-Neiger, A., Fremouw, W., Kane, J. and Hutton, S. (2004) Exploring the psychological and somatic impact of identity theft. Journal of Forensic Sciences 49 (1): 131–136.

    Google Scholar 

  • Sheehan, K.B. (1999) An investigation of gender differences in online privacy concerns and resultant behaviours. Journal of Interactive Marketing 13 (4): 24–38.

    Article  Google Scholar 

  • Sheeran, P., Orbell, S. and Trafimow, D. (1999) Does the temporal stability of behavioral intentions moderate intention-behavior and past behavior-future behavior relations? Personality and Social Psychology Bulletin 25 (6): 724–734.

    Article  Google Scholar 

  • Thomas, D. and Loader, B.D. (eds.) (2000) Cybercrime: Law Enforcement, Security and Surveillance in the Information Age. New York: Routledge.

    Google Scholar 

  • Yao, M.Z. and Linz, D.G. (2008) Predicting self-protections of online privacy. CyberPsychology and Behaviour 11 (5): 615–617.

    Article  Google Scholar 

  • Yao, M.Z., Rice, R.E. and Wallis, K. (2007) Predicting user concerns about online privacy. Journal of the American Society for Information Science and Technology 58 (5): 710–722.

    Article  Google Scholar 

Download references

Acknowledgements

The authors thank the significant contribution of the anonymous reviewers in the revision process of this article.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Sarah Burns.

Appendix

Appendix

Perceived behavioural control items

Even if I want to, I don’t have the necessary confidence to protect my privacy online

Even if I want to, I don’t have the necessary ability to protect my privacy online

Even if I want to, I don’t have the necessary knowledge to protect my privacy online

Even if I want to, I don’t have the necessary resources to protect my privacy online

Subjective norms items

Most people that are important to me think that I should protect my online privacy

It is expected of me that I protect my online privacy

The people in my life whose opinions I value would approve of me protecting my online privacy

To the extent of my knowledge, most people who are important to me protect their online privacy

Many people like me protect their online privacy

Rights and permissions

Reprints and permissions

About this article

Cite this article

Burns, S., Roberts, L. Applying the Theory of Planned Behaviour to predicting online safety behaviour. Crime Prev Community Saf 15, 48–64 (2013). https://doi.org/10.1057/cpcs.2012.13

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1057/cpcs.2012.13

Keywords

Navigation