Abstract
Dramatic increases in public Wi-Fi™ (hereafter referred to as Wi-Fi) availability have occurred over the last decade. Although Wi-Fi provides convenient network connectivity, it has significant security vulnerabilities. Despite widespread knowledge of potential vulnerabilities of public Wi-Fi, most people simply connect to it in public places. We investigated the individual calculus behind risk-taking behavior based on the theoretical foundations of risk taking behavior, technology threat avoidance theory, prospect theory, and self-determination theory. Using survey data collected from 1313 respondents in the United States, this study found that avoidance motivation, risk averting propensity, and intrinsic and extrinsic motivations affect intention to use public Wi-Fi. In addition, our results indicate that avoidance motivation is related to safeguard effectiveness, safeguard cost, and perceived threat, while risk averting propensity is associated with positive outcome history, age, gender, and education attainment.


Similar content being viewed by others
Notes
The difference in Chi-squares is 391.33 with 98 degrees of freedom, which is not significant.
References
Aime, C., & Lioy. (2007). Dependability in wireless networks: Can we rely on Wifi? IEEE SECURITY & PRIVACY, 5, 23–29.
Anderson, & Agarwal. (2011). The digitization of healthcare: Boundary risks, emotion, and consumer willingness to disclose personal health information. Information Systems Research, 22(3), 469–490.
Arachchilage, & Love. (2013). A game design framework for avoiding phishing attacks. Computers in Human Behavior, 29(3), 706–714.
Arachchilage, & Love. (2014). Security awareness of computer users: A phishing threat avoidance perspective. Computers in Human Behavior, 38, 304–312.
Bachmann, M. (2010). The risk propensity and rationality of computer hackers. International Journal of Cyber Criminology, 4(1/2), 643–656.
Barlow, W., Ormond, & Dennis. (2013). Don't make excuses! Discouraging neutralization to reduce it policy violation. Computers & Security, 39, 145–159.
Becker, D., Sorensen, G., Borch-Johnsen, M., et al. (1996). Prediction of risk of liver disease by alcohol intake, sex, and age: A prospective population study. Hepatology, 23(5), 1025–1029.
Bencie (2017). Why You Really Need to Stop Using Public Wi-Fi. https://hbr.org/2017/05/why-you-really-need-to-stop-using-public-wi-fi. Accessed March 20 2019.
Blank, G., Bolsover, G., & Dubois, E. (2014, August). A new privacy paradox: Young people and privacy on social network sites. In Prepared for the Annual Meeting of the American Sociological Association (Vol. 17). (see https://papers.ssrn.com/sol3/papers.cfm?abstract_id=2479938).
Braverman, & Frost. (2012). Matching the graphical display of data to avoidance versus approach motivation increases outcome expectancies. The Journal of Social Psychology, 152(2), 228–245.
Buhrmester, K., & Gosling. (2011). Amazon's mechanical Turk: A new source of inexpensive, yet high-quality, data? Perspectives on Psychological Science, 6(1), 3–5.
Byrne. (2005). How do consumers evaluate risk in financial products? Journal of Financial Services Marketing, 10(1), 21–36.
Carpenter, Y., Barrett, & McLeod. (2019). Refining technology threat avoidance theory. Communications of the Association for Information Systems, 44(1), 22.
CBSNEWS (2010). Dangers of Free Public Wifi. http://www.cbsnews.com/2100-501083_162-6657962.html.
Chang, D. V., & Chiremba. (2004). Determinants of subjective and objective risk tolerance. Journal of Personal Finance, 3(3), 53–67.
Chin, W. W. (2010). How to write up and report PLS analyses. In Handbook of partial least squares (pp. 655–690). Springer, Berlin, Heidelberg.
CISCO (2012). The Future of Hotspots: Making Wi-Fi as Secure and Easy to Use as Cellular. https://www.icg.isy.liu.se/exjobb/doc/ext/white_paper_c11-649337.pdf.
Correal (2020). Just a Quarter of New York’s Wi-Fi Kiosks Are Up. Guess Where. https://www.nytimes.com/2019/12/06/nyregion/linknyc-wifi-connections.html#:~:text=The%20company%20behind%20LinkNYC%2C%20CityBridge,of%20the%207%2C500%20promised%20kiosks. Accessed August 26 2020.
Cox. (2012). Information systems user security: A structured model of the knowing–doing gap. Computers in Human Behavior, 28(5), 1849–1858.
Crossler, L., Loraas, & Trinkle. (2014). Understanding compliance with bring your own device policies utilizing protection motivation theory: Bridging the intention-behavior gap. Journal of Information Systems, 28(1), 209–226.
Curry, G., & McBride. (1997). Reasons for quitting: Intrinsic and extrinsic motivation for smoking cessation in a population-based sample of smokers. Addictive Behaviors, 22(6), 727–739.
Cutler, D. M., & Lleras-Muney, A. (2006). Education and health: evaluating theories and evidence. In National Poverty Center Working Paper Series# 06-19. National Poverty Center, University of Michigan.
Das, & Teng. (2001). Strategic risk behaviour and its temporalities: Between risk propensity and decision context. Journal of Management Studies, 38(4), 515–534.
Davis, B., & Warshaw. (1992). Extrinsic and intrinsic motivation to use computers in the workplace 1. Journal of Applied Social Psychology, 22(14), 1111–1132.
den Broeck, V., Poels, & Walrave. (2015). Older and Wiser? Facebook Use, Privacy Concern, and Privacy Protection in the Life Stages of Emerging, Young, and Middle Adulthood. Social Media+ Society, 1(2), 2056305115616149.
der Heijden, V. (2004). User acceptance of hedonic information systems. MIS Quarterly, 28, 695–704.
Dewett. (2006). Exploring the role of risk in employee creativity. The Journal of Creative Behavior, 40(1), 27–45.
Dinev, & Hart. (2006). An extended privacy Calculus model for E-commerce transactions. Information Systems Research, 17(1), 61–80,100.
Dinev, H., & Mullen. (2008). Internet privacy concerns and beliefs about government surveillance–an empirical investigation. The Journal of Strategic Information Systems, 17(3), 214–233.
Dulebohn, & Murray. (2007). Retirement savings behavior of higher education employees. Research in Higher Education, 48(5), 545–582.
Dymond, S., Roche, D. H., & Freegard. (2012). Safe from harm: Learned, instructed, and symbolic generalization pathways of human threat-avoidance. PLoS One, 7(10), e47539.
Elliot, E., & Harmon-Jones. (2013). Approach–avoidance motivation and emotion: Convergence and divergence. Emotion Review, 5(3), 308–311.
Farahmand, & Spafford. (2013). Understanding insiders: An analysis of risk-taking behavior. Information Systems Frontiers, 15(1), 5–15.
Ferro, & Potorti. (2005). Bluetooth and Wi-fi wireless protocols: A survey and a comparison. Wireless Communications, IEEE, 12(1), 12–26. https://doi.org/10.1109/mwc.2005.1404569.
Fornell, & Larcker. (1981). Structural equation models with unobservable variables and measurement error: Algebra and statistics. Journal of Marketing Research, 382–388.
Foster, S., & Goff. (2009). Why do narcissists take more risks? Testing the roles of perceived risks and benefits of risky behaviors. Personality and Individual Differences, 47(8), 885–889.
Gnambs, A., & Oeberst. (2015). Red color and risk-taking behavior in online environments. PLoS One, 10(7), e0134033.
Gold. (2011). Cracking wireless networks. Network Security, 2011(11), 14–18. https://doi.org/10.1016/s1353-4858(11)70120-9.
Granié. (2009). Effects of gender, sex-stereotype conformity, age and internalization on risk-taking among adolescent pedestrians. Safety Science, 47(9), 1277–1283.
Guardian (2011). Wi-Fi Security Flaw for Smartphones Puts Your Credit Cards at Risk. http://www.guardian.co.uk/technology/2011/apr/25/wifi-security-flaw-smartphones-risk. Accessed March 25 2019.
Hamid, R., Taib, & Thurasamy. (2014). The relationship between risk propensity, risk perception and risk-taking behaviour in an emerging market. International Journal of Banking and Finance, 10(1), 134–147.
He, & Mittal. (2007). The effect of decision risk and project stage on escalation of commitment. Organizational Behavior and Human Decision Processes, 103(2), 225–237. https://doi.org/10.1016/j.obhdp.2007.01.002.
HelpNetSecurity (2016). Public Wi-Fi: Users’ Habits and Perceptions of Risk. https://www.helpnetsecurity.com/2016/10/19/public-wi-fi-users-habits-risk/. Accessed Janunary 19 2020.
Herath, C., Wang, B., Wilbur, & Rao. (2014). Security services as coping mechanisms: An investigation into user intention to adopt an email authentication service. Information Systems Journal, 24(1), 61–84.
Hoffman (2017). Wi-Fi Vs. Ethernet: How Much Better Is a Wired Connection? https://www.howtogeek.com/217463/wi-fi-vs.-ethernet-how-much-better-is-a-wired-connection/. Accessed March 20 2019.
Holden, D., & Hicks. (2013). Assessing the reliability of the M5-120 on Amazon’s mechanical Turk. Computers in Human Behavior, 29(4), 1749–1754.
Hongsranagon, K., Hongpukdee, H., & Deelertyuenyong. (2011). Traffic risk behavior and perceptions of Thai motorcyclists: A case study. IATSS research, 35(1), 30–33.
Hoy, & Milne. (2010). Gender differences in privacy-related measures for young adult Facebook users. Journal of Interactive Advertising, 10(2), 28–45.
Huff, & Prybutok. (2008). Information systems Project Management decision making: The influence of experience and risk propensity. Project Management Journal, 39(2), 34–47.
Hulland. (1999). Use of partial least squares (Pls) in strategic management research: A review of four recent studies. Strategic Management Journal, 20, 195–204.
Iscrupe (2019). Is Public Wi-Fi Safe? No, but It Is Necessary. https://www.allconnect.com/blog/is-public-wifi-safe. Accessed January 19 2020.
Jardine. (2020). The case against commercial antivirus software: Risk homeostasis and information problems in Cybersecurity. Risk Analysis., 40, 1571–1588.
Jonah. (1986). Accident risk and risk-taking behaviour among young drivers. Accident Analysis & Prevention, 18(4), 255–271.
Keil, W., Turk, D.-R., & Nulden. (2000). An investigation of risk perception and risk propensity on the decision to continue a software development project. Journal of Systems and Software, 53(2), 145–157.
Kelleher (2019). Why You Should Never Use Free Airport Wi-Fi. https://www.forbes.com/sites/suzannerowankelleher/2019/09/24/why-you-should-never-use-free-airport-wi-fi/#7dc14bd97d3a. Accessed August 26 2020.
Kim (2019). The Hidden Costs of ‘Free’ Wifi. https://www.webroot.com/blog/2019/03/13/the-hidden-costs-of-free-wifi/. Accessed August 26 2020.
Kindberg, T., O'Neill, E., Bevan, C., Kostakos, V., Stanton Fraser, D., & Jay, T. (2008, April). Measuring trust in wi-fi hotspots. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (pp. 173–182).
Kirby. (2001). Understanding what works and what Doesn't in reducing adolescent sexual risk-taking. Family Planning Perspectives, 33(6), 276–281.
Klasnja, C., Jung, G., LeGrand, P., et al. (2009). "When I Am on Wi-Fi, I Am Fearless": Privacy Concerns & Practices in Eeryday Wi-Fi Use. Paper presented at the proceedings of the SIGCHI conference on human factors in computing systems. Boston: MA, USA.
Korzaan, B., & Greer. (2009). Demystifying personality and privacy: An empirical investigation into antecedents of concerns for information privacy. Journal of Behavioral Studies in Business, 1, 1.
Laric, P., & Katsanis. (2009). Consumer concerns for healthcare information privacy: A comparison of us and Canadian perspectives. Research in Healthcare Financial Management, 12(1), 93.
Leavitt. (2011). Mobile security: Finally a serious problem? Computer, 44(6), 11–14. https://doi.org/10.1109/mc.2011.184.
Lee, C., & Chen. (2005). Acceptance of internet-based learning medium: The role of extrinsic and intrinsic motivation. Information & Management, 42(8), 1095–1104.
Lehr, & McKnight. (2003). Wireless internet access: 3g Vs. Wifi? Telecommunications Policy, 27(5–6), 351–370. https://doi.org/10.1016/s0308-5961(03)00004-1.
Lemstra, & Hayes. (2009). License-exempt: Wi-fi complement to 3g. Telematics and Informatics, 26(3), 227–239. https://doi.org/10.1016/j.tele.2008.11.003.
Li, S., & Xu. (2011). The role of affect and cognition on online Consumers’ decision to disclose personal information to unfamiliar online vendors. Decision Support Systems, 51(3), 434–445.
Li, L., Steinberg, K.-C., Kim-Spoon, & Deater-Deckard. (2019). Longitudinal link between trait motivation and risk-taking behaviors via neural risk processing. Developmental Cognitive Neuroscience, 40, 100725.
Liang, & Xue. (2009). Avoidance of information Tehchnology threats: A theoretical perspective. [article]. MIS Quarterly, 33(1), 71–90.
Liang, & Xue. (2010). Understanding security behaviors in personal computer usage: A threat avoidance perspective*. Journal of the Association for Information Systems, 11(7), 394–413.
Lin, F. T. (2009). Does the risk aversion vary with different background risk of households. International Research Journal of Finance and Economics, 34(34), 69–82.
Luarn, & Lin. (2005). Toward an understanding of the behavioral intention to use Mobile banking. Computers in Human Behavior, 21(6), 873–891.
MacCrimmon, & Wehrung. (1990). Characteristics of risk taking executives. Management Science, 36(4), 422–435. https://doi.org/10.2307/2632007.
McCormac, Z., Parsons, C., Butavicius, & Pattinson. (2017). Individual differences and information security awareness. Computers in Human Behavior, 69, 151–156.
Miller. (2001). Facing the challenge of wireless security. Computer, 34(7), 16–18. https://doi.org/10.1109/2.933495.
Miltgen, & Peyrat-Guillard. (2014). Cultural and generational influences on privacy concerns: A qualitative study in seven European countries. European Journal of Information Systems, 23(2), 103–125.
Mongin. (1997). Expected Utility Theory (Handbook of Economic Methodology). London: Edward Elgar.
Moody, G., & Dunn. (2017). Which phish get caught? An exploratory study of individuals′ susceptibility to phishing. European Journal of Information Systems, 26(6), 564–584.
Mun, & Hwang. (2003). Predicting the use of web-based information systems: Self-efficacy, enjoyment, learning goal orientation, and the technology acceptance model. International Journal of Human-Computer Studies, 59(4), 431–449.
Murty, V., & Rao. (2012). Performance evaluation of Wi-fi comparison with Wimax networks. International Journal of Distributed and Parallel Systems (IJDPS), 3(1), 321–329.
Nobles, P., & Horrocks, P. A. (2004). Vulnerability of IEEE802. 11 WLANs to MAC layer DoS attacks.
Pablo. (1997). Reconciling predictions of decision making under risk: Insights from a Reconceptualized model of risk behaviour. Journal of Managerial Psychology, 12(1), 4–20.
Peace, G., & Thong. (2003). Software piracy in the workplace: A model and empirical test. Journal of Management Information Systems, 20(1), 153–178.
Pelletier, F., Vallerand, T., Briere, & Blais. (1995). Toward a new measure of intrinsic motivation, extrinsic motivation, and Amotivation in sports: The sport motivation scale (Sms). Journal of Sport and Exercise Psychology, 17, 35–35 53.
Podsakoff, T., Grover, & Huber. (1984). Situational moderators of leader reward and punishment behaviors: Fact or fiction? Organizational Behavior and Human Performance, 34(1), 21–63.
Powell, & Ansic. (1997). Gender differences in risk behaviour in financial decision-making: An experimental analysis. Journal of Economic Psychology, 18(6), 605–628.
PRNewswire (2012). Almost 80% Believe Free Wi-Fi Can Lead to Identity Theft, Study Finds. http://www.prnewswire.com/news-releases/almost-80-believe-free-wi-fi-can-lead-to-identity-theft-study-finds-174740441.html. Accessed May 13 2015.
Raghunathan. (1999). Impact of information quality and decision-maker quality on decision quality: A theoretical model and simulation analysis. Decision Support Systems, 26(4), 275–286.
Rainie, L., Kiesler, S., Kang, R., Madden, M., Duggan, M., Brown, S., & Dabbish, L. (2013). Anonymity, privacy, and security online. Pew Research Center, 5.
Reddy, S, R., Rijutha, A., & Reddy (2010). Wireless Hacking - a Wifi Hack by Cracking Wep. In Education Technology and Computer (ICETC), 2010 2nd International Conference on, 22–24 June 2010 2010 (Vol. 1, pp. 189–193). https://doi.org/10.1109/icetc.2010.5529269.
Ruedl, P., Sommersacher, G., Kopp, N., et al. (2010). Factors associated with self-reported risk-taking behaviour on ski slopes. British Journal of Sports Medicine, 44(3), 204–206.
Ryan, & Deci. (2000). Intrinsic and extrinsic motivations: Classic definitions and new directions. Contemporary Educational Psychology, 25(1), 54–67.
Satz, M., Miller, S., McArthur, C., et al. (1993). Low. Education as a Possible Risk Factor for Cognitive Abnormalities in Hiv-1: Findings from the Multicenter Aids Cohort Study (Macs)., 6(5), 503–511.
Schoemaker. (1982). The expected utility model: Its variants, purposes, evidence and limitations. Journal of Economic Literature, 20(2), 529–563.
Schomakers, L., Müllmann, & Ziefle. (2019). Internet users’ perceptions of information sensitivity–insights from Germany. International Journal of Information Management, 46, 142–150.
Scott, B., Andersen, W., Voeks, D., et al. (2007). Testing the risk compensation hypothesis for safety helmets in Alpine skiing and snowboarding. Injury Prevention, 13(3), 173–177.
Sebbar, Boulahya, Mezzour, & Boulmalf (2016). An Empirical Study of Wifi Security and Performance in Morocco-Wardriving in Rabat. In 2016 International Conference on Electrical and Information Technologies (ICEIT), 2016 (pp. 362–367): IEEE.
Shadish, W. R., Cook, T. D., & Campbell, D. T. (2002). Experimental and quasi-experimental designs for generalized causal inference, by William R. Shedish, Thomas D. Cook, Donald T. Campbell. Boston Houghton Mifflin.
Sharma, Y., & Crawford. (2009). Estimating the effect of common method variance: The method—Method pair technique with an illustration from tam research. MIS Quarterly, 33, 473–490.
Sheehan. (1999). An investigation of gender differences in on-line privacy concerns and resultant behaviors. Journal of Interactive Marketing, 13(4), 24–38.
Shim, C., & Lee. (2009). Empirical analysis of risk-taking behavior in it platform migration decisions. Computers in Human Behavior, 25(6), 1290–1305.
Simbana, S., Lopez, G., Tipantuna, C., & Sanchez, F. (2018). Vulnerability analysis toolkit for IEEE 802.11 wireless networks: a practical approach. In 2018 International Conference on Information Systems and Computer Science (INCISCOS) (pp. 227–232). IEEE.
Sitkin, & Weingart. (1995). Determinants of risky decision making behaviors: A test of the mediating role of risk perceptions and propensity. [article]. Academy of Management Journal, 38(6), 1573–1592. https://doi.org/10.2307/256844.
Small, S. A., & Luster, T. (1994). Adolescent sexual activity: An ecological, risk-factor approach. Journal of Marriage and the Family, 181–192.
Statista (2019). Number of Public Wi-Fi Hotspots Worldwide from 2016 to 2022. https://www.statista.com/statistics/677108/global-public-wi-fi-hotspots/. Accessed January 23 2019.
Straub, L., & Karahanna-Evaristo. (1995). Measuring system usage: Implications for is theory testing. Management Science, 41(8), 1328–1342.
Sun, A., & Koong (2011). The more secure the better? A Study of Information Security Readiness. Industrial Management & Data Systems.
Swanson, U., & Lank. (2010). Naïve security in a Wi-fi world. In M. Nishigaki, A. Jøsang, Y. Murayama, & S. Marsh (Eds.), Trust Management Iv (Vol. 321, pp. 32-47, Ifip advances in information and communication technology). Berlin Heidelberg: Springer.
Swierczek, & Ha. (2003). Entrepreneurial orientation, uncertainty avoidance and firm performance: An analysis of Thai and Vietnamese Smes. The International Journal of Entrepreneurship Innovation, 4(1), 46–58.
Symantec (2018). 2017 Norton Wi-Fi Risk Report. https://www.symantec.com/content/dam/symantec/docs/reports/2017-norton-wifi-risk-report-global-results-summary-en.pdf. Accessed March 25 2019.
Taylor, & Strutton. (2010). Has E-marketing come of age? Modeling historical influences on post-adoption era internet consumer behaviors. Journal of Business Research, 63(9), 950–956.
Taylor, & Todd. (1995). Understanding information technology usage: A test of competing models. Information Systems Research, 6(2), 144–176.
TeleGeography (2017). Kt Opens up Access to 100,000 Wi-Fi Hotspots. https://www.telegeography.com/products/commsupdate/articles/2017/08/14/kt-opens-up-access-to-100000-wi-fi-hotspots/. Accessed January 23 2019.
Teo, L., & Lai. (1999). Intrinsic and extrinsic motivation in internet usage. Omega, 27(1), 25–37.
Tu, Z., & Yuan, Y. (2012). Understanding user's behaviors in coping with security threat of mobile devices Loss and theft. In 2012 45th Hawaii International Conference on System Sciences (pp. 1393-1402). IEEE.
Turner, & McClure. (2003). Age and gender differences in risk-taking behaviour as an explanation for high incidence of motor vehicle crashes as a driver in young males. Injury Control and Safety Promotion, 10(3), 123–130.
Tversky, & Kahneman. (1992). Advances in Prospect theory: Cumulative representation of uncertainty. Journal of Risk uncertainty, 5(4), 297–323.
Vansteenkiste, L., & Deci. (2006). Intrinsic versus extrinsic goal contents in self-determination theory: Another look at the quality of academic motivation. Educational Psychologist, 41(1), 19–31.
Vater, M., & Roepke. (2018). Does a narcissism epidemic exist in modern Western societies? Comparing narcissism and self-esteem in east and West Germany. PLoS One, 13(1), e0188287.
Venkatesh. (1999). Creation of favorable user perceptions: Exploring the role of intrinsic motivation. MIS Quarterly, 23(2), 239–260.
Venkatesh, M., Davis, & Davis. (2003). User acceptance of information technology: Toward a unified view. MIS Quarterly, 27(3), 425–478.
Warkentin, & Siponen. (2015). An enhanced fear appeal rhetorical framework: Leveraging threats to the human asset through sanctioning rhetoric. MIS Quarterly, 39(1), 113–134.
Watts. (2016). Secure authentication is the only solution for vulnerable public Wifi. Computer Fraud & Security, 2016(1), 18–20.
Witemyre, S. J., Abegaz, T. T., Payne, B. R., & Mady, A. (2018). Hijacking wireless communications using WiFi Pineapple NANO as a rogue access point. 2018 Kennesaw State University Conference on Cybersecurity Education.
Wolburg. (2001). The “risky business” of binge drinking among college students: Using risk models for Psas and anti-drinking campaigns. Journal of Advertising, 30(4), 23–39.
Wong. (2005). The role of risk in making decisions under escalation situations. Applied Psychology, 54(4), 584–607.
Woon, I., Tan, G. W., & Low, R. (2005). A protection motivation theory approach to home wireless security. 2005 International Conference on Information Systems (ICIS).
Workman, B., & Straub. (2008). Security lapses and the omission of information security measures: A threat control model and empirical test. Computers in Human Behavior, 24(6), 2799–2816.
Woyke (2017). The Startup Behind Nyc’s Plan to Replace Phone Booths with 7,500 Connected Kiosks. https://www.technologyreview.com/s/608281/the-startup-behind-nycs-plan-to-replace-phone-booths-with-7500-connected-kiosks/. Accessed January 23 2019.
Yao, S., & Wang. (2011). Decomposing the age effect on risk tolerance. The Journal of Socio-Economics, 40(6), 879–887.
Yim, & Han. (2013). An Investigation of the Factors That Influence the Compliance to Information Security Policy: From Risk Compensation Theory. The Journal of Digital Policy and Management, 11(10), 153–168.
Yoon, & Kim. (2013). Understanding computer security behavioral intention in the workplace: An empirical study of Korean firms. Information Technology People, 26(4), 401–419.
Yordanova, I., & Alexandrova-Boshnakova, I. (2011). Gender effects on risk-taking of entrepreneurs: Evidence from Bulgaria. International Journal of Entrepreneurial Behavior Research, 17(3), 272–295.
Youn. (2009). Determinants of online privacy concern and its influence on privacy protection behaviors among young adolescents. Journal of Consumer Affairs, 43(3), 389–418.
Zafft, & Agu (2012). Malicious Wifi Networks: A First Look. In Local Computer Networks Workshops (LCN Workshops), 2012 IEEE 37th Conference on, 22–25 Oct. 2012 2012 (pp. 1038–1043). https://doi.org/10.1109/LCNW.2012.6424041.
Zhang, R., & Li. (2009). Impact of perceived technical protection on security behaviors. Information Management & Computer Security., 17, 330–340.
Ziegler (2016). Avast Wi-Fi Hack Experiment Demonstrates “Reckless” Behavior of Mobile World Congress Attendees. https://www.businesswire.com/news/home/20160222005555/en/Avast-Wi-Fi-Hack-Experiment-Demonstrates-%E2%80%9CReckless%E2%80%9D-Behavior. Accessed August 26 2020.
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher’s Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Appendix 1
Appendix 1
Rights and permissions
About this article
Cite this article
Choi, H.S., Carpenter, D. & Ko, M.S. Risk Taking Behaviors Using Public Wi-Fi™. Inf Syst Front 24, 965–982 (2022). https://doi.org/10.1007/s10796-021-10119-7
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s10796-021-10119-7