Al Helaly, YasserDhillon, GurpreetOliveira, Tiago2024-01-312024-01-312024-01-291449-8618PURE: 82577253PURE UUID: 5c3ef1ab-38ee-47e5-be32-772fc5aaadc7Scopus: 85190125945WOS: 001156887500001ORCID: /0000-0001-6523-0809/work/151990299ORCID: /0000-0001-5183-7554/work/158234341http://hdl.handle.net/10362/162918Al Helaly, Y., Dhillon, G., & Oliveira, T. (2024). Mobile Identity Protection: The Moderation Role of Self-Efficacy. Australasian Journal of Information Systems, 28, 1-40. https://doi.org/10.3127/ajis.v28.4397 --- The authors would like to thank Fundação para a Ciência e a Tecnologia (FCT) regarding the program UIDB/04152/2020 - Centro de Investigação em Gestão de Informação — MagIC (NOVA IMS).The rapid growth of mobile applications and the associated increased dependency on digital identity raises the growing risk of identity theft and related fraud. Hence, protecting identity in a mobile environment is a problem. This study develops a model that examines the role of identity protection self-efficacy in increasing users’ motivation intentions to achieve actual mobile identity protection. Our research found that self-efficacy significantly affects the relationship between users’ perceived threat appraisal and their motivational intentions for identity protection. The relation between mobile users’ protection, motivational intentions, and actual mobile identity protection actions was also found to be significant. Additionally, the findings revealed the considerable impact of awareness in fully mediating between self-efficacy and actual identity protection. The model and its hypotheses are empirically tested through a survey of 383 mobile users, and the findings are validated through a panel of experts, thus confirming the impact of self-efficacy on an individual’s identity protection in the mobile context.40735982engMobile identity protectionidentity theftself-efficacythreat appraisalidentity protection awarenessmobile contextmotivationInformation SystemsBusiness, Management and Accounting (miscellaneous)Human-Computer InteractionInformation Systems and ManagementSDG 8 - Decent Work and Economic GrowthMobile Identity Protectionjournal article10.3127/ajis.v28.4397The Moderation Role of Self-Efficacyhttps://www.scopus.com/pages/publications/85190125945https://www.webofscience.com/wos/woscc/full-record/WOS:001156887500001