skip to main content
research-article

New Phone, Who Dis? Modeling Millennials’ Backup Behavior

Published:04 December 2018Publication History
Skip Abstract Section

Abstract

Given the ever-rising frequency of malware attacks and other problems leading people to lose their files, backups are an important proactive protective behavior in which users can engage. Backing up files can prevent emotional and financial losses and improve overall user experience. Yet, we find that less than half of young adults perform mobile or computer backups regularly. To understand why, we model the factors that drive mobile and computer backup behavior, and changes in that behavior over time, using data from a panel survey of 384 diverse young adults. We develop a set of models that explain 37% and 38% of the variance in reported mobile and computer backup behaviors, respectively. These models show consistent relationships between Internet skills and backup frequency on both mobile and computer devices. We find that this relationship holds longitudinally: increases in Internet skills lead to increased frequency of computer backups. This article provides a foundation for understanding what drives young adults’ backup behavior. It concludes with recommendations for motivating people to back up, and for future work, modeling similar user behaviors.

References

  1. 2008. Protecting Your Digital Life. Technical Report. Webroot. Retrieved from https://www.webroot.com/shared/pdf/2008_Consumer_SOIS-Protecting_Your_Digital_Life.pdf.Google ScholarGoogle Scholar
  2. 2010. The Costs Associated with Disorganization. Technical Report. Brother International Corporation.Google ScholarGoogle Scholar
  3. 2016. Back up and restore your PC. Retrieved from https://support.microsoft.com/en-us/help/17127/windows-back-up-restore.Google ScholarGoogle Scholar
  4. 2017. iCloud: Restore or set up your iOS device from iCloud. https://support.apple.com/kb/ph12521?locale=enUS.Google ScholarGoogle Scholar
  5. Robert P. Abelson. 1985. A variance explanation paradox: When a little is a lot. Psychological Bulletin 97, 1 (1985), 129.Google ScholarGoogle ScholarCross RefCross Ref
  6. Paul Ambrose and Ananth Chiravuri. 2010. An empirical investigation of cloud computing for personal use. 2010 Proceedings MWAIS.Google ScholarGoogle Scholar
  7. Bruce J. Arneklev, Harold G. Grasmick, Charles R. Tittle, and Robert J. Bursik. 1993. Low self-control and imprudent behavior. Journal of Quantitative Criminology 9, 3 (Sept. 1993), 225--247.Google ScholarGoogle ScholarCross RefCross Ref
  8. Samuel J. Best and Brian S. Krueger. 2005. Analyzing the representativeness of Internet political participation. Political Behavior 27, 2 (2005), 183--216.Google ScholarGoogle ScholarCross RefCross Ref
  9. Anol Bhattacherjee and Sang Cheol Park. 2014. Why end-users move to the cloud: A migration-theoretic analysis. European Journal of Information Systems 23, 3 (2014), 357--372.Google ScholarGoogle ScholarCross RefCross Ref
  10. Jan Lauren Boyles, Aaron Smith, and Mary Madden. 2012. Privacy and data management on mobile devices. Pew Internet 8 American Life Project 4. Retrieved from http://www.privacylives.com/wp-content/uploads/2012/09/PIPMobilePrivacyManagement-092012.pdf.Google ScholarGoogle Scholar
  11. Daniel Burda and Frank Teuteberg. 2014. The role of trust and risk perceptions in cloud archiving: Results from an empirical study. The Journal of High Technology Management Research 25, 2 (Jan. 2014), 172--187.Google ScholarGoogle ScholarCross RefCross Ref
  12. Pedro Casas and Raimund Schatz. 2014. Quality of experience in cloud services: Survey and measurements. Computer Networks 68, Supplement C (Aug. 2014), 149--165.Google ScholarGoogle Scholar
  13. Marshini Chetty, Richard Banks, A. J. Brush, Jonathan Donner, and Rebecca Grinter. 2012. You’re capped: Understanding the effects of bandwidth caps on broadband use in the home. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems. ACM, 3021--3030. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. Jason W. Clark, Peter Snyder, Damon McCoy, and Chris Kanich. 2015. “I saw images I didn’t even know I had:” Understanding user perceptions of cloud storage privacy. In Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems (CHI’15). ACM, New York, NY, 1641--1644. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. R. E. Crossler. 2010. Protection motivation theory: Understanding determinants to backing up personal data. In Proceedings of the 2010 43rd Hawaii International Conference on System Sciences. 1--10. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. Kerry Dobransky and Eszter Hargittai. 2016. Unrealized potential: Exploring the digital disability divide. Poetics 58 (2016), 18--28.Google ScholarGoogle ScholarCross RefCross Ref
  17. Idilio Drago, Enrico Bocchi, Marco Mellia, Herman Slatman, and Aiko Pras. 2013. Benchmarking personal cloud storage. In Proceedings of the 2013 Conference on Internet Measurement Conference (IMC’13). ACM, New York, NY, 205--212. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. Idilio Drago, Marco Mellia, Maurizio M. Munafo, Anna Sperotto, Ramin Sadre, and Aiko Pras. 2012. Inside Dropbox: Understanding personal cloud storage services. In Proceedings of the 2012 Internet Measurement Conference (IMC’12). ACM, New York, NY, 481--494. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. Maeve Duggan and Joanna Brenner. 2013. The Demographics of Social Media Users, 2012. Vol. 14. Pew Research Center’s Internet 8 American Life Project Washington, D.C.Google ScholarGoogle Scholar
  20. Renato Frey, Andreas Pedroni, Rui Mata, Jörg Rieskamp, and Ralph Hertwig. 2017. Risk preference shares the psychometric structure of major psychological traits. Science Advances 3, 10 (2017), e1701381.Google ScholarGoogle ScholarCross RefCross Ref
  21. Eszter Hargittai and Yuli Patrick Hsieh. 2012. Succinct survey measures of web-use skills. Social Science Computer Review 30, 1 (2012), 95--107. Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. Eszter Hargittai and Eden Litt. 2012. Becoming a tweep: How prior online experiences influence Twitter use. Information, Communication 8 Society 15, 5 (2012), 680--702.Google ScholarGoogle Scholar
  23. Wenjin Hu, Tao Yang, and Jeanna N. Matthews. 2010. The good, the bad and the ugly of consumer cloud storage. ACM SIGOPS Operating Systems Review 44, 3 (2010), 110--115. Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. Daniel Kahneman, Andrew M. Rosenfield, Linnea Gandhi, and Tom Blaser. 2016. Noise: How to overcome the high, hidden cost of inconsistent decision making. Harvard Business Review 94, 10 (2016), 38--46.Google ScholarGoogle Scholar
  25. Ruogu Kang, Laura Dabbish, Nathaniel Fruchter, and Sara Kiesler. 2015. “My data just goes everywhere:” User mental models of the Internet and implications for privacy and security. In Symposium on Usable Privacy and Security (SOUPS). USENIX Association Berkeley, CA, 39--52. Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. Bilge Karabacak and Ibrahim Sogukpinar. 2005. ISRAM: Information security risk analysis method. Computers 8 Security 24, 2 (2005), 147--159. Google ScholarGoogle ScholarDigital LibraryDigital Library
  27. Eyong B. Kim. 2005. Information security awareness status of full time employees. The Business Review, Cambridge 3, 2 (2005), 219--226.Google ScholarGoogle Scholar
  28. Andy Klein. 2017. Backup Awareness Survey, Our 10th Year. Retrieved from https://www.backblaze.com/blog/backup-awareness-survey/.Google ScholarGoogle Scholar
  29. Susie D. Lamborn, Nina S. Mounts, Laurence Steinberg, and Sanford M. Dornbusch. 1991. Patterns of competence and adjustment among adolescents from authoritative, authoritarian, indulgent, and neglectful families. Child Development 62, 5 (1991), 1049--1065.Google ScholarGoogle ScholarCross RefCross Ref
  30. Kevin Lewis, Jason Kaufman, and Nicholas Christakis. 2008. The taste for privacy: An analysis of college student privacy settings in an online social network. Journal of Computer-Mediated Communication 14, 1 (2008), 79--100.Google ScholarGoogle ScholarCross RefCross Ref
  31. Yuan Li and Kuo-chung Chang. 2012. A study on user acceptance of cloud computing: A multi-theoretical perspective. (2012). Retrieved from http://aisel.aisnet.org/amcis2012/proceedings/AdoptionDiffusionIT/19/.Google ScholarGoogle Scholar
  32. Eden Litt and Eszter Hargittai. 2014. Smile, snap, and share? A nuanced approach to privacy and online photo-sharing. Poetics 42 (2014), 1--21.Google ScholarGoogle ScholarCross RefCross Ref
  33. Arunesh Mathur, Brent Schlotfeldt, and Marshini Chetty. 2015. A mixed-methods study of mobile users’ data usage practices in South Africa. In Proceedings of the 2015 ACM International Joint Conference on Pervasive and Ubiquitous Computing. ACM, 1209--1220. Google ScholarGoogle ScholarDigital LibraryDigital Library
  34. Philip Menard, Robert Gatlin, and Merrill Warkentin. 2014. Threat protection and convenience: Antecedents of cloud-based data backup. Journal of Computer Information Systems 55, 1 (Sept. 2014), 83--91.Google ScholarGoogle ScholarCross RefCross Ref
  35. Adriana Mijuskovic and Mexhid Ferati. 2015. User awareness of existing privacy and security risks when storing data in the cloud. In Proceedings of the International Conference on e-Learning, Vol. 15. 268--273.Google ScholarGoogle Scholar
  36. Sarah Mitroff. 2015. Back to basics: The three easiest ways to back up your files. Retrieved from https://www.cnet.com/how-to/easiest-ways-to-backup-your-files/.Google ScholarGoogle Scholar
  37. Mozy. 2012. Lost 8 Found: Data Loss Research. Retrieved from https://mozy.com/about/news/reports/lost-and-found/.Google ScholarGoogle Scholar
  38. I. Muslukhov, Y. Boshmaf, C. Kuo, J. Lester, and K. Beznosov. 2012. Understanding users’ requirements for data protection in smartphones. In Proceedings of the 2012 IEEE 28th International Conference on Data Engineering Workshops. 228--235. Google ScholarGoogle ScholarDigital LibraryDigital Library
  39. Maurizio Naldi and Loretta Mastroeni. 2013. Cloud storage pricing: A comparison of current practices. In Proceedings of the 2013 International Workshop on Hot Topics in Cloud Services (HotTopiCS’13). ACM, New York, NY, 27--34. Google ScholarGoogle ScholarDigital LibraryDigital Library
  40. Sergio Picazo-Vela, Shih Yung Chou, Arlyn J. Melcher, and John M. Pearson. 2010. Why provide an online review? An extended theory of planned behavior and the role of big-five personality traits. Computers in Human Behavior 26, 4 (2010), 685--696. Google ScholarGoogle ScholarDigital LibraryDigital Library
  41. Karen Renaud, Melanie Volkamer, and Arne Renkema-Padmos. 2014. Why doesn’t Jane protect her privacy? In Proceedings of the International Symposium on Privacy Enhancing Technologies Symposium. Springer, 244--262.Google ScholarGoogle ScholarCross RefCross Ref
  42. Paul Ruggiero and Matthew Heckathorn, A. 2012. Data backup options. Retrieved from http://www.emacromall.com/techpapers/Data%20Backup%20Options.pdf.Google ScholarGoogle Scholar
  43. J. P. Scheible. 2002. A survey of storage options. Computer 35, 12 (Dec. 2002), 42--46. Google ScholarGoogle ScholarDigital LibraryDigital Library
  44. L. Tian, C. Lin, and Y. Ni. 2010. Evaluation of user behavior trust in cloud computing. In Proceedings of the 2010 International Conference on Computer Application and System Modeling (ICCASM 2010), Vol. 7. V7--567--V7--572.Google ScholarGoogle ScholarCross RefCross Ref
  45. Bindu Trikha. 2010. A journey from floppy disk to cloud storage. International Journal on Computer Science and Engineering 2, 4 (2010), 1449--1452.Google ScholarGoogle Scholar
  46. Alexander Van Deursen and Jan Van Dijk. 2011. Internet skills and the digital divide. New Media 8 Society 13, 6 (2011), 893--911.Google ScholarGoogle Scholar
  47. Ira M. Wasserman and Marie Richmond-Abbott. 2005. Gender and the Internet: Causes of variation in access, level, and scope of use. Social Science Quarterly 86, 1 (2005), 252--270.Google ScholarGoogle ScholarCross RefCross Ref

Index Terms

  1. New Phone, Who Dis? Modeling Millennials’ Backup Behavior

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in

      Full Access

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader
      About Cookies On This Site

      We use cookies to ensure that we give you the best experience on our website.

      Learn more

      Got it!