Abstract
Given the ever-rising frequency of malware attacks and other problems leading people to lose their files, backups are an important proactive protective behavior in which users can engage. Backing up files can prevent emotional and financial losses and improve overall user experience. Yet, we find that less than half of young adults perform mobile or computer backups regularly. To understand why, we model the factors that drive mobile and computer backup behavior, and changes in that behavior over time, using data from a panel survey of 384 diverse young adults. We develop a set of models that explain 37% and 38% of the variance in reported mobile and computer backup behaviors, respectively. These models show consistent relationships between Internet skills and backup frequency on both mobile and computer devices. We find that this relationship holds longitudinally: increases in Internet skills lead to increased frequency of computer backups. This article provides a foundation for understanding what drives young adults’ backup behavior. It concludes with recommendations for motivating people to back up, and for future work, modeling similar user behaviors.
- 2008. Protecting Your Digital Life. Technical Report. Webroot. Retrieved from https://www.webroot.com/shared/pdf/2008_Consumer_SOIS-Protecting_Your_Digital_Life.pdf.Google Scholar
- 2010. The Costs Associated with Disorganization. Technical Report. Brother International Corporation.Google Scholar
- 2016. Back up and restore your PC. Retrieved from https://support.microsoft.com/en-us/help/17127/windows-back-up-restore.Google Scholar
- 2017. iCloud: Restore or set up your iOS device from iCloud. https://support.apple.com/kb/ph12521?locale=enUS.Google Scholar
- Robert P. Abelson. 1985. A variance explanation paradox: When a little is a lot. Psychological Bulletin 97, 1 (1985), 129.Google Scholar
Cross Ref
- Paul Ambrose and Ananth Chiravuri. 2010. An empirical investigation of cloud computing for personal use. 2010 Proceedings MWAIS.Google Scholar
- Bruce J. Arneklev, Harold G. Grasmick, Charles R. Tittle, and Robert J. Bursik. 1993. Low self-control and imprudent behavior. Journal of Quantitative Criminology 9, 3 (Sept. 1993), 225--247.Google Scholar
Cross Ref
- Samuel J. Best and Brian S. Krueger. 2005. Analyzing the representativeness of Internet political participation. Political Behavior 27, 2 (2005), 183--216.Google Scholar
Cross Ref
- Anol Bhattacherjee and Sang Cheol Park. 2014. Why end-users move to the cloud: A migration-theoretic analysis. European Journal of Information Systems 23, 3 (2014), 357--372.Google Scholar
Cross Ref
- Jan Lauren Boyles, Aaron Smith, and Mary Madden. 2012. Privacy and data management on mobile devices. Pew Internet 8 American Life Project 4. Retrieved from http://www.privacylives.com/wp-content/uploads/2012/09/PIPMobilePrivacyManagement-092012.pdf.Google Scholar
- Daniel Burda and Frank Teuteberg. 2014. The role of trust and risk perceptions in cloud archiving: Results from an empirical study. The Journal of High Technology Management Research 25, 2 (Jan. 2014), 172--187.Google Scholar
Cross Ref
- Pedro Casas and Raimund Schatz. 2014. Quality of experience in cloud services: Survey and measurements. Computer Networks 68, Supplement C (Aug. 2014), 149--165.Google Scholar
- Marshini Chetty, Richard Banks, A. J. Brush, Jonathan Donner, and Rebecca Grinter. 2012. You’re capped: Understanding the effects of bandwidth caps on broadband use in the home. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems. ACM, 3021--3030. Google Scholar
Digital Library
- Jason W. Clark, Peter Snyder, Damon McCoy, and Chris Kanich. 2015. “I saw images I didn’t even know I had:” Understanding user perceptions of cloud storage privacy. In Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems (CHI’15). ACM, New York, NY, 1641--1644. Google Scholar
Digital Library
- R. E. Crossler. 2010. Protection motivation theory: Understanding determinants to backing up personal data. In Proceedings of the 2010 43rd Hawaii International Conference on System Sciences. 1--10. Google Scholar
Digital Library
- Kerry Dobransky and Eszter Hargittai. 2016. Unrealized potential: Exploring the digital disability divide. Poetics 58 (2016), 18--28.Google Scholar
Cross Ref
- Idilio Drago, Enrico Bocchi, Marco Mellia, Herman Slatman, and Aiko Pras. 2013. Benchmarking personal cloud storage. In Proceedings of the 2013 Conference on Internet Measurement Conference (IMC’13). ACM, New York, NY, 205--212. Google Scholar
Digital Library
- Idilio Drago, Marco Mellia, Maurizio M. Munafo, Anna Sperotto, Ramin Sadre, and Aiko Pras. 2012. Inside Dropbox: Understanding personal cloud storage services. In Proceedings of the 2012 Internet Measurement Conference (IMC’12). ACM, New York, NY, 481--494. Google Scholar
Digital Library
- Maeve Duggan and Joanna Brenner. 2013. The Demographics of Social Media Users, 2012. Vol. 14. Pew Research Center’s Internet 8 American Life Project Washington, D.C.Google Scholar
- Renato Frey, Andreas Pedroni, Rui Mata, Jörg Rieskamp, and Ralph Hertwig. 2017. Risk preference shares the psychometric structure of major psychological traits. Science Advances 3, 10 (2017), e1701381.Google Scholar
Cross Ref
- Eszter Hargittai and Yuli Patrick Hsieh. 2012. Succinct survey measures of web-use skills. Social Science Computer Review 30, 1 (2012), 95--107. Google Scholar
Digital Library
- Eszter Hargittai and Eden Litt. 2012. Becoming a tweep: How prior online experiences influence Twitter use. Information, Communication 8 Society 15, 5 (2012), 680--702.Google Scholar
- Wenjin Hu, Tao Yang, and Jeanna N. Matthews. 2010. The good, the bad and the ugly of consumer cloud storage. ACM SIGOPS Operating Systems Review 44, 3 (2010), 110--115. Google Scholar
Digital Library
- Daniel Kahneman, Andrew M. Rosenfield, Linnea Gandhi, and Tom Blaser. 2016. Noise: How to overcome the high, hidden cost of inconsistent decision making. Harvard Business Review 94, 10 (2016), 38--46.Google Scholar
- Ruogu Kang, Laura Dabbish, Nathaniel Fruchter, and Sara Kiesler. 2015. “My data just goes everywhere:” User mental models of the Internet and implications for privacy and security. In Symposium on Usable Privacy and Security (SOUPS). USENIX Association Berkeley, CA, 39--52. Google Scholar
Digital Library
- Bilge Karabacak and Ibrahim Sogukpinar. 2005. ISRAM: Information security risk analysis method. Computers 8 Security 24, 2 (2005), 147--159. Google Scholar
Digital Library
- Eyong B. Kim. 2005. Information security awareness status of full time employees. The Business Review, Cambridge 3, 2 (2005), 219--226.Google Scholar
- Andy Klein. 2017. Backup Awareness Survey, Our 10th Year. Retrieved from https://www.backblaze.com/blog/backup-awareness-survey/.Google Scholar
- Susie D. Lamborn, Nina S. Mounts, Laurence Steinberg, and Sanford M. Dornbusch. 1991. Patterns of competence and adjustment among adolescents from authoritative, authoritarian, indulgent, and neglectful families. Child Development 62, 5 (1991), 1049--1065.Google Scholar
Cross Ref
- Kevin Lewis, Jason Kaufman, and Nicholas Christakis. 2008. The taste for privacy: An analysis of college student privacy settings in an online social network. Journal of Computer-Mediated Communication 14, 1 (2008), 79--100.Google Scholar
Cross Ref
- Yuan Li and Kuo-chung Chang. 2012. A study on user acceptance of cloud computing: A multi-theoretical perspective. (2012). Retrieved from http://aisel.aisnet.org/amcis2012/proceedings/AdoptionDiffusionIT/19/.Google Scholar
- Eden Litt and Eszter Hargittai. 2014. Smile, snap, and share? A nuanced approach to privacy and online photo-sharing. Poetics 42 (2014), 1--21.Google Scholar
Cross Ref
- Arunesh Mathur, Brent Schlotfeldt, and Marshini Chetty. 2015. A mixed-methods study of mobile users’ data usage practices in South Africa. In Proceedings of the 2015 ACM International Joint Conference on Pervasive and Ubiquitous Computing. ACM, 1209--1220. Google Scholar
Digital Library
- Philip Menard, Robert Gatlin, and Merrill Warkentin. 2014. Threat protection and convenience: Antecedents of cloud-based data backup. Journal of Computer Information Systems 55, 1 (Sept. 2014), 83--91.Google Scholar
Cross Ref
- Adriana Mijuskovic and Mexhid Ferati. 2015. User awareness of existing privacy and security risks when storing data in the cloud. In Proceedings of the International Conference on e-Learning, Vol. 15. 268--273.Google Scholar
- Sarah Mitroff. 2015. Back to basics: The three easiest ways to back up your files. Retrieved from https://www.cnet.com/how-to/easiest-ways-to-backup-your-files/.Google Scholar
- Mozy. 2012. Lost 8 Found: Data Loss Research. Retrieved from https://mozy.com/about/news/reports/lost-and-found/.Google Scholar
- I. Muslukhov, Y. Boshmaf, C. Kuo, J. Lester, and K. Beznosov. 2012. Understanding users’ requirements for data protection in smartphones. In Proceedings of the 2012 IEEE 28th International Conference on Data Engineering Workshops. 228--235. Google Scholar
Digital Library
- Maurizio Naldi and Loretta Mastroeni. 2013. Cloud storage pricing: A comparison of current practices. In Proceedings of the 2013 International Workshop on Hot Topics in Cloud Services (HotTopiCS’13). ACM, New York, NY, 27--34. Google Scholar
Digital Library
- Sergio Picazo-Vela, Shih Yung Chou, Arlyn J. Melcher, and John M. Pearson. 2010. Why provide an online review? An extended theory of planned behavior and the role of big-five personality traits. Computers in Human Behavior 26, 4 (2010), 685--696. Google Scholar
Digital Library
- Karen Renaud, Melanie Volkamer, and Arne Renkema-Padmos. 2014. Why doesn’t Jane protect her privacy? In Proceedings of the International Symposium on Privacy Enhancing Technologies Symposium. Springer, 244--262.Google Scholar
Cross Ref
- Paul Ruggiero and Matthew Heckathorn, A. 2012. Data backup options. Retrieved from http://www.emacromall.com/techpapers/Data%20Backup%20Options.pdf.Google Scholar
- J. P. Scheible. 2002. A survey of storage options. Computer 35, 12 (Dec. 2002), 42--46. Google Scholar
Digital Library
- L. Tian, C. Lin, and Y. Ni. 2010. Evaluation of user behavior trust in cloud computing. In Proceedings of the 2010 International Conference on Computer Application and System Modeling (ICCASM 2010), Vol. 7. V7--567--V7--572.Google Scholar
Cross Ref
- Bindu Trikha. 2010. A journey from floppy disk to cloud storage. International Journal on Computer Science and Engineering 2, 4 (2010), 1449--1452.Google Scholar
- Alexander Van Deursen and Jan Van Dijk. 2011. Internet skills and the digital divide. New Media 8 Society 13, 6 (2011), 893--911.Google Scholar
- Ira M. Wasserman and Marie Richmond-Abbott. 2005. Gender and the Internet: Causes of variation in access, level, and scope of use. Social Science Quarterly 86, 1 (2005), 252--270.Google Scholar
Cross Ref
Index Terms
New Phone, Who Dis? Modeling Millennials’ Backup Behavior
Recommendations
Is sexting good for your relationship? It depends
Our understanding of the prevalence, correlates, predictors, and outcomes of sexting is increasing; however, little is known about potential positive aspects of this emerging behavior, and whether the consequences of sexting vary by gender or ...
Social media jealousy and intimate partner violence in young adults’ romantic relationships: A longitudinal study
Highlights- Social media are a prime location for the emergence of jealousy in romantic relationships.
AbstractSocial media have profoundly transformed young adults’ social interactions, especially within their romantic relationships. For instance, jealousy induced by the partner's activity on social media can cause conflicts that can escalate ...
Not-allowed sharing of sexts and dating violence from the perpetrator's perspective
Several studies have found that coercive sexting increases the probability of being victimized within a dating relationship. Our study focused on the perpetrator's perspective instead. It aimed to investigate the relationship between a specific sexting ...






Comments