Grin logo
de en es fr
Shop
GRIN Website
Publish your texts - enjoy our full service for authors
Go to shop › Didactics - Social Studies/ Civics

Literature review on factors influencing millenial behavior

Title: Literature review on factors influencing millenial behavior

Essay , 2022 , 10 Pages , Grade: A

Autor:in: Mourine Atsien (Author)

Didactics - Social Studies/ Civics
Excerpt & Details   Look inside the ebook
Summary Excerpt Details

This literature review explores existing knowledge on promotion strategies in the B2C market of Trulifi’s product among Dutch millennials. The researcher used keywords such as influencing millennials’ intention to cyber security products, millennials’ awareness towards cyber security, millennials' perception towards cyber security products, and motivating millennials to engage with cyber security behavior in searching appropriate literature. The literature helped the researcher identify the knowledge gaps the study should fulfill. Therefore, the literature review chapter discusses the key factors influencing millennials (24-41) in the Netherlands to purchase Trulifi products.

Excerpt


Table of Contents

Chapter II: Literature Review

Introduction and Literature Search Questions

Determinants of millennial's behavior

Millennials' perception of cyber security products

Millennials’ awareness of cyber security

Motivating millennials to adopt cyber security behavior

Conclusions and Knowledge Gaps

Objectives and Research Themes

The primary objective of this literature review is to investigate the key behavioral determinants influencing Dutch millennials regarding their purchasing intentions for cyber security products, specifically Trulifi. The research seeks to bridge the gap between high levels of self-efficacy in the Netherlands and the practical adoption of preventative cyber security measures among the younger generation.

  • Social influence and its impact on millennial consumer behavior
  • Cultural drivers of risk assessment and uncertainty avoidance
  • Perceptual factors of security technology: usefulness and ease of use
  • The effectiveness of threat and coping appraisals in motivating behavioral change
  • The role of professional knowledge and awareness in adoption decisions

Excerpt from the Book

Determinants of millennial's behavior

Factors such as values, principles, and outlooks create a shared identity among people. Social influence theory explains that millenials behave as a single community when making decisions due to shared values and views (Ozuem et al., 2021). In the contemporary world, they form online-based communities where they build social networks that influence individuals on the products to buy and their behavior (Lavuri, 2021). While social influence theory suggests that millenials are a single market segment, the theory of planned behavior explains that people's attitudes, intentions, and subjective norms influence how people behave (Ajzen, 1985).

Similarly, Fitriana and Kristaung (2020) determined that social influence was significantly associated with behavioral change. Millennials are the most exposed to cyber security threats as they are the least risk-averse. They have a distinct perspective on their online personal data since they are concerned about their safety and security and are well aware of security dangers despite paying little attention to them (Pinto, 2018).

Summary of Chapters

Introduction and Literature Search Questions: This section outlines the scope of the study, focusing on promotion strategies for Trulifi products among Dutch millennials and the identification of knowledge gaps.

Determinants of millennial's behavior: This chapter analyzes how social influence, cultural identity, and societal values shape the decision-making processes and risk attitudes of millennials.

Millennials' perception of cyber security products: This section explores the application of the health belief model to explain how perceived benefits, usefulness, and ease of use influence the adoption of security technology.

Millennials’ awareness of cyber security: This chapter examines the correlation between the awareness of cyber threats and the willingness to adopt protective behaviors, highlighting the critical role of professional guidance.

Motivating millennials to adopt cyber security behavior: This section discusses the Protection Motivation Theory and how fear messaging, threat appraisal, and coping strategies drive user engagement in cyber security.

Conclusions and Knowledge Gaps: This chapter synthesizes the research findings, highlighting the paradox between high risk-exposure and high self-efficacy, and advocates for better communication of product benefits.

Key Keywords

Millennials, Cyber Security, Trulifi, Dutch Market, Social Influence Theory, Theory of Planned Behavior, Protection Motivation Theory, Self-Efficacy, Uncertainty Avoidance, Consumer Behavior, Technology Adoption, Risk Assessment, Awareness Training, Purchasing Intention, Digital Security

Frequently Asked Questions

What is the core focus of this publication?

The publication examines the behavioral factors and market dynamics affecting how Dutch millennials perceive and adopt cyber security products like Trulifi.

What are the central thematic fields discussed?

The key themes include consumer behavior, social influence, psychological motivation theories (such as PMT and HBM), and the specific cultural landscape of the Netherlands regarding digital risk.

What is the primary objective of this literature review?

The goal is to understand why there is a delayed adoption of cyber security technology among millennials and how communication strategies can be improved to overcome these barriers.

Which scientific theories support the methodology?

The work relies on the Social Influence Theory, the Theory of Planned Behavior, the Health Belief Model, and the Protection Motivation Theory to frame the research.

What does the main body of the text cover?

It covers individual decision-making mechanisms, the impact of awareness on behavior, the effectiveness of threat messaging, and the necessity of linking product utility to user intentions.

Which keywords best characterize this work?

The work is best characterized by terms such as cyber security awareness, millennial behavior, technology adoption, and motivation strategies.

How does Hofstede’s dimension of 'Uncertainty Avoidance' impact the findings?

The findings use this dimension to explain that despite high risk-aversion in the Netherlands, there remains a disconnect between awareness and actual security implementation.

Why is the 'Health Belief Model' relevant to cyber security?

Researchers utilize this model to predict how users respond to cyber risks based on their perceptions of vulnerability, benefits, and barriers related to security tools.

What role does 'ease of use' play in the findings?

The research concludes that perceived complexity is a primary barrier; if millennials perceive security products as difficult to integrate into their lives, their intention to purchase drops significantly.

What is the significance of the 24-41 age demographic in this study?

This group represents the specific millennial cohort in the Netherlands targeted for the research, noted for being highly exposed to cyber risks while simultaneously being the most influential group in forming online communities.

Excerpt out of 10 pages  - scroll top

Details

Title
Literature review on factors influencing millenial behavior
College
University of Nairobi
Grade
A
Author
Mourine Atsien (Author)
Publication Year
2022
Pages
10
Catalog Number
V1326035
ISBN (PDF)
9783346814234
Language
English
Tags
literature
Product Safety
GRIN Publishing GmbH
Quote paper
Mourine Atsien (Author), 2022, Literature review on factors influencing millenial behavior, Munich, GRIN Verlag, https://www.grin.com/document/1326035
Look inside the ebook
  • Depending on your browser, you might see this message in place of the failed image.
  • Depending on your browser, you might see this message in place of the failed image.
  • Depending on your browser, you might see this message in place of the failed image.
  • Depending on your browser, you might see this message in place of the failed image.
  • Depending on your browser, you might see this message in place of the failed image.
  • Depending on your browser, you might see this message in place of the failed image.
Excerpt from  10  pages
Grin logo
  • Grin.com
  • Shipping
  • Contact
  • Privacy
  • Terms
  • Imprint