A students' behaviors in information security: Extension of Protection Motivation Theory (PMT)
被引:1
|
作者:
Alam, Syed Shah
论文数: 0引用数: 0
h-index: 0
机构:
Prince Sultan Univ, Coll Business Adm, Dept Mkt, Riyadh BANGI, Saudi ArabiaPrince Sultan Univ, Coll Business Adm, Dept Mkt, Riyadh BANGI, Saudi Arabia
Alam, Syed Shah
[1
]
Ahsan, Nilufar
论文数: 0引用数: 0
h-index: 0
机构:
Multimedia Univ, Fac Management, Cyberjaya, MalaysiaPrince Sultan Univ, Coll Business Adm, Dept Mkt, Riyadh BANGI, Saudi Arabia
Ahsan, Nilufar
[2
]
Kokash, Husam Ahmad
论文数: 0引用数: 0
h-index: 0
机构:
Prince Sultan Univ, Coll Business Adm, Dept Mkt, Riyadh BANGI, Saudi ArabiaPrince Sultan Univ, Coll Business Adm, Dept Mkt, Riyadh BANGI, Saudi Arabia
Kokash, Husam Ahmad
[1
]
Alam, Shafiul
论文数: 0引用数: 0
h-index: 0
机构:
Chief Metropolitan Magistrate Court, Addit Chief Metropolitan Magistrate, Rajshahi, BangladeshPrince Sultan Univ, Coll Business Adm, Dept Mkt, Riyadh BANGI, Saudi Arabia
Alam, Shafiul
[3
]
Ahmed, Saif
论文数: 0引用数: 0
h-index: 0
机构:
Univ Kebangsaan Malaysia, Grad Sch Business, Bangi, MalaysiaPrince Sultan Univ, Coll Business Adm, Dept Mkt, Riyadh BANGI, Saudi Arabia
Ahmed, Saif
[4
]
机构:
[1] Prince Sultan Univ, Coll Business Adm, Dept Mkt, Riyadh BANGI, Saudi Arabia
[2] Multimedia Univ, Fac Management, Cyberjaya, Malaysia
[4] Univ Kebangsaan Malaysia, Grad Sch Business, Bangi, Malaysia
来源:
INFORMATION SECURITY JOURNAL
|
2024年
关键词:
Information security;
protection motivation theory (PMT);
university student;
structural equation modeling;
Malaysia;
SELF-EFFICACY;
POLICY COMPLIANCE;
RISK PERCEPTION;
INTENTION;
PREDICTORS;
CONTEXT;
GAP;
D O I:
10.1080/19393555.2024.2408264
中图分类号:
TP [自动化技术、计算机技术];
学科分类号:
0812 ;
摘要:
This study investigates information security behaviors among university students, focusing on the interplay of psychological and social factors influencing their behavioral intentions and actions. By integrating the Theory of Planned Behavior, Protection Motivation Theory, and General Deterrence Theory, the research offers a comprehensive understanding of factors such as self-efficacy, perceived risk vulnerability, response cost, and response efficacy. Utilizing structural equation modeling (SEM) and Necessary Condition Analysis (NCA), the study assesses the impact of these factors on students' information security practices. Measurement items were developed based on recent empirical studies, ensuring relevance to the contemporary digital environment. The findings reveal significant associations between these factors and students' security behaviors, providing insights into effective strategies for promoting information security awareness and practices. This research contributes to the academic discourse on digital security behaviors and offers practical implications for enhancing information security measures within university settings.