How to keep your information secure? Toward a better understanding of users security behavior

被引:1
|
作者
Arenas, Alvaro
Ray, Gautam [2 ]
Hidalgo, Antonio [3 ]
Uruena, Alberto [1 ,3 ]
机构
[1] IE Univ, IE Business Sch, C-Maria Molina 12, Madrid 28006, Spain
[2] Univ Minnesota, Carlson Sch Management, 321 19th Ave S, Minneapolis, MN 55455 USA
[3] Univ Politecn Madrid, ETSI Ind, C-Jose Gutierrez Abascal 2, Madrid 28006, Spain
关键词
Information security; Routine activity theory; Malware infection; Cyberattacks; Personal computer; ROUTINE ACTIVITY THEORY; ONLINE; CRIME; VICTIMIZATION; NETHERLANDS; DETERRENCE; AVOIDANCE; ATTITUDE; THREATS; IMPACT;
D O I
10.1016/j.techfore.2023.123028
中图分类号
F [经济];
学科分类号
02 ;
摘要
Use of computers and the Internet is an integral part of our lives, with business becoming more digital. As a result, individuals are using their home computers to perform diverse tasks and to store sensitive data. This paper investigates the relative efficacy of two strategies to protect home computers from security threats: security tools and security activities. For the analysis, we collected data from over 1900 individuals in Spain, following an approach combining self- reported data, via an online survey, with actual data collected directly from home users' computers. The main contribution of the paper is to provide a model, based on routine activity theory, explaining the role of security tools and security activities in protecting personal computers from malware infection, thus offering an in-depth understanding of users' security behavior. Using multivariate, logit and probit regressions, our study reveals that having security tools is positively related with higher risk activities and more infections, while pursuing security activities reduces malware infections. These results have important implications for policy makers and organizations, reinforcing the view that security tools are not sufficient to protect users from malware infection, and the need to develop security education and awareness programs for computer users.
引用
收藏
页数:13
相关论文
共 50 条
  • [1] KEEP YOUR SECURITY REALLY SECURE
    FREEMAN, JW
    CME-CHARTERED MECHANICAL ENGINEER, 1986, 33 (7-8): : 20 - 22
  • [2] Information Security Application Design: Understanding Your Users
    Bhattarai, Ranjan
    Joyce, Ger
    Dutta, Saurabh
    HUMAN ASPECTS OF INFORMATION SECURITY, PRIVACY, AND TRUST, 2016, 9750 : 103 - 113
  • [3] HOW TO KEEP USERS HAPPY AND KEEP YOUR SANITY
    SECRIST, LS
    COMPUTER DECISIONS, 1980, 12 (02): : 93 - &
  • [5] Toward a better understanding of SMB CEOs' Information Security Behavior: Insights from Threat or Coping appraisal
    Barlette, Yves
    Gundolf, Katherine
    Jaouen, Annabelle
    JOURNAL OF INTELLIGENCE STUDIES IN BUSINESS, 2015, 5 (01): : 5 - 17
  • [6] How Secure is Your System? Examining the Influence of Technical, Managerial, and Educational Controls on Users' Secure Behavior
    Jenkins, Jeffrey
    Durcikova, Alexandra
    Ross, Gray
    AMCIS 2010 PROCEEDINGS, 2010,
  • [7] Toward a Better Understanding of Mobile Users' Behavior: A Web Session Repair Scheme
    Charmet, Fabien
    Morikawa, Tomohiro
    Takahashi, Takeshi
    IEEE ACCESS, 2022, 10 : 99931 - 99943
  • [8] How to make money from your information and keep your privacy
    Rao, Divya
    Ng, Wee Keong
    PROCEEDINGS 2015 IEEE INTERNATIONAL CONFERENCE ON BIG DATA, 2015, : 2859 - 2861
  • [9] How to keep more of your hard-earned cash & secure your future
    Crandall, R
    PLATING AND SURFACE FINISHING, 1999, 86 (01): : 76 - 77
  • [10] The more secure the better? A study of information security readiness
    Sun, Jun
    Ahluwalia, Punit
    Koong, Kai S.
    INDUSTRIAL MANAGEMENT & DATA SYSTEMS, 2011, 111 (3-4) : 570 - 588