How to keep your information secure? Toward a better understanding of users security behavior

被引:1
|
作者
Arenas, Alvaro
Ray, Gautam [2 ]
Hidalgo, Antonio [3 ]
Uruena, Alberto [1 ,3 ]
机构
[1] IE Univ, IE Business Sch, C-Maria Molina 12, Madrid 28006, Spain
[2] Univ Minnesota, Carlson Sch Management, 321 19th Ave S, Minneapolis, MN 55455 USA
[3] Univ Politecn Madrid, ETSI Ind, C-Jose Gutierrez Abascal 2, Madrid 28006, Spain
关键词
Information security; Routine activity theory; Malware infection; Cyberattacks; Personal computer; ROUTINE ACTIVITY THEORY; ONLINE; CRIME; VICTIMIZATION; NETHERLANDS; DETERRENCE; AVOIDANCE; ATTITUDE; THREATS; IMPACT;
D O I
10.1016/j.techfore.2023.123028
中图分类号
F [经济];
学科分类号
02 ;
摘要
Use of computers and the Internet is an integral part of our lives, with business becoming more digital. As a result, individuals are using their home computers to perform diverse tasks and to store sensitive data. This paper investigates the relative efficacy of two strategies to protect home computers from security threats: security tools and security activities. For the analysis, we collected data from over 1900 individuals in Spain, following an approach combining self- reported data, via an online survey, with actual data collected directly from home users' computers. The main contribution of the paper is to provide a model, based on routine activity theory, explaining the role of security tools and security activities in protecting personal computers from malware infection, thus offering an in-depth understanding of users' security behavior. Using multivariate, logit and probit regressions, our study reveals that having security tools is positively related with higher risk activities and more infections, while pursuing security activities reduces malware infections. These results have important implications for policy makers and organizations, reinforcing the view that security tools are not sufficient to protect users from malware infection, and the need to develop security education and awareness programs for computer users.
引用
收藏
页数:13
相关论文
共 50 条
  • [31] How Secure Is Your Radiology Department? Mapping Digital Radiology Adoption and Security Worldwide
    Stites, Mark
    Pianykh, Oleg S.
    AMERICAN JOURNAL OF ROENTGENOLOGY, 2016, 206 (04) : 797 - 804
  • [32] HOW SECURE IS YOUR CLOUD: CLASSIFICATION OF SECURITY THREATS AND COUNTERMEASURES WITHIN CLOUD COMPUTING?
    Almotiri, Sultan H.
    Al Ghamdi, Mohammed A.
    Saeed, Atif
    Shahid, Muhammad
    Masood, Khalid
    Nagra, Arfan Ali
    Asif, Muhammad
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2020, 20 (08): : 228 - 241
  • [33] ISBP: Understanding the Security Rule of Users' Information-Sharing Behaviors in Partnership
    Wu, Hongchen
    Wang, Xinjun
    PLOS ONE, 2016, 11 (03):
  • [34] Smartphone users: Understanding how security mechanisms are perceived and new persuasive methods
    Alsaleh, Mansour
    Alomar, Noura
    Alarifi, Abdulrahman
    PLOS ONE, 2017, 12 (03):
  • [35] Our (in)Secure Web: Understanding Update Behavior of Websites and Its Impact on Security
    Demir, Nurullah
    Urban, Tobias
    Wittek, Kevin
    Pohlmann, Norbert
    PASSIVE AND ACTIVE MEASUREMENT, PAM 2021, 2021, 12671 : 76 - 92
  • [36] Toward a better understanding of prosocial behavior: The role of evolution and directed attention
    Kaplan, S
    De Young, R
    BEHAVIORAL AND BRAIN SCIENCES, 2002, 25 (02) : 263 - +
  • [37] Toward a stage theory of the development of employees' information security behavior
    Karjalainen, Mari
    Siponen, Mikko
    Sarker, Suprateek
    COMPUTERS & SECURITY, 2020, 93
  • [38] The Affective Side of Disruptive Behavior: Toward Better Understanding, Assessment, and Treatment
    Evans, Spencer C.
    Burke, Jeffrey D.
    JOURNAL OF CLINICAL CHILD AND ADOLESCENT PSYCHOLOGY, 2024, 53 (02): : 141 - 155
  • [39] Toward a better understanding of the effects of hindrance and challenge stressors on work behavior
    Webster, Jennica R.
    Beehr, Terry A.
    Christiansen, Neil D.
    JOURNAL OF VOCATIONAL BEHAVIOR, 2010, 76 (01) : 68 - 77
  • [40] WhY DO USERS KEEP COMING BACK TO TIKTOK? UNDERSTANDING USERS' MOTIVATION TOWARD ThE CONTINUOUS USE INTENTION OF ChINESE ADOLESCENT SOCIAL MEDIA USERS
    Shao, Jinhua
    Zhao, Meiling
    Lyu, Yan
    Chen, Yugang
    INNOVATIVE MARKETING, 2023, 19 (03) : 134 - 144