Predicting Students' Security Behavior Using Information-Motivation-Behavioral Skills Model

被引:12
作者
Farooq, Ali [1 ]
Jeske, Debora [2 ]
Isoaho, Jouni [1 ]
机构
[1] Univ Turku, Turku, Finland
[2] Univ Coll Cork, Cork, Ireland
来源
ICT SYSTEMS SECURITY AND PRIVACY PROTECTION, SEC 2019 | 2019年 / 562卷
关键词
Information security; Threat knowledge; Security behavior; IMB Model; SOCIAL COGNITIVE THEORY; PROTECTION MOTIVATION; FEAR APPEALS; TECHNOLOGY; THREATS; COUNTERMEASURES; AWARENESS; ADULTS; SEM;
D O I
10.1007/978-3-030-22312-0_17
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The Information-Motivation-Behavioral Skills (IMB) Model has shown reliability in predicting behaviors related to health and voting. In this study, we examine whether the IMB Model could predict security behavior among university students. Using a cross-sectional design and proxy IMB variables, data was collected from 159 Finnish students on their security threats' awareness (representing IMB's information variable), attitude toward information security and social motivation (replacing IMB's motivation variable), self-efficacy and familiarity with security measures (variables related to IMB's behavioral skills), and self-reported security behavior (IMB outcome variable). An analysis conducted with PLS-SEM v3.2 confirmed that the IMB Model was an appropriate model to explain and predict security behavior of the university students. Path analysis showed that behavioral skills measures predict security behavior directly, while students' information and motivation variables predicted security behavior through behavioral skills (self-efficacy and familiarity with security measures). The findings suggest that the security behavior of students can be improved by improving threat knowledge, their motivation and behavioral skills - supporting the use of the IMB Model in this context and combination with existing predictors.
引用
收藏
页码:238 / 252
页数:15
相关论文
共 53 条
[31]  
Katz F.H., 2005, P 2 ANN C INFORM SEC, P43, DOI DOI 10.1145/1107622.1107633
[32]  
Kerievsky B., 1976, ACM SIGUCCS NEWSLETT, V6, P9, DOI [10.1145/1098899.1098901, DOI 10.1145/1098899.1098901]
[33]  
Kim T., 2011, CCIS, V200, P1, DOI [10.1007/978-3-642-23141-41, DOI 10.1007/978-3-642-23141-41]
[34]   The dark side of the Internet: Attacks, costs and responses [J].
Kim, Won ;
Jeong, Ok-Ran ;
Kim, Chulyun ;
So, Jungmin .
INFORMATION SYSTEMS, 2011, 36 (03) :675-705
[35]  
Kruger Hennie, 2010, Information Management & Computer Security, V18, P316, DOI 10.1108/09685221011095236
[36]   Information security awareness and behavior: a theory-based literature review [J].
Lebek, Benedikt ;
Uffen, Joerg ;
Neumann, Markus ;
Hohler, Bernd ;
Breitner, Michael H. .
MANAGEMENT RESEARCH REVIEW, 2014, 37 (12) :1049-1092
[37]   Partial Least Squares (PLS) Structural Equation Modeling (SEM) for Building and Testing Behavioral Causal Theory: When to Choose It and How to Use It [J].
Lowry, Paul Benjamin ;
Gaskin, James .
IEEE TRANSACTIONS ON PROFESSIONAL COMMUNICATION, 2014, 57 (02) :123-146
[38]   PROTECTION MOTIVATION AND SELF-EFFICACY - A REVISED THEORY OF FEAR APPEALS AND ATTITUDE-CHANGE [J].
MADDUX, JE ;
ROGERS, RW .
JOURNAL OF EXPERIMENTAL SOCIAL PSYCHOLOGY, 1983, 19 (05) :469-479
[39]   PC VIRUS ATTACKS IN SMALL FIRMS: EFFECTS OF RISK PERCEPTIONS AND INFORMATION TECHNOLOGY COMPETENCE ON PREVENTIVE BEHAVIORS [J].
Mariani, Marco G. ;
Zappala, Salvatore .
TPM-TESTING PSYCHOMETRICS METHODOLOGY IN APPLIED PSYCHOLOGY, 2014, 21 (01) :51-65
[40]   Reliable Behavioural Factors in the Information Security Context [J].
Mayer, Peter ;
Kunz, Alexandra ;
Volkamer, Melanie .
PROCEEDINGS OF THE 12TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY (ARES 2017), 2017,