Understanding Security Behaviors in Personal Computer Usage: A Threat Avoidance Perspective

被引:0
|
作者
Liang, Huigang [1 ]
Xue, Yajiong [1 ]
机构
[1] E Carolina Univ, Coll Business, Greenville, NC 27858 USA
来源
JOURNAL OF THE ASSOCIATION FOR INFORMATION SYSTEMS | 2010年 / 11卷 / 07期
关键词
threat; avoidance; susceptibility; severity; safeguarding measure; motivation; security; home setting; PROTECTION-MOTIVATION THEORY; STRUCTURAL EQUATION MODELS; HEALTH BELIEF MODEL; SELF-EFFICACY; INFORMATION-TECHNOLOGY; USER ACCEPTANCE; PERCEIVED EASE; FEAR APPEALS; SYSTEMS; MANAGEMENT;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This study aims to understand the IT threat avoidance behaviors of personal computer users. We tested a research model derived from Technology Threat Avoidance Theory (TTAT) using survey data. We find that users' IT threat avoidance behavior is predicted by avoidance motivation, which, in turn, is determined by perceived threat, safeguard effectiveness, safeguard cost, and self-efficacy. Users develop a threat perception when they believe that the malicious IT is likely to attack them (perceived susceptibility) and the negative consequences will be severe if they are attacked (perceived severity). When threatened, users are more motivated to avoid the threat if they believe that the safeguarding measure is effective (safeguard effectiveness) and inexpensive (safeguard cost) and they have confidence in using it (self-efficacy). In addition, we find that perceived threat and safeguard effectiveness have a negative interaction on avoidance motivation so that a higher level of perceived threat is associated with a weaker relationship between safeguard effectiveness and avoidance motivation or a higher level of safeguard effectiveness is associated with a weaker relationship between perceived threat and avoidance motivation. These findings provide an enriched understanding about personal computer users' IT threat avoidance behavior.
引用
收藏
页码:394 / 413
页数:20
相关论文
共 50 条
  • [1] Understanding security behaviors in personal computer usage: A threat avoidance perspective
    Liang H.
    Xue Y.
    Journal of the Association for Information Systems, 2010, 11 (07) : 394 - 413
  • [2] Security awareness of computer users: A phishing threat avoidance perspective
    Arachchilage, Nalin Asanka Gamagedara
    Love, Steve
    COMPUTERS IN HUMAN BEHAVIOR, 2014, 38 : 304 - 312
  • [3] Security Behaviors of Healthcare Providers Using HIT Outside of Work: A Technology Threat Avoidance Perspective
    Samhan, Bahae
    2017 8TH INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION SYSTEMS (ICICS), 2017, : 342 - 347
  • [4] Understanding Computer Usage Evolution
    Anastasiu, David C.
    Rashid, Al M.
    Tagarelli, Andrea
    Karypis, George
    2015 IEEE 31ST INTERNATIONAL CONFERENCE ON DATA ENGINEERING (ICDE), 2015, : 1549 - 1560
  • [5] Personal computer and internet usage in childhood
    Arslan, Elif
    Butun, Pinar
    Dogan, Murat
    Dag, Huseyin
    Serdarzade, Cavid
    Arica, Vefik
    IZMIR DR BEHCET UZ COCUK HASTANESI DERGISI, 2014, 4 (03): : 195 - 201
  • [6] Understanding personal Web usage in organizations
    Lee, Younghwa
    Lee, Zoonky
    Kim, Yongbeom
    JOURNAL OF ORGANIZATIONAL COMPUTING AND ELECTRONIC COMMERCE, 2007, 17 (01) : 75 - 99
  • [7] PERSONAL-COMPUTER SECURITY
    GUSTOFF, ME
    SEXTON, TJ
    INFORMATION AGE, 1988, 10 (04): : 195 - 202
  • [8] Threat modeling for aviation computer security
    Baquero, Abraham O.
    Kornecki, Andrew J.
    Zalewski, Janusz
    CrossTalk, 2015, 28 (06): : 21 - 27
  • [9] Are Computer Chips the New Security Threat?
    Greengard, Samuel
    COMMUNICATIONS OF THE ACM, 2017, 60 (02) : 18 - 20
  • [10] Usage control in computer security: A survey
    Lazouski, Aliaksandr
    Martinelli, Fabio
    Mori, Paolo
    COMPUTER SCIENCE REVIEW, 2010, 4 (02) : 81 - 99