Understanding Security Behaviors in Personal Computer Usage: A Threat Avoidance Perspective

被引:0
|
作者
Liang, Huigang [1 ]
Xue, Yajiong [1 ]
机构
[1] E Carolina Univ, Coll Business, Greenville, NC 27858 USA
来源
JOURNAL OF THE ASSOCIATION FOR INFORMATION SYSTEMS | 2010年 / 11卷 / 07期
关键词
threat; avoidance; susceptibility; severity; safeguarding measure; motivation; security; home setting; PROTECTION-MOTIVATION THEORY; STRUCTURAL EQUATION MODELS; HEALTH BELIEF MODEL; SELF-EFFICACY; INFORMATION-TECHNOLOGY; USER ACCEPTANCE; PERCEIVED EASE; FEAR APPEALS; SYSTEMS; MANAGEMENT;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This study aims to understand the IT threat avoidance behaviors of personal computer users. We tested a research model derived from Technology Threat Avoidance Theory (TTAT) using survey data. We find that users' IT threat avoidance behavior is predicted by avoidance motivation, which, in turn, is determined by perceived threat, safeguard effectiveness, safeguard cost, and self-efficacy. Users develop a threat perception when they believe that the malicious IT is likely to attack them (perceived susceptibility) and the negative consequences will be severe if they are attacked (perceived severity). When threatened, users are more motivated to avoid the threat if they believe that the safeguarding measure is effective (safeguard effectiveness) and inexpensive (safeguard cost) and they have confidence in using it (self-efficacy). In addition, we find that perceived threat and safeguard effectiveness have a negative interaction on avoidance motivation so that a higher level of perceived threat is associated with a weaker relationship between safeguard effectiveness and avoidance motivation or a higher level of safeguard effectiveness is associated with a weaker relationship between perceived threat and avoidance motivation. These findings provide an enriched understanding about personal computer users' IT threat avoidance behavior.
引用
收藏
页码:394 / 413
页数:20
相关论文
共 50 条
  • [11] Security Economics - A Personal Perspective
    Anderson, Ross
    28TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE (ACSAC 2012), 2012, : 139 - 144
  • [12] Technology Perspective: Is Green IT a Threat to IT Security?
    Frangiskatos, Dimitrios
    Ghassemian, Mona
    Gan, Diane
    INFORMATION SECURITY AND DIGITAL FORENSICS, 2010, 41 : 147 - 154
  • [13] COMPUTER HISTORY - A PERSONAL PERSPECTIVE
    ZUSE, K
    SIEMENS REVIEW, 1989, 56 (04): : 16 - 19
  • [14] Understanding Avoidance Behaviors of Users for Conversational AI
    Wu, Siyuan
    Shu, Yatong
    Yang, Xinyue
    Huang, Zilin
    Zhang, Xuzheng
    Chen, Xiyin
    Peng, Guochao
    DISTRIBUTED, AMBIENT AND PERVASIVE INTERACTIONS, DAPI 2023, PT I, 2023, 14036 : 281 - 294
  • [15] Computer information systems threat analysis on security
    Li, Y
    Wei, J
    INNOVATIONS THROUGH INFORMATION TECHNOLOGY, VOLS 1 AND 2, 2004, : 951 - 953
  • [16] PERSONAL COMPUTER SECURITY LOCK.
    Bealkowski, R.
    Cutt, P.S.
    Goetz, F.E.
    Luckfield, F.L.
    Miller, M.S.
    IBM technical disclosure bulletin, 1984, 27 (05): : 2897 - 2899
  • [17] The mediating role of security anxiety in internet threat avoidance behavior
    Wang, Xuan
    Li, Yaojie
    Khasraghi, Hanieh Javadi
    Trumbach, Cherie
    COMPUTERS & SECURITY, 2023, 134
  • [18] UNDERSTANDING SECURITY: A NEW PERSPECTIVE
    Hasan, Asifa
    IPRI JOURNAL, 2006, 6 (02): : 143 - 144
  • [19] School Security Measures, School Environment, and Avoidance Behaviors
    Nguyen, Kim
    Yuan, Yue
    McNeeley, Susan
    VICTIMS & OFFENDERS, 2020, 15 (01) : 43 - 59
  • [20] COVID-19-induced negative emotions and the impacts on personal values and travel behaviors: A threat appraisal perspective
    Wu, Alex Qitao
    Lau, Virginia Meng-Chan
    JOURNAL OF HOSPITALITY AND TOURISM MANAGEMENT, 2022, 51 : 143 - 155