Understanding Security Behaviors in Personal Computer Usage: A Threat Avoidance Perspective

被引:0
|
作者
Liang, Huigang [1 ]
Xue, Yajiong [1 ]
机构
[1] E Carolina Univ, Coll Business, Greenville, NC 27858 USA
来源
JOURNAL OF THE ASSOCIATION FOR INFORMATION SYSTEMS | 2010年 / 11卷 / 07期
关键词
threat; avoidance; susceptibility; severity; safeguarding measure; motivation; security; home setting; PROTECTION-MOTIVATION THEORY; STRUCTURAL EQUATION MODELS; HEALTH BELIEF MODEL; SELF-EFFICACY; INFORMATION-TECHNOLOGY; USER ACCEPTANCE; PERCEIVED EASE; FEAR APPEALS; SYSTEMS; MANAGEMENT;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This study aims to understand the IT threat avoidance behaviors of personal computer users. We tested a research model derived from Technology Threat Avoidance Theory (TTAT) using survey data. We find that users' IT threat avoidance behavior is predicted by avoidance motivation, which, in turn, is determined by perceived threat, safeguard effectiveness, safeguard cost, and self-efficacy. Users develop a threat perception when they believe that the malicious IT is likely to attack them (perceived susceptibility) and the negative consequences will be severe if they are attacked (perceived severity). When threatened, users are more motivated to avoid the threat if they believe that the safeguarding measure is effective (safeguard effectiveness) and inexpensive (safeguard cost) and they have confidence in using it (self-efficacy). In addition, we find that perceived threat and safeguard effectiveness have a negative interaction on avoidance motivation so that a higher level of perceived threat is associated with a weaker relationship between safeguard effectiveness and avoidance motivation or a higher level of safeguard effectiveness is associated with a weaker relationship between perceived threat and avoidance motivation. These findings provide an enriched understanding about personal computer users' IT threat avoidance behavior.
引用
收藏
页码:394 / 413
页数:20
相关论文
共 50 条
  • [21] Progress in understanding crystallisation: a personal perspective
    Price, Sarah L.
    FARADAY DISCUSSIONS, 2022, 235 (00) : 569 - 581
  • [22] Competence and Understanding-A Personal Perspective
    Jones, Gareth
    KEY COMPETENCES IN PHYSICS TEACHING AND LEARNING, 2017, 190 : 11 - 24
  • [23] ANALYSIS OF FILE USAGE IN PERSONAL-COMPUTER ENVIRONMENTS
    MUHAREMAGIC, EA
    MAHGOUB, IO
    MILENKOVIC, M
    DISTRIBUTED AND PARALLEL DATABASES, 1995, 3 (04) : 315 - 324
  • [24] A network perspective on real-life threat, anxiety, and avoidance
    Glueck, Valentina M.
    Engelke, Paula
    Hilger, Kirsten
    Wong, Alex H. K.
    Boschet, Juliane M.
    Pittig, Andre
    JOURNAL OF CLINICAL PSYCHOLOGY, 2024, 80 (01) : 23 - 38
  • [25] Understanding Awareness of Cyber Security Threat Among IT Employees
    AL-Mohannadi, Hamad
    Awan, Irfan
    Al Hamar, Jassim
    Al Hamar, Yousef
    Shah, Mohammad
    Musa, Ahmad
    2018 IEEE 6TH INTERNATIONAL CONFERENCE ON FUTURE INTERNET OF THINGS AND CLOUD WORKSHOPS (W-FICLOUD 2018), 2018, : 188 - 192
  • [26] PERSONAL-COMPUTER SECURITY SYSTEM LAUNCHED
    不详
    INFORMATION AGE, 1989, 11 (04): : 240 - 240
  • [27] Understanding IPv6 Usage: Communities and Behaviors
    Huang, Shaojun
    An, Chaugqing
    Wang, Hui
    Yang, Jiahai
    CHALLENGES FOR NEXT GENERATION NETWORK OPERATIONS AND SERVICE MANAGEMENT, PROCEEDINGS, 2008, 5297 : 256 - +
  • [28] Computer security research: A British perspective
    Barnes, BH
    IEEE SOFTWARE, 1998, 15 (05) : 30 - 33
  • [29] SECURITY ASPECTS OF THE PERSPECTIVE COMPUTER NETWORKS
    Kysela, Libor
    DISTANCE LEARNING, SIMULATION AND COMMUNICATION (DLSC 2011), 2011, : 163 - 167
  • [30] Understanding security behaviour among healthcare professionals by comparing results from technology threat avoidance theory and protection motivation theory
    Sreenath, Sanjana Sundara Raj
    Hewitt, Barbara
    Sreenath, Sahana
    BEHAVIOUR & INFORMATION TECHNOLOGY, 2025, 44 (02) : 181 - 196