Understanding Security Behaviors in Personal Computer Usage: A Threat Avoidance Perspective

被引:0
|
作者
Liang, Huigang [1 ]
Xue, Yajiong [1 ]
机构
[1] E Carolina Univ, Coll Business, Greenville, NC 27858 USA
来源
JOURNAL OF THE ASSOCIATION FOR INFORMATION SYSTEMS | 2010年 / 11卷 / 07期
关键词
threat; avoidance; susceptibility; severity; safeguarding measure; motivation; security; home setting; PROTECTION-MOTIVATION THEORY; STRUCTURAL EQUATION MODELS; HEALTH BELIEF MODEL; SELF-EFFICACY; INFORMATION-TECHNOLOGY; USER ACCEPTANCE; PERCEIVED EASE; FEAR APPEALS; SYSTEMS; MANAGEMENT;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This study aims to understand the IT threat avoidance behaviors of personal computer users. We tested a research model derived from Technology Threat Avoidance Theory (TTAT) using survey data. We find that users' IT threat avoidance behavior is predicted by avoidance motivation, which, in turn, is determined by perceived threat, safeguard effectiveness, safeguard cost, and self-efficacy. Users develop a threat perception when they believe that the malicious IT is likely to attack them (perceived susceptibility) and the negative consequences will be severe if they are attacked (perceived severity). When threatened, users are more motivated to avoid the threat if they believe that the safeguarding measure is effective (safeguard effectiveness) and inexpensive (safeguard cost) and they have confidence in using it (self-efficacy). In addition, we find that perceived threat and safeguard effectiveness have a negative interaction on avoidance motivation so that a higher level of perceived threat is associated with a weaker relationship between safeguard effectiveness and avoidance motivation or a higher level of safeguard effectiveness is associated with a weaker relationship between perceived threat and avoidance motivation. These findings provide an enriched understanding about personal computer users' IT threat avoidance behavior.
引用
收藏
页码:394 / 413
页数:20
相关论文
共 50 条
  • [31] Threat modelling of industrial controllers: A firmware security perspective
    Varghese, Anitha
    Bose, Arijit Kumar
    PROCEEDINGS OF 2014 IEEE INTERNATIONAL CONFERENCE ON ANTI-COUNTERFEITING, SECURITY AND IDENTIFICATION (ASID), 2014, : 16 - 19
  • [32] Coping with BYOD Security Threat: From Management Perspective
    Tu, Zhiling
    Yuan, Yufei
    AMCIS 2015 PROCEEDINGS, 2015,
  • [33] Understanding Security Group Usage in a Public IaaS Cloud
    Jin, Cheng
    Srivastava, Abhinav
    Zhang, Zhi-Li
    IEEE INFOCOM 2016 - THE 35TH ANNUAL IEEE INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATIONS, 2016,
  • [34] The influence of big data-enabled price discrimination on tourists' continuance usage intention to mobile applications: a technology threat avoidance perspective
    Shang, Yuanyuan
    Li, Fangxuan
    Su, Qianqian
    CURRENT ISSUES IN TOURISM, 2023, 26 (19) : 3209 - 3230
  • [35] Better security through diversity - a personal perspective
    Iranmanesh L.
    Computer Fraud and Security, 2022, 2022 (01):
  • [36] Statistical Behaviors: Personal and Computer-Aided Observations
    Hanley, James A.
    SLAS DISCOVERY, 2018, 23 (05) : 440 - 447
  • [37] USAGE PATTERN AND SOURCES OF ASSISTANCE FOR PERSONAL-COMPUTER USERS
    LEE, DMS
    MIS QUARTERLY, 1986, 10 (04) : 313 - 325
  • [38] A Threat Rislk Estimation Model for Computer N etworlk Security
    Rezaee, Razieh
    Bafghi, Abbas Ghaemi
    Khosravi-Farmad, Masoud
    2016 6TH INTERNATIONAL CONFERENCE ON COMPUTER AND KNOWLEDGE ENGINEERING (ICCKE), 2016, : 223 - 228
  • [39] Research on the Main Threat and Prevention Technology of Computer Network Security
    Gao, Xiang
    Liu, Liyuan
    Zhu, Xuanbing
    2020 ASIA CONFERENCE ON GEOLOGICAL RESEARCH AND ENVIRONMENTAL TECHNOLOGY, 2021, 632
  • [40] Is the Biggest Security Threat to Medical Information Simply a Lack of Understanding?
    Williams, Patricia A. H.
    HEALTH INFORMATICS: THE TRANSFORMATIVE POWER OF INNOVATION, 2011, 168 : 179 - 187