Understanding Security Behaviors in Personal Computer Usage: A Threat Avoidance Perspective

被引:0
|
作者
Liang, Huigang [1 ]
Xue, Yajiong [1 ]
机构
[1] E Carolina Univ, Coll Business, Greenville, NC 27858 USA
来源
JOURNAL OF THE ASSOCIATION FOR INFORMATION SYSTEMS | 2010年 / 11卷 / 07期
关键词
threat; avoidance; susceptibility; severity; safeguarding measure; motivation; security; home setting; PROTECTION-MOTIVATION THEORY; STRUCTURAL EQUATION MODELS; HEALTH BELIEF MODEL; SELF-EFFICACY; INFORMATION-TECHNOLOGY; USER ACCEPTANCE; PERCEIVED EASE; FEAR APPEALS; SYSTEMS; MANAGEMENT;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This study aims to understand the IT threat avoidance behaviors of personal computer users. We tested a research model derived from Technology Threat Avoidance Theory (TTAT) using survey data. We find that users' IT threat avoidance behavior is predicted by avoidance motivation, which, in turn, is determined by perceived threat, safeguard effectiveness, safeguard cost, and self-efficacy. Users develop a threat perception when they believe that the malicious IT is likely to attack them (perceived susceptibility) and the negative consequences will be severe if they are attacked (perceived severity). When threatened, users are more motivated to avoid the threat if they believe that the safeguarding measure is effective (safeguard effectiveness) and inexpensive (safeguard cost) and they have confidence in using it (self-efficacy). In addition, we find that perceived threat and safeguard effectiveness have a negative interaction on avoidance motivation so that a higher level of perceived threat is associated with a weaker relationship between safeguard effectiveness and avoidance motivation or a higher level of safeguard effectiveness is associated with a weaker relationship between perceived threat and avoidance motivation. These findings provide an enriched understanding about personal computer users' IT threat avoidance behavior.
引用
收藏
页码:394 / 413
页数:20
相关论文
共 50 条
  • [41] Security threat posed by USB-based personal health records
    Wright, Adam
    Sittig, Dean F.
    ANNALS OF INTERNAL MEDICINE, 2007, 146 (04) : 314 - 315
  • [42] Malaysian women entrepreneurs: understanding the ICT usage behaviors and drivers
    Ndubisi, Nelson Oly
    Kahraman, Cengiz
    JOURNAL OF ENTERPRISE INFORMATION MANAGEMENT, 2005, 18 (06) : 721 - +
  • [43] Examining Personal Security and Avoidance Measures in a 12-City Sample
    Giblin, Matthew J.
    JOURNAL OF RESEARCH IN CRIME AND DELINQUENCY, 2008, 45 (04): : 359 - 379
  • [44] Format and usage model of security patterns in ontology-driven threat modelling
    Brazhuk, Andrei
    Olizarovich, Evgeny
    Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2020, 12412 LNAI : 382 - 392
  • [45] Format and Usage Model of Security Patterns in Ontology-Driven Threat Modelling
    Brazhuk, Andrei
    Olizarovich, Evgeny
    ARTIFICIAL INTELLIGENCE, 2020, 12412 : 382 - 392
  • [46] The impact of information security threat awareness on privacy-protective behaviors
    Mamonov, Stanislav
    Benbunan-Fich, Raquel
    COMPUTERS IN HUMAN BEHAVIOR, 2018, 83 : 32 - 44
  • [47] A Brief Survey on Ransomware with the Perspective of Internet Security Threat Reports
    Farhat, Danyal
    Awan, Malik Shahzad
    9TH INTERNATIONAL SYMPOSIUM ON DIGITAL FORENSICS AND SECURITY (ISDFS'21), 2021,
  • [48] Deception Techniques in Computer Security: A Research Perspective
    Han, Xiao
    Kheir, Nizar
    Balzarotti, Davide
    ACM COMPUTING SURVEYS, 2018, 51 (04)
  • [49] COMPUTER SECURITY INSPECTION: AN INSPECTEE PERSPECTIVE.
    Penny, S.K.
    Caldwell, R.J.
    Nuclear materials management, 1987, 16 : 548 - 550
  • [50] Enhancing Security in Ambient Intelligence: A STRIDE Threat Modeling Perspective
    Hossain, Md Ismail
    Hasan, Ragib
    2023 IEEE 9TH WORLD FORUM ON INTERNET OF THINGS, WF-IOT, 2023,