Herd behavior in information security decision-making

被引:30
作者
Vedadi, Ali [1 ]
Warkentin, Merrill [2 ]
Dennis, Alan [3 ]
机构
[1] Middle Tennessee State Univ, Informat Syst & Analyt, Murphreesboro, TN 37132 USA
[2] Mississippi State Univ, Coll Business, Dept Management & Informat Syst, Mississippi State, MS 39762 USA
[3] Indiana Univ, Kelley Sch Business, Bloomington, IN 47405 USA
关键词
Popularity information; Imitation; Herd behavior; Information security; Coping appraisal; Bounded rationality; SOCIAL-INFLUENCE; FEAR APPEALS; PROTECTION MOTIVATION; EMPIRICAL-EXAMINATION; POLICY COMPLIANCE; ADOPTION; POPULARITY; THREATS; METAANALYSIS; ANTECEDENTS;
D O I
10.1016/j.im.2021.103526
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Current information security behavior research assumes that lone individuals make a rational, informed decision about security technologies based on careful consideration of personally available information. We challenge this assumption by examining how the herd behavior influences users' security decisions when coping with security threats. The results show that uncertainty about a security technology leads users to discount their own information and imitate others. We found that imitation tendency has a more substantial effect on security decisions than the personal perceived efficacy of the security technology. It is essential for researchers and managers to consider how the herd behavior effect influences users' security decisions.
引用
收藏
页数:13
相关论文
共 50 条
[21]   Individual's Response to Security Messages: A Decision-Making Perspective [J].
Qing, Tang ;
Ng, Boon-Yuen ;
Kankanhalli, Atreyi .
DECISION SUPPORT FOR GLOBAL ENTERPRISES, 2007, 2 :177-191
[22]   The Cultural Foundation of Information Security Behavior: Developing a Cultural Fit Framework for Information Security Behavior Control [J].
Lin, Canchu ;
Kunnathur, Anand S. ;
Li, Long .
JOURNAL OF DATABASE MANAGEMENT, 2020, 31 (02) :21-41
[23]   Review of IT/IS Adoption and Decision-Making Behavior in Small Businesses [J].
杨小平 ;
付静 .
Tsinghua Science and Technology, 2008, (03) :323-328
[24]   The experimentation of bounded rationality behavior in individual decision-making [J].
Li Zhan-lei ;
Li Hong-mei ;
Li Nan .
PROCEEDINGS OF 2007 INTERNATIONAL CONFERENCE ON MANAGEMENT SCIENCE & ENGINEERING (14TH) VOLS 1-3, 2007, :416-421
[25]   Toward a stage theory of the development of employees' information security behavior [J].
Karjalainen, Mari ;
Siponen, Mikko ;
Sarker, Suprateek .
COMPUTERS & SECURITY, 2020, 93
[26]   Imitative (herd) behaviour in direction decision-making hinders efficiency of crowd evacuation processes [J].
Haghani, Milad ;
Sarvi, Majid .
SAFETY SCIENCE, 2019, 114 :49-60
[27]   A group decision-making method for public opinion response plans: Herd behavior and two-stage consensus-reaching [J].
Ma, Jing ;
Wang, Dan ;
Mcbean, Edward A. ;
Su, Jiafu .
EXPERT SYSTEMS WITH APPLICATIONS, 2025, 268
[28]   Herd behavior identification based on coevolution in human-machine collaborative multi-stage large group decision-making [J].
Hou, Yuzhou ;
Xu, Xuanhua ;
Pan, Bin .
INFORMATION SCIENCES, 2025, 689
[29]   Using event-related brain potentials to explore the temporal dynamics of decision-making related to information security [J].
West, Robert ;
Kirby, Bridget ;
Malley, Kaitlyn .
FRONTIERS IN NEUROSCIENCE, 2022, 16
[30]   Security Awareness: The First Step in Information Security Compliance Behavior [J].
Hwang, Inho ;
Wakefield, Robin ;
Kim, Sanghyun ;
Kim, Taeha .
JOURNAL OF COMPUTER INFORMATION SYSTEMS, 2021, 61 (04) :345-356