Herd behavior in information security decision-making

被引:30
作者
Vedadi, Ali [1 ]
Warkentin, Merrill [2 ]
Dennis, Alan [3 ]
机构
[1] Middle Tennessee State Univ, Informat Syst & Analyt, Murphreesboro, TN 37132 USA
[2] Mississippi State Univ, Coll Business, Dept Management & Informat Syst, Mississippi State, MS 39762 USA
[3] Indiana Univ, Kelley Sch Business, Bloomington, IN 47405 USA
关键词
Popularity information; Imitation; Herd behavior; Information security; Coping appraisal; Bounded rationality; SOCIAL-INFLUENCE; FEAR APPEALS; PROTECTION MOTIVATION; EMPIRICAL-EXAMINATION; POLICY COMPLIANCE; ADOPTION; POPULARITY; THREATS; METAANALYSIS; ANTECEDENTS;
D O I
10.1016/j.im.2021.103526
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Current information security behavior research assumes that lone individuals make a rational, informed decision about security technologies based on careful consideration of personally available information. We challenge this assumption by examining how the herd behavior influences users' security decisions when coping with security threats. The results show that uncertainty about a security technology leads users to discount their own information and imitate others. We found that imitation tendency has a more substantial effect on security decisions than the personal perceived efficacy of the security technology. It is essential for researchers and managers to consider how the herd behavior effect influences users' security decisions.
引用
收藏
页数:13
相关论文
共 50 条
[31]   How to react to hacker types and asset types in security decision-making [J].
Wu, Xiaomin ;
Wu, Yong ;
Li, Qingying ;
Dai, Tao .
EXPERT SYSTEMS WITH APPLICATIONS, 2023, 231
[32]   An Ontology-based Security Framework for Decision-making in Industrial Systems [J].
Mozzaquatro, Bruno A. ;
Melo, Raquel ;
Agostinho, Carlos ;
Jardim-Goncalves, Ricardo .
PROCEEDINGS OF THE 4TH INTERNATIONAL CONFERENCE ON MODEL-DRIVEN ENGINEERING AND SOFTWARE DEVELOPMENT (MODELSWARD 2016), 2016, :779-788
[33]   Rational Conformity in Sequential Decision-making: an Experiment of Information Cascades [J].
Li, Jian-biao ;
Ju, Long ;
Wang, Guang-rong ;
Fu, Peng .
2009 WRI WORLD CONGRESS ON SOFTWARE ENGINEERING, VOL 2, PROCEEDINGS, 2009, :407-415
[34]   Adaptation in Information Search and Decision-Making under Time Constraints [J].
Crescenzi, Anita ;
Capra, Rob ;
Choi, Bogeum ;
Li, Yuan .
CHIIR '21: PROCEEDINGS OF THE 2021 CONFERENCE ON HUMAN INFORMATION INTERACTION AND RETRIEVAL, 2021, :95-105
[35]   Thermodynamics as a theory of decision-making with information-processing costs [J].
Ortega, Pedro A. ;
Braun, Daniel A. .
PROCEEDINGS OF THE ROYAL SOCIETY A-MATHEMATICAL PHYSICAL AND ENGINEERING SCIENCES, 2013, 469 (2153)
[36]   Decision-making's impact on organizational learning and information overload [J].
Bettis-Outland, Harriette .
JOURNAL OF BUSINESS RESEARCH, 2012, 65 (06) :814-820
[37]   Linguistic information distortion on investment decision-making in the crowdfunding market [J].
Wang, Wei ;
Xu, Yuting ;
Wu, Yenchun Jim ;
Goh, Mark .
MANAGEMENT DECISION, 2022, 60 (03) :648-672
[38]   Risks and rewards in adolescent decision-making [J].
Van Duijvenvoorde, Anna C. K. ;
van Hoorn, Jorien ;
Blankenstein, Neeltje E. .
CURRENT OPINION IN PSYCHOLOGY, 2022, 48
[39]   STRATEGIC DECISION-MAKING [J].
EISENHARDT, KM ;
ZBARACKI, MJ .
STRATEGIC MANAGEMENT JOURNAL, 1992, 13 :17-37
[40]   Information Security Policy Decision Making: An Analytic Hierarchy Process Approach [J].
Hwang, Junseok ;
Syamsuddin, Irfan .
2009 THIRD ASIA INTERNATIONAL CONFERENCE ON MODELLING & SIMULATION, VOLS 1 AND 2, 2009, :158-163