Herd behavior in information security decision-making

被引:30
作者
Vedadi, Ali [1 ]
Warkentin, Merrill [2 ]
Dennis, Alan [3 ]
机构
[1] Middle Tennessee State Univ, Informat Syst & Analyt, Murphreesboro, TN 37132 USA
[2] Mississippi State Univ, Coll Business, Dept Management & Informat Syst, Mississippi State, MS 39762 USA
[3] Indiana Univ, Kelley Sch Business, Bloomington, IN 47405 USA
关键词
Popularity information; Imitation; Herd behavior; Information security; Coping appraisal; Bounded rationality; SOCIAL-INFLUENCE; FEAR APPEALS; PROTECTION MOTIVATION; EMPIRICAL-EXAMINATION; POLICY COMPLIANCE; ADOPTION; POPULARITY; THREATS; METAANALYSIS; ANTECEDENTS;
D O I
10.1016/j.im.2021.103526
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Current information security behavior research assumes that lone individuals make a rational, informed decision about security technologies based on careful consideration of personally available information. We challenge this assumption by examining how the herd behavior influences users' security decisions when coping with security threats. The results show that uncertainty about a security technology leads users to discount their own information and imitate others. We found that imitation tendency has a more substantial effect on security decisions than the personal perceived efficacy of the security technology. It is essential for researchers and managers to consider how the herd behavior effect influences users' security decisions.
引用
收藏
页数:13
相关论文
共 50 条
[41]   Analytical Techniques for Decision Making on Information Security for Big Data Breaches [J].
Albeshri, Aiiad ;
Thayananthan, Vijey .
INTERNATIONAL JOURNAL OF INFORMATION TECHNOLOGY & DECISION MAKING, 2018, 17 (02) :527-545
[42]   Effect of risky decision-making and job satisfaction on turnover intention and turnover behavior among information technology employees [J].
Ladelsky, Limor Kessler ;
Lee, Thomas William .
INTERNATIONAL JOURNAL OF ORGANIZATIONAL ANALYSIS, 2023, 31 (07) :3553-3581
[43]   Evaluating Security of Big Data Through Fuzzy Based Decision-Making Technique [J].
Alassery, Fawaz ;
Alzahrani, Ahmed ;
Khan, Asif Irshad ;
Sharma, Kanika ;
Ahmad, Masood ;
Khan, Raees Ahmad .
COMPUTER SYSTEMS SCIENCE AND ENGINEERING, 2023, 44 (01) :859-872
[44]   Enterprises' decision-making under government green subsidy and information asymmetry [J].
Song, Haohao ;
Wang, Ying .
RAIRO-OPERATIONS RESEARCH, 2022, 56 (06) :3871-3893
[45]   Integration of individual and social information for decision-making in groups of different sizes [J].
Park, Seongmin A. ;
Goiame, Sidney ;
O'Connor, David A. ;
Dreher, Jean-Claude .
PLOS BIOLOGY, 2017, 15 (06)
[46]   Nurse Information Security Policy Compliance, Information Competence, and Information Security Attitudes Predict Information Security Behavior [J].
Kang, Purum ;
Kang, Jiwon ;
Monsen, Karen A. .
CIN-COMPUTERS INFORMATICS NURSING, 2023, 41 (08) :595-602
[47]   The Theory of Planned Behavior and Information Security Policy Compliance [J].
Sommestad, Teodor ;
Karlzen, Henrik ;
Hallberg, Jonas .
JOURNAL OF COMPUTER INFORMATION SYSTEMS, 2019, 59 (04) :344-353
[48]   Consumer's Decision-making Behavior in Online Shopping: An Integrated Analysis [J].
Zhang, Lingying ;
Shi, Yongjiang ;
Lu, Qiang .
COMPUTER AND INFORMATION TECHNOLOGY, 2014, 519-520 :422-429
[49]   Predicting Students' Security Behavior Using Information-Motivation-Behavioral Skills Model [J].
Farooq, Ali ;
Jeske, Debora ;
Isoaho, Jouni .
ICT SYSTEMS SECURITY AND PRIVACY PROTECTION, SEC 2019, 2019, 562 :238-252
[50]   Impact of Users' Security Awareness on Desktop Security Behavior: A Protection Motivation Theory Perspective [J].
Hanus, Bartlomiej ;
Wu, Yu Andy .
INFORMATION SYSTEMS MANAGEMENT, 2016, 33 (01) :2-16