The Use and Non-Use of Cybersecurity Tools Among Consumers: Do They Want Help?

被引:10
作者
Dupuis, Marc [1 ]
Geiger, Tamara [2 ]
Slayton, Marshelle [2 ]
Dewing, Frances [3 ]
机构
[1] Univ Washington, Bothell, WA 98011 USA
[2] Univ Washington, Seattle, WA USA
[3] Rubica Inc, Seattle, WA USA
来源
PROCEEDINGS OF THE 20TH ANNUAL CONFERENCE ON INFORMATION TECHNOLOGY EDUCATION (SIGITE '19) | 2019年
关键词
cybersecurity; privacy; education; training; awareness; protective measures; threats; behavior; MOTIVATION; COUNTERMEASURES; IMPACT;
D O I
10.1145/3349266.3351419
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Cybersecurity behavior changes over time, as do the recommendations for how one may best protect themselves from cybersecurity threats. This paper examines current trends in what protective measures people take, such as using a password manager, virtual private network (VPN), or anti-malware software. The reasons why people employ these protective measures is explored, including why some choose not to and whether or not they are willing to pay for cybersecurity protective services, including on-call expert access. The evidence indicates that there is an important place for security education, training, and awareness (SETA) programs to help those that do not use such measures, as well as concerted efforts to improve the self-efficacy of individuals, especially females and adults 35 and over. About one in three individuals are willing to pay for cybersecurity services that include on-call access to cybersecurity experts. However, establishing a proper price point for such services remains critical.
引用
收藏
页码:81 / 86
页数:6
相关论文
共 18 条
[1]   Ransomware threat success factors, taxonomy, and countermeasures: A survey and research directions [J].
Al-rimy, Bander Ali Saleh ;
Maarof, Mohd Aizaini ;
Shaid, Syed Zainudeen Mohd .
COMPUTERS & SECURITY, 2018, 74 :144-166
[2]   Integrated framework for hands-on cybersecurity training: CyTrONE [J].
Beuran, Razvan ;
Tang, Dat ;
Cuong Pham ;
Chinen, Ken-ichi ;
Tan, Yasuo ;
Shinoda, Yoichi .
COMPUTERS & SECURITY, 2018, 78 :43-59
[3]   User Awareness of Security Countermeasures and Its Impact on Information Systems Misuse: A Deterrence Approach [J].
D'Arcy, John ;
Hovav, Anat ;
Galletta, Dennis .
INFORMATION SYSTEMS RESEARCH, 2009, 20 (01) :79-98
[4]  
DeVellis R.F., 2012, Scale development, V3rd
[5]  
Dupuis M., 2013, INT C CLOUD SEC MAN
[6]  
Dupuis M., 2016, 49 HAW INT C SYST SC
[7]  
Dupuis M, 2018, PROCEEDINGS OF THE 2018 APWG SYMPOSIUM ON ELECTRONIC CRIME RESEARCH (ECRIME), P70
[8]   "I Got the Job!": An exploratory study examining the psychological factors related to status updates on facebook [J].
Dupuis, Marc ;
Khadeer, Samreen ;
Huang, Joyce .
COMPUTERS IN HUMAN BEHAVIOR, 2017, 73 :132-140
[9]  
Dupuis MJ, 2019, PROCEEDINGS OF THE 52ND ANNUAL HAWAII INTERNATIONAL CONFERENCE ON SYSTEM SCIENCES, P4841
[10]   A meta-analysis of research on protection motivation theory [J].
Floyd, DL ;
Prentice-Dunn, S ;
Rogers, RW .
JOURNAL OF APPLIED SOCIAL PSYCHOLOGY, 2000, 30 (02) :407-429