"If It's Urgent or It Is Stopping Me from Doing Something, Then I Might Just Go Straight at It": A Study into Home Data Security Decisions

被引:14
作者
Nthala, Norbert [1 ]
Flechais, Ivan [1 ]
机构
[1] Univ Oxford, Dept Comp Sci, Oxford OX1 3QD, England
来源
HUMAN ASPECTS OF INFORMATION SECURITY, PRIVACY AND TRUST (HAS 2017) | 2017年 / 10292卷
关键词
Home user; Data security; Decision making; Security-related behaviours; Grounded theory; Meta-synthesis; RESPONSIBILITY; PROTECTION; MOTIVATION;
D O I
10.1007/978-3-319-58460-7_9
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Data security incidents have led to a wave of security awareness campaigns by public institutions targeted towards the so-called home user. Despite this rise, studies have shown poor adoption rates of security measures by the target. In this paper, we conduct a qualitative investigation of 15 home users, analyse the data using Grounded Theory and present a model of factors of data security decisions made in the home. We further consolidate the literature on this topic and analyse our findings against it using meta-synthesis. From this we identify the critical issues that surround data security in the home environment. We finally present a consolidated theoretical model for investigating factors that influence security practices in the home, and suggest future work based on our findings.
引用
收藏
页码:123 / 142
页数:20
相关论文
共 32 条
[21]   An empirical investigation of anti-spyware software adoption: A multitheoretical perspective [J].
Lee, Younghwa ;
Kozar, Kenneth A. .
INFORMATION & MANAGEMENT, 2008, 45 (02) :109-119
[22]  
Mendes Marilia S., 2015, Human Aspects of Information Security, Privacy and Trust. Third International Conference, HAS 2015, held as part of HCI International 2015. Proceedings: LNCS 9190, P391, DOI 10.1007/978-3-319-20376-8_35
[23]   Toward an Understanding of the Online Consumer's Risky Behavior and Protection Practices [J].
Milne, George R. ;
Labrecque, Lauren I. ;
Cromer, Cory .
JOURNAL OF CONSUMER AFFAIRS, 2009, 43 (03) :449-473
[24]  
Ng BY, 2005, PACIFIC ASIA CONFERENCE ON INFORMATION SYSTEMS 2005, SECTIONS 1-8 AND POSTER SESSIONS 1-6, P234
[25]  
Nouh Mariam, 2014, Human Aspects of Information Security, Privacy, and Trust. Second International Conference, HAS 2014, Held as Part of HCI International 2014. Proceedings: LNCS 8533, P352, DOI 10.1007/978-3-319-07620-1_31
[26]   Identifying patterns in informal sources of security information [J].
Rader, Emilee ;
Wash, Rick .
JOURNAL OF CYBERSECURITY, 2015, 1 (01) :121-144
[27]  
Rao UH, 2012, INT CONF COMPU ASPEC, P217, DOI 10.1109/CASoN.2012.6412405
[28]   PROTECTION MOTIVATION THEORY OF FEAR APPEALS AND ATTITUDE-CHANGE [J].
ROGERS, RW .
JOURNAL OF PSYCHOLOGY, 1975, 91 (01) :93-114
[29]   THE TRIANGLE MODEL OF RESPONSIBILITY [J].
SCHLENKER, BR ;
BRITT, TW ;
PENNINGTON, J ;
MURPHY, R ;
DOHERTY, K .
PSYCHOLOGICAL REVIEW, 1994, 101 (04) :632-652
[30]  
Styles Martyn, 2013, Human Aspects of Information Security, Privacy, and Trust. First International Conference, HAS 2013 Held as Part of HCI International 2013. Proceedings. LNCS 8030, P197, DOI 10.1007/978-3-642-39345-7_21