Students’ computers safety behaviors, under effects of cognition and socialization: when gender and job experience influence information security behaviors

Author(s):  
Jean-Francois Berthevas
2014 ◽  
Vol 26 (3) ◽  
pp. 23-46 ◽  
Author(s):  
Clay K. Williams ◽  
Donald Wynn ◽  
Ramana Madupalli ◽  
Elena Karahanna ◽  
Barbara K. Duncan

Information security is often viewed as a technological matter. However, security professionals will readily admit that without safe practices by users, no amount or type of technology will be effective at preventing unauthorized intrusions. By paralleling the practices of information security and health prevention, a rationale for employing constructs from existing models of health behavior is established. A comprehensive and parsimonious model (the Security Belief Model) is developed to explain information security behavior intentions. The model is tested empirically based on a sample of 237 Indian professionals. The results of the empirical study indicate general support for the model, particularly including severity, susceptibility, benefits, and a cue to action as antecedents to the intention to perform preventive information security behaviors. The paper also discusses implications of the model and results for practitioners and possibilities for future research are included.


Author(s):  
Canchu Lin ◽  
Xin (Robert) Luo

Extant information systems security research identified and examined a variety of individual as well as organizational factors influencing information security behaviors, but rarely offered sufficient theoretical insight into the interaction of the individual factors with the organizational context in impacting information security behaviors. To fill this gap, this study proposes a theoretical framework that builds on the concepts of organizational culture and sensemaking to show that: 1) information security behaviors are outcomes of sensemaking; and 2) sensemaking is enabled as well as constrained by organizational culture. This study further epitomizes that information security diagnosing, solving, and performing behaviors emerge as outcomes of sensemaking about information security during the organization's interactions with technology. Theoretical and pragmatic contributions of this framework and future research directions are also demonstrated.


2019 ◽  
Vol 5 ◽  
pp. 1-22
Author(s):  
Sagar Samtani ◽  
◽  
Hongyi Zhu ◽  
Shuo Yu ◽  
◽  
...  

Author(s):  
Scott M. Debb ◽  
◽  
Daniel R. Schaffer ◽  
Darlene G. Colson ◽  
◽  
...  

How individuals conceptualize their accountability related to digital technology. There may also be age-based vulnerabilities resulting from personal perceptions about the importance of engaging in best-practices. However, age may not be as critical as experience when it comes to implementation of these behaviors. Using the Cybersecurity Behaviors subscale of the Online Security Behaviors and Beliefs Questionnaire (OSBBQ), this study compared the self-reported cybersecurity attitudes and behaviors across college-aged individuals from Generation Y and Generation Z. Data were derived from a convenience sample of predominantly African-American and Caucasian respondents (N=593) recruited from two public universities in Virginia, USA. Four of the eight OSBBQ subscale items demonstrated significant differences between Generation Y and Generation Z adults. Generation Y adults reported greater reviewing of privacy policies on social media, maintenance of antivirus updates, watching for unusual computer performance, and acting on malware alerts, but no significant differences on the other items. It is reasonable to assume that the observed elevated scores were accompanied by greater individual knowledge of information security simply because of being older as a cohort, suggesting that the group was also more experienced and less likely to perceive themselves as invulnerable to online victimization.


Author(s):  
Nor Natasha Ashira Shamsudin ◽  
Saiful Farik Mat Yatin ◽  
Nurul Fadhlin Mohd Nazim ◽  
Amie Witiza Talib ◽  
Mohammad Afiq Mohamed Sopiee ◽  
...  

Sign in / Sign up

Export Citation Format

Share Document