Understanding Security Behaviors in Personal Computer Usage: A Threat Avoidance Perspective
نویسندگان
چکیده
Huigang Liang East Carolina University [email protected] Yajiong Xue East Carolina University [email protected] This study aims to understand the IT threat avoidance behaviors of personal computer users. We tested a research model derived from Technology Threat Avoidance Theory (TTAT) using survey data. We find that users’ IT threat avoidance behavior is predicted by avoidance motivation, which, in turn, is determined by perceived threat, safeguard effectiveness, safeguard cost, and self-efficacy. Users develop a threat perception when they believe that the malicious IT is likely to attack them (perceived susceptibility) and the negative consequences will be severe if they are attacked (perceived severity). When threatened, users are more motivated to avoid the threat if they believe that the safeguarding measure is effective (safeguard effectiveness) and inexpensive (safeguard cost) and they have confidence in using it (self-efficacy). In addition, we find that perceived threat and safeguard effectiveness have a negative interaction on avoidance motivation so that a higher level of perceived threat is associated with a weaker relationship between safeguard effectiveness and avoidance motivation or a higher level of safeguard effectiveness is associated with a weaker relationship between perceived threat and avoidance motivation. These findings provide an enriched understanding about personal computer users’ IT threat avoidance behavior.
منابع مشابه
Alleviating Consumers' Privacy Concerns in Location-Based Services: A Psychological Control Perspective
Location-based services (LBS), enabled by advances in mobile and positioning technologies, have afforded users with a pervasive flexibility to be uniquely addressable and to access network and services on-the-move. However, because LBS could also associate the lifestyle habits, behaviors, and movements with a consumer’s personal identity, privacy concerns are particularly salient for LBS. Drawi...
متن کاملOnline Self-Disclosure and Offline Threat Detection
Human beings have evolved to detect and react to threats in their physical environment, and have developed perceptual systems to assess physical, sensorial stimuli for current, material risks. In cyberspace, those stimuli can be absent, subdued, or deliberately manipulated by antagonistic third parties. Security and privacy concerns that would normally be activated in the offline world, therefo...
متن کاملMalware Avoidance Motivations and Behaviors: A Technology Threat Avoidance Replication
The current study presents a conceptual replication of Liang and Xue’s (2010) test of their proposed Technology Threat Avoidance Theory (TTAT). Whereas the original study investigated individuals’ spyware related threat perceptions, avoidance motivations, and behaviors; we applied the original study’s research questions, hypotheses, and model to the more general context of malware. Results from...
متن کاملA Grid System Detecting Internal Malicious Behaviors at System Call Level
In our previous work, we developed a security system which detects malicious behaviors at systemcall level. It first creates users’ personal profiles for all users of a close environment and an attacker profile for all hackers to keep track of their usage behaviors as the computer forensic features, and then determines whether or not a legally login user u is the account holder or a hacker by c...
متن کاملAn investigation into the security behaviour of tertiary students regarding mobile device security
The use of mobile devices is becoming more popular by the day. With all the different features that the smart mobile devices possess, it is starting to replace personal computers both for personal use and business use. There are also more attacks concerning security on mobile devices because of their increased usage and the security measures not as effective and well-known as on personal comput...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- J. AIS
دوره 11 شماره
صفحات -
تاریخ انتشار 2010