Explaining Users' Security Behaviors with the Security Belief Model

نویسندگان

  • Clay K. Williams
  • Donald E. Wynn
  • Ramana Madupalli
  • Elena Karahanna
  • Barbara K. Duncan
چکیده

Information security is often viewed as a technological matter. However, security professionals will readily admit that without safe practices by users, no amount or type of technology will be effective at preventing unauthorized intrusions. By paralleling the practices of information security and health prevention, a rationale for employing constructs from existing models of health behavior is established. A comprehensive and parsimonious model (the Security Belief Model) is developed to explain information security behavior intentions. The model is tested empirically based on a sample of 237 Indian professionals. The results of the empirical study indicate general support for the model, particularly including severity, susceptibility, benefits, and a cue to action as antecedents to the intention to perform preventive information security behaviors. The paper also discusses implications of the model and results for practitioners and possibilities for future research are included. Explaining Users’ Security Behaviors with the Security Belief Model

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A combination of semantic and attribute-based access control model for virtual organizations

A Virtual Organization (VO) consists of some real organizations with common interests, which aims to provide inter organizational associations to reach some common goals by sharing their resources with each other. Providing security mechanisms, and especially a suitable access control mechanism, which enforces the defined security policy is a necessary requirement in VOs. Since VO is a complex ...

متن کامل

Donald Wynn , Jr . University of Dayton

Many tools and safe computing practices are available to information system users to help them avoid the negative outcomes due to information security threats. Yet many users do not use these tools and practices. We seek to understand the factors influencing organizational users’ adoption of preventive information security behaviors. These behaviors are similar to those which individuals practi...

متن کامل

Private Key based query on encrypted data

Nowadays, users of information systems have inclination to use a central server to decrease data transferring and maintenance costs. Since such a system is not so trustworthy, users' data usually upkeeps encrypted. However, encryption is not a nostrum for security problems and cannot guarantee the data security. In other words, there are some techniques that can endanger security of encrypted d...

متن کامل

Encouraging Users to Behave Securely: Examining the Influence of Technical, Managerial, and Educational Controls on Users' Secure Behavior

The human is frequently referred to as the weakest link of security. Employees who engage in behaviors contrary to their organization’s security policy often cause undesirable outcomes. This research presents a dual-processing model explaining and predicting secure behavior in relation to password policies. The model posits that the number of password security layers (technical controls), train...

متن کامل

Explaining and Evaluating the Effective Factors in Improving the Quality of Children’s Playgrounds in Cities with an Emphasis on Safety and Security Aspects of Children from Parents’ Viewpoint; Case study: Koodak Park of Isfahan

Abstract Childhood games are essential for the development of cognitive, psychological, and physical skills. Playgrounds are spaces that provide the required opportunity to develop the fundamental skills and needs of children, such as connections with nature, games, activities, and so forth. Therefore, the presence of children in these areas requires the provision of a safe and secure environm...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • JOEUC

دوره 26  شماره 

صفحات  -

تاریخ انتشار 2014