Explaining Users' Security Behaviors with the Security Belief Model
نویسندگان
چکیده
Information security is often viewed as a technological matter. However, security professionals will readily admit that without safe practices by users, no amount or type of technology will be effective at preventing unauthorized intrusions. By paralleling the practices of information security and health prevention, a rationale for employing constructs from existing models of health behavior is established. A comprehensive and parsimonious model (the Security Belief Model) is developed to explain information security behavior intentions. The model is tested empirically based on a sample of 237 Indian professionals. The results of the empirical study indicate general support for the model, particularly including severity, susceptibility, benefits, and a cue to action as antecedents to the intention to perform preventive information security behaviors. The paper also discusses implications of the model and results for practitioners and possibilities for future research are included. Explaining Users’ Security Behaviors with the Security Belief Model
منابع مشابه
A combination of semantic and attribute-based access control model for virtual organizations
A Virtual Organization (VO) consists of some real organizations with common interests, which aims to provide inter organizational associations to reach some common goals by sharing their resources with each other. Providing security mechanisms, and especially a suitable access control mechanism, which enforces the defined security policy is a necessary requirement in VOs. Since VO is a complex ...
متن کاملDonald Wynn , Jr . University of Dayton
Many tools and safe computing practices are available to information system users to help them avoid the negative outcomes due to information security threats. Yet many users do not use these tools and practices. We seek to understand the factors influencing organizational users’ adoption of preventive information security behaviors. These behaviors are similar to those which individuals practi...
متن کاملPrivate Key based query on encrypted data
Nowadays, users of information systems have inclination to use a central server to decrease data transferring and maintenance costs. Since such a system is not so trustworthy, users' data usually upkeeps encrypted. However, encryption is not a nostrum for security problems and cannot guarantee the data security. In other words, there are some techniques that can endanger security of encrypted d...
متن کاملEncouraging Users to Behave Securely: Examining the Influence of Technical, Managerial, and Educational Controls on Users' Secure Behavior
The human is frequently referred to as the weakest link of security. Employees who engage in behaviors contrary to their organization’s security policy often cause undesirable outcomes. This research presents a dual-processing model explaining and predicting secure behavior in relation to password policies. The model posits that the number of password security layers (technical controls), train...
متن کاملExplaining and Evaluating the Effective Factors in Improving the Quality of Children’s Playgrounds in Cities with an Emphasis on Safety and Security Aspects of Children from Parents’ Viewpoint; Case study: Koodak Park of Isfahan
Abstract Childhood games are essential for the development of cognitive, psychological, and physical skills. Playgrounds are spaces that provide the required opportunity to develop the fundamental skills and needs of children, such as connections with nature, games, activities, and so forth. Therefore, the presence of children in these areas requires the provision of a safe and secure environm...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- JOEUC
دوره 26 شماره
صفحات -
تاریخ انتشار 2014