Compliance with security guidelines in teenagers
نویسندگان
چکیده
What drives teenagers to comply with computer password guidelines? Using an extended form of protection motivation theory (PMT) (Rogers, 1983), we found that even if teenage users believe they are susceptible being hacked, or hacked would be detrimental, it has no bearing on their choices. Other motives outside PMT also drive security behaviour. Personal norms fully mediate the relationship between perceived severity threat and compliance intentions such is not sufficient encourage compliance. Teenagers must actually feel obligated comply. While personal may compliance, concerns about feeling embarrassed ashamed social media accounts into encourages On other hand, peer influence, as fear teased someone hacking account, discourages Our study contributes understanding early practices highlights potential differences adult behaviours consider in future studies. For example, our findings suggest guidelines alone will suffice ensure compliance; need enforced rules at authentication level eliminate any opportunity violate rules. benefit children parents well organizations have changed work enable employees from home, but which places danger clicking malicious links parents’ computers. To knowledge, this first applies examine computer-based teenagers.
منابع مشابه
Compliance With Infection Control Guidelines in the Operating Rooms
Introduction: Compliance with the safety standards in the operating rooms, as one of the most complex work environments in the health care systems, is very important. One of the safety measures is the infection control standard. Objective: This study aimed to investigate compliance with infection control standards in the operating rooms of teaching hospitals in Rasht City, Iran. Materials an...
متن کاملCriminal Liability for Non-Compliance with Health Care Guidelines and Criteria in COVID-19
The emerging and pervasive disease of COVID 19 (coronavirus disease), which has gone from an epidemic to a global pandemic, has created many challenges for the international community. Since this disease has certain characteristics such as the unknown and complexity of its origin, high extent and speed of its spread and transmission, high mutability, lack of definitive treatment so far for it, ...
متن کاملCompliance with haemodialysis practice guidelines in Egypt.
Evidence- and consensus-based clinical practice guidelines for haemodialysis have recently been developed in Egypt. This study aimed to measure compliance with the guidelines in a sample of 16 government hospitals in Cairo and Giza governorates. Each haemodialysis unit was visited to assess the haemodialysis unit and patient care practices for all patients under dialysis at the time of the visi...
متن کاملDocumenting history in compliance with Medicare's guidelines.
S years have passed since the Health Care Financing Administration (HCFA) first put physicians on notice about the kind of medical records they would be asked to produce to back up claims considered questionable by Medicare carriers. The “Documentation Guidelines for Evaluation and Management Services,” which HCFA (now the Centers for Medicare & Medicaid Services, or CMS) developed with input f...
متن کاملGeneral Awareness of Teenagers in Information Security
The use of IT equipment has become a part of every day. However, each device that is part of cyberspace should be secured against unauthorized use. It is very important to know the basics of these security devices, but also the basics of safe conduct their owners. This information should be part of every curriculum computer science education in primary and secondary schools. Therefore, the work...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Australasian Journal of Information Systems
سال: 2021
ISSN: ['1326-2238', '1039-7841', '1449-8618']
DOI: https://doi.org/10.3127/ajis.v25i0.2953