What Influences Information Security Behavior? A Study with Brazilian Users

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Self-efficacy in information security: Its influence on end users' information security practice behavior

The ultimate success of information security depends on appropriate information security practice behaviors by the end users. Based on social cognitive theory, this study models and tests relationships among self-efficacy in information security, security practice behavior and motivation to strengthen security efforts. This study also explores antecedents to individuals’ self-efficacy beliefs i...

متن کامل

Hackers, Users, Information Security

We analyze the strategic interactions among end-users and between end-users and a hacker. We show that security efforts by end users are strategic substitutes. This explains the inertia among end-users in taking precautions even in the face of grave potential consequences. Next, we analyze the direct and indirect effects of changes in user fixing cost and the rate of enforcement against hacking...

متن کامل

What Influences Students to Study Information and Communication Technology?

There is a high demand for qualified information and communication technology (ICT) practitioners in the European labor market. According to recent reports, ICT companies want to hire thousands of ICT specialists but are unable to find the talent. A problem at many universities is a high dropout rate among ICT students, especially during the first year. Therefore, educational research is needed...

متن کامل

Adaptive Security Dialogs for Improved Security Behavior of Users

Despite the increasing awareness of the importance of security for daily computer users, we see that many users still fail to behave securely when confronted with a security-related decision. In this paper, we introduce a new approach to security-related dialogs called Adaptive Security Dialogs (ASD). This approach is a combination of a new architecture and a new way of interacting with users t...

متن کامل

Information Security Policy - What do International Information Security Standards say?

One of the most information security controls is the information security policy. This vital direction-giving document is, however, not always easy to develop and the authors thereof battle with questions such as what constitutes a policy. This results in the policy authors turning to existing sources for guidance. One of these sources is the various international information security standards...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Journal of Information Systems and Technology Management

سال: 2016

ISSN: 1807-1775

DOI: 10.4301/s1807-17752016000300007