Enforcing Information Security Protection: Risk Propensity and Self-Efficacy Perspectives
نویسندگان
چکیده
Effective information security (InfoSec) management cannot be achieved through only technology; people are the weakest point in security and their behaviors such as inappropriate use of computer and network resources, file sharing habits etc. cannot be controlled by security technologies. Although the importance of individuals’ InfoSec behaviors has been widely recognized, there is limited understanding of what impact individual users InfoSec protection behavior. Thus, focusing on the relationships among risk propensity, InfoSec selfefficacy, InfoSec protection efforts from several theoretical lenses, the study proposes a research model to explain individuals’ intention to reinforce their InfoSec protection and empirically validates the proposed model. The results of the study are expected to provide a deeper understanding of the relationships among risk propensity, self-efficacy, risk perception, InfoSec protection efforts, and InfoSec reinforcement intention.
منابع مشابه
Analyzing Tools and Algorithms for Privacy Protection and Data Security in Social Networks
The purpose of this research, is to study factors influencing privacy concerns about data security and protection on social network sites and its’ influence on self-disclosure. 100 articles about privacy protection, data security, information disclosure and Information leakage on social networks were studied. Models and algorithms types and their repetition in articles have been distinguished a...
متن کاملOn Economic Perspectives of Internet Security: The Problem of Designing Optimal Cyber-Insurance Contracts
In Internet security, traditional protection mechanisms such as anti-virus software, firewalls, and other add-ons are not capable of completely eliminating security risks [3]. As noted in [7], the management of information security needs to be addressed through economic, psychological, and policymaking approaches, in combination with engineering approaches. As a realistic and futuristic solutio...
متن کاملInvestigating the Effects of Education Based on the Information-Motivation-Behavioral Skills Model on Sexual Self-Efficacy in Women with High-Risk Sexual Behaviors
Lower levels of sexual self-efficacy increase high-risk sexual behaviors in prostitutes. In this respect, an educational intervention program based on the Information-Motivation-Behavioral Skills (IMB) model can enhance sexual self-efficacy. Therefore, this study investigated the effects of IMB education on sexual self-efficacy in women. To this end, a clinical trial was conducted on women with...
متن کاملA Genetic Algorithms-Based Approach for Optimized Self-protection in a Pervasive Service Middleware
With increasingly complex and heterogeneous systems in pervasive service computing, it becomes more and more important to provide self-protected services to end users. In order to achieve selfprotection, the corresponding security should be provided in an optimized manner considering the constraints of heterogeneous devices and networks. In this paper, we present a Genetic Algorithms-based appr...
متن کاملProtection motivation and deterrence: a framework for security policy compliance in organisations
Received: 21 February 2008 Revised: 15 August 2008 2nd Revision: 31 January 2009 Accepted: 23 February 2009 Abstract Enterprises establish computer security policies to ensure the security of information resources; however, if employees and end-users of organisational information systems (IS) are not keen or are unwilling to follow security policies, then these efforts are in vain. Our study is...
متن کامل