Personality, attitudes, and intentions: Predicting initial adoption of information security behavior

نویسندگان

  • Jordan Shropshire
  • Merrill Warkentin
  • Shwadhin Sharma
چکیده

Investigations of computer user behavior become especially important when behaviors like security software adoption affect organizational information resource security, but adoption antecedents remain elusive. Technology adoption studies typically predict behavioral outcomes by investigating the relationship between attitudes and intentions, though intention may not be the best predictor of actual behavior. Personality constructs have recently been found to explain evenmore variance in behavior, thus providing insights into user behavior. This research incorporates conscientiousness and agreeableness into a conceptual model of security software use. Attitudinal constructs perceived ease of use and perceived usefulness were linked with behavioral intent, while the relationship between intent and actual use was found to be moderated by conscientiousness and agreeableness. The results that the moderating effect of personality greatly increases the amount of variance explained in actual use. © 2015 Elsevier Ltd. All rights reserved.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

An Empirical Examination of Personality Traits and Behavioral Intentions

Organizations are investing substantial resources in technical security measures that aim at preventively protecting their information assets. The way management – or information security executives – deals with potential security measures varies individually and depends on personality traits and cognitive factors. Based on the Theory of Planned Behavior, the authors examine the relationship be...

متن کامل

Predicting Academic Misconduct Intentions and Behavior Using the Theory of Planned Behavior and Personality

The efficacy of Azjen’s (1985, 1991) Theory of Planned Behavior (TPB) for the prediction of cheating intentions and behaviors was examined in a sample of 241 business undergraduates. Mediated structural equation models of the TPB, with personality constructs, adjustment, and prudence, as antecedents were examined. The TPB model explained 21% of the variance in cheating intentions and 36% of che...

متن کامل

Understanding and Predicting Electronic Commerce Adoption: An Extension of the Theory of Planned Behavior

This paper extends Ajzen’s (1991) theory of planned behavior (TPB) to explain and predict the process of e-commerce adoption by consumers. The process is captured through two online consumer behaviors: (1) getting information and (2) purchasing a product from a Web vendor. First, we simultaneously model the association between these two contingent online behaviors and their respective intention...

متن کامل

Providing a model of key factors affecting behavioral intentions of using e-banking services in Tejarat Bank

The present study aims to identify the factors affecting the behavior of customers’ use of e-banking services of Tejarat Bank in Tehran. A qualitative method and an in-depth interview have been applied to achieve the research goal. The information and data collected from the interviews have been analyzed using open coding and axial coding. Then, the initial indicators of the model of using e-ba...

متن کامل

Protection motivation and deterrence: a framework for security policy compliance in organisations

Received: 21 February 2008 Revised: 15 August 2008 2nd Revision: 31 January 2009 Accepted: 23 February 2009 Abstract Enterprises establish computer security policies to ensure the security of information resources; however, if employees and end-users of organisational information systems (IS) are not keen or are unwilling to follow security policies, then these efforts are in vain. Our study is...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • Computers & Security

دوره 49  شماره 

صفحات  -

تاریخ انتشار 2015