全部 标题 作者
关键词 摘要

OALib Journal期刊
ISSN: 2333-9721
费用:99美元

查看量下载量

相关文章

更多...

Threat Perceptions, Avoidance Motivation and Security Behaviors Correlations

DOI: 10.4236/jis.2020.111002, PP. 19-45

Keywords: Millennial, Perceptions, Threat, Avoidance Motivation, Online Security Behaviors

Full-Text   Cite this paper   Add to My Lib

Abstract:

As the economy increases its dependence on the internet to increase efficiency and productivity in all aspects of society, close attention has been directed to solve the challenges related to internet security. Despite the large amount of resource invested so far in this area, cybersecurity challenges are still great as the media frequently report new cyber breaches. Although researchers acknowledge that great progress has been made in protecting digital assets, cybercriminals are still successful in their operations which are no longer limited to government entities and corporations but also individual computer users. To improve users’ security posture, the researcher examined the relationship between Millennials’ perceptions of cybersecurity threat, users’ online security behaviors and avoidance motivation. The study focused on three constructs which are Perceived Threat (PTH), Online Security Behaviors (OSB) and Avoidance Motivation (AMO). The researcher administered a survey to 109 participants randomly selected in the United States. The Spearman’s correlation test performed supported the analysis of the strength of the relationship and the level of significance between the independent variable and the dependent variables. The results from the statistical test provided enough evidence to fail to reject the null hypothesis related to relationships between PTH and OSB and to reject the null hypothesis regarding the relationship between PTH and AMO.

References

[1]  Barnard-Wills, D. and Ashenden, D. (2012) Securing Virtual Space: Cyber War, Cyber Terror, and Risk. Space and Culture, 15, 110-123.
https://doi.org/10.1177/1206331211430016
[2]  Srivastava, S. (2012) Pessimistic Side of Information & Communication Technology: Cyber Bullying & Legislature Laws. International Journal of Advances in Computer Science and Technology, 1, 14-20.
[3]  Jones, C. and Mujtaba, B. (2006) Is Your Information at Risk? Information Technology Leaders’ Thoughts about the Impact of Cybercrime on Competitive Advantage. Review of Business Information Systems, 10, 7.
https://doi.org/10.19030/rbis.v10i2.5320
[4]  Williams, C.D. (2015) The Socialization of Secure Computing Practices for Home Internet Users: A Quantitative Analysis of Individual Perceptions. Doctoral Dissertation.
[5]  Panetta, L. (2012) Sustaining US Global Leadership: Priorities for 21st Century Defense. US Department of Defense, Washington DC.
[6]  Fischhoff, B., Slovic, P., Lichtenstein, S., Read, S. and Combs, B. (1978) How Safe Is Safe Enough? A Psychometric Study of Attitudes towards Technological Risks and Benefits. Policy Sciences, 9, 127-152.
https://doi.org/10.1007/BF00143739
[7]  Hali, S.M. (2000) The Role of Media in War. Defence Journal.
http://www.defencejournal.com/2000/aug/role-media-war.htm
[8]  Parsons, K., McCormac, A., Butavicius, M. and Ferguson, L. (2010) Human Factors and Information Security: Individual, Culture and Security Environment. No. DSTO-TR-2484, Command, Control, Communications and Intelligence Division DSTO Defence Science and Technology Organisation, Edinburgh.
[9]  Pattinson, M. and Anderson, G. (2005) Risk Communication, Risk Perception and Information Security. In: Security Management, Integrity, and Internal Control in Information Systems, Springer, Berlin, 175-184.
https://doi.org/10.1007/0-387-31167-X 11
[10]  Oswick, C., Fleming, P. and Hanlon, G. (2011) From Borrowing to Blending: Rethinking the Processes of Organizational Theory Building. Academy of Management Review, 36, 318-337. https://doi.org/10.5465/AMR.2011.59330932
[11]  Warkentin, M. and Siponen, M. (2015) An Enhanced Fear Appeal Rhetorical Framework: Leveraging Threats to the Human Asset through Sanctioning Rhetoric. MIS Quarterly, 39, 113-134.
https://doi.org/10.25300/MISQ/2015/39.1.06
[12]  Boss, S., Galletta, D., Lowry, P.B., Moody, G.D. and Polak, P. (2015) What Do Systems Users Have to Fear? Using Fear Appeals to Engender Threats and Fear That Motivate Protective Security Behaviors. MIS Quarterly, 39, 837-864.
https://doi.org/10.25300/MISQ/2015/39.4.5
[13]  Claar, C. and Johnson, J. (2012) Analyzing Home PC Security Adoption Behavior. Journal of Computer Information Systems, 52, 20-29.
https://doi.org/10.1108/09685221211235599
[14]  Ng, B.-Y., Kankanhalli, A. and Xu, Y.C. (2009) Studying Users’ Computer Security Behavior: A Health Belief Perspective. Decision Support Systems, 46, 815-825.
https://doi.org/10.1016/j.dss.2008.11.010
[15]  Edwards, K. (2015) Examining the Security Awareness, Information Privacy, and the Security Behaviors of Home Computer Users. Doctoral Dissertation.
[16]  DelCampo, R.G., Haggerty, L.A., Knippel, L.A. and Haney, M.J. (2011) Managing the Multi-Generational Workforce: From the GI Generation to the Millennials. Gower Publishing, Ltd., Burlington.
[17]  Haeger, D.L. and Lingham, T. (2014) A Trend toward Work-Life Fusion: A Multi-Generational Shift in Technology Use at Work. Technological Forecasting and Social Change, 89, 316-325. https://doi.org/10.1016/j.techfore.2014.08.009
[18]  Miller, K. and Murphrey, T.P. (2010) Catching Up with Our Students. Millennials and iGen: Is Agriscience Education Ready? The Agricultural Education Magazine, 83, 20.
[19]  S-O’Brien, L., Read, P., Woolcott, J. and Shah, C. (2011) Understanding Privacy Behaviors of Millennials within Social Networking Sites. Proceedings of the American Society for Information Science and Technology, 48, 1-10.
https://doi.org/10.1002/meet.2011.14504801198
[20]  Wipawayangkool, K. and Villafranca, E. (2015) Exploring Millennials’ Malware Awareness and Intention to Comply with Information Security Policy. Review of Integrative Business and Economics Research, 4, 153.
[21]  Li, L., He, W., Xu, L., Ivan, A., Anwar, M. and Yuan, X. (2014) Does Explicit Information Security Policy Affect Employees’ Cyber Security Behavior? A Pilot Study. 2014 Enterprise Systems Conference, Shanghai, 2-3 August 2014, 169-173.
https://doi.org/10.1109/ES.2014.66
[22]  APWG (2016) Phishing Activity Trends Report, 1st Quarter 2016. Anti-Phishing Working Group. https://docs.apwg.org/reports/apwg_trends_report_q1_2016.pdf
[23]  Symantec (2017) Internet Security Threat Report.
https://www.symantec.com/content/dam/symantec/docs/reports/istr-22-2017-en.pdf
[24]  Furnell, S. (2010) Jumping Security Hurdles. Computer Fraud & Security, 2010, 10-14. https://doi.org/10.1016/S1361-3723(10)70067-1
[25]  Raytheon (2017) Securing Our Future: Cybersecurity and the Millennial Workforce.
https://www.raytheon.com/sites/default/files/2017-12/2017 cyber report rev1.pdf
[26]  Sasse, M.A. and Flechais, I. (2005) Usable Security: Why Do We Need It? How Do We Get It? O’Reilly, Sebastopol.
[27]  Coughlin, T.M. (2017) Cybersecurity Education for Adolescents and Non-Technical Adults. Master’s Thesis.
[28]  Furnell, S.M., Bryant, P. and Phippen, A.D. (2007) Assessing the Security Perceptions of Personal Internet Users. Computers & Security, 26, 410-417.
https://doi.org/10.1016/j.cose.2007.03.001
[29]  Galvan, J.L. (2016) Student Motivations Regarding Online Security Implementation: A Qualitative Case Study. Doctoral Dissertation.
[30]  Chakraborty, R., Lee, J., Bagchi-Sen, S., Upadhyaya, S. and Raghav Rao, H. (2016) Online Shopping Intention in the Context of Data Breach in Online Retail Stores: An Examination of Older and Younger Adults. Decision Support Systems, 83, 47-56. https://doi.org/10.1016/j.dss.2015.12.007
[31]  Anderson, K.B., Durbin, E. and Salinger, M.A. (2008) Identity Theft. Journal of Economic Perspectives, 22, 171-192.
https://doi.org/10.1257/jep.22.2.171
[32]  Kang, R., Dabbish, L., Fruchter, N. and Kiesler, S. (2015) My Data Just Goes Everywhere: User Mental Models of the Internet and Implications for Privacy and Security. Symposium on Usable Privacy and Security, Pittsburgh, PA, 39-52.
[33]  de Bruijn, H. and Janssen, M. (2017) Building Cybersecurity Awareness: The Need for Evidence-Based Framing Strategies. Government Information Quarterly, 34, 1-7. https://doi.org/10.1016/j.giq.2017.02.007
[34]  Siponen, M.T. (2000) A Conceptual Foundation for Organizational Information Security Awareness. Information Management & Computer Security, 8, 31-41.
https://doi.org/10.1108/09685220010371394
[35]  Von Solms, B. (2001) Information Security—A Multidimensional Discipline. Computers & Security, 20, 504-508.
https://doi.org/10.1016/S0167-4048(01)00608-3
[36]  Jones, D. (2007) Low Cost Security Tools: Employee Awareness. Security: Solutions for Enterprise Security Leaders, 44, 90-91.
[37]  Kelly, C. (2006) Awareness Trumps New Security Toys. Computerworld-Newton Then Framingham Massachusetts, 40, 44.
[38]  Claar, C.L. (2011) The Adoption of Computer Security: An Analysis of Home Personal Computer User Behavior Using the Health Belief Model. Doctoral Dissertation.
[39]  Bryce, J. and Fraser, J. (2014) The Role of Disclosure of Personal Information in the Evaluation of Risk and Trust in Young Peoples’ Online Interactions. Computers in Human Behavior, 30, 299-306.
https://doi.org/10.1016/j.chb.2013.09.012
[40]  Dinev, T. and Hu, Q. (2007) The Centrality of Awareness in the Formation of User Behavioral Intention toward Protective Information Technologies. Journal of the Association for Information Systems, 8, 23.
https://doi.org/10.17705/1jais.00133
[41]  Byrne, Z.S., Dvorak, K.J., Peters, J.M., Ray, I., Howe, A. and Sanchez, D. (2016) From the User’s Perspective: Perceptions of Risk Relative to Benefit Associated with Using the Internet. Computers in Human Behavior, 59, 456-468.
https://doi.org/10.1016/j.chb.2016.02.024
[42]  Riek, M., Bohme, R. and Moore, T. (2016) Measuring the Influence of Perceived Cybercrime Risk on Online Service Avoidance. IEEE Transactions on Dependable and Secure Computing, 13, 261-273.
https://doi.org/10.1109/TDSC.2015.2410795
[43]  Skinner, C.S., Tiro, J. and Champion, V.L. (2015) The Health Belief Model. In: Health Behavior: Theory, Research, and Practice, 5th Edition, Jossey-Bass, San Francisco, CA, 75-94.
[44]  Dodel, M. and Mesch, G. (2017) Cyber-Victimization Preventive Behavior: A Health Belief Model Approach. Computers in Human Behavior, 68, 359-367.
https://doi.org/10.1016/j.chb.2016.11.044
[45]  McNabb, D.E. (2010) Research Methods for Political Science: Qualitative and Quantitative Approaches. ME Sharp Inc., New York.
[46]  Liang, H. and Xue, Y. (2010) Understanding Security Behaviors in Personal Computer Usage: A Threat Avoidance Perspective. Journal of the Association for Information Systems, 11, 394-413. https://doi.org/10.17705/1jais.00232
[47]  O’Dwyer, L.M. and Bernauer, J.A. (2013) Quantitative Research for the Qualitative Researcher. Sage Publications, Thousand Oaks, CA.
[48]  Nardi, P.M. (2018) Doing Survey Research: A Guide to Quantitative Methods. 4th Edition, Routledge, New York.
https://doi.org/10.4324/9781315172231
[49]  Martin, W.E. and Bridgmon, K.D. (2012) Quantitative and Statistical Research Methods: From Hypothesis to Results (Vol. 42). John Wiley & Sons, Hoboken, NJ.
[50]  Punch, K. (2003) Survey Research: The Basics. Sage Publications, Thousand Oaks, CA. https://doi.org/10.4135/9781849209984
[51]  Gay, L. and Airasian, P. (2000) Educational Research: Competencies for Analysis and Experience. 6th Edition, Prentice-Hall, Upper Saddle River, NJ.
[52]  Bethlehem, J. and Biffignandi, S. (2011) Handbook of Web Surveys (Vol. 567). John Wiley & Sons, Hoboken, NJ.
https://doi.org/10.1002/9781118121757
[53]  Fry, R. (2018) Millennials Are the Largest Generation in the U.S. Labor Force. Pew Research Center, Washington DC.
https://www.pewresearch.org/fact-tank/2018/2004/2011/millennials-largest-generation-us-labor-force
[54]  Kane, M.T. (1992) The Assessment of Professional Competence. Evaluation & the Health Professions, 15, 163-182.
https://doi.org/10.1177/016327879201500203
[55]  U.S. Census Bureau (2015) Millennials Outnumber Baby Boomers and Are Far More Diverse. US Census Bureau, Suitland, MD.
https://www.census.gov/newsroom/press-releases/2015/cb15-113.html
[56]  Survey Monkey (2018) Diverse Recruitment.
https://www.SurveyMonkey.com/collect/audience/?collector id=232820799
[57]  Lachin, J.M. (1981) Introduction to Sample Size Determination and Power Analysis for Clinical Trials. Controlled Clinical Trials, 2, 93-113.
https://doi.org/10.1016/0197-2456(81)90001-5
[58]  Shuster, J.J. (2014) Sample Size Verification for Clinical Trials. Clinical and Translational Science, 7, 60-62.
https://doi.org/10.1111/cts.12115
[59]  Suresh, K. and Chandrashekara, S. (2012) Sample Size Estimation and Power Analysis for Clinical Research Studies. Journal of Human Reproductive Sciences, 5, 7.
https://doi.org/10.4103/0974-1208.97779
[60]  QFAB (2019) Statistical Decision Tree.
https://www.anzmtg.org/stats/PowerCalculator/PowerCorrelation
[61]  Ifinedo, P. (2014) Information Systems Security Policy Compliance: An Empirical Study of the Effects of Socialisation, Influence, and Cognition. Information & Management, 51, 69-79. https://doi.org/10.1016/j.im.2013.10.001
[62]  Lebek, B., Uffen, J., Neumann, M., Hohler, B. and Breitner, M.H. (2014) Information Security Awareness and Behavior: A Theory-Based Literature Review. Management Research Review, 37, 1049-1092.
https://doi.org/10.1108/MRR-04-2013-0085
[63]  Straub, D., Boudreau, M. and Gefen, D. (2004) Validation Guidelines for Is Positivist Research. Communications of the Association for Information Systems, 13, 380-427. https://doi.org/10.17705/1CAIS.01324
[64]  Trochim, W.M.K. and Donnelly, J.P. (2008) The Research Methods Knowledge Base. 3rd Edition, Atomic Dog, Mason, 56-65.
[65]  U.S. Department of Health and Human Services (1979) The Belmont Report. New York.
[66]  Coulehan, M.B. and Well, J.F. (2006) Guidelines for Responsible Data Management in Scientific Research. Clinical Tools, Incorporated, Chapel Hill, NC.
[67]  Gall, M., Gall, J. and Borg, W. (2007) Nonexperimental Research: Descriptive and Causal-Comparative Designs. In: Gall, M.D., Gall, J.P. and Borg, W.R., Eds., Educational Research: An Introduction, Pearson/Allyn & Bacon, Boston, MA, 298-330.
[68]  Bless, C., Higson-Smith, C. and Kagee, A. (2006) Fundamentals of Social Research Methods: An African Perspective. Juta and Company Ltd., Cape Town.
[69]  Belli, G. (2008) Nonexperimental Quantitative Research. Lapan, 1, 59.
[70]  Newson, R. (2001) Somersd-Confidence Intervals for Nonparametric Statistics and Their Differences. Stata Technical Bulletin, 10, 47-55.
[71]  Laerd (2018). Spearman’s Rank-Order Correlation.
https://statistics.laerd.com/statistical-guides/spearmans-rank-order-correlation-statistical-guide.php
[72]  Faul, F., Erdfelder, E., Lang, A.-G. and Buchner, A. (2007) G Power 3: A Flexible Statistical Power Analysis Program for the Social, Behavioral, and Biomedical Sciences. Behavior Research Methods, 39, 175-191.
https://doi.org/10.3758/BF03193146
[73]  Field, A. (2009) Discovering Statistics Using SPSS. Sage Publications, Thousand Oaks, CA.
[74]  Matkar, A. (2012) Cronbach’s Alpha Reliability Coefficient for Standard of Customer Services in Maharashtra State Cooperative Bank. IUP Journal of Bank Management, 11, 89-95.
[75]  Tavakol, M. and Dennick, R. (2011) Making Sense of Cronbach’s Alpha. International Journal of Medical Education, 2, 53.
https://doi.org/10.5116/ijme.4dfb.8dfd
[76]  Hair, J.F., Anderson, R.E., Black, W.C., Tatham, R.L. and Babin, B.J. (2006) Multivariate Data Analysis (Vol. 6). Pearson Prentice Hall, Upper Saddle River, NJ.
[77]  Nunnally, J.C. (1978) Psychometric Theory. 2nd Edition, McGraw-Hill, New York.
[78]  George, D. and Mallery, P. (2003) SPSS for Windows Step by Step: A Simple Guide and Reference. 11.0 Update, 4th Edition, Allyn & Bacon, Boston, MA.
[79]  Gliem, J.A. and Gliem, R.R. (2003) Calculating, Interpreting, and Reporting Cronbach’s Alpha Reliability Coefficient for Likert-Type Scales.
[80]  Jackson, J.E. (2003) A User’s Guide to Principle Components. Hoboken, NJ: John Wiley & Sons, Inc., New York.
[81]  Haugli, S.E. (2014) Factor Analysis of the Psychosocial Assessment Tool (PAT2.0) (Doctoral Dissertation). ProQuest Dissertations & Theses Global Database.

Full-Text

Contact Us

service@oalib.com

QQ:3279437679

WhatsApp +8615387084133