Human-Computer Interaction. HCI Applications and Services
DOI: 10.1007/978-3-540-73111-5_100
|View full text |Cite
|
Sign up to set email alerts
|

A Survey of Factors Influencing People’s Perception of Information Security

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
9
0
1

Publication Types

Select...
5
3
1

Relationship

1
8

Authors

Journals

citations
Cited by 17 publications
(10 citation statements)
references
References 14 publications
0
9
0
1
Order By: Relevance
“…Starr (1969) found that factors such as level of knowledge, control, and catastrophic potential factors influence perceived risk, perceived benefit, and risk acceptance. More recently, Huang, Rau, and Salvendy (2007) and Nurse et al (2011) noted similar influences on risk perception within the security context, including knowledge, impact, severity, controllability, awareness, and possibility.…”
Section: Risk Message Receivermentioning
confidence: 91%
See 1 more Smart Citation
“…Starr (1969) found that factors such as level of knowledge, control, and catastrophic potential factors influence perceived risk, perceived benefit, and risk acceptance. More recently, Huang, Rau, and Salvendy (2007) and Nurse et al (2011) noted similar influences on risk perception within the security context, including knowledge, impact, severity, controllability, awareness, and possibility.…”
Section: Risk Message Receivermentioning
confidence: 91%
“…Numerous studies have explored these perceptions, mostly among non-technical users. Huang et al (2007) conducted a survey of over 600 individuals that revealed factors that influence security perceptions, including knowledge, impact, controllability, and awareness of exposure to a threat. Furnell and Thomson (2009) and Stanton et al (2016) discussed "security fatigue," a weariness towards security when it becomes too burdensome.…”
Section: Security Mental Models and Perceptionsmentioning
confidence: 99%
“…Consequently, their reactions depend on how they perceive this or that situation (Huang et al, 2007).…”
Section: Security and Psychological Wellbeingmentioning
confidence: 99%
“…Koohang, Riggio, Paliszkiewicz, and Nord (2017) identified the top leading issues regarding mobile security policies within organizations. They were 1) BYOD (Ghosh, Gajar, & Rai, 2013;Longo, 2013;Marshall, 2014;Miller, Voas, & Hurlburt, 2012), 2) corporate communication conducted on mobile devices (Goodman, 2004;2006;He, 2012), 3) mobile apps used in the workplace (He, 2012;Huang, Rau, & Salvendy, 2007;Wu, 2013), and 4) disaster recovery plan (Choo, 2011;Totten & Hammock 2014). We assert that the awareness of these mobile devices security policies is essential to the life of the organization and potentially reduces or eliminates the threats to organizational resources.…”
Section: Mobile Devices Security Policy Awarenessmentioning
confidence: 99%