2016 49th Hawaii International Conference on System Sciences (HICSS) 2016
DOI: 10.1109/hicss.2016.459
|View full text |Cite
|
Sign up to set email alerts
|

Measuring the Human Factor in Information Security and Privacy

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

2
10
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
3
3
2

Relationship

0
8

Authors

Journals

citations
Cited by 23 publications
(12 citation statements)
references
References 36 publications
2
10
0
Order By: Relevance
“…Thus, the Delphi technique was employed with a group of 11 subject matter experts (SMEs) that engage in cybersecurity a majority of their time through a typical workday. The Delphi technique has been employed in information systems and cybersecurity based research before (e.g., [38] and is a common technique employed to reach consensus. Three rounds were performed with the first round being the most open.…”
Section: Objective 1: Password Hygiene Behaviorsmentioning
confidence: 99%
“…Thus, the Delphi technique was employed with a group of 11 subject matter experts (SMEs) that engage in cybersecurity a majority of their time through a typical workday. The Delphi technique has been employed in information systems and cybersecurity based research before (e.g., [38] and is a common technique employed to reach consensus. Three rounds were performed with the first round being the most open.…”
Section: Objective 1: Password Hygiene Behaviorsmentioning
confidence: 99%
“…Survey data were collected via Amazon's crowdsourcing platform Mechanical Turk (MTurk) where researchers submit surveys to individuals who are compensated a menial fee upon completion. The use of MTurk participants is increasingly popular for academic work (Dupuis, Endicott-Poposky, and Crossler 2013), with thousands of studies having been conducted via MTurk data (Hitlin 2016). The platform provides easy access to a large, stable, and diverse subject pool (Mason & Suri, 2012).…”
Section: Experimental Designmentioning
confidence: 99%
“…Self-efficacy needs to be contextspecific [29]. In this research we examined the threat of one's personal information being compromised and the nine responses found to be required to effectively mitigate this threat [30]. The importance of privacy and preventing one's personal information from being compromised by malware and other sources has been examined in several studies on individual users in both a personal and professional context (e.g., [31]).…”
Section: Information Security Behaviormentioning
confidence: 99%
“…In contrast, some of the constructs were multi-dimensional aggregate constructs consisting of reflective first-order, formative second-order: self-efficacy [43], perceived response costs [44], and perceived response efficacy [42]. A previously developed and validated survey instrument was used to assess the actions needed to protect one's self from the compromise of personal information and consisted of a formative first-order, formative secondorder construct [30].…”
Section: Data Analysis Proceduresmentioning
confidence: 99%