2009
DOI: 10.1016/j.dss.2008.11.010
|View full text |Cite
|
Sign up to set email alerts
|

Studying users' computer security behavior: A health belief perspective

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

11
353
6
2

Year Published

2011
2011
2023
2023

Publication Types

Select...
5
3
1

Relationship

0
9

Authors

Journals

citations
Cited by 413 publications
(374 citation statements)
references
References 28 publications
11
353
6
2
Order By: Relevance
“…HBM has being suggested by previous study to be a comprehensive theory because it consists of number of explanatory constructs that are not represented in IS adoption or other related theories, but important in information security practices [20]. Moreover, HBM is able to measure or predict human behavior successfully [21].…”
Section: B Health Belief Modelmentioning
confidence: 99%
See 1 more Smart Citation
“…HBM has being suggested by previous study to be a comprehensive theory because it consists of number of explanatory constructs that are not represented in IS adoption or other related theories, but important in information security practices [20]. Moreover, HBM is able to measure or predict human behavior successfully [21].…”
Section: B Health Belief Modelmentioning
confidence: 99%
“…Ng et al [20] defined perceived barrier as a user"s perceptions towards the difficulty of practicing computer security behavior, which is likely to reduce the performance of information security behavior. One of the barriers in information security is unskilled employees towards security technology due to their lack of security awareness.…”
Section: Perceived Barriermentioning
confidence: 99%
“…However, PMT has seldom been applied to individuals' risky use of the Internet and information technology, with exceptions including recent studies on computer users' decisions to employ virus protection (Lee et al, 2008) and to regularly back up work-related data (Boss and Galletta, 2008), employees' compliance with company security policies (Pahnila et al, 2007;Johnston and Warkentin, 2010), and the stress coping mechanisms for IT professionals (Tsai et al, 2007). Other recent studies have utilized some of the same health-related constructs modeled in PMT to help explain security consciousness in users (Ng et al, 2009). The results of these studies largely indicated that the same factors that influence an individual's response to health and environmental threats, such as response costs, efficacy, and vulnerability, can influence an individual's response to technology-related threats.…”
Section: What Factors Influence An Individual To Post Personal Informmentioning
confidence: 99%
“…Similar research has shown robust results with fewer respondents (e.g. [18], [40]). Eleven respondents did not complete the questionnaire, leaving 123 respondents in total: 54 male (43.9%) and 69 female (56.1%).…”
Section: ) Demographicsmentioning
confidence: 65%