Issues in Information Systems Volume 14, Issue 2, pp , 2013
|
|
|
- Francis Allison
- 10 years ago
- Views:
Transcription
1 COLLEGE STUDENT HOME COMPUTER SECURITY ADOPTION Chet L. Claar, Central Washington University, Robert C. Shields, Central Washington University, David Rawlinson, Central Washington University, Robert Lupton, Central Washington University, ABSTRACT The home Internet user faces a hostile environment abundant in potential attacks on their computers. These attacks have been increasing at an alarming rate and cause damage to individuals and organizations regularly, and have the potential to cripple the critical infrastructures of entire countries. Recent research has determined that some individuals are not utilizing additional software protections available to mitigate these potential security risks. This paper seeks to clarify the reasons by proposing a conceptual framework that utilizes the Health Belief Model as a possible way to explain why some people do not perceive a threat sufficient to prompt the adoption of computer security software. Keywords: computer security, technology adoption, home computer security, health belief model and protective technology INTRODUCTION This paper uses the Security Adoption Behavior Model (SABM) presented in [4] to assess home computer security adoption by students at a medium sized public university in Washington. There are striking similarities in the beliefs and perceptions in protecting one s health and in protecting one s computer from infection and attack. The SABM uses constructs from the long standing medical Health Belief Model presented in [10]. The objective of the current work is to better understand why individuals do (or do not) adopt better security behaviors and ultimately to understand how to increase their motivation to do so. Research [1, 6] has consistently found that some people do not use available software to reduce their security risk. The phenomenal growth of the Internet has brought new and exciting opportunities to the home computer user. Online shopping and banking, communication with friends and relatives, access to sources of information for research and homework, entertainment sources, up-to-the-minute weather and news, and countless other possible online activities have made the internet indispensible for most online-enabled households. However, while providing these new opportunities for home Internet users, it has also provided an opportunity-rich environment for criminals and others with malicious intent. They seek to exploit computer users who do not adequately protect themselves from the ever-increasing number of cyber threats. Using computer security solutions available in the form of antivirus, anti-spyware, and firewall software in addition to ensuring that operating systems are properly updated provides effective protection from these online threats. The U.S. Census Bureau statistics for 2010 population survey show over million households in the United States with Internet access [12]; all of these are potential targets for Internet-borne attacks. Consumer Reports surveyed home users in 2012 and extrapolating from their data estimate 58.2 million online users suffered a noticeable malware infection [6]. America Online and the National Cyber Security Alliance conducted a survey of Internet users in the United States in order to assess their level of security awareness and good practice [1]. The study revealed that approximately 75% of all respondents feel that their computer is very safe from online attacks and viruses. Thus, 84% of respondents keep sensitive information on their computer and 72% use their computers for sensitive transactions. An examination of the respondents systems revealed that 15% had no anti-virus software installed and that 67% were not updated within the previous week, 19% of these computers had an active viral infection, and that 63% had experienced a previous viral infection. The study discovered that 67% of computers had no firewall software installed, and 72% with firewalls installed were not properly configured. Inadequately protected computers 139
2 represented by these recent studies equate to millions of vulnerable computers in the United States that are potential victims. With the possibility of infected machines being used to disrupt or destroy critical infrastructures and disrupt vital services, the necessity of determining the factors involved in the adoption of computer security solutions continues to be important. LITERATURE REVIEW The behavioral antecedents of adoption and use of computer security solutions of home computer users is the focus of this research. The concept of perceived vulnerability in online activities seems an appropriate aspect to examine when trying to understand adoption and usage behavior for computer security solutions. Additionally, the severity of a security incident to the user would also be an important user perception to examine in an effort to better understand adoption behavior. Focusing this research on the individual home computer user will contribute to a better understanding of computer security adoption behavior. The current predominant models in information systems used to examine user adoption and usage behavior are the Theory of Reasoned Action [8], the Theory of Planned Behavior [2], the Technology Acceptance Model [7], the Unified Theory of Acceptance and Usage of Technology [13], the Model of Adoption of Technology in Households [3], the Model of PC utilization [11], and the Innovation Diffusion Theory [9]. However, these MIS research models usually focus on technologies that promote positive outcomes and offer the user some sort of utility. However, computer security software is classified as a protective technology, which is strictly designed to avert negative outcomes and offers little obvious utility [5]. In an attempt to resolve the deficiency of MIS models for security adoption, a research model was constructed to examine the effectiveness of the constructs found in the Health Belief Model [10], a healthcare model from outside the information systems domain [4]. MODEL DEVELOPMENT This work uses constructs and the survey instrument developed for the Security Adoption Behavior Model (SABM) [4] to explore the behaviors of home computer users in relation to the security measures taken on their computers using the research model shown in Figure 1. The slightly simplified conceptual model for the current work contains six core constructs that comprise Model 1 in the data analysis and results section below. The analysis also includes the interactions of the first five core constructs using prior experience with malware incidents as a moderator variable as Model 2. [4] assessed the overall quality of the model and found that it explained 30.4% of the variance in the home usage of computer security (adjusted R 2 was 0.167). For the current study, we used the factor analysis weighting of the survey instrument questions developed in [4] to measure each of these core constructs. This replication casts additional light on the complex issue of what induces individual users to mitigate risk of suffering a malware incident. 140
3 Figure 1. Research Model Research Model Core Constructs Brief explanations of the core and moderating constructs are presented with their associated research hypotheses. Tables 1 and 2 show the mapping of the survey instrument questions to each of the core constructs. Factor analysis weights were determined and validated in [4]. H1 Perceived Vulnerability to security incidents is positively related to computer security usage. Perceived Vulnerability (VUL) is an individual s judgment of the security risk of his or her computer suffering from a particular security related issue. H2 Perceived severity of security incidents is positively related to computer security usage. Perceived Severity (SEV) is the individual s belief in the severity of the security compromise and its impact on lifestyle. H3 Perceived benefits of practicing computer security are positively related to computer security usage. Perceived Benefits (BEN) of an action is the belief in the effectiveness of the actions required to prevent a security risk H4 - Perceived barriers of practicing computer security are negatively related to computer security usage. Perceived Barriers to Action (BAR) construct is the individual s belief in the benefits compared to the perceived costs of action. Perceived Barriers constitute obstacles to adoption and usage of security software for home computers. H5 Information Security Self- efficacy is positively related to computer security usage. Self- Efficacy (SEF) is an individual s belief in his or her own ability to carry out a particular task. For this study, it means the belief that the individual can install, configure, and maintain the security software on their computer. H6 - Cues to action are positively related to computer security usage. Cues to Action (CUE): Even if a person is motivated and can perceive a beneficial action to take, actual change often occurs only in response to some external or internal cue. Research Model Moderating Variable Prior Experience (PXP) H7a- e - Prior Experience (with security issues or attacks) significantly moderates the relationships of VUL, SEV, BEN, BAR and SEF on Computer Security Usage (CSU). 141
4 Research Model Dependent Variable Issues in Information Systems Computer Security Usage (CSU) This is the dependent variable of the study as depicted in Figure 1. The measurement for this construct is selfreported usage of computer security software. It is assessed using questions to determine if the individual has antivirus, firewall, and anti-spyware software installed and the level of usage. Software updates are not addressed in this study. Survey Design RESEARCH METHODOLOGY This research used an Internet-based survey to test the proposed model. The survey used questions developed and presented in [4]. The population of interest is all Internet enabled computer owners that are at least partially responsible for the selection, installation, and maintenance of the software on their computers. Perceived Vulnerability, Perceived Severity, and Perceived Benefits used the scenario based items listed in Table 1. The questions for the remaining model constructs are listed in Table 2. All questions used a seven point scale. Table 1 Security Incident Scenarios and Core Construct Associations Scenario Question (evaluated for likeliness, severity, and benefits) Construct and Measure 1 My computer system becoming corrupted by a virus or worm. VUL1-8: Highly Likely 2 My computer system being taken over by a hacker. to Highly Un-Likely for 3 My data corrupted by a virus or cyber-attack. vulnerability 4 My identity stolen (credit card number, Social Security Number, Bank account information, etc.). SEV1-8: Very important to not at all important 5 My data lost due to a virus or worm on my computer. for severity 6 The Internet becoming inaccessible because of computer security BEN1-8: Highly useful problems. to not at all useful for 7 Downloading a file that is infected with a virus through my . benefits of using 8 Downloading a file that is infected with a virus from the internet. security software 142
5 Table 2 Survey Question Items and Core Construct Associations Item Question Measure BAR1 The expense of security software is a concern for me. Highly Disagree to Highly Agree BAR2 Using security software would change the way I use my computer. Highly Disagree to Highly Agree BAR3 Using security software effectively is time consuming. Highly Disagree to Highly Agree BAR4 Using security software is would require considerable investment of Highly Disagree to Highly Agree effort other than time. SEF1 I can select the appropriate security software for my home computer. Not At All Confident to Totally Confident SEF2 I can correctly install security software on my home computer(s). Not At All Confident to Totally Confident SEF3 I can correctly configure security software on my home computer(s). Not At All Confident to Totally Confident SEF4 I can find the information I need if I have problems using security Not At All Confident to Totally CUE1 CUE2 CUE3 CUE4 software on my home computer(s). If a friend were to tell me of a recent experience with a computer virus, I would be more conscious of my computer's chance of being attacked. If my computer started behaving strangely, I would be concerned it had been the victim of a security attack. If I saw a news report, or read a newspaper or magazine about a new computer vulnerability, I would be more concerned about my computer's chances of being attacked. If I received an from the maker of my computer s operating system about a new security vulnerability, I would be more concerned about my computer's chances of being attacked. Confident Highly Disagree to Highly Agree Highly Disagree to Highly Agree Highly Disagree to Highly Agree Highly Disagree to Highly Agree PXP1 How frequently have you been affected by a computer security problem? PXP2 How recently have you been affected by a computer security problem? PXP3 The level of impact I have experienced from a computer security problem is: SSU1 I use add-on anti-virus software on my home computer(s). Never to Always SSU2 I use add-on firewall software on my home computer(s) Never to Always SSU3 I use add-on anti-spyware software on my home computer(s) Never to Always Never to All the Time Never to Within the Last Week Very Low/No Impact to Very High Impact Data Collection To recruit participants for the study members of undergraduate classes at a northwestern United States university were asked to complete the survey on SurveyMonkey.com. This website allows the survey to be filled out anonymously. Data collection yielded 99 usable surveys. Table 3 lists the sample participant characteristics. 143
6 Table 3: Sample Characteristics Categorical Variable Frequency Percent (%) Gender (GEN) Male Female No Answer Operating System (OS) Windows XP or Earlier Windows Vista Windows Windows Apple OS X Linux Continuous Variable Value AGE Mean Standard Deviation DATA ANALYSIS AND RESULTS To test the hypotheses outlined above, a multiple regression analysis was conducted using SPSS with all nondichotomous variables mean-centered prior to the regression analysis. The descriptive statistics for the variables used in the regression can be found in Table 4. The regression employed a hierarchical two-step method. In the first step (Model 1), the dependent variable Computer Security Usage was regressed on the six independent variables to determine main effects. The moderating variable: prior experience; and the hypothesized two-way interactions between it and the five independent variables comprised step two (Model 2). Regression results appear in Table 5. This study supports the understanding that several individual human characteristics help explain individual adoption of security behavior and that there is still considerable room for improving this understanding and corresponding behavior. Table 4 Construct Descriptive Statistics Variable Min Max Mean St. Dev. Skew St. Err. Kurtosis St. Err. Vulnerability Severity Benefits Barriers Cues to Action Self Efficacy Prior Experience Computer Security Usage In the current study, overall, the research model explains 35.3% of the variance in the dependent variable, computer security usage; slightly more than the 30.4% of the variance explained by the model as used in the prior study [4]. The main effects of vulnerability, severity, benefits, barriers, self-efficacy, and cues to action account for 26.2% of the explained variance, while the moderating variable, prior experience and the hypothesized two-way effects account for 9.1% of the variance in computer security usage. In the Model 1 regression analysis, the core construct main effects of vulnerability, severity, benefits, barriers, selfefficacy, and cues to action, were tested (H1-H6). In model 2, the research hypotheses H7a-e were tested to 144
7 determine the strength of the interaction effects of the moderating variable. In Table 5 the post-hoc t- test the number of asterisks next to each un-standardized coefficient indicates significance level for each model component. Model 1 Table 5: Regression Results In Model 1, the research hypotheses H1 through H6 were tested to determine the main effects of the Independent variables on the dependent variables. Results from the Model 1 analysis are listed in Table 5. Only two hypotheses were supported: H1 (vulnerability) and H5(self-efficacy) had significant coefficients as expected. Interestingly, the severity coefficient was significant but contrary to the hypothesis had a negative sign. This inconsistency may appear because a significant number of participants have a faulty or unrealistic perception of severity. Model 2 Model 1 Model 2 Result Coefficients Coefficients Vulnerability (VUL) 0.364** 0.297* H1 Supported Severity (SEV) * H2 Not supported Benefits (BEN) H3 Not supported Barriers (BAR) * H4 Not supported Self-Efficacy (SEF) 0.425** 0.372* H5 Supported Cues to Action (CUE) H6 Not supported Prior Experience (PXP) PXP * VUL H7a Not supported PXP * SEV 0.454* H7b Supported PXP * BEN * H7c Supported PXP * BAR H7d Not supported PXP * SEF H7e Not supported Model 1 Model 2 R *** 0.353*** Adjusted R Change in R *p 0.05; **p 0.01; ***p The second model focused on research hypotheses H7a-e: that prior experience would have a significant moderating effect on the core constructs. As shown in Table 6, two hypotheses were supported: H7b and H7c. H7b with a coefficient showing significant moderating effect as hypothesized. Prior experience did interact with perceived benefits to produce a significant coefficient; however, unlike results in [4], it produced a negative coefficient. Please see the prior experience - perceived benefits interaction discussion that follows Figure 3 for a discussion of this results. 145
8 Figure 2. Interaction of Prior Experience and Perceived Severity The interaction of prior experience and severity on computer security usage, Figure 2, shows that when prior experience with security incidents is high (+2 SD), perceived severity has a positive relationship with computer security usage. This is consistent with the hypothesis that perceived severity is positively related to computer security usage. However, when prior experience is low (-2 SD), the simple slope of the line takes on a negative value and the corresponding value of computer security decreases. This inconsistency may appear because participants with little prior experience have a faulty or very skewed perception of severity. Figure 3. Interaction of Prior Experience and Perceived Benefits The interaction of prior experience and perceived benefits on computer security usage, Figure 3, shows that when prior experience with security incidents is low (-2 SD), Perceived Benefits has a positive relationship with computer security usage. This is consistent with the hypothesis that perceived benefits is positively related to computer security usage. When prior experience is high (+2 SD) the relationship between Perceived Benefits and Computer Security Usage is slightly negative. This inconsistency may appear because participants with extensive prior 146
9 malware events recognize that some problems can occur regardless of how diligently one behaves to mitigate risk. Another possible interpretation may be that students with prior malware experiences believe that mitigating security risks is not worth the expected benefit. Respondents with low prior experience had a much more widely distributed range of perceived benefits and computer security usage. Those with high prior experience had a narrow range of computer security usage with a slightly negative slope to their perceived benefits. This unexpected distribution seems to be the key reason for the negative coefficient for this interaction. CONCLUSIONS The research model shown in Figure 1 presents 11 constructs and moderated interactions as predictors for computer security usage behavior in the home environment. This study provides empirical evidence that these constructs contribute to this understudied area of computer security. The results of this research also suggest that further evaluation of models based on the Health Belief Model may enhance the understanding of computer security adoption in the home. Two of the constructs in the research model, perceived severity and cues to action, do not appear in other extant Information Systems models. While cues to action was not found to be a significant predictors of computer security usage in this research, it may still offer possible explanations of attitude that should be explored in the future. The testing of the model with the current sample data revealed significant contributors to the usage of computer security were the perceived vulnerability of a security incident, perceived severity of security incidents and the moderating effect of prior experience with a security incident on perceived severity and perceived benefits of secure practices. Implications for educators The results presented above suggest that user education could influence users perceptions of vulnerability and improve security software usage. Limitations One major limitation of this study is the non-random, college student-based sample used. The full population of interest (potentially all home computer users) is large and heterogeneous. The anonymous nature of the data collection and the sampling method lead to the possibility of non-responder bias which is impossible to measure in this study. Another limitation is that the study used self-reported usage as a dependent variable. This could result in a selfreport bias in which the respondents answer the usage measures in a way that would make their usage appear higher than would be measured through observation or experimentation. The results presented in [1] suggest that some home users hold unrealistic or inaccurate views of the vulnerability and level of risk mitigation on their home computers. The use of an online survey limits the respondent pool to those that felt comfortable completing the survey, creating a potential response bias. Future Research An obvious addition to this study would be a replication using different samples from the target population, such as international samples. Another option would be to combine the most significant constructs from this model with those from another effective tool such as the Unified Theory of Acceptance and Use of Technology (UTAUT) described in [13]. 147
10 This study considered computer security usage as the application of anti-virus, firewall, and anti-spyware software. Future applications of the model could be extended to the behaviors involved in opening suspicious s, using suspicious websites, file sharing, and other high-risk online activities. Finally, the application of the HBM to the study of security adoption can be extended beyond the home environment to study security adoption behavior in the corporate environment. REFERENCES [1] AOL and National Cyber Security Alliance (NCSA), (2005). AOL/NCSA Online Safety Study. [2] Ajzen, I. (1991). The theory of planned behavior. Organizational Behavior and Human Decision Processes, 50, [3] Brown, S.A., Venkatesh, V. (2005). Model of Adoption of Technology in Households: A Baseline Model Test and Extension Incorporating Household Life Cycle, MIS Quarterly, 29(3), [4] Claar, C., & Johnson, J. (2012). Analyzing home PC security adoption behavior. Journal of Computer Information Systems, Summer 2012, [5] Conklin, Wm. Arthur (2006). Computer security behaviors of home PC users: A diffusion of innovation approach. Ph.D. dissertation, The University of Texas at San Antonio, United States -- Texas. Retrieved September 27, 2009, from Dissertations & Theses: Full Text.(Publication No. AAT ). [6] Consumer Reports. (2013) Meanwhile, on your home computer, June 2013, 21. [7] Davis, F. D. (1989). Perceived usefulness, perceived ease of use, and user acceptance of information technology. MIS Quarterly, 13(3), [8] Fishbein, M. & Ajzen, I. (1975). Belief, Attitude, Intention, and Behavior: An Introduction to Theory and Research. Boston: Addison-Wesley. [9] Rogers, E.M., Diffusion of Innovations. Fifth ed. 2003, New York, New York, U.S.A.: The Free Press. [10] Rosenstock I., Strecher, V., & Becker, M. (1994). The Health Belief Model and HIV risk behavior change. In R.J. DiClemente & J.L. Peterson (Eds.), Preventing AIDS: Theories and methods of behavioral interventions (pp. 5-24). New York, NY: Plenum Press. [11] Thompson, R. L., Higgins, C. A., & Howell, J. M. (1991). Personal computing: Toward a conceptual model of utilization. MIS Quarterly, 15(1), 131. [12] U.S. Census Bureau, (2012), Computer and Internet Use in the United States: 2010, downloaded 2 May 2012 from [13] Venkatesh, V., Morris, M. G., Davis, G. B., & Davis, F. D. (2003). User acceptance of information technology: Toward a unified view. MIS Quarterly, 27(3), Acknowledgements: We want to thank the anonymous reviewers for their suggestions to improve the clarity of this work. 148
EXAMINING HEALTHCARE PROFESSIONALS ACCEPTANCE OF ELECTRONIC MEDICAL RECORDS USING UTAUT
EXAMINING HEALTHCARE PROFESSIONALS ACCEPTANCE OF ELECTRONIC MEDICAL RECORDS USING UTAUT Matthew J. Wills, Dakota State University Omar F. El-Gayar, Dakota State University Dorine Bennett, Dakota State
ANALYSIS OF USER ACCEPTANCE OF A NETWORK MONITORING SYSTEM WITH A FOCUS ON ICT TEACHERS
ANALYSIS OF USER ACCEPTANCE OF A NETWORK MONITORING SYSTEM WITH A FOCUS ON ICT TEACHERS Siti Rahayu Abdul Aziz 1, Mohamad Ibrahim 2, and Suhaimi Sauti 3 1 Universiti Teknologi MARA, Malaysia, [email protected]
Jurnal Teknologi CONTINUOUS USE OF ONLINE STORAGE SYSTEM FOR DOCUMENT SHARING. Full Paper. Fadhilah Mat Yamin a*, Wan Hussain Wan Ishak b
Jurnal Teknologi CONTINUOUS USE OF ONLINE STORAGE SYSTEM FOR DOCUMENT SHARING Fadhilah Mat Yamin a*, Wan Hussain Wan Ishak b a School of Technology Management & Logistics, College of Business, Universiti
Students Acceptance on Document Sharing through Online Storage System
Students Acceptance on Document Sharing through Online Storage System Wan Hussain Wan Ishak, Fadhilah Mat Yamin, Amlus Ibrahim Universiti Utara Malaysia, Sintok, Kedah, Malaysia Email: [email protected]
Mobile Stock Trading (MST) and its Social Impact: A Case Study in Hong Kong
Mobile Stock Trading (MST) and its Social Impact: A Case Study in Hong Kong K. M. Sam 1, C. R. Chatwin 2, I. C. Ma 3 1 Department of Accounting and Information Management, University of Macau, Macau, China
Modelling user acceptance of wireless medical technologies
Modelling user acceptance of wireless medical technologies Katrin Arning, Sylvia Kowalewski, and Martina Ziefle Human Computer Interaction Center (HCIC), RWTH Aachen University Theaterplatz 14, 52062 Aachen,
UNDERSTANDING EXPLORATORY USE
UNDERSTANDING EXPLORATORY USE OF ERP SYSTEMS 1 Rui D. Sousa Terry College of Business University of Georgia [email protected] Dale L. Goodhue Terry College of Business University of Georgia [email protected]
User Behavior Research of Information Security Technology Based on TAM
, pp.203-210 http://dx.doi.org/10.14257/ijsia.2014.8.2.21 User Behavior Research of Information Security Technology Based on TAM Wang Cheng 1 and Wang Shi-bo 1 1 School of Economics and Management of Qiqihar
1. For each of the 25 questions, multiply each question response risk value (1-5) by the number of times it was chosen by the survey takers.
Employee Security Awareness Survey Trenton Bond [email protected] Admin - Version 1.3 Security Awareness One of the most significant security risks that organizations and corporations face today is
DEVELOPING AN EXTENDED TECHNOLOGY ACCEPTANCE MODEL: DOCTORS ACCEPTANCE OF ELECTRONIC MEDICAL RECORDS IN JORDAN
DEVELOPING AN EXTENDED TECHNOLOGY ACCEPTANCE MODEL: DOCTORS ACCEPTANCE OF ELECTRONIC MEDICAL RECORDS IN JORDAN INTRODUCTION Fauziah Baharom 1, Ola T. Khorma 2, Haslina Mohd 3, and Mahmood G. Bashayreh
DENIAL OF SERVICE: HOW BUSINESSES EVALUATE THE THREAT OF DDOS ATTACKS IT SECURITY RISKS SPECIAL REPORT SERIES
DENIAL OF SERVICE: HOW BUSINESSES EVALUATE THE IT SECURITY RISKS SPECIAL REPORT SERIES Kaspersky Lab 2 Corporate IT Security Risks Survey details: More than 5500 companies in 26 countries around the world
Cloud Computing: A Comparison Between Educational Technology Experts' and Information Professionals' Perspectives
Noa Aharony 1 Cloud Computing: A Comparison Between Educational Technology Experts' and Information Professionals' Perspectives Noa Aharony Department of Information Science, Bar-Ilan University [email protected]
Consumer Perception of Mobile Phone Attributes
Consumer Perception of Mobile Phone Attributes Tao Zhang 1, Pei-Luen Patrick Rau 2, Jia Zhou 2 1 Department of Electrical Engineering and Computer Science Vanderbilt University, TN 37211, USA 2 Department
Dual. Utilitarian. Productivity. Fun
An Interdisciplinary Journal on Humans in ICT Environments ISSN: 1795-6889 www.humantechnology.jyu.fi Volume 2 (2), October 2006, 225 235 AN ACCEPTANCE MODEL FOR USEFUL AND FUN INFORMATION SYSTEMS Thomas
Issues in Information Systems Volume 15, Issue I, pp. 409-417, 2014
STUDENT ACCEPTENCE OF LEARNING MANAGEMENT SYSTEMS: A STUDY ON DEMOGRAPHICS Chet Claar, Central Washington University, [email protected] Laura Portolese Dias, Central Washington University, [email protected] Robert
G/On. Basic Best Practice Reference Guide Version 6. For Public Use. Make Connectivity Easy
For Public Use G/On Basic Best Practice Reference Guide Version 6 Make Connectivity Easy 2006 Giritech A/S. 1 G/On Basic Best Practices Reference Guide v.6 Table of Contents Scope...3 G/On Server Platform
THE THEORY OF PLANNED BEHAVIOR AND ITS ROLE IN TECHNOLOGY ACCEPTANCE OF ELECTRONIC MEDICAL RECORDS IMPLEMENTATION
THE THEORY OF PLANNED BEHAVIOR AND ITS ROLE IN TECHNOLOGY ACCEPTANCE OF ELECTRONIC MEDICAL RECORDS IMPLEMENTATION Elaine Seeman, Department of Management Information Systems College of Business, East Carolina
The Influence of Trust In Top Management And Attitudes Toward Appraisal And Merit Systems On Perceived Quality Of Care
The Influence of Trust In Top Management And Attitudes Toward Appraisal And Merit Systems On Perceived Quality Of Care Michael J. Vest and David L. Duhon Department of Management and Marketing College
Older-Users Acceptance of Smartcard Payment Systems: An Investigation of an Old-street Venders
Older-Users Acceptance of Smartcard Payment Systems: An Investigation of an Old-street Venders 1 Sheng-Chin Yu, 2 Fong-Ling Fu, 3 Chia-jen Ting, 4 Hsing-Chuan Lu 1, Assoc Prof. of TungNan University, [email protected]
UNDERSTANDING AND MOTIVATING ENERGY CONSERVATION VIA SOCIAL NORMS. Project Report: 2004 FINAL REPORT
UNDERSTANDING AND MOTIVATING ENERGY CONSERVATION VIA SOCIAL NORMS Project Report: 2004 FINAL REPORT Robert Cialdini, Ph.D. Arizona State University Wesley Schultz, Ph.D. California State University, San
A Study of Retail Banks & DDoS Attacks
A Study of Retail Banks & DDoS Attacks Sponsored by Corero Network Security Independently conducted by Ponemon Institute LLC Publication Date: December 2012 Ponemon Institute Research Report A Study of
Perceptions About Network Security Survey of IT & IT security practitioners in the U.S.
Perceptions About Network Security Survey of IT & IT security practitioners in the U.S. Sponsored by Juniper Networks Independently conducted by Ponemon Institute LLC Publication Date: June 2011 Ponemon
PHYSICIANS ACCEPTANCE OF WEB-BASED MEDICAL ASSESSMENT SYSTEMS: FINDINGS FROM A NATIONAL SURVEY
PHYSICIANS ACCEPTANCE OF WEB-BASED MEDICAL ASSESSMENT SYSTEMS: FINDINGS FROM A NATIONAL SURVEY Bengisu Tulu School of Information Science Claremont Graduate University [email protected] Brian Hilton
The Impact of Cybercrime on Business
The Impact of Cybercrime on Business Studies of IT practitioners in the United States, United Kingdom, Germany, Hong Kong and Brazil Sponsored by Check Point Software Technologies Independently conducted
CHAPTER 5: CONSUMERS ATTITUDE TOWARDS ONLINE MARKETING OF INDIAN RAILWAYS
CHAPTER 5: CONSUMERS ATTITUDE TOWARDS ONLINE MARKETING OF INDIAN RAILWAYS 5.1 Introduction This chapter presents the findings of research objectives dealing, with consumers attitude towards online marketing
The Importance of Cyber Threat Intelligence to a Strong Security Posture
The Importance of Cyber Threat Intelligence to a Strong Security Posture Sponsored by Webroot Independently conducted by Ponemon Institute LLC Publication Date: March 2015 Ponemon Institute Research Report
Issues in Information Systems Volume 16, Issue I, pp. 163-169, 2015
A Task Technology Fit Model on e-learning Linwu Gu, Indiana University of Pennsylvania, [email protected] Jianfeng Wang, Indiana University of Pennsylvania, [email protected] ABSTRACT In this research, we propose
EXAMINING STUDENTS ACCEPTANCE OF TABLET PC USING TAM
EXAMINING STUDENTS ACCEPTANCE OF TABLET PC USING TAM Omar El-Gayar, Dakota State University, [email protected] Mark Moran, Dakota State University, [email protected] ABSTRACT With the proliferation
STUDENT ATTITUDES TOWARD WEB-BASED COURSE MANAGEMENT SYSTEM FEATURES
STUDENT ATTITUDES TOWARD WEB-BASED COURSE MANAGEMENT SYSTEM FEATURES Dr. Manying Qiu, Virginia State University, [email protected] Dr. Steve Davis, Clemson University, [email protected] Dr. Sadie Gregory, Virginia
Open an attachment and bring down your network?
Open an attachment and bring down your network? Many people think this will never happen to them, but virus attacks can come from unlikely sources and can strike when you least expect it. They can wreak
Evaluating User Acceptance of Online Banking Information Systems: An Empirical Case of Pakistan Paper 18
Evaluating User Acceptance of Online Banking Information Systems: An Empirical Case of Pakistan Paper 18 Fida Hussain Chandio [email protected] ABSTRACT Pakistan banking sector has gone through
A Study on Customer Satisfaction in Mobile Telecommunication Market by Using SEM and System Dynamic Method
A Study on in Mobile Telecommunication Market by Using SEM and System Dynamic Method Yuanquan Li, Jiayin Qi and Huaying Shu School of Economics & Management, Beijing University of Posts & Telecommunications,
Evaluating the Factors Affecting on Intension to Use of E-Recruitment
American Journal of Information Science and Computer Engineering Vol., No. 5, 205, pp. 324-33 http://www.aiscience.org/journal/ajisce Evaluating the Factors Affecting on Intension to Use of E-Recruitment
How To Audit The Mint'S Information Technology
Audit Report OIG-05-040 INFORMATION TECHNOLOGY: Mint s Computer Security Incident Response Capability Needs Improvement July 13, 2005 Office of Inspector General Department of the Treasury Contents Audit
2011 NATIONAL SMALL BUSINESS STUDY
2011 NATIONAL SMALL BUSINESS STUDY The National Cyber Security Alliance has conducted a new study with Symantec to analyze cyber security practices, behaviors and perceptions of small businesses throughout
AOL/NCSA Online Safety Study. Conducted by America Online and the National Cyber Security Alliance December 2005
AOL/NCSA Online Safety Study Conducted by America Online and the National Cyber Security Alliance December 2005 AOL/NCSA Online Safety Study Conducted by America Online and the National Cyber Security
Managing Security Risks in Modern IT Networks
Managing Security Risks in Modern IT Networks White Paper Table of Contents Executive summary... 3 Introduction: networks under siege... 3 How great is the problem?... 3 Spyware: a growing issue... 3 Feeling
Spyware is the latest epidemic security threat. Investigating Factors Affecting
By Younghwa Lee and Kenneth A. Kozar Investigating Factors Affecting of Anti Spyware is the latest epidemic security threat for Internet users. There are various types of spyware programs (see Table 1)
What Do You Mean My Cloud Data Isn t Secure?
Kaseya White Paper What Do You Mean My Cloud Data Isn t Secure? Understanding Your Level of Data Protection www.kaseya.com As today s businesses transition more critical applications to the cloud, there
Abstract. Keywords: Mobile commerce, short messaging services, mobile marketing. Mobile Marketing
Consumer Perspectives On Mobile Advertising And Marketing Craig Standing, Steve Benson, Edith Cowan University Heikki Karjaluoto, University of Oulu, Finland Abstract Mobile marketing is set to make a
An Application of the UTAUT Model for Understanding Student Perceptions Using Course Management Software
An Application of the UTAUT Model for Understanding Student Perceptions Using Course Management Software Jack T. Marchewka Chang Liu Operations Management and Information Systems Department Northern Illinois
Computer Security Maintenance Information and Self-Check Activities
Computer Security Maintenance Information and Self-Check Activities Overview Unlike what many people think, computers are not designed to be maintenance free. Just like cars they need routine maintenance.
Examining the Savings Habits of Individuals with Present-Fatalistic Time Perspectives using the Theory of Planned Behavior
Examining the Savings Habits of Individuals with Present-Fatalistic Time Perspectives using the Theory of Planned Behavior Robert H. Rodermund April 3, 2012 Lindenwood University 209 S. Kingshighway, Harmon
End-user Security Analytics Strengthens Protection with ArcSight
Case Study for XY Bank End-user Security Analytics Strengthens Protection with ArcSight INTRODUCTION Detect and respond to advanced persistent threats (APT) in real-time with Nexthink End-user Security
Total Defense Endpoint Premium r12
DATA SHEET Total Defense Endpoint Premium r12 Overview: Total Defense Endpoint Premium Edition r12 offers comprehensive protection for networks, endpoints and groupware systems from intrusions, malicious
Comparison of Firewall, Intrusion Prevention and Antivirus Technologies
White Paper Comparison of Firewall, Intrusion Prevention and Antivirus Technologies How each protects the network Juan Pablo Pereira Technical Marketing Manager Juniper Networks, Inc. 1194 North Mathilda
Preparing Your Personal Computer to Connect to the VPN
Preparing Your Personal Computer to Connect to the VPN (Protecting Your Personal Computer Running Windows) Using the VPN to connect your computer to the campus network is the same as bringing your computer
EVALUATION OF THE EFFECTIVENESS OF ACCOUNTING INFORMATION SYSTEMS
49 International Journal of Information Science and Technology EVALUATION OF THE EFFECTIVENESS OF ACCOUNTING INFORMATION SYSTEMS H. Sajady, Ph.D. M. Dastgir, Ph.D. Department of Economics and Social Sciences
(G.M. Hochbaum, 1958; subsequently modified by other authors)
Health Belief Model (HBM) (G.M. Hochbaum, 1958; subsequently modified by other authors) Purpose The HBM was originally developed in the 1950s by social psychologists working at the U.S. Public Health Service
TIME TO LIVE ON THE NETWORK
TIME TO LIVE ON THE NETWORK Executive Summary This experiment tests to see how well commonly used computer platforms withstand Internet attacks in the wild. The experiment quantifies the amount of time
Barriers to the Implementation of Project Lead The Way as Perceived by Indiana High School Principals. C.J. Shields Purdue University
Barriers to the Implementation of Project Lead The Way as Perceived by Indiana High School Principals C.J. Shields Purdue University The history of educating youth for a career is as old as humanity. Without
Predictors of Attitude of College Students Towards use of Computers
DOI: 10.15415/iie.2015.31003 Predictors of Attitude of College Students Towards use of Computers Jagpreet Kaur 1 and Khushgeet Kaur 2 1 Assistant Professor, Department of Education and Community Service,
Security & SMEs. An Introduction by Jan Gessin. Introduction to the problem
Security & SMEs An Introduction by Jan Gessin Introduction to the problem SMEs convinced it will never happen to them. In many ways SMEs are more of a target than big business. Harsh realities of the online
2012 NCSA / Symantec. National Small Business Study
2012 NCSA / Symantec National Small Business Study National Cyber Security Alliance Symantec JZ Analytics October 2012 Methodology and Sample Characteristics JZ Analytics was commissioned by the National
Task-Technology Fit and Adoption Behaviors of Mobile Business Systems
International DSI / Asia and Pacific DSI 2007 Full Paper (July, 2007) Task-Technology Fit and Adoption Behaviors of Mobile Business Systems Ching-Chang Lee *, Kuo-Wei Su, Cheng-Ta Lu, Xin-Xin Yu National
Defensible Strategy To. Cyber Incident Response
Cyber Incident Response Defensible Strategy To Cyber Incident Response Cyber Incident Response Plans Every company should develop a written plan (cyber incident response plan) that identifies cyber attack
A COMPARISON ANALYSIS ON THE INTENTION TO CONTINUED USE OF A LIFELONG LEARNING WEBSITE
International Journal of Electronic Business Management, Vol. 10, No. 3, pp. 213-223 (2012) 213 A COMPARISON ANALYSIS ON THE INTENTION TO CONTINUED USE OF A LIFELONG LEARNING WEBSITE Hsiu-Li Liao * and
PREDICTING ACCEPTANCE OF ELECTRONIC MEDICAL RECORDS: WHAT FACTORS MATTER MOST?
PREDICTING ACCEPTANCE OF ELECTRONIC MEDICAL RECORDS: WHAT FACTORS MATTER MOST? Shanan G. Gibson & Elaine D. Seeman College of Business, East Carolina University [email protected]; [email protected] ABSTRACT
Security Consultant Scenario INFO 517-900 Term Project. Brad S. Brady. Drexel University
Security Consultant Scenario INFO 517-900 Term Project Drexel University Author Note This paper was prepared for INFO-517-900 taught by Dr. Scott White. Table of Contents ABSTRACT.1 THE INTERVIEW...2 THE
Technology Complexity, Personal Innovativeness And Intention To Use Wireless Internet Using Mobile Devices In Malaysia
International Review of Business Research Papers Vol.4 No.5. October-November 2008. PP.1-10 Technology Complexity, Personal Innovativeness And Intention To Use Wireless Internet Using Mobile Devices In
Global IT Security Risks
Global IT Security Risks June 17, 2011 Kaspersky Lab leverages the leading expertise in IT security risks, malware and vulnerabilities to protect its customers in the best possible way. To ensure the most
Background. Executive Summary
Background The Interdisciplinary Research Centre in Cyber Security at the University of Kent in Canterbury recently launched a second online survey 1 in order to get a better picture of the prevalence
Can Personality Be Used to Predict How We Use the Internet?
July 2002, Vol. 4 Issue 2 Volume 4 Issue 2 Past Issues A-Z List Usability News is a free web newsletter that is produced by the Software Usability Research Laboratory (SURL) at Wichita State University.
How To Study Information Security
Assessing The Relative Importance of Information Security Governance Processes Master Thesis Stockholm, Sweden 2011 XR-EE-ICS 2011:002 ASSESSING THE RELATIVE IMPORTANCE OF INFORMATION SECURITY GOVERNANCE
Global Corporate IT Security Risks: 2013
Global Corporate IT Security Risks: 2013 May 2013 For Kaspersky Lab, the world s largest private developer of advanced security solutions for home users and corporate IT infrastructures, meeting the needs
WHAT CONSUMERS THINK, FEEL, AND DO TOWARD DIGITAL ADS: A MULTI-PHASE STUDY
WHAT CONSUMERS THINK, FEEL, AND DO TOWARD DIGITAL ADS: A MULTI-PHASE STUDY Abstract Ping Zhang, Syracuse University, Syracuse, NY 13244, USA, [email protected] With the wide deployment of digital technologies,
DETERMINANTS OF INSTRUCTORS TO APPLY IT IN TEACHING
Proceedings of the International Conference for Education, 2005 World Scientific Publishing Company DETERMINANTS OF INSTRUCTORS TO APPLY IT IN TEACHING SHOW-HUI HUANG International Business & Trade, Shu-Te
TLP WHITE. Denial of service attacks: what you need to know
Denial of service attacks: what you need to know Contents Introduction... 2 What is DOS and how does it work?... 2 DDOS... 4 Why are they used?... 5 Take action... 6 Firewalls, antivirus and updates...
The Diffusion of E-Learning Innovations in an Australian Secondary College: Strategies and Tactics for Educational Leaders
The Diffusion of E-Learning Innovations in an Australian Secondary College: Strategies and Tactics for Educational Leaders Sam Jebeile Division of Economic and Financial Studies Macquarie University Australia
Learner Self-efficacy Beliefs in a Computer-intensive Asynchronous College Algebra Course
Learner Self-efficacy Beliefs in a Computer-intensive Asynchronous College Algebra Course Charles B. Hodges Georgia Southern University Department of Leadership, Technology, & Human Development P.O. Box
FINANCIAL FRAUD: THE IMPACT ON CORPORATE SPEND IT SECURITY RISKS SPECIAL REPORT SERIES
FINANCIAL FRAUD: THE IMPACT ON CORPORATE SPEND IT SECURITY RISKS SPECIAL REPORT SERIES Kaspersky Lab 2 Corporate IT Security Risks Survey details: More than 5,500 companies in 26 countries around the world
Boston University Security Awareness. What you need to know to keep information safe and secure
What you need to know to keep information safe and secure Introduction Welcome to Boston University s Security Awareness training. Depending on your reading speed, this presentation will take approximately
CA Anti-Virus r8.1. Benefits. Overview. CA Advantage
PRODUCT BRIEF: CA ANTI-VIRUS CA Anti-Virus r8.1 CA ANTI-VIRUS IS THE NEXT GENERATION IN COMPREHENSIVE ANTI-VIRUS SECURITY FOR BUSINESS PCS, SERVERS AND PDAS. IT COMBINES PROACTIVE PROTECTION AGAINST MALWARE
Promoting Network Security (A Service Provider Perspective)
Promoting Network Security (A Service Provider Perspective) Prevention is the Foundation H S Gupta DGM (Technical) Data Networks, BSNL [email protected] DNW, BSNL 1 Agenda Importance of Network Security
NATIONAL CYBER SECURITY AWARENESS MONTH
NATIONAL CYBER SECURITY AWARENESS MONTH Tip 1: Security is everyone s responsibility. Develop an awareness framework that challenges, educates and empowers your customers and employees to be part of the
The Relationship between Ethnicity and Academic Success in Online Education Courses
The Relationship between Ethnicity and Academic Success in Online Education Courses Lori Kupczynski Texas A&M University-Kingsville Department of Educational Leadership and Counseling 700 University Blvd.,
COMPARISONS OF CUSTOMER LOYALTY: PUBLIC & PRIVATE INSURANCE COMPANIES.
277 CHAPTER VI COMPARISONS OF CUSTOMER LOYALTY: PUBLIC & PRIVATE INSURANCE COMPANIES. This chapter contains a full discussion of customer loyalty comparisons between private and public insurance companies
Brand, Knowledge and False Sense of Security
International Centre for Behavioural Business Research ICBBR Working Paper Series No 2010_07 Brand, Knowledge and False Sense of Security Wendy Hui Abstract A 2x2 experiment was used to study the effects
Emerging Security Technological Threats
Emerging Security Technological Threats Jamie Gillespie Training and Education Team Leader, AusCERT About AusCERT Australia s national CERT Collect, monitor, advise on threats and vulnerabilities Incident
