Please use this identifier to cite or link to this item:

Enforcing Information Security Protection: Risk Propensity and Self-Efficacy Perspectives

File Size Format  
paper0614.pdf 1.16 MB Adobe PDF View/Open

Item Summary

Title:Enforcing Information Security Protection: Risk Propensity and Self-Efficacy Perspectives
Authors:Nguyen, Quynh N.
Kim, Dan J.
Keywords:information security
risk propensity
security self-efficacy
technical controllability
reinforcement intention
Date Issued:04 Jan 2017
Abstract:Effective information security (InfoSec) management cannot be achieved through only technology; people are the weakest point in security and their behaviors such as inappropriate use of computer and network resources, file sharing habits etc. cannot be controlled by security technologies. Although the importance of individuals’ InfoSec behaviors has been widely recognized, there is limited understanding of what impact individual users InfoSec protection behavior. Thus, focusing on the relationships among risk propensity, InfoSec self-efficacy, InfoSec protection efforts from several theoretical lenses, the study proposes a research model to explain individuals’ intention to reinforce their InfoSec protection and empirically validates the proposed model. The results of the study are expected to provide a deeper understanding of the relationships among risk propensity, self-efficacy, risk perception, InfoSec protection efforts, and InfoSec reinforcement intention.
Pages/Duration:10 pages
Rights:Attribution-NonCommercial-NoDerivatives 4.0 International
Appears in Collections: Information Security, Privacy, and Policy Minitrack

Please email if you need this content in ADA-compliant format.

Items in ScholarSpace are protected by copyright, with all rights reserved, unless otherwise indicated.