254,684 research outputs found

    Personal Motivation Measures for Personal IT Security Behavior

    Get PDF
    While IT security research has explored explanatory models using risk/fear/efficacy drivers, this effort emphasizes assessments of personal security optimism/pessimism as drivers of personal security behavior. Technical solutions can help but many organizational vulnerabilities are exacerbated by non-compliance. Individuals neglect to or choose not to comply with security practices, placing organizations at risk. In this study, we explore a model that identifies likely non-compliers. We assess constructs over time, assess perceptions of the pros and cons of compliance, and deliver small training/motivational content. In our results measuring over time and including pro/con perception increased explanatory power for compliance behavior and prediction algorithms were able to identify non-compliers with a high degree of accuracy. We assert that this approach, which integrates training and assessment over time and uses measures that may be more palatable for real-world settings, is promising for organizations who seek to both understand and improve security behavior

    Changing, priming, and acting on values: Effects via motivational relations in a circular model

    No full text
    Circular models of values and goals suggest that some motivational aims are consistent with each other, some oppose each other, and others are orthogonal to each other. The present experiments tested this idea explicitly by examining how value confrontation and priming methods influence values and value-consistent behaviors throughout the entire value system. Experiment 1 revealed that change in 1 set of social values causes motivationally compatible values to increase in importance, whereas motivationally incompatible values decrease in importance and orthogonal values remain the same. Experiment 2 found that priming security values reduced the better-than-average effect, but priming stimulation values increased it. Similarly, Experiments 3 and 4 found that priming security values increased cleanliness and decreased curiosity behaviors, whereas priming self-direction values decreased cleanliness and increased curiosity behaviors. Experiment 5 found that priming achievement values increased success at puzzle completion and decreased helpfulness to an experimenter, whereas priming with benevolence values decreased success and increased helpfulness. These results highlight the importance of circular models describing motivational interconnections between values and personal goals

    Are we predisposed to behave securely? Influence of risk disposition on individual security behaviors

    Get PDF
    Employees continue to be the weak link in organizational security management and efforts to improve the security of employee behaviors have not been as effective as hoped. Researchers contend that security-related decision making is primarily based on risk perception. There is also a belief that, if changed, this could improve security-related compliance. The extant research has primarily focused on applying theories that assume rational decision making e.g. protection motivation and deterrence theories. This work presumes we can influence employees towards compliance with information security policies and by means of fear appeals and threatened sanctions. However, it is now becoming clear that security-related decision making is complex and nuanced, not a simple carrot- and stick-related situation. Dispositional and situational factors interact and interplay to influence security decisions. In this paper, we present a model that positions psychological disposition of individuals in terms of risk tolerance vs. risk aversion and proposes research to explore how this factor influences security behaviors. We propose a model that acknowledges the impact of employees' individual dispositional risk propensity as well as their situational risk perceptions on security-related decisions. It is crucial to understand this decision-making phenomenon as a foundation for designing effective interventions to reduce such risk taking. We conclude by offering suggestions for further research.</p

    Why do People Adopt, or Reject, Smartphone Security Tools?

    Get PDF
    A large variety of security tools exist for Smartphones, to help their owners to secure the phones and prevent unauthorised others from accessing their data and services. These range from screen locks to antivirus software to password managers. Yet many Smartphone owners do not use these tools despite their being free and easy to use. We were interested in exploring this apparent anomaly. A number of researchers have applied existing models of behaviour from other disciplines to try to understand these kinds of behaviours in a security context, and a great deal of research has examined adoption of screen locking mechanisms. We review the proposed models and consider how they might fail to describe adoption behaviours. We then present the Integrated Model of Behaviour Prediction (IMBP), a richer model than the ones tested thus far. We consider the kinds of factors that could be incorporated into this model in order to understand Smartphone owner adoption, or rejection, of security tools. The model seems promising, based on existing literature, and we plan to test its efficacy in future studies

    Cyber security fear appeals:unexpectedly complicated

    Get PDF
    Cyber security researchers are starting to experiment with fear appeals, with a wide variety of designs and reported efficaciousness. This makes it hard to derive recommendations for designing and deploying these interventions. We thus reviewed the wider fear appeal literature to arrive at a set of guidelines to assist cyber security researchers. Our review revealed a degree of dissent about whether or not fear appeals are indeed helpful and advisable. Our review also revealed a wide range of fear appeal experimental designs, in both cyber and other domains, which confirms the need for some standardized guidelines to inform practice in this respect. We propose a protocol for carrying out fear appeal experiments, and we review a sample of cyber security fear appeal studies, via this lens, to provide a snapshot of the current state of play. We hope the proposed experimental protocol will prove helpful to those who wish to engage in future cyber security fear appeal research

    Exploring the factors affecting the motivation for learning from the perspective of public health students: A qualitative study

    Get PDF
    Objective. Despite the significant role of motivation in achieving success among public health students, students often do not demonstrate adequate motivation for learning and education. This study was performed to determine factors affecting the motivation for learning from the perspective of public health students via content analysis approach. Methods. This qualitative study was conducted at Kurdistan University of Medical Sciences in Sanandaj, Iran in 2017. 15 students were included in the study by using purposive sampling. Data were collected through personal interviews, group discussions, and field notes, and they were analyzed through conventional content analysis. Several parameters were taken into account to support the accuracy and the strength of the data: acceptability, confirmability, and transferability. Results. Five categories were derived from the data analysis, including “University Policy”, “Health Status”, “Teacher’s Role”, “Student-Related Factors” and “University Facilities”. Attention to the health status and its priority in the opinion of people, authorities, and educational system were the most important factors involved in the students’ motivation for learning. Conclusions. To increase motivation for learning, students have diverse needs that should be met. Attention to the components of motivation for learning not only enhances academic achievement but also promotes the formation of health behaviors in the society

    Lexical Derivation of the PINT Taxonomy of Goals: Prominence, Inclusiveness, Negativity Prevention, and Tradition

    Full text link
    What do people want? Few questions are more fundamental to psychological science than this. Yet, existing taxonomies disagree on both the number and content of goals. We thus adopted a lexical approach and investigated the structure of goal-relevant words from the natural English lexicon. Through an intensive rating process, 1,060 goal-relevant English words were first located. In Studies 1-2, two relatively large and diverse samples (total n = 1,026) rated their commitment to approaching or avoiding these goals. Principal component analyses yielded 4 replicable components: Prominence, Inclusiveness, Negativity prevention, and Tradition (the PINT Taxonomy). Study 3-7 (total n = 1,396) supported the 4-factor structure of an abbreviated scale and found systematic differences in their relationships with past goal-content measures, the Big 5 traits, affect, and need satisfaction. This investigation thus provides a data-driven taxonomy of higher-order goal-content and opens up a wide variety of fascinating lines for future research
    • 

    corecore