254,684 research outputs found
Personal Motivation Measures for Personal IT Security Behavior
While IT security research has explored explanatory models using risk/fear/efficacy drivers, this effort emphasizes assessments of personal security optimism/pessimism as drivers of personal security behavior. Technical solutions can help but many organizational vulnerabilities are exacerbated by non-compliance. Individuals neglect to or choose not to comply with security practices, placing organizations at risk. In this study, we explore a model that identifies likely non-compliers. We assess constructs over time, assess perceptions of the pros and cons of compliance, and deliver small training/motivational content. In our results measuring over time and including pro/con perception increased explanatory power for compliance behavior and prediction algorithms were able to identify non-compliers with a high degree of accuracy. We assert that this approach, which integrates training and assessment over time and uses measures that may be more palatable for real-world settings, is promising for organizations who seek to both understand and improve security behavior
Changing, priming, and acting on values: Effects via motivational relations in a circular model
Circular models of values and goals suggest that some motivational aims are consistent with each other, some oppose each other, and others are orthogonal to each other. The present experiments tested this idea explicitly by examining how value confrontation and priming methods influence values and value-consistent behaviors throughout the entire value system. Experiment 1 revealed that change in 1 set of social values causes motivationally compatible values to increase in importance, whereas motivationally incompatible values decrease in importance and orthogonal values remain the same. Experiment 2 found that priming security values reduced the better-than-average effect, but priming stimulation values increased it. Similarly, Experiments 3 and 4 found that priming security values increased cleanliness and decreased curiosity behaviors, whereas priming self-direction values decreased cleanliness and increased curiosity behaviors. Experiment 5 found that priming achievement values increased success at puzzle completion and decreased helpfulness to an experimenter, whereas priming with benevolence values decreased success and increased helpfulness. These results highlight the importance of circular models describing motivational interconnections between values and personal goals
Are we predisposed to behave securely? Influence of risk disposition on individual security behaviors
Employees continue to be the weak link in organizational security management and efforts to improve the security of employee behaviors have not been as effective as hoped. Researchers contend that security-related decision making is primarily based on risk perception. There is also a belief that, if changed, this could improve security-related compliance. The extant research has primarily focused on applying theories that assume rational decision making e.g. protection motivation and deterrence theories. This work presumes we can influence employees towards compliance with information security policies and by means of fear appeals and threatened sanctions. However, it is now becoming clear that security-related decision making is complex and nuanced, not a simple carrot- and stick-related situation. Dispositional and situational factors interact and interplay to influence security decisions. In this paper, we present a model that positions psychological disposition of individuals in terms of risk tolerance vs. risk aversion and proposes research to explore how this factor influences security behaviors. We propose a model that acknowledges the impact of employees' individual dispositional risk propensity as well as their situational risk perceptions on security-related decisions. It is crucial to understand this decision-making phenomenon as a foundation for designing effective interventions to reduce such risk taking. We conclude by offering suggestions for further research.</p
Why do People Adopt, or Reject, Smartphone Security Tools?
A large variety of security tools exist for Smartphones, to help their owners to secure the
phones and prevent unauthorised others from accessing their data and services. These range
from screen locks to antivirus software to password managers. Yet many Smartphone owners
do not use these tools despite their being free and easy to use. We were interested in exploring
this apparent anomaly. A number of researchers have applied existing models of behaviour
from other disciplines to try to understand these kinds of behaviours in a security context, and
a great deal of research has examined adoption of screen locking mechanisms. We review the
proposed models and consider how they might fail to describe adoption behaviours. We then
present the Integrated Model of Behaviour Prediction (IMBP), a richer model than the ones
tested thus far. We consider the kinds of factors that could be incorporated into this model in
order to understand Smartphone owner adoption, or rejection, of security tools. The model
seems promising, based on existing literature, and we plan to test its efficacy in future studies
Cyber security fear appeals:unexpectedly complicated
Cyber security researchers are starting to experiment with fear appeals, with a wide variety of designs and reported efficaciousness. This makes it hard to derive recommendations for designing and deploying these interventions. We thus reviewed the wider fear appeal literature to arrive at a set of guidelines to assist cyber security researchers. Our review revealed a degree of dissent about whether or not fear appeals are indeed helpful and advisable. Our review also revealed a wide range of fear appeal experimental designs, in both cyber and other domains, which confirms the need for some standardized guidelines to inform practice in this respect. We propose a protocol for carrying out fear appeal experiments, and we review a sample of cyber security fear appeal studies, via this lens, to provide a snapshot of the current state of play. We hope the proposed experimental protocol will prove helpful to those who wish to engage in future cyber security fear appeal research
Exploring the factors affecting the motivation for learning from the perspective of public health students: A qualitative study
Objective. Despite the significant role of motivation in achieving success among public health students, students often do not demonstrate adequate motivation for learning and education. This study was performed to determine factors affecting the motivation for learning from the perspective of public health students via content analysis approach. Methods. This qualitative study was conducted at Kurdistan University of Medical Sciences in Sanandaj, Iran in 2017. 15 students were included in the study by using purposive sampling. Data were collected through personal interviews, group discussions, and field notes, and they were analyzed through conventional content analysis. Several parameters were taken into account to support the accuracy and the strength of the data: acceptability, confirmability, and transferability. Results. Five categories were derived from the data analysis, including âUniversity Policyâ, âHealth Statusâ, âTeacherâs Roleâ, âStudent-Related Factorsâ and âUniversity Facilitiesâ. Attention to the health status and its priority in the opinion of people, authorities, and educational system were the most important factors involved in the studentsâ motivation for learning. Conclusions. To increase motivation for learning, students have diverse needs that should be met. Attention to the components of motivation for learning not only enhances academic achievement but also promotes the formation of health behaviors in the society
Lexical Derivation of the PINT Taxonomy of Goals: Prominence, Inclusiveness, Negativity Prevention, and Tradition
What do people want? Few questions are more fundamental to psychological science than this. Yet, existing taxonomies disagree on both the number and content of goals. We thus adopted a lexical approach and investigated the structure of goal-relevant words from the natural English lexicon. Through an intensive rating process, 1,060 goal-relevant English words were first located. In Studies 1-2, two relatively large and diverse samples (total n = 1,026) rated their commitment to approaching or avoiding these goals. Principal component analyses yielded 4 replicable components: Prominence, Inclusiveness, Negativity prevention, and Tradition (the PINT Taxonomy). Study 3-7 (total n = 1,396) supported the 4-factor structure of an abbreviated scale and found systematic differences in their relationships with past goal-content measures, the Big 5 traits, affect, and need satisfaction. This investigation thus provides a data-driven taxonomy of higher-order goal-content and opens up a wide variety of fascinating lines for future research
- âŠ