44 research outputs found

    User Awareness Design for Electronic Money User Using Protection Motivation Theory and NIST 800-50 Framework

    Get PDF
    Electronic money has emerged as the payment method. It becomes more popular because it is convenient and ubiquitous. However, the popularity has caused new security threats for the the user of electronic money. Personal data and financial information are the main target of the threats. Individuals need to protect and have certain responsibilities regarding their personal data and financial information used for electronic money services. Technology alone is unable to prevent the threats. Human behavior also becomes crucial factor to protect people against the threats and plays essential role in safe guarding personal data and financial information. This study uses Protection Motivation Theory (PMT) as a theoretical framework to empirically test why people do precautionary behavior on electronic money transaction. PMT is a social-cognitive model to predict and explain prevention behavior. Empirical research is conducted using survey methodology and collecting data from 186 respondents using online forms. Partial Least Square structural equation modelling provides support for factors influencing protection motivation in electronic money context. The results provide support for the use of threat and coping appraisal, in particular perceived security vulnerabilities, perceived security threat and perceived response efficacy to influence precautionary behavior in the context of electronic money. Those results contributes to the design of user awareness programs using NIST Special Publication 800-50. The awareness programs aimed at precaution behavior, thereby empowering electronic money user to protect themselve

    Information disclosure behaviour in social media among Malaysian youth : the impact of privacy concern, risk and trust

    Get PDF
    People have been using Social Network Sites (SNS) to communicate and make friends through online. Although SNS has been benefited its users in many ways, information privacy seemed to be overlooked. This study proposes a framework to examine users? protective behaviour associated with information disclosure in SNS. The proposed framework was derived based on the Protection Motivation Theory and Privacy Concern

    Information disclosure behaviour in social media among Malaysian youth: the impact of privacy concern, risk and trust

    Get PDF
    People have been using Social Network Sites (SNS) to communicate and make friends through online. Although SNS has been benefited its users in many ways, information privacy seemed to be overlooked. This study proposes a framework to examine users’ protective behaviour associated with information disclosure in SNS. The proposed framework was derived based on the Protection Motivation Theory and Privacy Concer

    Virtual Educational Space For Young Learners: Advantages And Challenges. Comparative Research

    Get PDF
    The Internet has become a global medium without which it is difficult to imagine modern life. It provides enormous opportunities, but at the same time creates a lot of dangers especially for the youngest users. This article presents selected aspects of a preliminary analysis of "Children on the Web", research on the virtual educational space, the aim of which was to diagnose the conditions for safe use of the Internet in education, and its impact on the development of children, as well as threats and ways to prevent them. The respondents were in-service and pre-service teachers

    Impact of Protection Motivation and Deterrence on IS Security Policy Compliance: A Multi-Cultural View

    Get PDF
    IS security policy non-compliance is a problem experienced globally. Organizations have implemented formal and informal sanctions to enforce policy compliance. Sanctions can be positive (rewards) or negative (punishment) and may influence employees differently across different cultures. We propose an examination of antecedents that influence IS security policy compliance utilizing Protection Motivation Theory (PMT) and Deterrence Theory in a global context. Using six different countries, we plan to find if protection motivation and deterrence factors differ among different cultures through the influence of Hofstede’s cultural dimensions

    Investigating attitudes towards online safety and security, and evaluating a peer-led Internet safety programme for 14– to 16-year-olds: final report

    Get PDF
    Research Grants 2009 - Harnessing Technology Project. Recognising the significant e-safety issues facing young people, students aged between 14 and 16 were encouraged to engage peer-based activities to raise their own awareness of threats and appropriate responses

    Analyzing The Adoption of Computer Security Utilizing The Health Belief Model

    Get PDF
    The home Internet user faces a hostile environment abundant in potential attacks on their computers. These attacks have been increasing at an alarming rate and cause damage to individuals and organizations regularly, and have the potential to cripple the critical infrastructures of entire countries. Recent research has determined that some individuals are not utilizing additional software protections available to mitigate these potential security risks. This paper seeks to further examine the reasons by proposing a conceptual framework that utilizes the Health Belief Model as a possible way to explain why some people do not perceive a threat sufficient to prompt the adoption of computer security software

    Information Security Policies Compliance: The Role of Organizational Punishment

    Get PDF
    It has been argued that organizational punishment serves as a deterrent to unwanted employee behavior but there is no clear consensus on the influence of punitive actions on employees’ behavior to comply with information security policies. This study proposes a model that explains the influence of organizational punishment on employees’ cognitive beliefs and their intention to comply with information security policies. We argue that likelihood of punishment impacts employees’ cognitive beliefs that in turn affect their information security compliance behavior. This study uses the theory of planned behavior as a support for its propositions and contributes to the body of knowledge in the IS security stream by addressing a significant gap in the current literature. This is a work in progress and we plan to present results of the empirical study at the conference

    Factors Affecting Computer Crime Protection Behavior

    Get PDF
    This research aimed to investigate factors that affect computer crime protection behavior, based on the protection motivation theory. Personal factors were considered, including: conscientious personality, perceived value of data, prior experience, and environmental factors. In addition, other factors were evaluated, including: subjective norm, security knowledge, and safeguard costs. These factors are mediated by threat appraisal and coping appraisal. The data were collected from 600 personal computer users by use of a questionnaire. Data were analyzed using structural equation modeling. Findings showed that all factors had significant effects on the computer crime protection behavior. In addition, the results showed that security knowledge, one of the environmental factors, had the strongest effects on coping appraisal which subsequently had the strongest impact on protection behavior

    Multiple Sources for Security: Seeking Online Safety Information and their Influence on Coping Self-efficacy and Protection Behavior Habits

    Get PDF
    Internet users face threats of increasing complexity and severity. To protect themselves they rely on sources for online safety information. These sources may either build up, or undermine, the coping self-efficacy and motivation needed to protect oneself. A survey of 800 subjects asked about which sources they relied on for information about online safety: media, work, school, friends and family, and specialized web sites. Individuals who said they had no comprehensive source for information reported the lowest levels of both coping self-efficacy (b= -0.609, p\u3c 0.001) and protection habit strength (b= -0.900, p\u3c 0.001). On the other hand, those who had an affiliation of school, work and specialized web sites had a positive relationship with both coping self-efficacy (b= 0.517, p\u3c 0.05) and protection habit strength (b= 0.692, p\u3c 0.05). Results suggest that some information affiliation networks are correlated with higher coping self-efficacy and stronger protection habits
    corecore