The effects of knowledge on security technology adoption: Results from a quasi-experiment

  title={The effects of knowledge on security technology adoption: Results from a quasi-experiment},
  author={Siu Man Lui and Wendy Hui},
  journal={The 5th International Conference on New Trends in Information Science and Service Science},
We conducted a quasi-experiment through an online survey to investigate the effects of information security knowledge on users' adoption of security technologies. We found that knowledge can affect adoption decision in multiple ways. On the one hand, knowledge tends to increase a user's self-efficacy in using the technology, which in turn increases the perceived usefulness of the technology, consistent with the Technology Acceptance Model (TAM). On the other hand, users who are knowledgeable… CONTINUE READING


Publications referenced by this paper.
Showing 1-10 of 49 references

Online Safety Strategies: A Content Analysis and Theoretical Assessment

  • R. LaRose, N. Rifon, S. Liu, D. Lee
  • The Fifty-fifth International Communication…
  • 2005
Highly Influential
4 Excerpts

Don't be the Next Phone

  • J. Osada
  • Virus Victim. AsiaOneDigital,
  • 2009
1 Excerpt

How to prevent identity theft

  • HSBC-North America Military Financial Education Center, University of Maryland University College
  • available at:…
  • 2009
2 Excerpts

New Study Describes Risk of Mobile Phone Virus Attacks

  • M. Runkle
  • ND Newswire,
  • 2009
1 Excerpt

Security Breaches Cost $1 Trillion Last Year

  • M. Knights
  • IT Pro,
  • 2009
1 Excerpt

The Price of Policy Risk - Empirical Insights from Choice Experiments with European Solar Energy Project Developers

  • S. Luethi
  • The Thirty-Second IAEE International Conference,
  • 2009

Windows Worm Being Spread through USB Memory

  • C. Beaumont
  • Sticks. Telegraph,
  • 2009
1 Excerpt

Global Information Security Survey 2008 Enisa . europa . eu . ENISA Conference : “ The Growing Requirement for Information Security Awareness Across Public and Private Organizations

  • T. Dinev.
  • 2008

Similar Papers

Loading similar papers…