Understanding Security Behaviors in Personal Computer Usage: A Threat Avoidance Perspective

@article{Liang2010UnderstandingSB,
  title={Understanding Security Behaviors in Personal Computer Usage: A Threat Avoidance Perspective},
  author={Huigang Liang and Yajiong Xue},
  journal={J. Assoc. Inf. Syst.},
  year={2010},
  volume={11},
  pages={1}
}
This study aims to understand the IT threat avoidance behaviors of personal computer users. We tested a research model derived from Technology Threat Avoidance Theory (TTAT) using survey data. We find that users’ IT threat avoidance behavior is predicted by avoidance motivation, which, in turn, is determined by perceived threat, safeguard effectiveness, safeguard cost, and self-efficacy. Users develop a threat perception when they believe that the malicious IT is likely to attack them… 

Figures and Tables from this paper

Threat Perceptions, Avoidance Motivation and Security Behaviors Correlations

TLDR
The researcher examined the relationship between Millennials’ perceptions of cybersecurity threat, users’ online security behaviors and avoidance motivation and provided enough evidence to fail to reject the null hypothesis related to relationships between PTH and OSB and to rejectThe null hypothesis regarding the relationship Between PTHand AMO.

Malware Avoidance Motivations and Behaviors: A Technology Threat Avoidance Replication

TLDR
Results from a sample of 486 computer users revealed that safeguard effectiveness, safeguard cost, and self-efficacy are relatively robust predictors of avoidance motivation across varied settings.

Security awareness of computer users: A phishing threat avoidance perspective

A Meta-Analysis of Studies on Protection Motivation Theory and Information Security Behaviour

TLDR
A meta-analysis of the protection motivation theory PMT is presented to assess how its efficacy is influenced by the information security behavior it is applied to.

WHAT INFLUENCES INFORMATION SECURITY BEHAVIOR? A STUDY WITH BRAZILIAN USERS

TLDR
There is influence of information security orientations provided by organizations in the perception about severity of the threat and the relationship between threat, effort, control and disgruntlement, and the responsible behavior towards information security was verified.

Phishing threat avoidance behaviour: An empirical investigation

...

References

SHOWING 1-10 OF 71 REFERENCES

Avoidance of Information Technology Threats: A Theoretical Perspective

TLDR
The technology threat avoidance theory (TTAT), which explains individual IT users' behavior of avoiding the threat of malicious information technologies, enhances the understanding of human behavior under IT threats and makes an important contribution to IT security research and practice.

Studying users' computer security behavior: A health belief perspective

Practicing Safe Computing: Message Framing, Self-View, and Home Computer User Security Behavior Intentions

TLDR
This study manipulated individuals’ goal frames and self-views in an experimental setting and examined their independent and interactive effects on subjective and descriptive norms related to home security behaviors and the effects of these norms on intentions to practice safe computing.

Computer Security and Risky Computing Practices: A Rational Choice Perspective

TLDR
A conceptual model of low-level insecure behavior by individual computer users as the outcome of a boundedly-rational choice process is proposed and explored in a survey of undergraduate students at two large public universities.

Self-efficacy: Toward a unifying theory of behavioral change☆☆☆

Effects of components of protection-motivation theory on adaptive and maladaptive coping with a health threat.

TLDR
The results disclosed that the high-threat condition energized all forms of coping; it did not differentially cue specific coping strategies, and the most maladaptive strategy was avoidant thinking, which simultaneously reduced fear of the threat and weakened intentions to adopt the adaptive response.

Perceived probability, perceived severity, and health-protective behavior.

  • N. Weinstein
  • Psychology
    Health psychology : official journal of the Division of Health Psychology, American Psychological Association
  • 2000
TLDR
A case study approach was used to examine how probability and severity combine to influence interest in protection and revealed that people are surprisingly insensitive to variations in hazard probability when probabilities are in the moderate to high range.

Influence of Computer Attitude and Self-Efficacy on IT Usage Behavior

  • P. Chau
  • Business
    J. Organ. End User Comput.
  • 2001
TLDR
The addition of computer attitude and self-efficacy into the TAM greatly improves the explanatory power of the model on the variance of perceived usefulness, which is again found to be a significant factor affecting the behavioral intention of using an IS/IT.
...