Multivariate data analysis (4th ed.): with readings
Multivariate data analysis (4th ed.): with readings
Fighting cybercrime: a review and the Taiwan experience
Decision Support Systems - Special issue: Intelligence and security informatics
Network externalities, layered protection and IT security risk management
Decision Support Systems
Promoting personal responsibility for internet safety
Communications of the ACM - Urban sensing: out of the woods
Validating instruments in MIS research
MIS Quarterly
An integrative study of information systems security effectiveness
International Journal of Information Management: The Journal for Information Professionals
ACM Transactions on Management Information Systems (TMIS)
Fighting identity theft: The coping perspective
Decision Support Systems
International Journal of Information Management: The Journal for Information Professionals
Accepting the inevitable: factoring the user into home computer security
Proceedings of the third ACM conference on Data and application security and privacy
A game design framework for avoiding phishing attacks
Computers in Human Behavior
IS Security Policy Violations: A Rational Choice Perspective
Journal of Organizational and End User Computing
A Composite Framework for Behavioral Compliance with Information Security Policies
Journal of Organizational and End User Computing
Journal of Organizational and End User Computing
A Composite Framework for Behavioral Compliance with Information Security Policies
Journal of Organizational and End User Computing
Journal of Organizational and End User Computing
Fuzzy Assessment of Health Information System Users' Security Awareness
Journal of Medical Systems
International Journal of Human-Computer Studies
Hi-index | 0.00 |
The damage due to computer security incidents is motivating organizations to adopt protective mechanisms. While technological controls are necessary, computer security also depends on individual's security behavior. It is thus important to investigate what influences a user to practice computer security. This study uses the Health Belief Model, adapted from the healthcare literature, to study users' computer security behavior. The model was validated using survey data from 134 employees. Results show that perceived susceptibility, perceived benefits, and self-efficacy are determinants of email related security behavior. Perceived severity moderates the effects of perceived benefits, general security orientation, cues to action, and self-efficacy on security behavior.