Designing information systems security
Designing information systems security
Security concerns of system users: a study of perceptions of the adequacy of security
Information and Management
Risk analysis as a source of professional knowledge
Computers and Security
Information systems security design methods: implications for information systems development
ACM Computing Surveys (CSUR)
Technical opinion: Information system security management in the new millennium
Communications of the ACM
Has the Internet become indispensable?
Communications of the ACM - Has the Internet become indispensable?
User acceptance of hedonic information systems
MIS Quarterly
Spyware: Spyware & Adware: the Risks facing Businesses
Network Security
ACM Transactions on Management Information Systems (TMIS)
Punishment, Justice, and Compliance in Mandatory IT Settings
Information Systems Research
Fighting identity theft: The coping perspective
Decision Support Systems
A Value Sensitive Design Investigation of Privacy Enhancing Tools in Web Browsers
Decision Support Systems
An Empirical Study of Knowledge Sharing Intention within Virtual Teams
International Journal of Knowledge Management
A game design framework for avoiding phishing attacks
Computers in Human Behavior
Journal of Database Management
Modeling the Impact of Biometric Security on Millennials' Protection Motivation
Journal of Organizational and End User Computing
Hi-index | 0.00 |
This paper describes the development of the technology threat avoidance theory (TTAT), which explains individual IT users' behavior of avoiding the threat of malicious information technologies. We articulate that avoidance and adoption are two qualitatively different phenomena and contend that technology acceptance theories provide a valuable, but incomplete, understanding of users' IT threat avoidance behavior. Drawing from cybernetic theory and coping theory, TTAT delineates the avoidance behavior as a dynamic positive feedback loop in which users go through two cognitive processes, threat appraisal and coping appraisal, to decide how to cope with IT threats. In the threat appraisal, users will perceive an IT threat if they believe that they are susceptible to malicious IT and that the negative consequences are severe. The threat perception leads to coping appraisal, in which users assess the degree to which the IT threat can be avoided by taking safeguarding measures based on perceived effectiveness and costs of the safeguarding measure and self-efficacy of taking the safeguarding measure. TTAT posits that users are motivated to avoid malicious IT when they perceive a threat and believe that the threat is avoidable by taking safeguarding measures; if users believe that the threat cannot be fully avoided by taking safeguarding measures, they would engage in emotion-focused coping. Integrating process theory and variance theory, TTAT enhances our understanding of human behavior under IT threats and makes an important contribution to IT security research and practice.