Factors affecting perception of information security and their impacts on IT adoption and security practices

  • Authors:
  • Ding-Long Huang;Pei-Luen Patrick Rau;Gavriel Salvendy;Fei Gao;Jia Zhou

  • Affiliations:
  • Department of Industrial Engineering, Tsinghua University, Beijing 100084, China;Department of Industrial Engineering, Tsinghua University, Beijing 100084, China;Department of Industrial Engineering, Tsinghua University, Beijing 100084, China and School of Industrial Engineering, 1297 Grissom Hall, Purdue University, West Lafayette, IN 17907-1287, USA;Department of Industrial Engineering, Tsinghua University, Beijing 100084, China;Department of Industrial Engineering, Tsinghua University, Beijing 100084, China

  • Venue:
  • International Journal of Human-Computer Studies
  • Year:
  • 2011

Quantified Score

Hi-index 0.00

Visualization

Abstract

The gap between the perceived security of an information system and its real security level can influence people' decisions and behavior. The objective of this study is to find effective ways to adjust people's perception of information security, in order to enhance their intention to adopt IT appliances and compliance to security practices. Two separate experiments were conducted. In experiment I, 64 participants were asked to transfer money through an e-banking system. Their intention to adopt e-banking was measured by a questionnaire. In experiment II, 64 participants were asked to register on an online forum. Their subjective intention to create a strong password was measured by a questionnaire, and the objective strength of the passwords they created was calculated. Results of the ANOVA and the path models derived from the path analysis indicated that people's adoption intention, such as their intention to adopt e-banking, can be enhanced by changing their perceived Knowledge, Controllability and Awareness, while changing the perceived Controllability is most effective. The results also indicated that people's compliance to security practices, such as setting strong passwords for IT systems, can be enhanced by changing their perceived Knowledge, Severity and Possibility, while changing their perceived Knowledge and Severity is most effective. Implications for further research and practice were also discussed.