首页> 外文学位 >The Role of Trait Affect in the Information Security Behavior of Home Users.
【24h】

The Role of Trait Affect in the Information Security Behavior of Home Users.

机译:特质影响在家庭用户信息安全行为中的作用。

获取原文
获取原文并翻译 | 示例

摘要

Computers provide people with the means to perform a wide range of tasks, from running complex applications to storing photographs. The Internet adds an additional dimension; it enables people to shop for gifts, pay bills, perform research, read the news, and communicate with old friends and new. In addition to all of the benefits computers provide to people, there are inherent risks. These risks exist in many different forms, including malware, phishing scams, loss of data, and the privacy of individuals being compromised.;Home users represent the largest segment of Internet users and pose the most significant threat. However, research has traditionally focused on users within an organizational setting. While research examining home users has increased significantly over the last several years, there is still a lot that we do not know.;This research examined the role trait affect, a lifelong and generally stable type of affect, has on the information security behavior of home users in response to three threats: computer performance compromise, personal information compromise, and loss of data and files. In this study, the role of trait affect in the information security behavior of home users was examined by using the two higher order dimensions of affect, positive affect and negative affect, which represent the valence of mood descriptors (e.g., afraid, scared, nervous, guilty, active, alert, enthusiastic, excited). It was hypothesized that the effect trait positive affect and trait negative affect have on the information security behavior of home users is indirect through their effect on threat perception (i.e., perceived threat severity and perceived threat vulnerability) and self-efficacy. Likewise, it was hypothesized that higher levels of trait positive affect are associated with lower levels of threat perception and higher levels of self-efficacy, with trait negative affect having the opposite effect.;Three surveys were used to explore these issues, including a previously validated survey instrument for trait positive affect and trait negative affect, previously validated constructs adapted from other research, and measures for the dependent variables developed through use of the Delphi technique.;The results of the three surveys supported 10 of the 33 hypotheses. Out of the nine hypotheses for trait positive affect, three were supported. This included an association between higher levels of trait positive affect with higher levels of information security response self-efficacy in two of the three studies. In one of the surveys, higher levels of trait positive affect was also associated with lower levels of perceived threat vulnerability. In contrast, none of the nine hypotheses for trait negative affect were supported. Beyond the 18 hypotheses for trait affect, the hypothesized relationship between self-efficacy and information security behavior was supported in all three surveys. Five additional hypotheses based on Protection Motivation Theory (PMT) were also supported.;This research makes five primary contributions. First, trait positive affect may play an indirect role in understanding how individuals respond to and cope with a threat. Furthermore, it suggests that trait positive affect is worth exploring further, perhaps with greater granularity than what was done here. Second, this research extended the application of Protection Motivation Theory (PMT), which has been the primary underlying theory used by researchers in understanding the information security behavior of home users. In part, this was done by including constructs from PMT and measurements of trait affect to form a more complete understanding of the information security behavior of home users. Third, in addition to extending PMT, this research examined three different threats using the same methods and data analysis procedures. I did this by conducting three different surveys at the same time---one for each of the three threats. This allowed me to determine if the efficacy of PMT depended at least in part on the threat under examination. The data analysis suggests that the specific threat that is examined using PMT does impact the efficacy of PMT as a theoretical framework for understanding human behavior. Fourth, an additional contribution this research makes is its support for the continued role of self-efficacy as a predictor of behavior. In fact, the positive association between self-efficacy and behavior was the one general hypothesis that was supported in all three surveys. Fifth, this dissertation contributes to research on the information security behavior of home users by having developed and validated three survey instruments. These three survey instruments were designed to measure specific information security responses required to mitigate one of three different threats: computer performance compromise, personal information compromise, and loss of data and files.;Finally, I explored future research avenues in light of these results, including experimental research, as well as exploring trait positive affect with a higher level of granularity than what was done here. Implications for theory, policy, and practice are discussed.
机译:计算机为人们提供了执行各种任务的方式,从运行复杂的应用程序到存储照片。互联网增加了一个层面。它使人们能够购买礼物,支付账单,进行研究,阅读新闻以及与新老朋友交流。除了计算机为人们提供的所有好处之外,还存在固有的风险。这些风险以许多不同的形式存在,包括恶意软件,网络钓鱼诈骗,数据丢失以及受到威胁的个人隐私。家庭用户代表互联网用户的最大部分,并构成最大的威胁。但是,传统上,研究的重点是组织环境中的用户。尽管过去几年来检查家庭用户的研究显着增加,但我们仍然不知道很多事情;该研究研究了角色特质影响(一种终身且总体上稳定的影响类型)对信息安全行为的影响。家庭用户应对三种威胁:计算机性能受损,个人信息受损以及数据和文件丢失。在这项研究中,特质情感在家庭用户信息安全行为中的作用是通过使用情感的两个较高阶维度(正面情感和负面情感)来检验的,这两个维度代表了情绪描述符的价值(例如,害怕,害怕,紧张) ,有罪,活跃,机敏,热情,激动)。假设特质正面影响和特质负面影响对家庭用户的信息安全行为的影响是间接的,因为它们对威胁感知(即感知威胁的严重程度和感知威胁的脆弱性)和自我效能的影响。同样,假设高水平的特质正面影响与较低水平的威胁感知和高水平的自我效能感相关,而特质负面影响则具有相反的影响。;通过三项调查来探讨这些问题,包括经验证的用于特质正面和特质负面影响的调查工具,先前通过其他研究验证的构造以及通过使用Delphi技术开发的因变量的度量。;三项调查的结果支持了33个假设中的10个。在特质积极影响的九种假设中,有三种得到了支持。在三项研究中的两项中,这包括较高水平的特质阳性影响与较高水平的信息安全响应自我效能之间的关联。在一项调查中,较高水平的特质正面影响也与较低水平的感知到的威胁脆弱性相关。相反,关于特质负面影响的九种假设均未得到支持。除了关于特质影响的18个假设之外,在所有三个调查中都支持了自我效能与信息安全行为之间的假设关系。还支持了基于保护动机理论(PMT)的另外五个假设。本研究做出了五个主要贡献。首先,特质积极影响可能在理解个人如何应对和应对威胁中起间接作用。此外,它表明特质积极影响值得进一步探索,也许比此处所做的更为详尽。其次,这项研究扩展了保护动机理论(PMT)的应用,保护动机理论已成为研究人员了解家庭用户信息安全行为的主要基础理论。在某种程度上,这是通过包括来自PMT的构造和特征影响的测量来完成的,以形成对家庭用户信息安全行为的更完整理解。第三,除了扩展PMT之外,本研究还使用相同的方法和数据分析程序研究了三种不同的威胁。为此,我同时进行了三项不同的调查-针对三种威胁分别进行了一项调查。这使我能够确定PMT的功效是否至少部分取决于所检查的威胁。数据分析表明,使用PMT检查的特定威胁确实会影响PMT作为理解人类行为的理论框架的功效。第四,这项研究做出的另一贡献是支持自我效能感继续作为行为的预测指标。实际上,自我效能感与行为之间的正相关是所有三项调查均支持的一种普遍假设。第五,本文通过开发和验证了三种调查手段,为家庭用户信息安全行为的研究做出了贡献。这三种调查工具旨在测量缓解三种不同威胁之一所需的特定信息安全响应:计算机性能受损,个人信息受损以及数据和文件丢失。,我根据这些结果探索了未来的研究途径,包括实验研究,以及以比此处更高的粒度探索性状正面影响。讨论了对理论,政策和实践的影响。

著录项

  • 作者

    Dupuis, Marc J.;

  • 作者单位

    University of Washington.;

  • 授予单位 University of Washington.;
  • 学科 Information Science.;Computer Science.;Psychology Social.;Psychology Personality.
  • 学位 Ph.D.
  • 年度 2014
  • 页码 312 p.
  • 总页数 312
  • 原文格式 PDF
  • 正文语种 eng
  • 中图分类
  • 关键词

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号