首页> 外文期刊>MIS quarterly >Avoidance Of Information Technology Threats: A Theoretical Perspective
【24h】

Avoidance Of Information Technology Threats: A Theoretical Perspective

机译:避免信息技术威胁的理论观点

获取原文
获取原文并翻译 | 示例
       

摘要

This paper describes the development of the technology threat avoidance theory (TTAT), which explains individual IT users' behavior of avoiding the threat of malicious information technologies. We articulate that avoidance and adoption are two qualitatively different phenomena and contend that technology acceptance theories provide a valuable, but incomplete, understanding of users' IT threat avoidance behavior. Drawing from cybernetic theory and coping theory, TTAT delineates the avoidance behavior as a dynamic positive feedback loop in which users go through two cognitive processes, threat appraisal and coping appraisal, to decide how to cope with IT threats. In the threat appraisal, users will perceive an IT threat if they believe that they are susceptible to malicious IT and that the negative consequences are severe. The threat perception leads to coping appraisal, in which users assess the degree to which the IT threat can be avoided by taking safeguarding measures based on perceived effectiveness and costs of the safeguarding measure and self-efficacy of taking the safeguarding measure. TTA Tposits that users are motivated to avoid malicious IT when they perceive a threat and believe that the threat is avoidable by taking safeguarding measures; if users believe that the threat cannot be fully avoided'by taking safeguarding measures, they would engage in emotion-focused coping. Integrating process theory and variance theory, TTAT enhances our understanding of human behavior under IT threats and makes an important contribution to IT security research and practice.
机译:本文介绍了技术威胁规避理论(TTAT)的发展,该理论解释了单个IT用户规避恶意信息技术威胁的行为。我们明确指出,规避和采用是两种质量上不同的现象,并认为技术接受理论对用户的IT规避威胁行为提供了有价值但不完整的理解。 TTAT借鉴控制论和应对理论,将逃避行为描绘为一个动态的正反馈回路,在该回路中,用户通过两个认知过程(威胁评估和应对评估)来决定如何应对IT威胁。在威胁评估中,如果用户认为自己容易受到恶意IT的侵害,并且负面后果很严重,则会感知到IT威胁。威胁感知导致应对评估,其中用户根据感知到的保护措施的有效性和成本以及采取该保护措施的自我效能,通过采取保护措施来评估可避免IT威胁的程度。 TTA信息库表明,当用户感知到威胁并认为可以通过采取防护措施来避免威胁时,他们就有动机避免恶意IT;如果用户认为通过采取防护措施无法完全避免威胁,他们将进行以情感为中心的应对。 TTAT将过程理论和方差理论相结合,加深了我们对IT威胁下人类行为的理解,并为IT安全研究和实践做出了重要贡献。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号