首页> 外文OA文献 >Examining Multiple Stages of Protective Behavior of Information System End-Users
【2h】

Examining Multiple Stages of Protective Behavior of Information System End-Users

机译:检查信息系统最终用户的保护行为的多个阶段

代理获取
本网站仅为用户提供外文OA文献查询和代理获取服务,本网站没有原文。下单后我们将采用程序或人工为您竭诚获取高质量的原文,但由于OA文献来源多样且变更频繁,仍可能出现获取不到、文献不完整或与标题不符等情况,如果获取不到我们将提供退款服务。请知悉。

摘要

The adage, "old habits die hard", is especially relevant when humans learn new protective behaviors (i.e., dental flossing, IS security behaviors). The foundation that underlies many social-cognitive theories used in IS research is that intention to change predicts actual behavior change. Despite intentions to change, humans do not always change their habits due to actual or perceived obstacles, for example. In this study, user behavior, particularly with respect to vigilance over phishing attempts, was investigated via the theoretical lens of a hybrid continuum-stage behavior change model adapted from health-related fields. This type of model helps us to understand whether there are qualitatively different stages for adopting a more vigilant action plan toward phishing attempts, the number and ordering of distinct stages that a user must move through between forming an intention and subsequent behavior, what characterizes those stages, and how appropriate interventions at these stages can move a user to a higher stage of vigilant behavior. The goal of this research was to gain a better understanding of: a) whether there are distinct stages that distinguish end-users' vigilance toward phishing attempts; b) how many qualitatively different stages there are; and, c) what characterizes these stages. This study profiled IS end-users based on the model's constructs (e.g., coping self-efficacy, intention, action/coping planning, and risk perception) that examined end-users' protective behavior toward phishing attempts. In an exploratory analysis of survey data, stages of IS end-users were determined via cluster analysis techniques (hierarchical followed by K-means). A survey was administered to respondents (n= 394). Next, an agglomerative hierarchical cluster analysis using within-groups method of average linkage and Euclidean distance measures was performed on the model's constructs. Three clusters emerged as the optimal number to be used in the subsequent K-means cluster analysis. After conducting analyses for stability and validity for the 3-cluster solution, I compared the means of the model's constructs to develop profiles for the distinct three stages. I conclude that exploratory cluster analysis is an effective technique to discover natural groupings for protective behavior of IS end-users and propose future research to investigate stage-appropriate interventions to move users to higher stages.
机译:这句格言是“旧习惯使人难受”,这在人类学习新的保护行为(即使用牙线,IS安全行为)时尤其重要。 IS研究中使用的许多社会认知理论的基础是,改变的意图可以预测实际的行为改变。尽管有改变的意图,但是例如由于实际或感知的障碍,人类并不总是改变其习惯。在这项研究中,通过从健康相关领域改编的混合连续阶段行为改变模型的理论视角,研究了用户行为,特别是针对网络钓鱼尝试的警惕性。这种类型的模型有助于我们了解在针对钓鱼尝试采取更加警惕的行动计划时,在质量上是否存在不同的阶段,用户在形成意图和随后的行为之间必须经历的不同阶段的数量和顺序,这些阶段的特征是什么? ,以及在这些阶段进行适当的干预如何将用户带入更高的警惕行为阶段。这项研究的目的是更好地了解:a)是否有不同的阶段可以区分最终用户对网络钓鱼尝试的警惕; b)有多少个本质上不同的阶段; c)这些阶段的特征是什么。这项研究根据模型的结构(例如应对自我效能,意图,行动/应对计划和风险感知)对IS最终用户进行了介绍,该结构检查了最终用户对网络钓鱼尝试的保护行为。在调查数据的探索性分析中,IS最终用户的阶段是通过聚类分析技术确定的(分层,然后是K均值)。对受访者进行了调查(n = 394)。接下来,在模型的构造上使用平均链接和欧几里德距离测度的组内方法进行了聚集层次聚类分析。出现了三个聚类作为在随后的K均值聚类分析中使用的最佳数。在对3聚类解决方案的稳定性和有效性进行了分析之后,我比较了该模型的构造方法以针对不同的三个阶段开发配置文件。我得出结论,探索性聚类分析是发现IS最终用户保护行为的自然分组的有效技术,并提出了进一步的研究,以调查适合阶段的干预措施以使用户进入更高的阶段。

著录项

  • 作者

    Burns Mary B.;

  • 作者单位
  • 年度 2012
  • 总页数
  • 原文格式 PDF
  • 正文语种 en
  • 中图分类

相似文献

  • 外文文献
  • 中文文献
  • 专利

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号