[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1145/3084381.3084429acmconferencesArticle/Chapter ViewAbstractPublication PagescprConference Proceedingsconference-collections
abstract

Exploring Factors Influencing Self-Efficacy in Information Security: An Empirical Analysis by Integrating Multiple Theoretical Perspectives in the Context of Using Protective Information Technologies

Published: 21 June 2017 Publication History

Abstract

Self-efficacy in information security (SEIS) is one of the most researched predictors of end user security behavior that hinges on end user acceptance and use of the protective technologies such as anti-virus and anti-spyware. SEIS is also modeled as a mediator between factors affecting SEIS and the end user cybersecurity behavior. However, it is not clearly established in past literature on whether SEIS is better modeled as a predictor or as a mediator. It is stressed in literature that we should find new ways to improve SEIS. Accordingly, the purpose of this research is to empirically investigate what factors influence SEIS, and to examine the relative effect of each theorized factor (including self-efficacy) in increasing information security.

References

[1]
Bandura, A. (1977). Self-efficacy: toward a unifying theory of behavioral change. Psychological review, 84(2), 191.
[2]
Bandura, A. (1986). Social foundations of thought and action (pp. 5--107). Prentice Hall.: Englewood Cliffs, NJ.
[3]
Bulgurcu, B., Cavusoglu, H., & Benbasat, I. (2010). Information security policy compliance: an empirical study of rationality-based beliefs and information security awareness. MIS quarterly, 34(3), 523--548.
[4]
Claar, C. L., Shields, R. C., Rawlinson, D., & Lupton, R. (2013). College student home computer security adoption. Issues in Information Systems, 14(2).
[5]
Dinev, T., & Hu, Q. (2007). The centrality of awareness in the formation of user behavioral intention toward PIT. Journal of the Association for Information Systems, 8(7), 23.
[6]
Furman, S., Theofanos, M. F., Choong, Y. Y., & Stanton, B. (2012). Basing cybersecurity training on user perceptions. IEEE Security and Privacy, 10(2), 40--49.
[7]
Hanus, B., & Wu, Y. A. (2016). Impact of Users' Security Awareness on Desktop Security Behavior: A Protection Motivation Theory Perspective. Information Systems Management, 33(1), 2--16.
[8]
McCormick, R. (1997). Conceptual and procedural knowledge. International journal of technology and design education, 7(1--2), 141--159.
[9]
Rhee, H. S., Kim, C., & Ryu, Y. U. (2009). SEIS: Its influence on end users' information security practice behavior. Computers & Security, 28(8), 816--826.
[10]
Shropshire, J., Warkentin, M., & Sharma, S. (2015). Personality, attitudes, and intentions: predicting initial adoption of information security behavior. computers & security, 49, 177--191.
[11]
Sommestad, T., Hallberg, J., Lundholm, K., & Bengtsson, J. (2014). Variables influencing information security policy compliance: A systematic review of quantitative studies. Information Management & Computer Security, 22(1), 42--75.
[12]
Straub, D. W., & Welke, R. J. (1998). Coping with systems risk: security planning models for management decision making. Mis Quarterly, 441--469.
[13]
Thatcher, J. B., & Perrewe, P. L. (2002). An empirical examination of individual traits as antecedents to computer anxiety and computer self-efficacy. Mis Quarterly, 381--396.
[14]
Wang, P. A. (2013, June). Assessment of Cybersecurity Knowledge and Behavior: An Anti-phishing Scenario. In International Conference on Internet Monitoring and Protection (ICIMP).
[15]
Yi, M. Y., & Davis, F. D. (2003). Developing and validating an observational learning model of computer software training and skill acquisition. Information Systems Research, 14(2), 146--169

Index Terms

  1. Exploring Factors Influencing Self-Efficacy in Information Security: An Empirical Analysis by Integrating Multiple Theoretical Perspectives in the Context of Using Protective Information Technologies

        Recommendations

        Comments

        Please enable JavaScript to view thecomments powered by Disqus.

        Information & Contributors

        Information

        Published In

        cover image ACM Conferences
        SIGMIS-CPR '17: Proceedings of the 2017 ACM SIGMIS Conference on Computers and People Research
        June 2017
        220 pages
        ISBN:9781450350372
        DOI:10.1145/3084381
        Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for third-party components of this work must be honored. For all other uses, contact the Owner/Author.

        Sponsors

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        Published: 21 June 2017

        Check for updates

        Author Tags

        1. awareness
        2. education
        3. security
        4. self-efficacy
        5. seta
        6. training

        Qualifiers

        • Abstract

        Conference

        SIGMIS-CPR '17
        Sponsor:

        Acceptance Rates

        Overall Acceptance Rate 300 of 480 submissions, 63%

        Contributors

        Other Metrics

        Bibliometrics & Citations

        Bibliometrics

        Article Metrics

        • 0
          Total Citations
        • 189
          Total Downloads
        • Downloads (Last 12 months)12
        • Downloads (Last 6 weeks)0
        Reflects downloads up to 06 Jan 2025

        Other Metrics

        Citations

        View Options

        Login options

        View options

        PDF

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader

        Media

        Figures

        Other

        Tables

        Share

        Share

        Share this Publication link

        Share on social media