2010
DOI: 10.1145/1877725.1877728
|View full text |Cite
|
Sign up to set email alerts
|

Drivers of information security search behavior: An investigation of network attacks and vulnerability disclosures

Abstract: More and more people use search engines to seek for various information. This study investigates the search behavior that drives the search for information security knowledge via a search engine. Based on theories in information search and information security behavior we examine the effects of network attacks and vulnerability disclosures on search for information security knowledge by ordinary users. We construct a unique dataset from publicly available sources, and use a dynamic regression model to test the… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

1
3
0

Year Published

2012
2012
2021
2021

Publication Types

Select...
6

Relationship

1
5

Authors

Journals

citations
Cited by 7 publications
(4 citation statements)
references
References 57 publications
1
3
0
Order By: Relevance
“…The results also indicate that contextual variables such as network attacks and the day when a search is performed (weekday vs. weekend) affect search behavior. The effects of control variables are largely consistent with prior findings in the area of information search (Baye et al 2009, Bucklin and Sismeiro 2003, Johnson et al 2003, Wang et al 2010.…”
Section: Estimation Resultssupporting
confidence: 83%
See 2 more Smart Citations
“…The results also indicate that contextual variables such as network attacks and the day when a search is performed (weekday vs. weekend) affect search behavior. The effects of control variables are largely consistent with prior findings in the area of information search (Baye et al 2009, Bucklin and Sismeiro 2003, Johnson et al 2003, Wang et al 2010.…”
Section: Estimation Resultssupporting
confidence: 83%
“…We thus included the number of network attacks on the date when the search was performed as a control variable. We derived the measurement of network attack intensity based on DShield data (www.DShield.org; Wang et al 2010). Fourth, we included whether the search was conducted on a weekday or weekend/holiday as a control variable, because time constraints may vary for these two periods (Baye et al 2009).…”
Section: Dread Risk and Searchmentioning
confidence: 99%
See 1 more Smart Citation
“…Then, it draws on a large-scale tracking data of million users across different websites to analyze consumers' holistic behaviour. Examining real-life logs of user behaviour is increasingly important, as it captures the actual usage rather than users' intension (Wang et al 2010) and provides valuable insight into online behaviour (Wang et al 2012(Wang et al , 2015. In addition, actual usage does not rely on participant's self-reported behaviour.…”
Section: Introductionmentioning
confidence: 99%