2014
DOI: 10.4018/joeuc.2014070102
|View full text |Cite
|
Sign up to set email alerts
|

Explaining Users' Security Behaviors with the Security Belief Model

Abstract: Information security is often viewed as a technological matter. However, security professionals will readily admit that without safe practices by users, no amount or type of technology will be effective at preventing unauthorized intrusions. By paralleling the practices of information security and health prevention, a rationale for employing constructs from existing models of health behavior is established. A comprehensive and parsimonious model (the Security Belief Model) is developed to explain information s… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

2
27
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 18 publications
(29 citation statements)
references
References 57 publications
2
27
0
Order By: Relevance
“…Finally, new software solutions, such as cloud access security brokers (CASBs), can provide security for remote workers who are increasingly accessing applications and data in the cloud ( Gartner, 2019 ), especially when working with their personal devices from home ( Bitglass, 2020 ; Papagiannidis et al, 2020 ). However, better protective technologies are not sufficient ( Williams, Wynn, Madupalli, Karahanna, & Dunkan, 2014 ) to efficiently mitigate BYOD-related security issues; protective behaviors and attitudes are also important ( Aurigemma & Mattson, 2019 ; Balapour et al, 2020 ). Some security measures can directly affect the company’s management and thus require organizational reflection ( Brodin, 2016 ) and management’s decision making ( Jeong, Lee, & Lim, 2019 ).…”
Section: Theoretical Backgroundmentioning
confidence: 99%
“…Finally, new software solutions, such as cloud access security brokers (CASBs), can provide security for remote workers who are increasingly accessing applications and data in the cloud ( Gartner, 2019 ), especially when working with their personal devices from home ( Bitglass, 2020 ; Papagiannidis et al, 2020 ). However, better protective technologies are not sufficient ( Williams, Wynn, Madupalli, Karahanna, & Dunkan, 2014 ) to efficiently mitigate BYOD-related security issues; protective behaviors and attitudes are also important ( Aurigemma & Mattson, 2019 ; Balapour et al, 2020 ). Some security measures can directly affect the company’s management and thus require organizational reflection ( Brodin, 2016 ) and management’s decision making ( Jeong, Lee, & Lim, 2019 ).…”
Section: Theoretical Backgroundmentioning
confidence: 99%
“…Generally, the HBM was utilized in information systems' security domain [15,19,20,[49][50][51]. In addition, the current study adopts the HBM for the following reasons:…”
Section: Research Modelmentioning
confidence: 99%
“…Furthermore, a total of 386 responses were used for the current analysis. Moreover, the SmartPLS 3.2.8 [15][16][17][18][19][20][21] has been utilized for the data analysis. The SmartPLS 3.2.8 is a well-known tool for statistical analysis and extensively employed in the research domain [19,20].…”
Section: Introductionmentioning
confidence: 99%
See 2 more Smart Citations