2011
DOI: 10.1016/j.ijhcs.2011.07.007
|View full text |Cite
|
Sign up to set email alerts
|

Factors affecting perception of information security and their impacts on IT adoption and security practices

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

5
61
0
1

Year Published

2012
2012
2022
2022

Publication Types

Select...
4
4
1

Relationship

0
9

Authors

Journals

citations
Cited by 98 publications
(67 citation statements)
references
References 40 publications
5
61
0
1
Order By: Relevance
“…Surveys have shown that security risk is one of the important factors that can have influence on adoption of online banking services. The gap between the perceived security of a technology and its real security level can affect behavior of people (Huang et al, 2011). The success of online banking service adoption is threatened by lack of awareness and incorrect perceived knowledge about information and money security (Huang et al, 2010) so:…”
Section: Ajasmentioning
confidence: 99%
“…Surveys have shown that security risk is one of the important factors that can have influence on adoption of online banking services. The gap between the perceived security of a technology and its real security level can affect behavior of people (Huang et al, 2011). The success of online banking service adoption is threatened by lack of awareness and incorrect perceived knowledge about information and money security (Huang et al, 2010) so:…”
Section: Ajasmentioning
confidence: 99%
“…Overplaying the risks, however, can inhibit precautionary behaviour as people prefer to deny it, and do not engage in precautionary actions such as verifying [32], [69]. Huang et al [25] report that awareness of threats was effective in motivating users to carry out necessary security steps in other contexts. Thus, we designed a risk message, emphasizing an existing threat and what the voter should do to avoid it.…”
Section: ) Excluded Categoriesmentioning
confidence: 92%
“…The selection process removed characteristics that are hard to measure according to either our experts or by nonexperts at SMEs whom eventually will use the model, for example, a user's mother tongue [25] and user's intention [17].…”
Section: Extrapolating Organizational Characteristicsmentioning
confidence: 99%
“…The effective marketing of security to all employees [13,17] Information security policy development…”
Section: A2mentioning
confidence: 99%