2009
DOI: 10.1108/09685220910993980
|View full text |Cite
|
Sign up to set email alerts
|

Impact of perceived technical protection on security behaviors

Abstract: PurposeThe purpose of this paper based on compensation theory, is to incorporate perceived technical security protection into the theory of planned behavior and examined factors affecting end‐user security behaviors, specifically, compliance with security policies.Design/methodology/approachAn online survey is conducted to validate the proposed research model. The survey is sent out to an industrial panel. A total of 176 usable responses are received and used in the data analysis.FindingsThe results show that … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2

Citation Types

3
60
0

Year Published

2013
2013
2021
2021

Publication Types

Select...
4
2
2

Relationship

0
8

Authors

Journals

citations
Cited by 89 publications
(63 citation statements)
references
References 30 publications
3
60
0
Order By: Relevance
“…The top three theories were the DT, theory of reasoned action/planned behavior (TRA), and protection motivation theory (PMT). As shown in Table 3, 12 studies relied on the DT [3, 12, 19, 26-28, 55, 62, 63, 66, 69, 70], whereas the TRA was used in seven studies [5,10,11,22,23,61,67] and PMT in five studies [9,20,21,24,74]. Both the rational choice theory (RCT) and social cognitive theory (SCT) have been adopted in three studies.…”
Section: Theoretical Evolvementmentioning
confidence: 99%
See 2 more Smart Citations
“…The top three theories were the DT, theory of reasoned action/planned behavior (TRA), and protection motivation theory (PMT). As shown in Table 3, 12 studies relied on the DT [3, 12, 19, 26-28, 55, 62, 63, 66, 69, 70], whereas the TRA was used in seven studies [5,10,11,22,23,61,67] and PMT in five studies [9,20,21,24,74]. Both the rational choice theory (RCT) and social cognitive theory (SCT) have been adopted in three studies.…”
Section: Theoretical Evolvementmentioning
confidence: 99%
“…It was not until 2006 when the TRA was introduced in IS research [22], which resulted in its use in six papers [5,10,11,23,61,67]. The first empirical study based on the PMT was published in 2008 [24], and this theory was cited in five papers [9,20,21,24,74].…”
Section: Theoretical Evolvementmentioning
confidence: 99%
See 1 more Smart Citation
“…However, employees still routinely fail to comply with those policies, either deliberately or unknowingly [9]. Considering that security researchers and organizational surveys generally consider insiderrelated security threats from well-meaning (nonmalicious) employees as one of the most likely sources of security breaches and which can cause more damage than external attacks [2,[10][11][12], it is important to understand why employees may intend or not intend to comply with the organization's ISP.…”
Section: Introductionmentioning
confidence: 99%
“…Examples also exist in computer security such asZhang et al (2009) andParsons et al (2010).4 Note that breaking out these effects separately is done for ease of understanding, not to either promote or demote these particular effects of security. Indeed, shaping attacker behavior is one of the key routes through which security measures produce beneficial outcomes.…”
mentioning
confidence: 98%