2018
DOI: 10.1016/j.cose.2018.03.003
|View full text |Cite
|
Sign up to set email alerts
|

Secure or usable computers? Revealing employees’ perceptions and trade-offs by means of a discrete choice experiment

Abstract: packages that are still preferred by employees. The paper also makes a methodological contribution to the literature by introducing discrete choice experiments to the field of information security.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2022
2022
2022
2022

Publication Types

Select...
1

Relationship

1
0

Authors

Journals

citations
Cited by 1 publication
(1 citation statement)
references
References 31 publications
0
1
0
Order By: Relevance
“…A structural equation model was then estimated to examine the direct and indirect effects of the varied attributes on the four measured perception variables and overall attractiveness. Also, Molin et al (2018) developed a single experiment with multiple questions. In the context of computer security preferences, this study constructed alternatives in which the attributes involved technical security measures that may be implemented to protect computers.…”
Section: Previous Workmentioning
confidence: 99%
“…A structural equation model was then estimated to examine the direct and indirect effects of the varied attributes on the four measured perception variables and overall attractiveness. Also, Molin et al (2018) developed a single experiment with multiple questions. In the context of computer security preferences, this study constructed alternatives in which the attributes involved technical security measures that may be implemented to protect computers.…”
Section: Previous Workmentioning
confidence: 99%