2,327
Views
59
CrossRef citations to date
0
Altmetric
Information security

Perception of information security

, &
Pages 221-232 | Received 01 Apr 2007, Accepted 01 Sep 2007, Published online: 11 Nov 2008

Keep up to date with the latest research on this topic with citation updates for this article.

Read on this site (6)

Malyun Hilowle, William Yeoh, Marthie Grobler, Graeme Pye & Frank Jiang. (2023) Users’ Adoption of National Digital Identity Systems: Human-Centric Cybersecurity Review. Journal of Computer Information Systems 63:5, pages 1264-1279.
Read now
Ron S. Hirschprung, Shay Tayro & Eti Reznik. (2022) Optimising technological literacy acquirement to protect privacy and security. Behaviour & Information Technology 41:5, pages 922-933.
Read now
Jiaxin Zhang & Yan Luximon. (2021) A quantitative diary study of perceptions of security in mobile payment transactions. Behaviour & Information Technology 40:15, pages 1579-1602.
Read now
Shashi Kant Srivastava, Saini Das, Godwin J. Udo & Kallol Bagchi. (2020) Determinants of Cybercrime Originating within a Nation: A Cross-country Study. Journal of Global Information Technology Management 23:2, pages 112-137.
Read now
Jurjen Jansen, Sander Veenstra, Renske Zuurveen & Wouter Stol. (2016) Guarding against online threats: why entrepreneurs take protective measures. Behaviour & Information Technology 35:5, pages 368-379.
Read now
Tao Wang, Chul-Ho Jung, Ming-Hui Kang & Young-Soo Chung. (2014) Exploring determinants of adoption intentions towards Enterprise 2.0 applications: an empirical study. Behaviour & Information Technology 33:10, pages 1048-1064.
Read now

Articles from other publishers (53)

Kelsey R. Ciagala, Sydney L. Reichin, Katherine Parsons & Samuel T. Hunter. (2024) Physical security culture: The neglected foundation for effective security. Safety Science 175, pages 106518.
Crossref
Marie Haugli-Sandvik, Mass Soldal Lund & Frøy Birte Bjørneseth. (2024) Maritime decision-makers and cyber security: deck officers’ perception of cyber risks towards IT and OT systems. International Journal of Information Security.
Crossref
Saqib Saeed. (2023) Education, Online Presence and Cybersecurity Implications: A Study of Information Security Practices of Computing Students in Saudi Arabia. Sustainability 15:12, pages 9426.
Crossref
Saqib Saeed. (2023) Digital Workplaces and Information Security Behavior of Business Employees: An Empirical Study of Saudi Arabia. Sustainability 15:7, pages 6019.
Crossref
Saqib Saeed. (2023) A Customer-Centric View of E-Commerce Security and Privacy. Applied Sciences 13:2, pages 1020.
Crossref
Ian Wiltshire, Sujana Adapa & David Paul. 2023. Small and Medium-sized Enterprises, and Business Uncertainty. Small and Medium-sized Enterprises, and Business Uncertainty 151 172 .
Yang Liu, Qin Gao & Pei-Luen Patrick Rau. (2022) Chinese passengers’ security perceptions of ride-hailing services: An integrated approach combining general and situational perspectives. Travel Behaviour and Society 26, pages 250-269.
Crossref
Kirill Gavrilov & Maria Butynko. (2021) The Perception of Cyber and Traditional Risks: Experience of Using the Psychometric Paradigm Approach. Sociological Journal 27:4, pages 146-168.
Crossref
Wei Xu, Finbarr Murphy, Xian Xu & Wenpeng Xing. (2021) Dynamic communication and perception of cyber risk: Evidence from big data in media. Computers in Human Behavior 122, pages 106851.
Crossref
Mariana Hentea. 2021. Building an Effective Security Program for Distributed Energy Resources and Systems. Building an Effective Security Program for Distributed Energy Resources and Systems 197 210 .
Laila Dahabiyeh, Mohammad S. Najjar & Deepti Agrawal. (2021) When ignorance is bliss: The role of curiosity in online games adoption. Entertainment Computing 37, pages 100398.
Crossref
Marie Haugli Larsen & Mass Soldal Lund. (2021) Cyber Risk Perception in the Maritime Domain: A Systematic Literature Review. IEEE Access 9, pages 144895-144905.
Crossref
Shadab Kalhoro, Mobashar Rehman, Vasaki Ponnusamy & Farhan Bashir Shaikh. (2021) Extracting Key Factors of Cyber Hygiene Behaviour Among Software Engineers: A Systematic Literature Review. IEEE Access 9, pages 99339-99363.
Crossref
Leigh A. Mutchler & Merrill Warkentin. (2020) Experience Matters. Journal of Database Management 31:2, pages 1-20.
Crossref
Ignas Zimaitis, Mindaugas Degutis & Sigitas Urbonavicius. (2020) Social Media Use and Paranoia: Factors That Matter in Online Shopping. Sustainability 12:3, pages 904.
Crossref
Eunjung Shin & Eric W. Welch. 2020. Open Government. Open Government 2295 2317 .
Mohammad Shakibazad & Ali Jabbar Rashidi. (2020) New method for assets sensitivity calculation and technical risks assessment in the information systems. IET Information Security 14:1, pages 133-145.
Crossref
Andrew Reeves, Kathryn Parsons & Dragana Calic. 2020. HCI for Cybersecurity, Privacy and Trust. HCI for Cybersecurity, Privacy and Trust 232 249 .
Péter Vörös, Péter Hudoba & Attila Kiss. 2020. Intelligent Information and Database Systems: Recent Developments. Intelligent Information and Database Systems: Recent Developments 241 252 .
Jiaxin Zhang, Yan Luximon & Yao Song. (2019) The Role of Consumers’ Perceived Security, Perceived Control, Interface Design Features, and Conscientiousness in Continuous Use of Mobile Payment Services. Sustainability 11:23, pages 6843.
Crossref
Mohammed Sajedur Rahman. (2019) Does Privacy Matters When We are Sick? An Extended Privacy Calculus Model for Healthcare Technology Adoption Behavior. Does Privacy Matters When We are Sick? An Extended Privacy Calculus Model for Healthcare Technology Adoption Behavior.
Gill Hubbard, Claire Taylor, Julie Munro, Nicola Dames, William Goodman, Raymond Oliphant & Rebecca Beeken. (2019) Experiences of support garments following bowel stoma formation: analysis of free-text responses in a cross-sectional survey. BMJ Open Gastroenterology 6:1, pages e000291.
Crossref
Samantha Bordoff, Quan Chen & Zheng Yan. 2019. Cyber Law, Privacy, and Security. Cyber Law, Privacy, and Security 20 37 .
Samantha Bordoff, Quan Chen & Zheng Yan. 2019. National Security. National Security 60 77 .
Samantha Bordoff, Quan Chen & Zheng Yan. 2019. Multigenerational Online Behavior and Media Use. Multigenerational Online Behavior and Media Use 407 424 .
Ali Farooq, Debora Jeske & Jouni Isoaho. 2019. ICT Systems Security and Privacy Protection. ICT Systems Security and Privacy Protection 238 252 .
Jurjen Jansen & Paul van Schaik. (2018) Testing a model of precautionary online behaviour: The case of online banking. Computers in Human Behavior 87, pages 371-383.
Crossref
Fei Gao, Pei-Luen Patrick Rau & Yubo Zhang. 2018. Mobile Commerce. Mobile Commerce 1179 1198 .
Hamed Taherdoost. (2017) Understanding of e-service security dimensions and its effect on quality and intention to use. Information & Computer Security 25:5, pages 535-559.
Crossref
Arash Ghazvini & Zarina Shukur. (2017) Review of information security guidelines for awareness training program in healthcare industry. Review of information security guidelines for awareness training program in healthcare industry.
Samantha Bordoff, Quan Chen & Zheng Yan. (2017) Cyber Attacks, Contributing Factors, and Tackling Strategies. International Journal of Cyber Behavior, Psychology and Learning 7:4, pages 68-82.
Crossref
Paul van Schaik, Debora Jeske, Joseph Onibokun, Lynne Coventry, Jurjen Jansen & Petko Kusev. (2017) Risk perceptions of cyber-security and precautionary behaviour. Computers in Human Behavior 75, pages 547-559.
Crossref
Václav Šimandl & Jiří Vaníček. (2017) Influences on ICT teachers knowledge and routines in a technical e-safety context. Telematics and Informatics.
Crossref
Debora Jeske & Paul van Schaik. (2017) Familiarity with Internet threats: Beyond awareness. Computers & Security 66, pages 129-141.
Crossref
Fei Gao, Pei-Luen Patrick Rau & Yubo Zhang. (2017) Perceived Mobile Information Security and Adoption of Mobile Payment Services in China. International Journal of Mobile Human Computer Interaction 9:1, pages 45-62.
Crossref
Ahmad Bakhtiyari Shahri, Zuraini Ismail & Shahram Mohanna. (2016) The Impact of the Security Competency on “Self-Efficacy in Information Security” for Effective Health Information Security in Iran. Journal of Medical Systems 40:11.
Crossref
Min, Kyeong-Eun, 권두순 & 김성준. (2016) The effects on privacy protection behavior through mobile messenger security awareness and security intention - Focus on Theory of Self-Determination -. Management & Information Systems Review 35:1, pages 207-233.
Crossref
Alireza Shameli-Sendi, Rouzbeh Aghababaei-Barzegar & Mohamed Cheriet. (2016) Taxonomy of information security risk assessment (ISRA). Computers & Security 57, pages 14-30.
Crossref
Gizem Öğütçü, Özlem Müge Testik & Oumout Chouseinoglou. (2016) Analysis of personal information security behavior and awareness. Computers & Security 56, pages 83-93.
Crossref
Aggeliki Tsohou, Maria Karyda & Spyros Kokolakis. (2015) Analyzing the role of cognitive and cultural biases in the internalization of information security policies: Recommendations for information security awareness programs. Computers & Security 52, pages 128-141.
Crossref
Kenneth J. Knapp & Claudia J. Ferrante. 2015. Standards and Standardization. Standards and Standardization 751 771 .
Yu‐Teng Jang, Shuchih Ernest Chang & Yi‐Jey Tsai. (2013) Smartphone security: understanding smartphone users' trust in information security management. Security and Communication Networks 7:9, pages 1313-1321.
Crossref
Marian Harbach, Sascha Fahl & Matthew Smith. (2014) Who's Afraid of Which Bad Wolf? A Survey of IT Security Risk Awareness. Who's Afraid of Which Bad Wolf? A Survey of IT Security Risk Awareness.
Kenneth J. Knapp & Claudia J. Ferrante. (2014) Information Security Program Effectiveness in Organizations. Journal of Organizational and End User Computing 26:1, pages 27-46.
Crossref
Balbir S. Barn, Ravinder Barn & Jo-Pei Tan. (2014) Young People and Smart Phones: An Empirical Study on Information Security. Young People and Smart Phones: An Empirical Study on Information Security.
Mehmet Göktürk & İbrahim Şişaneci. 2014. Design, User Experience, and Usability. User Experience Design Practice. Design, User Experience, and Usability. User Experience Design Practice 23 31 .
Balbir S. Barn, Ravinder Barn & Jo-Pei Tan. (2013) Smart Phone Activity. International Journal of Social and Organizational Dynamics in IT 3:4, pages 43-58.
Crossref
Shu-Chiung Lin, David C. Yen, Patrick S. Chen & Wei-Kuo Lin. (2013) Coding behavior of authentication code on the internet. Computers in Human Behavior 29:5, pages 2090-2099.
Crossref
Dirk Van Bruggen, Shu Liu, Mitch Kajzer, Aaron Striegel, Charles R. Crowell & John D'Arcy. (2013) Modifying smartphone user locking behavior. Modifying smartphone user locking behavior.
Steven Furnell & Nina Bär. 2013. Human Aspects of Information Security, Privacy, and Trust. Human Aspects of Information Security, Privacy, and Trust 217 225 .
Margaret Tan & Kathrine Sagala Aguilar. (2012) An investigation of students' perception of Bluetooth security. Information Management & Computer Security 20:5, pages 364-381.
Crossref
Gráinne Kirwan & Andrew PowerGráinne Kirwan & Andrew Power. 2012. The Psychology of Cyber Crime. The Psychology of Cyber Crime 73 92 .
Ding-Long Huang, Pei-Luen Patrick Rau, Gavriel Salvendy, Fei Gao & Jia Zhou. (2011) Factors affecting perception of information security and their impacts on IT adoption and security practices. International Journal of Human-Computer Studies 69:12, pages 870-883.
Crossref

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.