2,327
Views
59
CrossRef citations to date
0
Altmetric
Information security

Perception of information security

, &
Pages 221-232 | Received 01 Apr 2007, Accepted 01 Sep 2007, Published online: 11 Nov 2008

References

  • Berinato , S. 2005 . The Global State of Information Security 2005 . Available online at: http://www.csoonline.com/read/100105/survey.html) (accessed 16 April 2006)
  • Chai , S. , Bagchi-Sen , S. , Morrell , C. , Rao , H. R. and Upadhyaya , S. . Role of perceived importance of information security: an exploratory study of middle school children's information security behavior . Informing Science and Information Technology Conference Pro . 2006 , Greater Manchester, England.
  • China Internet Network Information Center . 2006 . The statistics report of the development of Internet in China . Available online at: http://www.cnnic.net.cn/index/0E/00/11/index.htm (accessed 17 April 2006)
  • Cooper , D. 2003 . Psychology, risk & safety: understanding how personality & perception can influence risk taking . Professional Safety , 48 : 39 – 46 .
  • Covello , V. T. 1983 . The perception of technological risks: a literature review . Technological Forecasting Social Change , 23 : 285 – 297 .
  • Covello , V. T. 1992 . “ Risk communication: an emerging area of health communication research ” . In Communication Yearbook , 15th ed. , Edited by: Deetz , S. 359 – 373 . Beverly Hills : Sage .
  • Covello , V. T. and Merkhofer , M. W. 1994 . Risk assessment methods , New York : Plenum .
  • Douglas , M. and Wildavsky , A. 1982 . Risk and culture , Berkeley : University of California Press .
  • Featherman , M. S. and Pavlou , P. A. 2003 . Predicting e-services adoption: a perceived risk facets perspective . International Journal of Human-Computer Studies , 59 : 451 – 474 .
  • Fischhoff , B. , Slovic , P. , Lichtenstein , S. , Read , S. and Cambs , B. 1978 . How safe is safe enough? A psychometric study of attitudes towards technological risks and benefits . Policy Sciences , 9 : 127 – 152 .
  • Gonzalez , J. J. and Sawicka , A. . A framework for human factors in information security . Proceedings of the 2002 WSEAS International Conference on Information Security (ICIS'02) . Rio de Janeiro.
  • Gorden , L. A. , Loeb , M. P. , Lucyshyn , W. and Richardson , R. 2006 . 2006 CSI/FBI computer crime and security survey . Available online at: http://www.gocsi.com (accessed 9 January 2007)
  • Hassel , L. and Wiedenbeck , S. 2004 . Human Factors and Information Security DIMACS Workshop on Usable Privacy and Security Software, 7–8 July 2004, DIMACS Centre, CORE Building, Rutges University, Piscataway, NJ
  • Holtgrave , D. R. and Weber , E. U. 1993 . Dimensions of risk perception for financial and health risks . Risk Analysis , 13 : 553 – 558 .
  • Jackson , J. , Allum , N. and Gaskell , G. 2005 . “ Perceptions of risk in cyberspace ” . In Trust and Crime in Information Societies , Edited by: Mansell , R. and Collins , B. S. Cheltenham : Edward Elgar . Available online at http://www/lse.ac.uk/collections/methodologyInstitute/pdf/JonJackson/perceptions%2007%20risk%20in%20cyberspace.pdf
  • Jih , W.-J. , Wong , S.-Y. and Chang , T.-B. 2005 . Effects of perceived risks on adoption of Internet banking services: an empirical investigation in Taiwan . International Journal of e-Business Research , 1 : 70 – 88 .
  • Lim , N. 2003 . Consumers' perceived risk: sources versus consequences . Electronic Commerce Research and Applications , 2 : 216 – 228 .
  • MacDonald , G. 2006 . Risk perception and construction safety . Proceedings of the Institution of Civil Engineers: Civil Engineering , 159 : 51 – 56 .
  • McDaniels , T. , Axelrod , L. J. and Slovic , P. 1995 . Characterizing perception of ecological risk . Risk Analysis , 15 : 575
  • Musekura , J. B. and Ekh , R. 2004 . “ Information security issues – difference between perception and practice in organizations ” . Available online at: http://www.oru.se/templates/oruExtNormal____19402.aspx (accessed 6 January 2007). Department of Business, Economics, Statistics and Informatics, Orebro University, Sweden
  • NSTISSC . 1994 . National Training Standard for Information Systems Security (Infosec) Professionals , National Security Telecommunications and Information Systems Security Committee .
  • Nunnally , J. C. 1978 . Psychometric theory , New York : McGraw-Hill .
  • Pikkarainen , T. , Pikkarainen , K. , Karjaluoto , H. and Pahnila , S. 2004 . Consumer acceptance of online banking: an extension of the technology acceptance model . Internet Research , 14 : 224 – 235 .
  • Salvendy , G. 1997 . Handbook of human factors and ergonomics , New York : Wiley-Interscience .
  • Schultz , E. E. , Proctor , R. W. , Lien , M. C. and Salvendy , G. 2001 . Usability and security: an appraisal of usability issues in information security methods . Computers and Security , 20 : 620
  • Setbon , M. , Raude , J. , Fischler , C. and Flahault , A. 2005 . Risk perception of the “mad cow disease” in France: determinants and consequences . Risk Analysis , 25 : 813 – 826 .
  • Siegrist , M. , Keller , C. and Kiers , H. A.L. 2005 . A new look at the psychometric paradigm of perception of hazards . Risk Analysis , 25 : 211 – 222 .
  • Sjoberg , L. 2000 . Factors in risk perception . Risk Analysis , 20 : 1 – 11 .
  • Sjoberg , L. 2003 . Distal factors in risk perception . Journal of Risk Research , 6 : 187
  • Sjoberg , L. and Drottz-Sjoberg , B.-M. 1991 . Knowledge and risk perception among nuclear power plant employees . Risk Analysis , 11 : 607
  • Slovic , P. 1987 . Perception of risk . Science , 236 : 280 – 285 .
  • Slovic , P. , Fischhoff , B. and Lichtenstein , S. 1980 . “ Facts and fears – understanding risk ” . In Societal Risk Assessment – How Safe is Safe Enough? , Edited by: Schwing , R. C. and Albers , W. A. 181 – 218 . New York : Plenum .
  • Stainer , A. and Stainer , L. 1995 . Young people's risk perception of nuclear power – a European viewpoint . International Journal of Global Energy Issues , 7 : 261 – 270 .
  • Starr , C. 1969 . Social benefit versus technological risk . Science , 165 : 1232 – 1238 .
  • Stewart , A. 2004 . On risk: perception and direction . Computers and Security , 23 : 362 – 370 .
  • Suh , B. and Han , I. 2003 . The impact of customer trust and perception of security control on the acceptance of electronic commerce . International Journal of Electronic Commerce , 7 : 135 – 161 .
  • Thomson , K. and von Solms , R. 2005 . Information security obedience: a definition . Computers & Security , 24 : 69 – 75 .
  • Turner , D. , Entwisle , S. , Fossi , M. , Blackbird , J. , McKinney , D. , Conneff , T. and Whitehouse , O. 2006 . “ Symantec Internet security threat report – trends for January 06 to June 06 ” . Available online at: http://www.symantec.com (17 January 2007)
  • UNCTAD . 2005 . “ Information economy report (United Nations Conference on Trade and Development) ” . Available online at: http://www.unctad.org (accessed 17 April 2006)
  • Vyskoc , J. and Fibikova , L. . IT users' perception of information security . 2nd Working Conference on Security and Control of Information Technology in Security . Bratislava, Slovakia. pp. 107 Bratislava : Comenius University .
  • Whitman , M. E. 2003 . Enemy at the gate: threats to information security . Communications of the ACM , 46 : 91 – 95 .
  • Whitman , M. E. and Mattford , H. J. 2004 . Principles of information security , Boston, MA : Thomson Learning .
  • Wogalter , M. S. , Brelsford , J. W. , Desaulniers , D. R. and Laughery , K. R. 1991 . Consumer product warnings. The role of hazard perception . Journal of Safety Research , 22 : 71
  • Yang , K. C.C. 2005 . Exploring factors affecting the adoption of mobile commerce in Singapore . Telematics and Informatics , 22 : 257 – 277 .
  • Yenisey , M. M. , Ozok , A. A. and Salvendy , G. 2005 . Perceived security determinants in e-commerce among Turkish university students . Behaviour & Information Technology , 24 : 259 – 274 .

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.