4,345
Views
10
CrossRef citations to date
0
Altmetric
Original Articles

Understanding negotiated anti-malware interruption effects on user decision quality in endpoint security

, &
Pages 903-932 | Received 29 Aug 2019, Accepted 19 Feb 2020, Published online: 12 Mar 2020

References

  • Abazari, F., M. Analoui, and H. Takabi. 2016. “Effect of Anti-Malware Software on Infectious Nodes in Cloud Environment.” Computers & Security 58: 139–148.
  • Adamczyk, P. D., and B. P. Bailey. 2004. “If Not Now, When? The Effects of Interruption at Different Moments Within Task Execution.” In Proceedings of the ACM Conference on Human Factors in Computing Systems CHI 2004, edited by Elizabeth Dykstra-Erickson and Manfred Tscheligi, 271–278. Vienna.
  • Addas, S., and A. Pinsonneault. 2018. “Theorizing the Multilevel Effects of Interruptions and the Role of Communication Technology.” Journal of the Association for Information Systems 19 (11): 1097–1129.
  • Adler, R. F., and R. Benbunan-Fich. 2013. “Self-Interruptions in Discretionary Multitasking.” Computers in Human Behavior 29: 1441–1449.
  • Al-Saleh, M. I., A. M. Espinoza, and J. R. Crandall. 2013. “Antivirus Performance Characterisation: System-Wide View.” IET Information Security 7: 126–133.
  • Altmann, E. M., and J. G. Trafton. 2004. “Task Interruption: Resumption Lag and the Role of Cues.” In Proceedings of the 26th Annual Conference of the Cognitive Science Society, edited by Kenneth Forbus, Dedre Gentner, and Terry Regier, 43–48. Chicago, IL, United States: Lawrence Erlbaum Associates, Inc..
  • Anderson, C. L. and R. Agarwal. 2010. “Practicing Safe Computing: A Multimethod Empirical Examination of Home Computer User Security Behavioral Intentions.” MIS Quarterly 34: 613.
  • Anderson, J. R., M. V. Albert, and J. M. Fincham. 2005. “Tracing Problem Solving in Real Time: fMRI Analysis of the Subject-Paced Tower of Hanoi.” Journal of Cognitive Neuroscience 17: 1261–1274.
  • Avrahami, D., and S. Hudson. 2004. “QnA: Augmenting an Instant Messaging Client to Balance User Responsiveness and Performance.” In ACM Conference on Computer Supported Cooperative Work CSCW’04, edited by Jim Herbsleb and Gary Olson, 515–518. Chicago, IL, United States: Association for Computing Machinery.
  • Bailey, B. P., and S. T. Iqbal. 2008. “Understanding Changes in Mental Workload During Execution of Goal-Directed Tasks and its Application for Interruption Management.” ACM Transactions on Computer-Human Interaction 14: 1–28.
  • Bailey, B. P., and J. A. Konstan. 2006. “On the Need for Attention-Aware Systems: Measuring Effects of Interruption on Task Performance, Error Rate and Affective State.” Computers in Human Behavior 22: 685–708.
  • Bailey, B. P., J. A. Konstan, and J. V. Carlis. 2001. “The Effects of Interruptions on Task Performance, Annoyance and Anxiety.” In Proceedings of INTERACT’01, edited by M Hirose, 593–601. Tokyo, Japan: IOS Press.
  • Baillette, P., Y. Barlette, and A. Leclercq-Vandelannoitte. 2018. “Bring Your Own Device in Organizations: Extending the Reversed IT Adoption Logic to Security Paradoxes for CEOs and End Users.” International Journal of Information Management 43: 76–84.
  • Baskerville, R., F. Rowe, and F.-C. Wolff. 2018. “Integration of Information Systems and Cybersecurity Countermeasures: An Exposure to Risk Perspective.” ACM SIGMIS Database: The DATABASE for Advances in Information Systems 49: 33–52.
  • Basoglu, K. A., M. A. Fuller, and J. T. Sweeney. 2009. “Investigating the Effects of Computer Mediated Interruptions: An Analysis of Task Characteristics and Interruption Frequency on Financial Performance.” International Journal of Accounting Information Systems 10: 177–189.
  • Beynon, M., S. Rasmequan, and S. Russ. 2002. “A New Paradigm for Computer-Based Decision Support.” Decision Support Systems 33: 127–142.
  • Blythe, J. M., and L. Coventry. 2018. “Costly but Effective: Comparing the Factors That Influence Employee Anti-Malware Behaviours.” Computers in Human Behavior 87: 87–97.
  • Bonner, S. E. 1994. “A Model of the Effects of Audit Task Complexity.” Accounting, Organizations and Society 19: 213–234.
  • Bonny, P., S. Goode, and D. Lacey. 2015. “Revisiting Employee Fraud: Gender, Investigation Outcomes and Offender Motivation.” Journal of Financial Crime 22: 447–467.
  • Bontchev, V. 1996. “Possible Macro Virus Attacks and How to Prevent Them.” Computers & Security 15: 595–626.
  • Brooks, J. L. 2012. "Counterbalancing for Serial Order Carryover Effects in Experimental Condition Orders." Psychological Methods 17:4 600-614
  • Bubaš, G., T. Orehovački, and M. Konecki. 2008. “Factors and Predictors of Online Security and Privacy Behavior.” Journal of Information and Organizational Sciences 32: 79–98.
  • Burmistrov, I., and A. Leonova. 2003. “Do Interrupted Users Work Faster or Slower? The Micro-Analysis of Computerized Text-Editing Task.” In Human-Computer Interaction: Theory and Practice (Part 1) – Proceedings of HCI International 2003, edited by J. Jacko and C. Stephanidis, 621–625. Crete, Greece: Lawrence Erlbaum Associates.
  • Burns, A. J., C. Posey, T. L. Roberts, and P. Benjamin Lowry. 2017. “Examining the Relationship of Organizational Insiders’ Psychological Capital With Information Security Threat and Coping Appraisals.” Computers in Human Behavior 68: 190–209.
  • Chen, A., and E. Karahanna. 2014. “Boundaryless Technology: Understanding the Effects of Technology-Mediated Interruptions Across the Boundaries Between Work and Personal Life.” AIS Transactions on Human-Computer Interaction 6: 16–36.
  • Chen, H., and W. Li. 2019. “Understanding Commitment and Apathy in is Security Extra-Role Behavior from a Person-Organization Fit Perspective.” Behaviour & Information Technology 38: 454–468.
  • Chenoweth, T., T. Gattiker, and K. Corral. 2019. “Adaptive and Maladaptive Coping With an It Threat.” Information Systems Management 36: 24–39.
  • Cohen, J. 1973. “Eta-Squared and Partial Eta-Squared in Fixed Factor ANOVA Designs.” Educational and Psychological Measurement 33: 107–112.
  • Cohen, J. 1988. Statistical Power Analysis for the Behavioral Sciences. New York, NY: Routledge.
  • Cutrell, E., M. Czerwinski, and E. Horvitz. 2001. “Disruption and Memory: Effects of Messaging Interruptions on Memory and Performance.” In Human-Computer Interaction: INTERACT’01, edited by M. Hirose, 263–269. Tokyo: IOS Press (for IFIP).
  • Czerwinski, M. E., E. Cutrell, and E. Horvitz. 2000a. “Instant Messaging: Effects of Relevance and Time.” In People and Computers XIV: Proceedings of HCI 2000, edited by Sharon McDonald, Yvonne Waern, and Gilbert Cockton, 71–76. Sunderland, United Kingdom: British Computer Society.
  • Czerwinski, M. E., E. Cutrell, and E. Horvitz. 2000b. “Instant Messaging and Interruption: Influence of Task Type on Performance.” In Proceedings of OZCHI 2000: Interfacing Reality in the New Millennium, edited by C. Paris, N. Ozkan, S. Howard, and S. Lu, 356–361. Sydney, Australia: The University of Technology, Sydney.
  • Dabbish, L., and R. Kraut. 2003. “Coordinating Communication: Awareness Displays and Interruption.” In Proceedings of the ACM Conference on Human Factors in Computing Systems (CHI’03): Extended Abstracts, edited by Gilbert Cockton and Panu Korhonen, 786–787. New York: ACM Press.
  • Dodel, M., and G. Mesch. 2018. “Inequality in Digital Skills and the Adoption of Online Safety Behaviors.” Communication & Society 21: 712–728.
  • Doherty, N. F., and S. T. Tajuddin. 2018. “Towards a User-Centric Theory of Value-Driven Information Security Compliance.” Information Technology & People 31: 348–367.
  • Eatchel, K. A., H. Kramer, and F. Drews. 2012. “The Effects of Interruption Context on Task Performance.” Proceedings of the Human Factors and Ergonomics Society Annual Meeting 56: 2118–2122.
  • Eyrolle, H., and J. M. Cellier. 2000. “The Effects of Interruptions in Work Activity: Field and Laboratory Results.” Applied Ergonomics 31: 537–543.
  • Faruki, P., A. Bharmal, V. Laxmi, V. Ganmoor, M. S. Gaur, M. Conti, and M. Rajarajan. 2014. “Android Security: A Survey of Issues, Malware Penetration, and Defenses.” IEEE Communications Surveys & Tutorials 17: 998–1022.
  • Fonner, K. L., and M. E. Roloff. 2012. “Testing the Connectivity Paradox: Linking Teleworkers’ Communication Media Use to Social Presence, Stress from Interruptions, and Organizational Identification.” Communication Monographs 79: 205–231.
  • Franke, J. L., J. J. Daniels, and D. C. McFarlane. 2002. “Recovering Context After Interruption.” In 24th Annual Meeting of the Cognitive Science Society, edited by Wayne Gray and Christian Schunn, 310–315. Fairfax, VA: Lawrence Erlbaum Associates.
  • Furnell, S., and N. Clarke. 2012. “Power to the People? The Evolving Recognition of Human Aspects of Security.” Computers & Security 31: 983–988.
  • Galluch, P. S., V. Grover, and J. B. Thatcher. 2015. “Interrupting the Workplace: Examining Stressors in an Information Technology Context.” Journal of the Association for Information Systems 16: 1–47.
  • Garrett, R., and J. Danziger. 2008. “Interruption Management? Instant Messaging and Disruption in the Workplace.” Journal of Computer-Mediated Communication 13: 23–42.
  • Gartner Research. 2018. Magic Quadrant for Endpoint Protection Platforms. Stamford, CT: Gartner Research Inc.
  • Gillie, T., and D. Broadbent. 1989. “What Makes Interruptions Disruptive? A Study of Length, Similarity and Complexity.” Psychological Research 50: 243–250.
  • Goode, Sigi, Hartmut Hoehle, Viswanath Venkatesh, and Susan A. Brown. 2017. “User Compensation as a Data Breach Recovery Action: An Investigation of the Sony PlayStation Network Breach.” MIS Quarterly 41 (3): 703–727. 10.25300/MISQ.
  • Goode, S., and D. Lacey. 2011. “Detecting Complex Account Fraud in the Enterprise: The Role of Technical and Non-Technical Controls.” Decision Support Systems 50: 702–714.
  • Goode, S., C. Lin, J. C. Tsai, and J. J. Jiang. 2015. “Rethinking the Role of Security in Client Satisfaction With Software-as-a-Service (SaaS) Providers.” Decision Support Systems 70: 73–85.
  • Gupta, A., H. Li, and R. Sharda. 2013. “Should I Send This Message? Understanding the Impact of Interruptions, Social Hierarchy and Perceived Task Complexity on User Performance and Perceived Workload.” Decision Support Systems 55: 135–145.
  • Gupta, A., R. Sharda, and R. A. Greve. 2011. “You’ve Got Email! Does it Really Matter to Process Emails Now or Later?” Information Systems Frontiers 13: 637–653.
  • Gurung, A., X. Luo, and Q. Liao. 2009. “Consumer Motivations in Taking Action Against Spyware: An Empirical Investigation.” Information Management & Computer Security 17: 276–289.
  • Hanus, B., J. C. Windsor, and Y. Wu. 2018. “Definition and Multidimensionality of Security Awareness: Close Encounters of the Second Order.” ACM SIGMIS Database: The DATABASE for Advances in Information Systems 49: 103–133.
  • Herath, T., and H. R. Rao. 2009. “Protection Motivation and Deterrence: A Framework for Security Policy Compliance in Organisations.” European Journal of Information Systems 18: 106–125.
  • Herold, R. 1995. “A Corporate Anti-Virus Strategy.” International Journal of Network Management 5: 189–192.
  • Highland, H. J. 1997. “Procedures to Reduce the Computer Virus Threat.” Computers & Security 16: 439–449.
  • Hodgetts, H. M., and D. M. Jones. 2003. “Interruptions in the Tower of London Task: Can Preparation Minimize Disruption?.” In 47th Annual Meeting of the Human Factors and Ergonomics Society. Denver, CO: Human Factors and Ergonomics Society.
  • Hodgetts, H. M., and D. M. Jones. 2007. “Reminders, Alerts and Pop-Ups: The Cost of Computer-Initiated Interruptions.” In Human-Computer Interaction: Interaction Design and Usability – Proceedings of HCI International 2007, Part I (Lecture Notes in Computer Science), edited by Julie Jacko, 818–826. Berlin: Springer.
  • Höne, K., and J. H. P. Eloff. 2002. “What Makes an Effective Information Security Policy?” Network Security 2002: 14–16.
  • Huang, D.-L., P.-L. P. Rau, H. Su, N. Tu, and C. Zhao. 2010. “Effects of Communication Style and Time Orientation on Notification Systems and Anti-Virus Software.” Behaviour & Information Technology 29: 483–495.
  • Ifinedo, P. 2016. “Critical Times for Organizations: What Should Be Done to Curb Workers’ Noncompliance With IS Security Policy Guidelines?” Information Systems Management 33: 30–41.
  • Iqbal, S. T., and E. Horvitz. 2007a. “Disruption and Recovery of Computing Tasks: Field Study, Analysis, and Directions.” In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI’07), edited by Mary Beth Rosson and David Gilmore, 677–686. New York: ACM Press.
  • Iqbal, S. T., and E. Horvitz. 2007b. “Conversations Amidst Computing: A Study of Interruptions and Recovery of Task Activity.” In Proceedings of 11th International Conference on User Modeling (UM 2007), (Lecture Notes in Computer Science), edited by C. Conati, K. McCoy, and G. Paliouras, 350–354. Berlin: Springer.
  • Jackson, T., R. Dawson, and D. Wilson. 2003. “Reducing the Effect of E-mail Interruptions on Employees.” International Journal of Information Management 23: 55–65.
  • Jansen, J., and P. van Schaik. 2018. “Testing a Model of Precautionary Online Behaviour: The Case of Online Banking.” Computers in Human Behavior 87: 371–383.
  • Jansen, J., S. Veenstra, R. Zuurveen, and W. Stol. 2016. “Guarding Against Online Threats: Why Entrepreneurs Take Protective Measures.” Behaviour & Information Technology 35: 368–379.
  • Jarvenpaa, S. L. 1990. “Graphic Displays in Decision Making – The Visual Salience Effect.” Journal of Behavioral Decision Making 3: 247–262.
  • Jett, Q. R., and J. M. George. 2003. “Work Interrupted: A Closer Look at the Role of Interruptions in Organizational Life.” Academy of Management Review 28: 494–507.
  • Johnston, A. C., M. Warkentin, M. McBride, and L. Carter. 2016. “Dispositional and Situational Factors: Influences on Information Security Policy Violations.” European Journal of Information Systems 25: 231–251.
  • Johnston, A. C., M. Warkentin, and M. Siponen. 2015. “An Enhanced Fear Appeal Rhetorical Framework: Leveraging Threats to the Human Asset Through Sanctioning Rhetoric.” MIS Quarterly 39: 113–134.
  • Kelton, A. S., R. R. Pennington, and B. M. Tuttle. 2010. “The Effects of Information Presentation Format on Judgment and Decision Making: A Review of the Information Systems Research.” Journal of Information Systems 24: 79–105.
  • Kim, B., A. Barua, and A. B. Whinston. 2002. “Virtual Field Experiments for a Digital Economy: A New Research Methodology for Exploring an Information Economy.” Decision Support Systems 32: 215–231.
  • Kim, D. W., P. Yan, and J. Zhang. 2015. “Detecting Fake Anti-Virus Software Distribution Webpages.” Computers & Security 49: 95–106.
  • Lee, Y., and K. R. Larsen. 2009. “Threat or Coping Appraisal: Determinants of SMB Executives’ Decision to Adopt Anti-Malware Software.” European Journal of Information Systems 18: 177–187.
  • Lee, A. R., S.-M. Son, and K. K. Kim. 2016. “Information and Communication Technology Overload and Social Networking Service Fatigue: A Stress Perspective.” Computers in Human Behavior 55: 51–61.
  • Leukfeldt, E. R. 2014. “Phishing for Suitable Targets in The Netherlands: Routine Activity Theory and Phishing Victimization.” Cyberpsychology Behavior, and Social Networking 17: 551–555.
  • Lévesque, F. L., S. Chiasson, A. Somayaji, and J. M. Fernandez. 2018. “Technological and Human Factors of Malware Attacks: A Computer Security Clinical Trial Approach.” ACM Transactions on Privacy and Security 21: 1–30.
  • Levy, E. C., S. Rafaeli, and Y. Ariel. 2016. “The Effect of Online Interruptions on the Quality of Cognitive Performance.” Telematics and Informatics 33: 1014–1021.
  • Li, H., A. Gupta, X. Luo, and M. Warkentin. 2011. “Exploring the Impact of Instant Messaging on Subjective Task Complexity and User Satisfaction.” European Journal of Information Systems 20: 139–155.
  • Liao, H.-C., and Y.-H. Wang. 2006. “A Memory Symptom-Based Virus Detection Approach.” International Journal of Network Security 2: 219–227.
  • Mano, R. S., and G. S. Mesch. 2010. “E-mail Characteristics, Work Performance and Distress.” Computers in Human Behavior 26: 61–69.
  • Mansi, G., and Y. Levy. 2013. “Do Instant Messaging Interruptions Help or Hinder Knowledge Workers’ Task Performance?” International Journal of Information Management 33: 591–596.
  • Marsden, J. R., R. Pakath, and K. Wibowo. 2002. “Decision Making Under Time Pressure With Different Information Sources and Performance-Based Financial Incentives—Part 1.” Decision Support Systems 34: 75–97.
  • Martens, M., R. De Wolf, and L. De Marez. 2019. “Investigating and Comparing the Predictors of the Intention Towards Taking Security Measures Against Malware, Scams and Cybercrime in General.” Computers in Human Behavior 92: 139–150.
  • Marulanda-Carter, L., and T. W. Jackson. 2012. “Effects of E-mail Addiction and Interruptions on Employees.” Journal of Systems and Information Technology 14: 82–94.
  • McAfee Labs. 2018a. McAfee Labs Threats Report, December 2018. Santa Clara, CA: McAfee Labs.
  • McAfee Labs. 2018b. McAfee Labs Threats Report, March 2018. Santa Clara, CA: McAfee Labs.
  • McFarlane, D. C. 1998. “Interruption of People in Human-Computer Interaction.” PhD., George Washington University.
  • McFarlane, D. C. 2002. “Comparison of Four Primary Methods for Coordinating the Interruption of People in Human-Computer Interaction.” Human-Computer Interaction 17: 63–139.
  • McFarlane, D. C., and K. A. Latorella. 2002. “The Scope and Importance of Human Interruption in Human-Computer Interaction Design.” Human-Computer Interaction 17: 1–61.
  • McGill, T., and N. Thompson. 2017. “Old Risks, New Challenges: Exploring Differences in Security Between Home Computer and Mobile Device Use.” Behaviour & Information Technology 36: 1111–1124.
  • Menard, P., G. J. Bott, and R. E. Crossler. 2017. “User Motivations in Protecting Information Security: Protection Motivation Theory Versus Self-Determination Theory.” Journal of Management Information Systems 34: 1203–1230.
  • Menard, P., R. Gatlin, and M. Warkentin. 2014. “Threat Protection and Convenience: Antecedents of Cloud-Based Data Backup.” Journal of Computer Information Systems 55: 83–91.
  • Menard, P., M. Warkentin, and P. B. Lowry. 2018. “The Impact of Collectivism and Psychological Ownership on Protection Motivation: A Cross-Cultural Examination.” Computers & Security 75: 147–166.
  • Milosevic, N., A. Dehghantanha, and K.-K. R. Choo. 2017. “Machine Learning Aided Android Malware Classification.” Computers & Electrical Engineering 61: 266–274.
  • Min, B., V. Varadharajan, U. Tupakula, and M. Hitchens. 2014. “Antivirus Security: Naked During Updates.” Software: Practice and Experience 44: 1201–1222.
  • Moe, W. W. 2006. “A Field Experiment to Assess the Interruption Effect of Pop-Up Promotions.” Journal of Interactive Marketing 20: 34–44.
  • Nystrom, L. E., T. S. Braver, F. W. Sabb, M. R. Delgado, D. C. Noll, and J. D. Cohen. 2000. “Working Memory for Letters, Shapes and Locations: fMRI Evidence Against Stimulus-Based Regional Organization in Human Prefrontal Cortex.” NeuroImage 11: 424–446.
  • Okane, P., S. Sezer, and K. McLaughlin. 2011. “Obfuscation: The Hidden Malware.” IEEE Security & Privacy Magazine 9: 41–47.
  • Ortiz de Guinea, A. 2016. “A Pragmatic Multi-Method Investigation of Discrepant Technological Events: Coping, Attributions, and ‘Accidental’ Learning.” Information & Management 53: 787–802. doi:10.1016/j.im.2016.03.003.
  • Ou, C. X. J., and R. M. Davison. 2011. “Interactive or Interruptive? Instant Messaging at Work.” Decision Support Systems 52: 61–72.
  • Ou, C. X., C. Ling Sia, and C. K. Hui. 2013. “Computer-Mediated Communication and Social Networking Tools at Work.” Information Technology & People 26: 172–190.
  • Peterson, A. P. 1992. “Counteracting Viruses in an MS-DOS Environment.” Information Systems Security 1: 58–65.
  • Plumlee, R. D. 2002. “Discussion of Impression Management with Graphs: Effects on Choices.” Journal of Information Systems 16: 203–206.
  • Posey, C., T. L. Roberts, and P. B. Lowry. 2015. “The Impact of Organizational Commitment on Insiders’ Motivation to Protect Organizational Information Assets.” Journal of Management Information Systems 32: 179–214.
  • Posey, C., T. L. Roberts, P. B. Lowry, and R. T. Hightower. 2014. “Bridging the Divide: A Qualitative Comparison of Information Security Thought Patterns Between Information Security Professionals and Ordinary Organizational Insiders.” Information & Management 51: 551–567.
  • Post, G., and A. Kagan. 1998. “The Use and Effectiveness of Anti-Virus Software.” Computers & Security 17: 589–599.
  • Ramachandran, S., C. Rao, T. Goles, and G. Dhillon. 2013. “Variations in Information Security Cultures Across Professions: A Qualitative Study.” Communications of the Association for Information Systems 33 (11): 163–204.
  • Rennecker, J., and L. Godwin. 2005. “Delays and Interruptions: A Self-Perpetuating Paradox of Communication Technology Use.” Information and Organization 15: 247–266.
  • Richardson, J. T. E. 2011. “Eta Squared and Partial Eta Squared as Measures of Effect Size in Educational Research.” Educational Research Review 6: 135–147.
  • Robertson, T. J., S. Prabhakararao, M. Burnett, C. Cook, J. R. Ruthruff, L. Beckwith, and A. Phalgune. 2004. “Impact of Interruption Style on End-User Debugging.” In Proceedings of the 2004 Conference on Human Factors in Computing Systems, edited by Elizabeth Dykstra-Erickson and Manfred Tscheligi, 287–294. Vienna, Austria: Association for Computing Machinery.
  • Russell, M. D., J. A. Clark, and S. Stepney. 2003. “Making the Most of Two Heuristics: Breaking Transposition Ciphers with Ants.” In CEC 2003: International Conference on Evolutionary Computation IEEE, edited by Rahul Sarker, Robert Reynolds, Hussein Abbass, Kay Chen Tan, Bob McKay, Daryl Essam, and Tom Gedeon, 2653–2658. Canberra, Australia: IEEE Press.
  • Russell, E., L. M. Purvis, and A. Banks. 2007. “Describing the Strategies Used for Dealing With Email Interruptions According to Different Situational Parameters.” Computers in Human Behavior 23: 1820–1837.
  • Safa, N. S., M. Sookhak, R. Von Solms, S. Furnell, N. A. Ghani, and T. Herawan. 2015. “Information Security Conscious Care Behaviour Formation in Organizations.” Computers & Security 53: 65–78.
  • Safa, N. S., R. Von Solms, and S. Furnell. 2016. “Information Security Policy Compliance Model in Organizations.” Computers & Security 56: 70–82.
  • Salvucci, D. D., and P. Bogunovich. 2010. “Multitasking and Monotasking: The Effects of Mental Workload on Deferred Task Interruptions.” In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, CHI ‘10, edited by Elizabeth Mynatt, Geraldine Fitzpatrick, Scott Hudson, Keith Edwards, and Tom Rodden, 85–88. New York, NY: Association for Computing Machinery.
  • Seitz, K., and R. Schumann-Hengsteler. 2000. “Mental Multiplication and Working Memory.” European Journal of Cognitive Psychology 12: 552–570.
  • Shropshire, J. D., M. Warkentin, and A. C. Johnston. 2010. “Impact of Negative Message Framing on Security Adoption.” Journal of Computer Information Systems 51: 41–51.
  • Solingen, R., E. Berghout, and F. Latum. 1998. “Interrupts: Just a Minute Never Is.” IEEE Software 15: 97–103.
  • Sophos. 2019. Sophos Labs 2019 Threat Report. Abingdon: Sophos, Ltd.
  • Speier, C., I. Vessey, and J. S. Valacich. 2003. “The Effects of Interruptions, Task Complexity, and Information Presentation on Computer-Supported Decision-Making Performance.” Decision Sciences 34: 771–797.
  • Steinbart, P. J., M. J. Keith, and J. Babb. 2016. “Examining the Continuance of Secure Behavior: A Longitudinal Field Study of Mobile Device Authentication.” Information Systems Research 27: 219–239.
  • Stich, J.-F., M. Tarafdar, and C. L. Cooper. 2018. “Electronic Communication in the Workplace: Boon or Bane?” Journal of Organizational Effectiveness: People and Performance 5: 98–106.
  • Stich, J.-F., M. Tarafdar, C. L. Cooper, and P. Stacey. 2017. “Workplace Stress from Actual and Desired Computer-Mediated Communication Use: A Multi-Method Study.” New Technology, Work and Employment 32: 84–100.
  • Sukwong, O., H. S. Kim, and J. C. Hoe. 2011. “Commercial Antivirus Software Effectiveness: An Empirical Study.” IEEE Computer 44: 63–70.
  • Sykes, E. R. 2011. “Interruptions in the Workplace: A Case Study to Reduce Their Effects.” International Journal of Information Management 31: 385–394.
  • Symantec Labs. 2017. Internet Security Threat Report – Ransomware 2017. Mountain View, CA: Symantec Corporation.
  • Teer, F. P., S. E. Kruck, and G. P. Kruck. 2007. “Empirical Study of Students’ Computer Security Practices/Perceptions.” Journal of Computer Information Systems 47: 105–110.
  • Tsai, H. S., M. Jiang, S. Alhabash, R. LaRose, N. J. Rifon, and S. R. Cotten. 2016. “Understanding Online Safety Behaviors: A Protection Motivation Theory Perspective.” Computers & Security 59: 138–150.
  • Visinescu, L. L., O. Azogu, S. D. Ryan, Y. “Andy” Wu, and D. J. Kim. 2016. “Better Safe Than Sorry: A Study of Investigating Individuals’ Protection of Privacy in the Use of Storage as a Cloud Computing Service.” International Journal of Human–Computer Interaction 32: 885–900.
  • Wachyudy, D., and S. Sumiyana. 2018. “Could Affectivity Compete Better Than Efficacy in Describing and Explaining Individuals’ Coping Behavior: An Empirical Investigation.” The Journal of High Technology Management Research 29: 57–70.
  • Wang, Z., P. David, J. Srivastava, S. Powers, C. Brady, J. D’Angelo, and J. Moreland. 2012. “Behavioral Performance and Visual Attention in Communication Multitasking: A Comparison Between Instant Messaging and Online Voice Chat.” Computers in Human Behavior 28: 968–975.
  • Warkentin, M., A. C. Johnston, and J. Shropshire. 2011. “The Influence of the Informal Social Learning Environment on Information Privacy Policy Compliance Efficacy and Intention.” European Journal of Information Systems 20: 267–284.
  • White, G., T. Ekin, and L. Visinescu. 2017. “Analysis of Protective Behavior and Security Incidents for Home Computers.” Journal of Computer Information Systems 57: 353–363.
  • Williams, C. K., D. Wynn, R. Madupalli, E. Karahanna, and B. K. Duncan. 2014. “Explaining Users’ Security Behaviors With the Security Belief Model.” Journal of Organizational and End User Computing 26: 23–46.
  • Xia, L., and D. Sudharshan. 2002. “Effects of Interruptions on Consumer Online Decision Processes.” Journal of Consumer Psychology 12: 265–280.
  • Ye, Y., T. Li, D. Adjeroh, and S. S. Iyengar. 2017. “A Survey on Malware Detection Using Data Mining Techniques.” ACM Computing Surveys 50: 41.
  • Yoo, C. W., G. L. Sanders, and R. P. Cerveny. 2018. “Exploring the Influence of Flow and Psychological Ownership on Security Education, Training and Awareness Effectiveness and Security Compliance.” Decision Support Systems 108: 107–118.
  • Yoon, C., J.-W. Hwang, and R. Kim. 2012. “Exploring Factors That Influence Students’ Behaviors in Information Security.” Journal of Information Systems Education 23: 407–415.
  • Yoon, C., and H. Kim. 2013. “Understanding Computer Security Behavioral Intention in the Workplace: An Empirical Study of Korean Firms.” Information Technology & People 26: 401–419.
  • Zenkin, D. 2001. “Fighting Against the Invisible Enemy: Methods for Detecting an Unknown Virus.” Computers & Security 20: 316–321.
  • Zhang, L., and W. C. McDowell. 2009. “Am I Really at Risk? Determinants of Online Users’ Intentions to Use Strong Passwords.” Journal of Internet Commerce 8: 180–197.