206
Views
6
CrossRef citations to date
0
Altmetric
Original Articles

Analyzing Home PC Security Adoption Behavior

&
Pages 20-29 | Received 15 Nov 2010, Accepted 12 Jan 2012, Published online: 11 Dec 2015

References

  • AOL and National Cyber Security Alliance (NCSA), (2005). AOL/NCSA Online Safety Study.
  • Ajzen, I. (1991). The theory of planned behavior. Organizational Behavior and Human Decision Processes, 50, 179–211.
  • Bandura, A. (1977). Self-efficacy: Toward a unifying theory of behavioral change. Psychological Review, 84, 191–215.
  • Boss, S. (2007). Control, perceived risk and information security precautions: External and internal motivations for security behavior. Ph.D. dissertation, University of Pittsburgh, United States — Pennsylvania. Retrieved September 27, 2009, from Dissertations & Theses: Full Text.(Publication No. AAT 3284534).
  • Brown, S.A., Venkatesh, V. (2005). Model of Adoption of Technology in Households: A Baseline Model Test and Extension Incorporating Household Life Cycle, MIS Quarterly, 29(3), 399–426
  • Chenoweth, T., Minch, R., & Gattiker, T. (2009). Application of Protection Motivation Theory to Adoption of Protective Technologies, In System sciences, 2009. HICSS 2007. 42nd annual hawaii international conference on.
  • Chin, W. W. (1998). The partial least squares approach to structural equation modeling. Modern Methods for Business Research, 295, 336.
  • Cohen, E. (1999). Reconceptualizing Information Systems as a Field of the Transdiscipline Informing Science: From Ugly Duckling to Swan, Journal of Computing and Information Technology. 7(3), 213–219
  • Conklin, Wm. Arthur (2006). Computer security behaviors of home PC users: A diffusion of innovation approach. Ph.D. dissertation, The University of Texas at San Antonio, United States — Texas. Retrieved September 27, 2009, from Dissertations & Theses: Full Text.(Publication No. AAT 3227760).
  • Davis, F. D. (1989). Perceived usefulness, perceived ease of use, and user acceptance of information technology. MIS Quarterly, 13(3), 319–340.
  • Fishbein, M. & Ajzen, I. (1975). Belief, Attitude, Intention, and Behavior: An Introduction to Theory and Research. Boston: Addison-Wesley.
  • Hassan, Nik R., (2008). Conceptual Development in IS: The Case of MISQ 1995-2004, MWAIS 2008 Proceedings. Paper 19.
  • King, J. L. (1993), “Editorial Notes,” Information Systems Research, 4(4), pp. 291–298.
  • LaRose, R., Rifon, N. J., & Enbody, R. (2008). Promoting personal responsibility for internet safety. Commun. ACM, 51(3), 71–76.
  • McAfee Avert Labs, (2009). McAfee Threats Report: First Quarter 2009, Retrieved April 10, 2010, from http://resources.mcafee.com/content/AvertReportQ109.
  • Ng, B.-Y., Kankanhalli, A., & Xu, Y. (2009). Studying users' computer security behavior: A health belief perspective. Decision Support Systems, 46(4), 815–825.
  • Pahnila, S., Siponen, M., & Mahmood, A. (2007). Employees' behavior towards IS security policy compliance. In System sciences, 2007. HICSS 2007. 40Th annual Hawaii international conference on.
  • Rogers, E.M., Diffusion of Innovations. Fifth ed. 2003, New York, New York, U.S.A.: The Free Press.
  • Rosenstock, I.M., (1966). Why people use health services, The Milbank Memorial Fund Quarterly 44(3)
  • Rosenstock, I. (1974). Historical Origins of the Health Belief Model. Health Education Monographs. Vol. 2 No. 4.
  • Rosenstock, I. M., Strecher, V. J., & Becker, M. H. (1988). Social learning theory and the health belief model. Health Education & Behavior, 15(2), 175.
  • Rosenstock, I., Strecher, V., & Becker, M. (1994). The Health Belief Model and HIV risk behavior change. In R.J. DiClemente & J.L. Peterson (Eds.), Preventing AIDS: Theories and methods of behavioral interventions (pp. 5–24). New York, NY: Plenum Press.
  • Symantec Corporation, (2007). Symantec Reports Rise in Data Theft, Data Leakage, and Targeted Attacks Leading to Hackers' Financial Gain. Retrieved April 10, 2010, from http://www.symantec.com/about/news/release/article.jsp?prid=20070319_01
  • Thompson, R. L., Higgins, C. A., & Howell, J. M. (1991). Personal computing: Toward a conceptual model of utilization. MIS Quarterly, 15(1), 131.
  • Tkacik Jr, J.J. (2007). Trojan dragons: China's international cyber warriors. The Heritage Foundation.
  • U.S. Census Bureau, (2007), Computer and Internet Use in the United States: October 2007, Population Division, Education & Social Stratification Branch
  • Venkatesh, V., Morris, M. G., Davis, G. B., & Davis, F. D. (2003). User acceptance of information technology: Toward a unified view. MIS Quarterly, 27(3), 425–478.
  • Weirich, D., & Sasse, M. A. (2001). Pretty good persuasion: A first step towards effective password security in the real world. In Proceedings of the 2001 workshop on new security paradigms.
  • Wilson, C. (2005). Computer attack and cyberterrorism: Vulnerabilities and policy issues for congress. Federation of American Scientists, Washington DC.
  • Woon, I. M.Y., Tan, G.W., and Low, R.T., “A Protection Motivation Theory Approach to Home Wireless Security,” in Proceedings of the Twenty-Sixth International Conference on Information Systems, Las Vegas, Nevada, USA, 11-14 December, 2005
  • Workman, M., Bommer, W. H., & Straub, D. (2008). Security lapses and the omission of information security measures: A threat control model and empirical test. Computers in Human Behavior, 24(6), 2799–2816.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.