Online safety begins with you and me: Convincing Internet users to protect themselves

作者: Nora J. Rifon , Ruth Shillair , Shelia R. Cotten , Hsin-Yi Sandy Tsai , Saleem Alhabash

DOI: 10.1016/J.CHB.2015.01.046

关键词:

摘要: We explore ways to encourage individuals follow online safety practices.We test effects of persuasive messaging strategies versus vicarious experience.Importance tailoring efficacy/experience levels shown. Serious and pervasive threats confront all Internet users. Despite frequent reports losses due computer security breaches, many still do not basic precautions. Understanding the mental processes that motivate users safe practices is key strengthening this weak link in chain. Using protection motivation theory (PMT), a model within class social cognitive theories (SCT), we develop assess value interventions enhance behaviors. Furthermore, integrate concept personal responsibility PMT approach better understand what motivates safe, The were tested using 2 (intervention strategy: manipulated)i?2 (personal responsibility: (knowledge: measured blocked), between subjects with random assignment experimental conditions behavior intentions as targeted outcome. Based on SCT principles change, two intervention developed, one semantically explained behaviors, offered user an enactive mastery exercise. sample was cross-sectional representative Results showed significant three-way interaction effect among responsibility, strategy prior knowledge. Enhancing user's sense appears be necessary precursor effective interventions, but necessarily sufficient; should match knowledge level Potential for designing messages are discussed.

参考文章(48)
Tamara Dinev, , Qing Hu, , The Centrality of Awareness in the Formation of User Behavioral Intention toward Protective Information Technologies Journal of the Association for Information Systems. ,vol. 8, pp. 23- ,(2007) , 10.17705/1JAIS.00133
Siponen, Vance, Neutralization: new insights into the problem of employee systems security policy violations Management Information Systems Quarterly. ,vol. 34, pp. 487- 502 ,(2010) , 10.2307/25750688
Julian Jang-Jaccard, Surya Nepal, None, A survey of emerging threats in cybersecurity Journal of Computer and System Sciences. ,vol. 80, pp. 973- 993 ,(2014) , 10.1016/J.JCSS.2014.02.005
Younghwa Lee, Kenneth A Kozar, None, An empirical investigation of anti-spyware software adoption: A multitheoretical perspective Information & Management. ,vol. 45, pp. 109- 119 ,(2008) , 10.1016/J.IM.2008.01.002