Protection Motivation Theory: Understanding the Determinants of Individual Security Behavior

dc.contributor.authorCrossler, Robert E.en
dc.contributor.committeechairBelanger, Franceen
dc.contributor.committeememberHiller, Janine S.en
dc.contributor.committeememberFan, Weiguo Patricken
dc.contributor.committeememberBrown, Robert M.en
dc.contributor.committeememberSheetz, Steven D.en
dc.contributor.departmentAccounting and Information Systemsen
dc.date.accessioned2014-03-14T21:10:08Zen
dc.date.adate2009-04-20en
dc.date.available2014-03-14T21:10:08Zen
dc.date.issued2009-03-19en
dc.date.rdate2009-04-20en
dc.date.sdate2009-03-26en
dc.description.abstractIndividuals are considered the weakest link when it comes to securing a personal computer system. All the technological solutions can be in place, but if individuals do not make appropriate security protection decisions they introduce holes that technological solutions cannot protect. This study investigates what personal characteristics influence differences in individual security behaviors, defined as behaviors to protect against security threats, by adapting Protection Motivation Theory into an information security context. This study developed and validated an instrument to measure individual security behaviors. It then tested the differences in these behaviors using the security research model, which built from Protection Motivation Theory, and consisted of perceived security vulnerability, perceived security threat, security self-efficacy, response efficacy, and protection cost. Participants, representing a sample population of home computer users with ages ranging from 20 to 83, provided 279 valid responses to surveys. The behaviors studied include using anti-virus software, utilizing access controls, backing up data, changing passwords frequently, securing access to personal computers, running software updates, securing wireless networks, using care when storing credit card information, educating others in one's house about security behaviors, using caution when following links in emails, running spyware software, updating a computer's operating system, using firewalls, and using pop-up blocking software. Testing the security research model found different characteristics had different impacts depending on the behavior studied. Implications for information security researchers and practitioners are provided, along with ideas for future research.en
dc.description.degreePh. D.en
dc.identifier.otheretd-03262009-234329en
dc.identifier.sourceurlhttp://scholar.lib.vt.edu/theses/available/etd-03262009-234329/en
dc.identifier.urihttp://hdl.handle.net/10919/37511en
dc.publisherVirginia Techen
dc.relation.haspartCrosslerDissertationFinal.pdfen
dc.rightsIn Copyrighten
dc.rights.urihttp://rightsstatements.org/vocab/InC/1.0/en
dc.subjectinformation securityen
dc.subjectinstrument developmenten
dc.subjectpartial-least squaresen
dc.subjectbehavioren
dc.subjectprotection motivation theoryen
dc.titleProtection Motivation Theory: Understanding the Determinants of Individual Security Behavioren
dc.typeDissertationen
thesis.degree.disciplineAccounting and Information Systemsen
thesis.degree.grantorVirginia Polytechnic Institute and State Universityen
thesis.degree.leveldoctoralen
thesis.degree.namePh. D.en

Files

Original bundle
Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
CrosslerDissertationFinal.pdf
Size:
1.13 MB
Format:
Adobe Portable Document Format