NotesFAQContact Us
Collection
Advanced
Search Tips
ERIC Number: ED547857
Record Type: Non-Journal
Publication Date: 2012
Pages: 113
Abstractor: As Provided
Reference Count: N/A
ISBN: 978-1-2674-4129-4
ISSN: N/A
The Cybercitizen Dimension: A Quantitative Study Using a Threat Avoidance Perspective
Manzano, Debbie L.
ProQuest LLC, Ph.D. Dissertation, Capella University
The importance of information security is understated and theory-based empirical research that explains computer users voluntary IT threat avoidance behavior is lacking. Most existing information security research on individual behaviors has been focused in organizational settings where the threat avoidance behavior is mandatory and dictated by security policies and procedures. This quantitative, correlational, nonexperimental study is grounded on the technology threat avoidance theory (TTAT) that explains why personal computer users employ antimalware software to avoid the threat of malware in voluntary settings. The basic premise of TTAT is that when users perceive an IT threat, they are motivated to actively avoid the threat by taking safeguarding measures if the threat is thought to be avoidable. The experimental group findings revealed that perceived threat, safeguard effectiveness, safeguard cost, and self-efficacy influenced avoidance motivation. The control group findings revealed that perceived threat had no significant relationship influencing avoidance motivation. However, all other factors influenced avoidance motivation. In addition, avoidance motivation was determined by avoidance behavior for both groups. Perceived threat was determined by severity but not perceived susceptibility for the experimental group and perceived threat was determined by severity and perceived susceptibility for the control group. Consequently, perceived threat negatively moderated the relationship between avoidance motivation and safeguard effectiveness for both groups. Since TTAT is in its infancy, future research efforts should theoretically extend TTAT more comprehensively by exploring other threats and populations in order to enhance our understanding of IT security phenomena in voluntary settings. [The dissertation citations contained here are published with the permission of ProQuest LLC. Further reproduction is prohibited without permission. Copies of dissertations may be obtained by Telephone (800) 1-800-521-0600. Web page: http://www.proquest.com/en-US/products/dissertations/individuals.shtml.]
ProQuest LLC. 789 East Eisenhower Parkway, P.O. Box 1346, Ann Arbor, MI 48106. Tel: 800-521-0600; Web site: http://www.proquest.com/en-US/products/dissertations/individuals.shtml
Publication Type: Dissertations/Theses - Doctoral Dissertations
Education Level: N/A
Audience: N/A
Language: English
Sponsor: N/A
Authoring Institution: N/A