Title page for ETD etd-03262009-234329

Type of Document Dissertation
Author Crossler, Robert E.
Author's Email Address robc@vt.edu
URN etd-03262009-234329
Title Protection Motivation Theory: Understanding the Determinants of Individual Security Behavior
Degree PhD
Department Accounting and Information Systems
Advisory Committee
Advisor Name Title
Belanger, France Committee Chair
Brown, Robert M. Committee Member
Fan, Weiguo Patrick Committee Member
Hiller, Janine S. Committee Member
Sheetz, Steven D. Committee Member
  • information security
  • instrument development
  • partial-least squares
  • behavior
  • protection motivation theory
Date of Defense 2009-03-19
Availability restricted
Individuals are considered the weakest link when it comes to securing a personal computer system. All the technological solutions can be in place, but if individuals do not make appropriate security protection decisions they introduce holes that technological solutions cannot protect. This study investigates what personal characteristics influence differences in individual security behaviors, defined as behaviors to protect against security threats, by adapting Protection Motivation Theory into an information security context.

This study developed and validated an instrument to measure individual security behaviors. It then tested the differences in these behaviors using the security research model, which built from Protection Motivation Theory, and consisted of perceived security vulnerability, perceived security threat, security self-efficacy, response efficacy, and protection cost. Participants, representing a sample population of home computer users with ages ranging from 20 to 83, provided 279 valid responses to surveys. The behaviors studied include using anti-virus software, utilizing access controls, backing up data, changing passwords frequently, securing access to personal computers, running software updates, securing wireless networks, using care when storing credit card information, educating others in one’s house about security behaviors, using caution when following links in emails, running spyware software, updating a computer’s operating system, using firewalls, and using pop-up blocking software. Testing the security research model found different characteristics had different impacts depending on the behavior studied. Implications for information security researchers and practitioners are provided, along with ideas for future research.

  Filename       Size       Approximate Download Time (Hours:Minutes:Seconds) 
 28.8 Modem   56K Modem   ISDN (64 Kb)   ISDN (128 Kb)   Higher-speed Access 
[VT] CrosslerDissertationFinal.pdf 1.18 Mb 00:05:28 00:02:48 00:02:27 00:01:13 00:00:06
[VT] indicates that a file or directory is accessible from the Virginia Tech campus network only.

Browse All Available ETDs by ( Author | Department )

dla home
etds imagebase journals news ereserve special collections
virgnia tech home contact dla university libraries

If you have questions or technical problems, please Contact DLA.