Type of Document Dissertation Author Crossler, Robert E. Author's Email Address email@example.com URN etd-03262009-234329 Title Protection Motivation Theory: Understanding the Determinants of Individual Security Behavior Degree PhD Department Accounting and Information Systems Advisory Committee
Advisor Name Title Belanger, France Committee Chair Brown, Robert M. Committee Member Fan, Weiguo Patrick Committee Member Hiller, Janine S. Committee Member Sheetz, Steven D. Committee Member Keywords
- information security
- instrument development
- partial-least squares
- protection motivation theory
Date of Defense 2009-03-19 Availability restricted AbstractIndividuals are considered the weakest link when it comes to securing a personal computer system. All the technological solutions can be in place, but if individuals do not make appropriate security protection decisions they introduce holes that technological solutions cannot protect. This study investigates what personal characteristics influence differences in individual security behaviors, defined as behaviors to protect against security threats, by adapting Protection Motivation Theory into an information security context.
This study developed and validated an instrument to measure individual security behaviors. It then tested the differences in these behaviors using the security research model, which built from Protection Motivation Theory, and consisted of perceived security vulnerability, perceived security threat, security self-efficacy, response efficacy, and protection cost. Participants, representing a sample population of home computer users with ages ranging from 20 to 83, provided 279 valid responses to surveys. The behaviors studied include using anti-virus software, utilizing access controls, backing up data, changing passwords frequently, securing access to personal computers, running software updates, securing wireless networks, using care when storing credit card information, educating others in one’s house about security behaviors, using caution when following links in emails, running spyware software, updating a computer’s operating system, using firewalls, and using pop-up blocking software. Testing the security research model found different characteristics had different impacts depending on the behavior studied. Implications for information security researchers and practitioners are provided, along with ideas for future research.
Filename Size Approximate Download Time (Hours:Minutes:Seconds)
28.8 Modem 56K Modem ISDN (64 Kb) ISDN (128 Kb) Higher-speed Access CrosslerDissertationFinal.pdf 1.18 Mb 00:05:28 00:02:48 00:02:27 00:01:13 00:00:06indicates that a file or directory is accessible from the Virginia Tech campus network only.
If you have questions or technical problems, please Contact DLA.