Detailed Information

Cited 0 time in webofscience Cited 0 time in scopus
Metadata Downloads

Determining the antecedents of digital security practices in the general public dimension

Full metadata record
DC Field Value Language
dc.contributor.authorJames, Tabitha-
dc.contributor.authorNottingham, Quinton-
dc.contributor.authorKim, Byung Cho-
dc.date.accessioned2021-09-06T00:46:02Z-
dc.date.available2021-09-06T00:46:02Z-
dc.date.created2021-06-18-
dc.date.issued2013-06-
dc.identifier.issn1385-951X-
dc.identifier.urihttps://scholar.korea.ac.kr/handle/2021.sw.korea/103006-
dc.description.abstractOur increased reliance on digital information and our expansive use of the Internet for a steadily rising number of tasks requires that more emphasis be placed on digital information security. The importance of securing digital information is apparent but the success in persuading individual users to adopt and utilize tools to improve security has been arguably more difficult. In this study, we propose a number of factors that may influence individual security practices. These constructs are developed by adapting existing theory from information security and privacy research to examine information security behaviors in the general public dimension. The influence of these factors on perceived need and actual behavior is then examined. The resulting model is shown to fit well and support is found for many of the proposed relationships. The determination of the antecedents of individual digital security practices may provide useful insight to tailoring programs for adoption and utilization of security tools by individuals in the general public dimension.-
dc.languageEnglish-
dc.language.isoen-
dc.publisherSPRINGER-
dc.subjectMODEL-
dc.subjectPRIVACY-
dc.subjectCRITERIA-
dc.titleDetermining the antecedents of digital security practices in the general public dimension-
dc.typeArticle-
dc.contributor.affiliatedAuthorKim, Byung Cho-
dc.identifier.doi10.1007/s10799-012-0147-4-
dc.identifier.scopusid2-s2.0-84878834521-
dc.identifier.wosid000320242700002-
dc.identifier.bibliographicCitationINFORMATION TECHNOLOGY & MANAGEMENT, v.14, no.2, pp.69 - 89-
dc.relation.isPartOfINFORMATION TECHNOLOGY & MANAGEMENT-
dc.citation.titleINFORMATION TECHNOLOGY & MANAGEMENT-
dc.citation.volume14-
dc.citation.number2-
dc.citation.startPage69-
dc.citation.endPage89-
dc.type.rimsART-
dc.type.docTypeArticle-
dc.description.journalClass1-
dc.description.journalRegisteredClassssci-
dc.description.journalRegisteredClassscopus-
dc.relation.journalResearchAreaInformation Science & Library Science-
dc.relation.journalResearchAreaBusiness & Economics-
dc.relation.journalWebOfScienceCategoryInformation Science & Library Science-
dc.relation.journalWebOfScienceCategoryManagement-
dc.subject.keywordPlusMODEL-
dc.subject.keywordPlusPRIVACY-
dc.subject.keywordPlusCRITERIA-
dc.subject.keywordAuthorInformation security-
dc.subject.keywordAuthorTrust-
dc.subject.keywordAuthorRisk-
dc.subject.keywordAuthorCountermeasure awareness-
Files in This Item
There are no files associated with this item.
Appears in
Collections
Korea University Business School > Department of Business Administration > 1. Journal Articles

qrcode

Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.

Related Researcher

Researcher Kim, Byung Cho photo

Kim, Byung Cho
경영대학 (경영학과)
Read more

Altmetrics

Total Views & Downloads

BROWSE