Determining the antecedents of digital security practices in the general public dimension
DC Field | Value | Language |
---|---|---|
dc.contributor.author | James, Tabitha | - |
dc.contributor.author | Nottingham, Quinton | - |
dc.contributor.author | Kim, Byung Cho | - |
dc.date.accessioned | 2021-09-06T00:46:02Z | - |
dc.date.available | 2021-09-06T00:46:02Z | - |
dc.date.created | 2021-06-18 | - |
dc.date.issued | 2013-06 | - |
dc.identifier.issn | 1385-951X | - |
dc.identifier.uri | https://scholar.korea.ac.kr/handle/2021.sw.korea/103006 | - |
dc.description.abstract | Our increased reliance on digital information and our expansive use of the Internet for a steadily rising number of tasks requires that more emphasis be placed on digital information security. The importance of securing digital information is apparent but the success in persuading individual users to adopt and utilize tools to improve security has been arguably more difficult. In this study, we propose a number of factors that may influence individual security practices. These constructs are developed by adapting existing theory from information security and privacy research to examine information security behaviors in the general public dimension. The influence of these factors on perceived need and actual behavior is then examined. The resulting model is shown to fit well and support is found for many of the proposed relationships. The determination of the antecedents of individual digital security practices may provide useful insight to tailoring programs for adoption and utilization of security tools by individuals in the general public dimension. | - |
dc.language | English | - |
dc.language.iso | en | - |
dc.publisher | SPRINGER | - |
dc.subject | MODEL | - |
dc.subject | PRIVACY | - |
dc.subject | CRITERIA | - |
dc.title | Determining the antecedents of digital security practices in the general public dimension | - |
dc.type | Article | - |
dc.contributor.affiliatedAuthor | Kim, Byung Cho | - |
dc.identifier.doi | 10.1007/s10799-012-0147-4 | - |
dc.identifier.scopusid | 2-s2.0-84878834521 | - |
dc.identifier.wosid | 000320242700002 | - |
dc.identifier.bibliographicCitation | INFORMATION TECHNOLOGY & MANAGEMENT, v.14, no.2, pp.69 - 89 | - |
dc.relation.isPartOf | INFORMATION TECHNOLOGY & MANAGEMENT | - |
dc.citation.title | INFORMATION TECHNOLOGY & MANAGEMENT | - |
dc.citation.volume | 14 | - |
dc.citation.number | 2 | - |
dc.citation.startPage | 69 | - |
dc.citation.endPage | 89 | - |
dc.type.rims | ART | - |
dc.type.docType | Article | - |
dc.description.journalClass | 1 | - |
dc.description.journalRegisteredClass | ssci | - |
dc.description.journalRegisteredClass | scopus | - |
dc.relation.journalResearchArea | Information Science & Library Science | - |
dc.relation.journalResearchArea | Business & Economics | - |
dc.relation.journalWebOfScienceCategory | Information Science & Library Science | - |
dc.relation.journalWebOfScienceCategory | Management | - |
dc.subject.keywordPlus | MODEL | - |
dc.subject.keywordPlus | PRIVACY | - |
dc.subject.keywordPlus | CRITERIA | - |
dc.subject.keywordAuthor | Information security | - |
dc.subject.keywordAuthor | Trust | - |
dc.subject.keywordAuthor | Risk | - |
dc.subject.keywordAuthor | Countermeasure awareness | - |
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.
(02841) 서울특별시 성북구 안암로 14502-3290-1114
COPYRIGHT © 2021 Korea University. All Rights Reserved.
Certain data included herein are derived from the © Web of Science of Clarivate Analytics. All rights reserved.
You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.