亲爱的研友该休息了!由于当前在线用户较少,发布求助请尽量完整地填写文献信息,科研通机器人24小时在线,伴您度过漫漫科研夜!身体可是革命的本钱,早点休息,好梦!

What motivates users to adopt cybersecurity practices? A survey experiment assessing protection motivation theory

脆弱性(计算) 计算机安全 心理干预 事件响应 计算机科学 业务 互联网隐私 心理学 精神科
作者
Cassandra Dodge,Nathan Fisk,George W. Burruss,Richard K. Moule,Chae M. Jaynes
出处
期刊:Criminology and public policy [Wiley]
卷期号:22 (4): 849-868 被引量:24
标识
DOI:10.1111/1745-9133.12641
摘要

Abstract Research Summary A 2 × 2 × 3 fully crossed factorial experiment is used to examine the linkages between key dimensions of protection motivation theory (PMT; perceived severity of risk, vulnerability to risk, and response costs) and the intentions to adopt information technology (IT) cybersecurity recommendations after being informed of degrees of risk in the vignettes. Data in this study consist of a nationwide sample of 720 American adults. Results from a series of fractional logistic regressions indicate support for many of the core mechanisms within PMT. Seventy percent of respondents indicated they were likely to follow IT recommendations to mitigate a cyber threat. Self‐efficacy and response costs affected intentions to do so. Policy Implications The study's findings have important implications for improving cybersecurity and reducing vulnerabilities to cyber threats. Current training programs need more effective communication strategies and engagement tools. Perceptions of users as security threats rather than potential contributors hinder progress in the ability of organizations to improve cybersecurity. Collaborative, user‐centered approaches can enhance users’ self‐efficacy and improve cybersecurity by aligning user and IT professional needs and capabilities. Strategies like gamified simulations and tailored interventions can create a more security‐focused culture and encourage user participation in defending an organization. Recognizing individual differences among users and further examining personal characteristics that may impact user interactions with technology and cybersecurity interventions is crucial. Overall, more personalized, adaptable approaches to cybersecurity policies and technical solutions, accounting for diverse user needs and characteristics, should be a priority for improving cybersecurity practices.
最长约 10秒,即可获得该文献文件

科研通智能强力驱动
Strongly Powered by AbleSci AI
更新
PDF的下载单位、IP信息已删除 (2025-6-4)

科研通是完全免费的文献互助平台,具备全网最快的应助速度,最高的求助完成率。 对每一个文献求助,科研通都将尽心尽力,给求助人一个满意的交代。
实时播报
17秒前
ding应助Eileen采纳,获得200
31秒前
希望天下0贩的0应助ping采纳,获得10
40秒前
Ankher完成签到,获得积分10
43秒前
aaa发布了新的文献求助10
1分钟前
Emad0gh应助科研通管家采纳,获得10
1分钟前
1分钟前
Richard完成签到,获得积分10
1分钟前
Richard发布了新的文献求助30
2分钟前
GingerF应助Ankher采纳,获得50
2分钟前
2分钟前
量子星尘发布了新的文献求助10
2分钟前
玛琳卡迪马完成签到 ,获得积分10
2分钟前
2分钟前
WZQ发布了新的文献求助10
2分钟前
冷静新烟完成签到,获得积分20
3分钟前
青鸟飞鱼完成签到,获得积分10
3分钟前
小吃完成签到,获得积分0
3分钟前
3分钟前
叶十七完成签到,获得积分10
3分钟前
Eileen发布了新的文献求助200
3分钟前
李健应助比大王采纳,获得30
3分钟前
3分钟前
敏敏9813完成签到,获得积分10
5分钟前
敏敏9813发布了新的文献求助10
5分钟前
5分钟前
5分钟前
SMX发布了新的文献求助30
5分钟前
共享精神应助枯藤老柳树采纳,获得10
5分钟前
5分钟前
比大王发布了新的文献求助30
6分钟前
6分钟前
6分钟前
6分钟前
7分钟前
Weiyu完成签到 ,获得积分10
7分钟前
Owen应助枯藤老柳树采纳,获得10
7分钟前
8分钟前
8分钟前
kuoping完成签到,获得积分0
8分钟前
高分求助中
(应助此贴封号)【重要!!请各用户(尤其是新用户)详细阅读】【科研通的精品贴汇总】 10000
Einführung in die Rechtsphilosophie und Rechtstheorie der Gegenwart 1500
Cowries - A Guide to the Gastropod Family Cypraeidae 1200
Handbook of Milkfat Fractionation Technology and Application, by Kerry E. Kaylegian and Robert C. Lindsay, AOCS Press, 1995 1000
Reflections of female probation practitioners: navigating the challenges of working with male offenders 500
Probation staff reflective practice: can it impact on outcomes for clients with personality difficulties? 500
PRINCIPLES OF BEHAVIORAL ECONOMICS Microeconomics & Human Behavior 400
热门求助领域 (近24小时)
化学 医学 生物 材料科学 工程类 有机化学 内科学 生物化学 物理 计算机科学 纳米技术 遗传学 基因 复合材料 化学工程 物理化学 病理 催化作用 免疫学 量子力学
热门帖子
关注 科研通微信公众号,转发送积分 5031743
求助须知:如何正确求助?哪些是违规求助? 4266197
关于积分的说明 13298721
捐赠科研通 4075679
什么是DOI,文献DOI怎么找? 2229136
邀请新用户注册赠送积分活动 1237679
关于科研通互助平台的介绍 1162769