Skip to main content
Log in

Determining the antecedents of digital security practices in the general public dimension

  • Published:
Information Technology and Management Aims and scope Submit manuscript

Abstract

Our increased reliance on digital information and our expansive use of the Internet for a steadily rising number of tasks requires that more emphasis be placed on digital information security. The importance of securing digital information is apparent but the success in persuading individual users to adopt and utilize tools to improve security has been arguably more difficult. In this study, we propose a number of factors that may influence individual security practices. These constructs are developed by adapting existing theory from information security and privacy research to examine information security behaviors in the general public dimension. The influence of these factors on perceived need and actual behavior is then examined. The resulting model is shown to fit well and support is found for many of the proposed relationships. The determination of the antecedents of individual digital security practices may provide useful insight to tailoring programs for adoption and utilization of security tools by individuals in the general public dimension.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4

Similar content being viewed by others

References

  1. Anderson JC, Gerbing DW (1988) Structural equation modeling in practice: a review and recommended two step approach. Psychol Bull 103(3):411–423

    Article  Google Scholar 

  2. Anderson R (2001) Why information security is hard—an economic perspective. In: Proceedings of the 17th Annual Computer Security Applied Conference. IEEE Computer Society, Los Alamitos, CA, pp 358–365

  3. Benassi P (1999) TRUSTe: an online privacy seal program. Commun ACM 42(2):56

    Article  Google Scholar 

  4. Bensaou M, Venkataman N (1996) Inter-organizational relationships and information technology: a conceptual synthesis and a research framework. Eur J Inform Syst 5:84–91

    Article  Google Scholar 

  5. Browne MW, Cudeck R (1993) Alternative ways of assessing model fit. In: Bollen KA, Long JS (eds) Testing structural equation models. Sage, Newbury Park, pp 445–455

    Google Scholar 

  6. Byrne BM (2001) Structural equation modeling with AMOS: basic concepts, applications and programming. Lawrence Erlbaum Associates, Mahwah

    Google Scholar 

  7. CERT (2007) Over-confidence is pervasive amongst security professionals. Retrieved July 3, from the Software Engineering Institute at Carnegie Mellon Web site: http://www.sei.cmu.edu/about/press/releases/2007ecrime.html

  8. CERT (2008) Vulnerability remediation statistics. Retrieved July 3, from the Software Engineering Institute at Carnegie Mellon Web site: http://www.cert.org/stats/vulnerability_remediation.html

  9. CR (2007) Net threats: why going online remains risky. Retrieved July 3, from the Consumer Reports Web site: http://www.consumerreports.org/cro/electronics-computers/computers/internet-and-other-services/net-threats-9-07/overview/0709_net_ov.htm

  10. D’Arcy J, Hovav A, Galletta D (2008) User awareness of security countermeasures and its impact on information systems misuse: a deterrence approach. Inform Syst Res (Forthcoming)

  11. Davis F (1989) Perceived usefulness, perceived ease of use, and user acceptance of information technology. MIS Quart, 319–340

  12. Department of Commerce (2011) Exploring the digital nation—computer and internet use at home. Retrieved July 31st, 2012 from the Department of Commerce website: http://www.esa.doc.gov/Reports/exploring-digital-nation-computer-and-internet-use-home

  13. Dhillon G (2007) Principles of information systems security: text and cases. Wiley, New York

    Google Scholar 

  14. Dhillon G (1999) Managing and controlling computer misuse. Inform Manag Comput Secur 7(4):171–175

    Article  Google Scholar 

  15. Dinev T, Hart P (2006) An extended privacy calculus model for E-commerce transactions. Inform Syst Res 17(1):61–80

    Article  Google Scholar 

  16. Fornell C, Larker DF (1981) Evaluating structural equation models with unobservable variables and measurement error. J Mark Res 18:39–50

    Article  Google Scholar 

  17. FTC (2007) FTC releases survey of identity theft in the U.S. study shows 8.3 million victims in 2005. Retrieved July 3, 2008, from the Federal Trade Commission Web site: http://www.ftc.gov/opa/2007/11/idtheft.shtm

  18. Hayduk L, Cummings GG, Boadu K, Pazderka-Robinson H, Boulianne S (2007) Testing! Testing! One, two, three—testing the theory in structural equation models! Pers Individ Dif 42:841–850

    Article  Google Scholar 

  19. Hansche S (2001) Designing a security awareness program: part 1. Inform Syst Secur 9(6):14–22

    Google Scholar 

  20. Hosmer L (1995) Trust: the connection link between organizational theory and philosophical ethics. Acad Manag Rev 20(3):213–237

    Google Scholar 

  21. Howard J, Longstaff T (1998) A common language for computer security incidents. Sandia National Laboratory report: SAND98-8667. Sandia National Lab. Retrieved November 29th, 2010 from: http://www.osti.gov/ bridge/purl.cover.jsp?purl =/751004-JhkwDA/webviewable/

  22. Hu L, Bentler PM (1999) Cutoff criteria for fit indexes in covariance structure analysis: conventional criteria versus new alternatives. Struct Equ Model 6(1):1–55

    Article  Google Scholar 

  23. Hughes D (2008) 12,000 Laptops Lost Weekly At U.S. Airports. Aviation Week, Retrieved July 3, 2008, from Aviation Week Web site: http://www.aviationweek.com/aw/generic/story_channel.jsp?channel=comm&id=news/LAP07038.xml&headline=12,000%20Laptops%20Lost%20Weekly%20At%20U.S.%20Airports

  24. James TL, Pirim T, Boswell K, Reithel B, Barkhi R (2006) Determining the intention to use of biometric devices: an application and extension of the technology acceptance model. J Organ End User Comput 18(3):1–24

    Article  Google Scholar 

  25. Javelin Strategy & Research (2010) 2010 Identity Fraud Survey Report: Consumer Version. Retrieved July 31, 2012, from Javelin Strategy Web site: http://http://www.javelinstrategy.com/uploads/files/1004.R_2010IdentityFraudSurveyConsumer.pdf

  26. Joreskog KG, Sorbom D (1996) LISREL 8: User’s reference guide. Scientific Software International, Chicago

    Google Scholar 

  27. Koufteros XA (1999) Testing a model of pull production: a paradigm for manufacturing research using structural equation modeling. J Oper Manag 17(4):467–488

    Article  Google Scholar 

  28. Kim BC, Chen P, Mukhopadhyay T (2011) The effect of liability and patch release on software security: the monopoly case. Prod Oper Manag 20(4):603–617

    Article  Google Scholar 

  29. Kline R (1998) Principles and practice guidelines of structural equation modeling. Guilford Press, New York

    Google Scholar 

  30. Krusl I (1998) Software vulnerability analysis, Ph.D. thesis. Department of Computer Sciences, Purdue University. Retrieved, November 29th from: https://www.cerias.purdue.edu/techreports-ssl/public/98-09.pdf

  31. Laufer R, Wolfe M (1977) Privacy as a concept and a social issue: a multidimensional developmental theory. J Soc Issues 33(3):22–42

    Article  Google Scholar 

  32. Lee SM, Lee SG, Yoo S (2004) An integrative model of computer abuse based on social control and general deterrence theories. Inform Manag 41(6):707–718

    Article  Google Scholar 

  33. MacCallum RC, Browne MW, Sugawara HM (1996) Power analysis and determination of sample size for covariance structure modeling. Psychol Methods 1:130–149

    Article  Google Scholar 

  34. NWCCC, BJA, FBI (2007) 2007 Internet crime report. Retrieved July 3, from the Internet Crime Complaint Center Web site: http://www.ic3.gov/media/annualreports.aspx

  35. Pavlou P (2003) Consumer acceptance of electronic commerce: integrating trust and risk with the technology acceptance model. Int J Electron Commer 7(3):69–103

    Google Scholar 

  36. Power R (1996) Current and future danger: a CSI primer of computer crime & information warfare, 4th edn. Computer Security Institute, Orlando

    Google Scholar 

  37. Raine L (2010) Internet, broadband, and cell phone statistics, A Pew Research Center Report, Jan. 5th, 2010. Obtained August 12th, 2010 from: http://www.pewinternet.org/Reports/2010/Internet-broadband-and-cell-phone-statistics.aspx

  38. Ring P, Van de Ven A (1994) Developing processes of cooperative inter-organizational relationships. Acad Manag Rev 19:90–118

    Google Scholar 

  39. Schumacker RE, Lomax RG (2004) A beginner’s guide to structural equation modeling, 2nd edn. Lawrence Erlbaum Associates, Mahwah

    Google Scholar 

  40. Siponen MT (2001) Five dimensions of information security awareness. ACM SIGCAS Comput Soc 31(2):24–29

    Article  Google Scholar 

  41. Stallings W (2003) Network security essentials: applications and standards, 2nd edn. Pearson Education, Inc., Upper Saddle River

    Google Scholar 

  42. Steiger JH (1990) Structural model evaluation and modification: an interval estimation approach. Multivar Behav Res 25:173–180

    Article  Google Scholar 

  43. Stoneburner G, Goguen A, Feringa A (2002) “Risk management guide for information technology systems”, NIST Special Publication 800-30, Retrieved November, 29th, 2010 from http://csrc.nist.gov/publications/nistpubs/800-30/sp800-30.pdf

  44. Straub DW (1990) Effective IS security: an empirical study. Inform Syst Res 1(3):255–276

    Article  Google Scholar 

  45. Straub D, Welke R (1998) Coping with systems risk: security planning models for management decision making. MIS Quart 22(4):441–469

    Article  Google Scholar 

  46. Symantec (2008) Symantec Internet Security Threat Report. Retrieved July 3, 2008, from the Symantec Web site: http://eval.symantec.com/mktginfo/enterprise/white_papers/b-whitepaper_exec_summary_internet_security_threat_report_xiii_04-2008.en-us.pdf

  47. Tyre P (2010) “A’s for Good Behavior”, The New York Times, Retrieved November 29th, 2010 from: http://www.nytimes.com/2010/11/28/weekinreview/28tyre.html

  48. Urbach N, Ahlemann F (2010) Structural equation modeling in information systems research using partial least squares. J Inform Technol Theory Appl 11(2):5–40

    Google Scholar 

  49. Van Eerde W, Thierry H (1996) Vroom’s expectancy models and work-related criteria: a meta-analysis. J Appl Psychol 81(5):575–586

    Article  Google Scholar 

  50. Vroom VH (1964) Work and motivation. Wiley, New York

    Google Scholar 

  51. Whitman ME (2004) In defense of the realm: understanding the threats to information security. Int J Inform Manage 24(1):43–57

    Article  Google Scholar 

  52. Whitman ME, Mattord H (2005) Principles of information security. Course Technology, Boston

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Tabitha James.

Rights and permissions

Reprints and permissions

About this article

Cite this article

James, T., Nottingham, Q. & Kim, B.C. Determining the antecedents of digital security practices in the general public dimension. Inf Technol Manag 14, 69–89 (2013). https://doi.org/10.1007/s10799-012-0147-4

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10799-012-0147-4

Keywords

Navigation