Information security threat avoidance behavior: an empirical investigation

In recent years, with the continuous integration of information technology into daily life, users are facing more and more information security threats. Although many software and hardware protection methods have been put in place to achieve higher information security, the number of security incide...

Full description

Saved in:
Bibliographic Details
Main Author: Ling, Zhixuan
Format: Thesis
Language:eng
eng
eng
Published: 2019
Subjects:
Online Access:https://etd.uum.edu.my/9404/1/s822840_01.pdf
https://etd.uum.edu.my/9404/2/s822840_02.pdf
https://etd.uum.edu.my/9404/3/s822840_references.docx
Tags: Add Tag
No Tags, Be the first to tag this record!
id my-uum-etd.9404
record_format uketd_dc
spelling my-uum-etd.94042022-05-29T09:51:41Z Information security threat avoidance behavior: an empirical investigation 2019 Ling, Zhixuan Abdul Talib, Yurita Yakimin Tunku Puteri Intan Safinaz School of Accountancy (TISSA) Tunku Puteri Intan Safinaz School of Accauntancy (TISSA) T58.5-58.64 Information technology In recent years, with the continuous integration of information technology into daily life, users are facing more and more information security threats. Although many software and hardware protection methods have been put in place to achieve higher information security, the number of security incidents has not decreased. Traditionally, much of the work of providing security in information systems has focused on technology, and recent research has shown that user behavior does play a central role. Considering that end users are often the first line of defense and are often seen as the weakest link in information security, security defenses are very important. Therefore, the purpose of this study is to examine the relationship between perceived information security threats and information security behavior of users by using Technology Threat Avoidance Theory (TTAT). This study focuses on three types of threats: malware, data loss or leakage and identity theft. More importantly, a variety of information security behaviors were identified in this study, including password usage behavior, security software usage behavior, data storage behavior, physical security behavior, and proactive awareness behavior. Based on a survey data provided by 319 Internet users from a public university in Malaysia, the research results show that data loss or leakage is the most harmful threat to information security of users, followed by malware and identity theft. Moreover, these perceived threats have a positive impact on the five information security behaviors, where proactive awareness behavior is the top choice among these five information security behaviors. 2019 Thesis https://etd.uum.edu.my/9404/ https://etd.uum.edu.my/9404/1/s822840_01.pdf text eng public https://etd.uum.edu.my/9404/2/s822840_02.pdf text eng public https://etd.uum.edu.my/9404/3/s822840_references.docx text eng public other masters Universiti Utara Malaysia
institution Universiti Utara Malaysia
collection UUM ETD
language eng
eng
eng
advisor Abdul Talib, Yurita Yakimin
topic T58.5-58.64 Information technology
spellingShingle T58.5-58.64 Information technology
Ling, Zhixuan
Information security threat avoidance behavior: an empirical investigation
description In recent years, with the continuous integration of information technology into daily life, users are facing more and more information security threats. Although many software and hardware protection methods have been put in place to achieve higher information security, the number of security incidents has not decreased. Traditionally, much of the work of providing security in information systems has focused on technology, and recent research has shown that user behavior does play a central role. Considering that end users are often the first line of defense and are often seen as the weakest link in information security, security defenses are very important. Therefore, the purpose of this study is to examine the relationship between perceived information security threats and information security behavior of users by using Technology Threat Avoidance Theory (TTAT). This study focuses on three types of threats: malware, data loss or leakage and identity theft. More importantly, a variety of information security behaviors were identified in this study, including password usage behavior, security software usage behavior, data storage behavior, physical security behavior, and proactive awareness behavior. Based on a survey data provided by 319 Internet users from a public university in Malaysia, the research results show that data loss or leakage is the most harmful threat to information security of users, followed by malware and identity theft. Moreover, these perceived threats have a positive impact on the five information security behaviors, where proactive awareness behavior is the top choice among these five information security behaviors.
format Thesis
qualification_name other
qualification_level Master's degree
author Ling, Zhixuan
author_facet Ling, Zhixuan
author_sort Ling, Zhixuan
title Information security threat avoidance behavior: an empirical investigation
title_short Information security threat avoidance behavior: an empirical investigation
title_full Information security threat avoidance behavior: an empirical investigation
title_fullStr Information security threat avoidance behavior: an empirical investigation
title_full_unstemmed Information security threat avoidance behavior: an empirical investigation
title_sort information security threat avoidance behavior: an empirical investigation
granting_institution Universiti Utara Malaysia
granting_department Tunku Puteri Intan Safinaz School of Accountancy (TISSA)
publishDate 2019
url https://etd.uum.edu.my/9404/1/s822840_01.pdf
https://etd.uum.edu.my/9404/2/s822840_02.pdf
https://etd.uum.edu.my/9404/3/s822840_references.docx
_version_ 1747828589027393536