是什么促使用户采用网络安全做法?保护动机理论评估的调查实验

IF 3.5 1区 社会学 Q1 CRIMINOLOGY & PENOLOGY
Cassandra E. Dodge, Nathan Fisk, George W. Burruss, Richard K. Moule Jr., Chae M. Jaynes
{"title":"是什么促使用户采用网络安全做法?保护动机理论评估的调查实验","authors":"Cassandra E. Dodge,&nbsp;Nathan Fisk,&nbsp;George W. Burruss,&nbsp;Richard K. Moule Jr.,&nbsp;Chae M. Jaynes","doi":"10.1111/1745-9133.12641","DOIUrl":null,"url":null,"abstract":"<div>\n \n \n <section>\n \n <h3> Research Summary</h3>\n \n <p>A 2 × 2 × 3 fully crossed factorial experiment is used to examine the linkages between key dimensions of protection motivation theory (PMT; perceived severity of risk, vulnerability to risk, and response costs) and the intentions to adopt information technology (IT) cybersecurity recommendations after being informed of degrees of risk in the vignettes. Data in this study consist of a nationwide sample of 720 American adults. Results from a series of fractional logistic regressions indicate support for many of the core mechanisms within PMT. Seventy percent of respondents indicated they were likely to follow IT recommendations to mitigate a cyber threat. Self-efficacy and response costs affected intentions to do so.</p>\n </section>\n \n <section>\n \n <h3> Policy Implications</h3>\n \n <p>The study's findings have important implications for improving cybersecurity and reducing vulnerabilities to cyber threats. Current training programs need more effective communication strategies and engagement tools. Perceptions of users as security threats rather than potential contributors hinder progress in the ability of organizations to improve cybersecurity. Collaborative, user-centered approaches can enhance users’ self-efficacy and improve cybersecurity by aligning user and IT professional needs and capabilities. Strategies like gamified simulations and tailored interventions can create a more security-focused culture and encourage user participation in defending an organization. Recognizing individual differences among users and further examining personal characteristics that may impact user interactions with technology and cybersecurity interventions is crucial. Overall, more personalized, adaptable approaches to cybersecurity policies and technical solutions, accounting for diverse user needs and characteristics, should be a priority for improving cybersecurity practices.</p>\n </section>\n </div>","PeriodicalId":47902,"journal":{"name":"Criminology & Public Policy","volume":"22 4","pages":"849-868"},"PeriodicalIF":3.5000,"publicationDate":"2023-09-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1111/1745-9133.12641","citationCount":"0","resultStr":"{\"title\":\"What motivates users to adopt cybersecurity practices? A survey experiment assessing protection motivation theory\",\"authors\":\"Cassandra E. Dodge,&nbsp;Nathan Fisk,&nbsp;George W. Burruss,&nbsp;Richard K. Moule Jr.,&nbsp;Chae M. Jaynes\",\"doi\":\"10.1111/1745-9133.12641\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"<div>\\n \\n \\n <section>\\n \\n <h3> Research Summary</h3>\\n \\n <p>A 2 × 2 × 3 fully crossed factorial experiment is used to examine the linkages between key dimensions of protection motivation theory (PMT; perceived severity of risk, vulnerability to risk, and response costs) and the intentions to adopt information technology (IT) cybersecurity recommendations after being informed of degrees of risk in the vignettes. Data in this study consist of a nationwide sample of 720 American adults. Results from a series of fractional logistic regressions indicate support for many of the core mechanisms within PMT. Seventy percent of respondents indicated they were likely to follow IT recommendations to mitigate a cyber threat. Self-efficacy and response costs affected intentions to do so.</p>\\n </section>\\n \\n <section>\\n \\n <h3> Policy Implications</h3>\\n \\n <p>The study's findings have important implications for improving cybersecurity and reducing vulnerabilities to cyber threats. Current training programs need more effective communication strategies and engagement tools. Perceptions of users as security threats rather than potential contributors hinder progress in the ability of organizations to improve cybersecurity. Collaborative, user-centered approaches can enhance users’ self-efficacy and improve cybersecurity by aligning user and IT professional needs and capabilities. Strategies like gamified simulations and tailored interventions can create a more security-focused culture and encourage user participation in defending an organization. Recognizing individual differences among users and further examining personal characteristics that may impact user interactions with technology and cybersecurity interventions is crucial. Overall, more personalized, adaptable approaches to cybersecurity policies and technical solutions, accounting for diverse user needs and characteristics, should be a priority for improving cybersecurity practices.</p>\\n </section>\\n </div>\",\"PeriodicalId\":47902,\"journal\":{\"name\":\"Criminology & Public Policy\",\"volume\":\"22 4\",\"pages\":\"849-868\"},\"PeriodicalIF\":3.5000,\"publicationDate\":\"2023-09-11\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"https://onlinelibrary.wiley.com/doi/epdf/10.1111/1745-9133.12641\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Criminology & Public Policy\",\"FirstCategoryId\":\"90\",\"ListUrlMain\":\"https://onlinelibrary.wiley.com/doi/10.1111/1745-9133.12641\",\"RegionNum\":1,\"RegionCategory\":\"社会学\",\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q1\",\"JCRName\":\"CRIMINOLOGY & PENOLOGY\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Criminology & Public Policy","FirstCategoryId":"90","ListUrlMain":"https://onlinelibrary.wiley.com/doi/10.1111/1745-9133.12641","RegionNum":1,"RegionCategory":"社会学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"CRIMINOLOGY & PENOLOGY","Score":null,"Total":0}
引用次数: 0

摘要

使用2×2×3的完全交叉因子实验来检验保护动机理论的关键维度(PMT;感知的风险严重性、易受风险影响性和响应成本)与在得知小插曲中的风险程度后采用信息技术(IT)网络安全建议的意图之间的联系。这项研究的数据包括720名美国成年人的全国性样本。一系列分数逻辑回归的结果表明支持PMT中的许多核心机制。70%的受访者表示,他们可能会遵循IT建议来减轻网络威胁。自我效能和反应成本影响了这样做的意图。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
What motivates users to adopt cybersecurity practices? A survey experiment assessing protection motivation theory

Research Summary

A 2 × 2 × 3 fully crossed factorial experiment is used to examine the linkages between key dimensions of protection motivation theory (PMT; perceived severity of risk, vulnerability to risk, and response costs) and the intentions to adopt information technology (IT) cybersecurity recommendations after being informed of degrees of risk in the vignettes. Data in this study consist of a nationwide sample of 720 American adults. Results from a series of fractional logistic regressions indicate support for many of the core mechanisms within PMT. Seventy percent of respondents indicated they were likely to follow IT recommendations to mitigate a cyber threat. Self-efficacy and response costs affected intentions to do so.

Policy Implications

The study's findings have important implications for improving cybersecurity and reducing vulnerabilities to cyber threats. Current training programs need more effective communication strategies and engagement tools. Perceptions of users as security threats rather than potential contributors hinder progress in the ability of organizations to improve cybersecurity. Collaborative, user-centered approaches can enhance users’ self-efficacy and improve cybersecurity by aligning user and IT professional needs and capabilities. Strategies like gamified simulations and tailored interventions can create a more security-focused culture and encourage user participation in defending an organization. Recognizing individual differences among users and further examining personal characteristics that may impact user interactions with technology and cybersecurity interventions is crucial. Overall, more personalized, adaptable approaches to cybersecurity policies and technical solutions, accounting for diverse user needs and characteristics, should be a priority for improving cybersecurity practices.

求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
Criminology & Public Policy
Criminology & Public Policy CRIMINOLOGY & PENOLOGY-
CiteScore
8.10
自引率
6.50%
发文量
41
期刊介绍: Criminology & Public Policy is interdisciplinary in nature, devoted to policy discussions of criminology research findings. Focusing on the study of criminal justice policy and practice, the central objective of the journal is to strengthen the role of research findings in the formulation of crime and justice policy by publishing empirically based, policy focused articles.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信