Cassandra E. Dodge, Nathan Fisk, George W. Burruss, Richard K. Moule Jr., Chae M. Jaynes
{"title":"是什么促使用户采用网络安全做法?保护动机理论评估的调查实验","authors":"Cassandra E. Dodge, Nathan Fisk, George W. Burruss, Richard K. Moule Jr., Chae M. Jaynes","doi":"10.1111/1745-9133.12641","DOIUrl":null,"url":null,"abstract":"<div>\n \n \n <section>\n \n <h3> Research Summary</h3>\n \n <p>A 2 × 2 × 3 fully crossed factorial experiment is used to examine the linkages between key dimensions of protection motivation theory (PMT; perceived severity of risk, vulnerability to risk, and response costs) and the intentions to adopt information technology (IT) cybersecurity recommendations after being informed of degrees of risk in the vignettes. Data in this study consist of a nationwide sample of 720 American adults. Results from a series of fractional logistic regressions indicate support for many of the core mechanisms within PMT. Seventy percent of respondents indicated they were likely to follow IT recommendations to mitigate a cyber threat. Self-efficacy and response costs affected intentions to do so.</p>\n </section>\n \n <section>\n \n <h3> Policy Implications</h3>\n \n <p>The study's findings have important implications for improving cybersecurity and reducing vulnerabilities to cyber threats. Current training programs need more effective communication strategies and engagement tools. Perceptions of users as security threats rather than potential contributors hinder progress in the ability of organizations to improve cybersecurity. Collaborative, user-centered approaches can enhance users’ self-efficacy and improve cybersecurity by aligning user and IT professional needs and capabilities. Strategies like gamified simulations and tailored interventions can create a more security-focused culture and encourage user participation in defending an organization. Recognizing individual differences among users and further examining personal characteristics that may impact user interactions with technology and cybersecurity interventions is crucial. Overall, more personalized, adaptable approaches to cybersecurity policies and technical solutions, accounting for diverse user needs and characteristics, should be a priority for improving cybersecurity practices.</p>\n </section>\n </div>","PeriodicalId":47902,"journal":{"name":"Criminology & Public Policy","volume":"22 4","pages":"849-868"},"PeriodicalIF":3.5000,"publicationDate":"2023-09-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1111/1745-9133.12641","citationCount":"0","resultStr":"{\"title\":\"What motivates users to adopt cybersecurity practices? A survey experiment assessing protection motivation theory\",\"authors\":\"Cassandra E. Dodge, Nathan Fisk, George W. Burruss, Richard K. Moule Jr., Chae M. Jaynes\",\"doi\":\"10.1111/1745-9133.12641\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"<div>\\n \\n \\n <section>\\n \\n <h3> Research Summary</h3>\\n \\n <p>A 2 × 2 × 3 fully crossed factorial experiment is used to examine the linkages between key dimensions of protection motivation theory (PMT; perceived severity of risk, vulnerability to risk, and response costs) and the intentions to adopt information technology (IT) cybersecurity recommendations after being informed of degrees of risk in the vignettes. Data in this study consist of a nationwide sample of 720 American adults. Results from a series of fractional logistic regressions indicate support for many of the core mechanisms within PMT. Seventy percent of respondents indicated they were likely to follow IT recommendations to mitigate a cyber threat. Self-efficacy and response costs affected intentions to do so.</p>\\n </section>\\n \\n <section>\\n \\n <h3> Policy Implications</h3>\\n \\n <p>The study's findings have important implications for improving cybersecurity and reducing vulnerabilities to cyber threats. Current training programs need more effective communication strategies and engagement tools. Perceptions of users as security threats rather than potential contributors hinder progress in the ability of organizations to improve cybersecurity. Collaborative, user-centered approaches can enhance users’ self-efficacy and improve cybersecurity by aligning user and IT professional needs and capabilities. Strategies like gamified simulations and tailored interventions can create a more security-focused culture and encourage user participation in defending an organization. Recognizing individual differences among users and further examining personal characteristics that may impact user interactions with technology and cybersecurity interventions is crucial. Overall, more personalized, adaptable approaches to cybersecurity policies and technical solutions, accounting for diverse user needs and characteristics, should be a priority for improving cybersecurity practices.</p>\\n </section>\\n </div>\",\"PeriodicalId\":47902,\"journal\":{\"name\":\"Criminology & Public Policy\",\"volume\":\"22 4\",\"pages\":\"849-868\"},\"PeriodicalIF\":3.5000,\"publicationDate\":\"2023-09-11\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"https://onlinelibrary.wiley.com/doi/epdf/10.1111/1745-9133.12641\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Criminology & Public Policy\",\"FirstCategoryId\":\"90\",\"ListUrlMain\":\"https://onlinelibrary.wiley.com/doi/10.1111/1745-9133.12641\",\"RegionNum\":1,\"RegionCategory\":\"社会学\",\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q1\",\"JCRName\":\"CRIMINOLOGY & PENOLOGY\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Criminology & Public Policy","FirstCategoryId":"90","ListUrlMain":"https://onlinelibrary.wiley.com/doi/10.1111/1745-9133.12641","RegionNum":1,"RegionCategory":"社会学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"CRIMINOLOGY & PENOLOGY","Score":null,"Total":0}
What motivates users to adopt cybersecurity practices? A survey experiment assessing protection motivation theory
Research Summary
A 2 × 2 × 3 fully crossed factorial experiment is used to examine the linkages between key dimensions of protection motivation theory (PMT; perceived severity of risk, vulnerability to risk, and response costs) and the intentions to adopt information technology (IT) cybersecurity recommendations after being informed of degrees of risk in the vignettes. Data in this study consist of a nationwide sample of 720 American adults. Results from a series of fractional logistic regressions indicate support for many of the core mechanisms within PMT. Seventy percent of respondents indicated they were likely to follow IT recommendations to mitigate a cyber threat. Self-efficacy and response costs affected intentions to do so.
Policy Implications
The study's findings have important implications for improving cybersecurity and reducing vulnerabilities to cyber threats. Current training programs need more effective communication strategies and engagement tools. Perceptions of users as security threats rather than potential contributors hinder progress in the ability of organizations to improve cybersecurity. Collaborative, user-centered approaches can enhance users’ self-efficacy and improve cybersecurity by aligning user and IT professional needs and capabilities. Strategies like gamified simulations and tailored interventions can create a more security-focused culture and encourage user participation in defending an organization. Recognizing individual differences among users and further examining personal characteristics that may impact user interactions with technology and cybersecurity interventions is crucial. Overall, more personalized, adaptable approaches to cybersecurity policies and technical solutions, accounting for diverse user needs and characteristics, should be a priority for improving cybersecurity practices.
期刊介绍:
Criminology & Public Policy is interdisciplinary in nature, devoted to policy discussions of criminology research findings. Focusing on the study of criminal justice policy and practice, the central objective of the journal is to strengthen the role of research findings in the formulation of crime and justice policy by publishing empirically based, policy focused articles.