Abstract
People use search engines to seek information. This study investigates the motives that drive the search for information security knowledge via a search engine. We empirically examine the effects of network attacks and vulnerability disclosures on the frequency of search for information security knowledge. . We find that network attacks of current day and one day prior significantly impact the search, while vulnerability disclosure does not significantly affect the search.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Jansen, B.J.: The Comparative Effectiveness of Sponsored and Nonsponsored Links for Web E-commerce Queries. ACM Transactions on the Web 1(1), 3 (2007)
Ybarra, M.L., Sumanb, M.: Help seeking behavior and the Internet: A national survey. International Journal of Medical Informatics 75(1), 29–41 (2006)
Kumar, N., Mohan, K., Holowczak, R.: Locking the door but leaving the computer vulnerable: Factors inhibiting home users’ adoption of software firewalls. Decision Support Systems 46(1), 254–264 (2008)
Liang, H., Xue, Y.: Avoidance of Information Technology Threats: A Theoretical Perspective. MIS Quarterly 33(1), 71–90 (2009)
Ng, B.-Y., Kankanhalli, A., Xu, Y.C.: Studying users’ computer security behavior: A health belief perspective. Decision Support Systems 46(4), 815–825 (2009)
Furnell, S.M., Jusoh, A., Katsabas, D.: The challenges of understanding and using security: A survey of end-users. Computers & Security 25(1), 27–35 (2006)
Png, I., Wang, C., Wang, Q.: The Deterrent and Displacement Effects of Information Security Enforcement: International Evidence. Journal of Management Information Systems 25(2), 125–144 (2008)
Rogers, R.W.: A protection motivation theory of fear appeals and attitude change. Journal of Psychology 91(1), 93–114 (1975)
Floyd, D.L., Prentice-Dunn, S., Rogers, R.W.: A Meta-Analysis of Research on Protection Motivation Theory. Journal of Applied Social Psychology 30(2), 407–429 (2000)
Pass, G., Chowdhury, A., Torgeson, C.: A Picture of Search. In: the First International Conference on Scalable Information Systems (INFOSCALE 2006), Hong Kong (2006)
Pankratz, A.: Forecasting with Dynamic Regression Models. John Wiley & Sons, New York (1991)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2010 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Wang, J., Xiao, N., Rao, H.R. (2010). An Exploration of the Search for Information Security. In: Sharman, R., Rao, H.R., Raghu, T.S. (eds) Exploring the Grand Challenges for Next Generation E-Business. WEB 2009. Lecture Notes in Business Information Processing, vol 52. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-17449-0_17
Download citation
DOI: https://doi.org/10.1007/978-3-642-17449-0_17
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-17448-3
Online ISBN: 978-3-642-17449-0
eBook Packages: Computer ScienceComputer Science (R0)