skip to main content
10.1145/2390317.2390318acmotherconferencesArticle/Chapter ViewAbstractPublication PagesinfoseccdConference Proceedingsconference-collections
research-article

The human element in cyber security: a study on student motivation to act

Published:12 October 2012Publication History

ABSTRACT

The internet was originally designed as an open system for trustworthy users, yet with its rapid growth rate, it has become vulnerable to cyber crime. Much research exists on promoting cyber security awareness among employees of businesses, but less exists on cyber security awareness in the general population. This paper focuses on the general student population at Kennesaw State University (KSU), examining how they are motivated to protect themselves from the threat of cyber crime. The study's framework draws on Roger's Protection Motivation Theory, making use of the five motivational factors: risk severity, vulnerability, self-efficacy, response efficacy, and response cost. Research methods used include observation of on-campus classes, interviews with instructors, and surveys of a random sampling of students. The results showed that feelings of vulnerability were significant indicators of motivation to take precautions when using social networks. The response cost, measured in time and money required to respond to social networking threats as well as computer virus threats, was a significant negative indicator of motivation for action.

References

  1. Bernard, H. R. 2006. Research Methods in Anthropology, 4th edition. AltaMira Press, Lanham, Maryland.Google ScholarGoogle Scholar
  2. Chen, C. C., Shaw, R. S., & Yang, S. C. 2006. Mitigating information security risks by increasing user security awareness: A case study of an information security awareness system. Information Technology Learning and Performance Journal, 24, 1.Google ScholarGoogle Scholar
  3. Cone, B. D., Irvine, C. E., Thompson, M. F., & Nguyen, T. D. 2007. A video game for cyber security training and awareness. Computers & Security, 26, 1, 63--72.Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Gordon, L. A., Loeb, M. P., & Sohail, T. 2003. A framework for using insurance for cyber-risk management. Communications of the ACM, 46, 3, 81--85. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Gurung, A., Luo, X., & Liao, Q. 2009. Consumer motivations in taking action against spyware: An empirical investigation. Information Management & Computer Security, 1, 3, 276--289.Google ScholarGoogle ScholarCross RefCross Ref
  6. KSU Factbook. 2010. WWW document viewed 10/19/2011 from https://vic34.kennesaw.edu/fb/kenn_fact_book.pkg_fact_book_html.p_show_fact_book_page?p_year=2010&p_page_type=STU&p_page_id=120Google ScholarGoogle Scholar
  7. Logan, P. Y., & Clarkson, A. 2005. Teaching students to hack: Curriculum issues in information security. ACM SIGCSE Bulletin, 3, 1, 157--161. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. Lorents, A. C., Maris, J. M., Morgan, J. N., & Neal, G. L. 2006. Ethics of computer use: A survey of student attitudes. Academy of Information and Management Sciences Journal, 9, 2.Google ScholarGoogle Scholar
  9. Miniwatts Marketing Group. Internet Usage Statistics: The Internet Big Picture. 2011. WWW document viewed 11/19/2011 from http://www.internetworldstats.com/stats.htm.Google ScholarGoogle Scholar
  10. Norman P, Boer H, Seydel E. R. 2005. Protection motivation theory. Predicting Health Behaviour. Open University Press, Berkshire, UK.Google ScholarGoogle Scholar
  11. Randazzo, M. R., Keeney, M., & Kowalski, E. 2005. Insider threat study: Illicit cyber activity in the banking and finance sector. Carnegie Mellon University Software Engineernig Institute Technical Report, Hanscom AFB, MA.Google ScholarGoogle Scholar
  12. Richardson, R. 2007. CSI computer crime and security survey. Computer Security Institute, 1--28.Google ScholarGoogle Scholar
  13. Siponen, M. T. 2001. Five dimensions of information security awareness. Computers and Society, 31, 2, 24--29. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. Valentine, J. A. 2006. Enhancing the employee security awareness model. Computer Fraud & Security, 6, 17--19.Google ScholarGoogle ScholarCross RefCross Ref
  15. Whitman, M. E., and Mattord, H. J. 2010. The enemy is still at the gates: Threats to information security revisited. 2010 Information Security Curriculum Development Conference, 95--96. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. Woodward, B., Davis, D. C., & Hodis, F. A. 2007. The relationship between ethical decision making and ethical reasoning in information technology students. Journal of Information Systems Education, 18, 2, 10.Google ScholarGoogle Scholar

Index Terms

  1. The human element in cyber security: a study on student motivation to act

        Recommendations

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in
        • Published in

          cover image ACM Other conferences
          InfoSecCD '12: Proceedings of the 2012 Information Security Curriculum Development Conference
          October 2012
          84 pages
          ISBN:9781450315388
          DOI:10.1145/2390317

          Copyright © 2012 ACM

          Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          • Published: 12 October 2012

          Permissions

          Request permissions about this article.

          Request Permissions

          Check for updates

          Qualifiers

          • research-article

          Acceptance Rates

          Overall Acceptance Rate18of23submissions,78%

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader