skip to main content
10.1145/3511716.3511724acmotherconferencesArticle/Chapter ViewAbstractPublication PagesebimcsConference Proceedingsconference-collections
research-article

Research on Information Security Behavior of Smart Agriculture Internet of Things Based on Protection Motivation Theory

Published:28 March 2022Publication History

ABSTRACT

[Purpose/Meaning] Explore the factors that influence the willingness of users of smart agricultural Internet of Things to conduct information security, to help the government, agricultural organizations or related organizations take effective measures, provide targeted information security education and training, and help train users The awareness of information security precautions promotes the willingness of information security behaviors among users of the intelligent agricultural Internet of Things. [Process/Method] This research is based on the theory of protection motivation, combined with the theory of social cognition, to establish a model that affects the information security behavior of users of the intelligent agricultural Internet of Things, conduct surveys for users, and finally use the structural equation model to analyze and explore the relationship between variables. [Results/Conclusions] The study found that threat assessment, response assessment, control tendencies, subjective norms, and security habits have a significant positive impact on user information security behavior, response costs have a negative impact on user behavior willingness, and perceived ease of use has a negative impact on user behavior. The influence of behavior intention is not significant.

References

  1. Esmaeili M. Assessment of Users'Information Security Behavior in Smartphone Networks[J].Dissertations & Theses-Gradworks, 2014.Google ScholarGoogle Scholar
  2. Jordan Shropshire,Merrill Warkentin , Shwadhin Sharma’ Personality, attitudes, and intentions: Predicting initial adoption of information security behavior[J]. computers & security, 2015,49:177-191Google ScholarGoogle Scholar
  3. Rogers, R. W.. A protection motivation theory of fear appeals and attitude change[J].The Journal of Psychology,1975,91(5):93-114.Google ScholarGoogle Scholar
  4. Rogers, R. W. Cognitive and physiological processes in fear-based attitude change: A revised theory of protection motivation. In J. Cacioppo and R. Petty (Eds.) [J]. Social psychophysiology,1983:153-176.Google ScholarGoogle Scholar
  5. Floyd, D. L, Prentice-Dunn, S.,and Rogers, R.W. A meta-analysis of research on protection motivation theory[J].Journal of Applied Social Psychology, 2000,30(2):407–429.Google ScholarGoogle ScholarCross RefCross Ref
  6. Workman, M., Bommer, W., and Straub, D. Security lapses and the omission of information security measures: An empirical test of the threat control model[J].Journal of Computers in Human Behavior, 2008,24(6):2799-2816.Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Liang, H., and Xue, Y. Understanding security behaviors in personal computer usage: A threat avoidance perspective[J].Journal of the Association for Information Systems, 2010,11(7):394-413.Google ScholarGoogle ScholarCross RefCross Ref
  8. Lee, Y.,and Larsen, K.Threat or coping appraisal:determinants of SMB executives' decision to adopt antimalware software[J].European Journal of Information Systems, 2009,18(2):177-187.Google ScholarGoogle ScholarCross RefCross Ref
  9. Bandura A.Human Agency in Social Cognitive Theory[J].American Psychologist, 1989,44(9):1175-1184.Google ScholarGoogle Scholar
  10. Fishbein, M., & Ajzen, I. On construct validity: a critique of Miniard and Cohen's paper[J].Journal of Experimental Social Psychology, 1981,17(3):340-350.Google ScholarGoogle ScholarCross RefCross Ref
  11. An, S. and Zhou, S. "A Conceptual comparison of the theoretical approaches in health campaigns: Focusing on SET, TRA, TPB, HBM, and EPPM," Paper presented at the annual meeting of the International Communication Association[J].TBA, Montreal, Quebec, Canada,2008,35(15):186-198.Google ScholarGoogle Scholar
  12. Schepers, J., and Wetzels, M. A meta-analysis of the technology acceptance model: Investigating subjective norm and moderation effects[J].Information & Management, 2007,44(1):90–103.Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. Anderson, C.L. and Agarwal, R.Practicing safe computing: A multi-method empirical examination of home computer user security intentions[J].MIS Quarterly,2010, 34(3):613–643.Google ScholarGoogle Scholar
  14. Brewer, N. T., Chapman, G. B., Gibbons, F. X., Gerrard, M., McCaul, K. D. and Weinstein, N. D. Meta-analysis of the relationship between risk perception and health behavior[J].Health Psychology,2007,26(2):136-145.Google ScholarGoogle Scholar
  15. Albarracín, D., Gillette, J.C., Earl, A.N., Glasman, L.R., Durantini, M.R., and Ho, M.H. A test of major assumptions about behavior change[J]. Psychological Bulletin, 2005,131(6):856-897.Google ScholarGoogle ScholarCross RefCross Ref
  16. ohnston A C, Warkentin M. Fear Appeals and Information Security Behaviors: An Empirical Study[J]. MISQ, 2010,34(3):549-566.Google ScholarGoogle ScholarCross RefCross Ref
  17. Davis F. Perceived usefulness, perceived ease of use, and user acceptance of information technology[J]. MISQ,1989,13(3):319-39.Google ScholarGoogle Scholar
  18. Lee Y, Kozar K. Prediction and intervention in health-related behaviour: A meta-analytic review of protection motivation theory[J].Journal of Applied Social Psychology, 2008,30:106–143.Google ScholarGoogle Scholar
  19. Kim, H. J. Increasing the persuasiveness of gain vs. loss framing: the effects of gender and fear arousal on processing gain- vs[J].MISQ,2010,45(2):109-19.Google ScholarGoogle Scholar
  20. Anderson, C.L. and Agarwal, R.Practicing safe computing: A multi-method empirical examination of home computer user security intentions[J].MIS Quarterly, 2010,34(3):613–643.Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. Ibrahimov, V.R., Mehdiyeva, G.Y.U., Yue, X.-G., Kaabar, M.K.A., Noeiaghdam, S., Juraev, D.A. Novel symmetric numerical methods for solving symmetric mathematical problems (2021) International Journal of Circuits, Systems and Signal Processing, 15, pp. 1545-1557. DOI: 10.46300/9106.2021.15.167.Google ScholarGoogle Scholar
  22. Liu, Z., Song, J., Wu, H., Gu, X., Zhao, Y., Yue, X., Shi, L. Impact of financial technology on regional green finance (2021) Computer Systems Science and Engineering, 39 (3), pp. 391-401. DOI: 10.32604/CSSE.2021.014527.Google ScholarGoogle Scholar
  23. Hu, J., Yue, X.-G., Teresiene, D., Ullah, I. How COVID19 pandemic affect film and drama industry in China: an evidence of nonlinear empirical analysis (2021) Economic Research-Ekonomska Istrazivanja. DOI: 10.1080/1331677X.2021.1937262.Google ScholarGoogle Scholar

Recommendations

Comments

Login options

Check if you have access through your login credentials or your institution to get full access on this article.

Sign in
  • Published in

    cover image ACM Other conferences
    EBIMCS '21: Proceedings of the 2021 4th International Conference on E-Business, Information Management and Computer Science
    December 2021
    539 pages
    ISBN:9781450395687
    DOI:10.1145/3511716

    Copyright © 2021 ACM

    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    • Published: 28 March 2022

    Permissions

    Request permissions about this article.

    Request Permissions

    Check for updates

    Qualifiers

    • research-article
    • Research
    • Refereed limited

    Acceptance Rates

    Overall Acceptance Rate143of708submissions,20%
  • Article Metrics

    • Downloads (Last 12 months)15
    • Downloads (Last 6 weeks)1

    Other Metrics

PDF Format

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

HTML Format

View this article in HTML Format .

View HTML Format