ABSTRACT
[Purpose/Meaning] Explore the factors that influence the willingness of users of smart agricultural Internet of Things to conduct information security, to help the government, agricultural organizations or related organizations take effective measures, provide targeted information security education and training, and help train users The awareness of information security precautions promotes the willingness of information security behaviors among users of the intelligent agricultural Internet of Things. [Process/Method] This research is based on the theory of protection motivation, combined with the theory of social cognition, to establish a model that affects the information security behavior of users of the intelligent agricultural Internet of Things, conduct surveys for users, and finally use the structural equation model to analyze and explore the relationship between variables. [Results/Conclusions] The study found that threat assessment, response assessment, control tendencies, subjective norms, and security habits have a significant positive impact on user information security behavior, response costs have a negative impact on user behavior willingness, and perceived ease of use has a negative impact on user behavior. The influence of behavior intention is not significant.
- Esmaeili M. Assessment of Users'Information Security Behavior in Smartphone Networks[J].Dissertations & Theses-Gradworks, 2014.Google Scholar
- Jordan Shropshire,Merrill Warkentin , Shwadhin Sharma’ Personality, attitudes, and intentions: Predicting initial adoption of information security behavior[J]. computers & security, 2015,49:177-191Google Scholar
- Rogers, R. W.. A protection motivation theory of fear appeals and attitude change[J].The Journal of Psychology,1975,91(5):93-114.Google Scholar
- Rogers, R. W. Cognitive and physiological processes in fear-based attitude change: A revised theory of protection motivation. In J. Cacioppo and R. Petty (Eds.) [J]. Social psychophysiology,1983:153-176.Google Scholar
- Floyd, D. L, Prentice-Dunn, S.,and Rogers, R.W. A meta-analysis of research on protection motivation theory[J].Journal of Applied Social Psychology, 2000,30(2):407–429.Google ScholarCross Ref
- Workman, M., Bommer, W., and Straub, D. Security lapses and the omission of information security measures: An empirical test of the threat control model[J].Journal of Computers in Human Behavior, 2008,24(6):2799-2816.Google ScholarDigital Library
- Liang, H., and Xue, Y. Understanding security behaviors in personal computer usage: A threat avoidance perspective[J].Journal of the Association for Information Systems, 2010,11(7):394-413.Google ScholarCross Ref
- Lee, Y.,and Larsen, K.Threat or coping appraisal:determinants of SMB executives' decision to adopt antimalware software[J].European Journal of Information Systems, 2009,18(2):177-187.Google ScholarCross Ref
- Bandura A.Human Agency in Social Cognitive Theory[J].American Psychologist, 1989,44(9):1175-1184.Google Scholar
- Fishbein, M., & Ajzen, I. On construct validity: a critique of Miniard and Cohen's paper[J].Journal of Experimental Social Psychology, 1981,17(3):340-350.Google ScholarCross Ref
- An, S. and Zhou, S. "A Conceptual comparison of the theoretical approaches in health campaigns: Focusing on SET, TRA, TPB, HBM, and EPPM," Paper presented at the annual meeting of the International Communication Association[J].TBA, Montreal, Quebec, Canada,2008,35(15):186-198.Google Scholar
- Schepers, J., and Wetzels, M. A meta-analysis of the technology acceptance model: Investigating subjective norm and moderation effects[J].Information & Management, 2007,44(1):90–103.Google ScholarDigital Library
- Anderson, C.L. and Agarwal, R.Practicing safe computing: A multi-method empirical examination of home computer user security intentions[J].MIS Quarterly,2010, 34(3):613–643.Google Scholar
- Brewer, N. T., Chapman, G. B., Gibbons, F. X., Gerrard, M., McCaul, K. D. and Weinstein, N. D. Meta-analysis of the relationship between risk perception and health behavior[J].Health Psychology,2007,26(2):136-145.Google Scholar
- Albarracín, D., Gillette, J.C., Earl, A.N., Glasman, L.R., Durantini, M.R., and Ho, M.H. A test of major assumptions about behavior change[J]. Psychological Bulletin, 2005,131(6):856-897.Google ScholarCross Ref
- ohnston A C, Warkentin M. Fear Appeals and Information Security Behaviors: An Empirical Study[J]. MISQ, 2010,34(3):549-566.Google ScholarCross Ref
- Davis F. Perceived usefulness, perceived ease of use, and user acceptance of information technology[J]. MISQ,1989,13(3):319-39.Google Scholar
- Lee Y, Kozar K. Prediction and intervention in health-related behaviour: A meta-analytic review of protection motivation theory[J].Journal of Applied Social Psychology, 2008,30:106–143.Google Scholar
- Kim, H. J. Increasing the persuasiveness of gain vs. loss framing: the effects of gender and fear arousal on processing gain- vs[J].MISQ,2010,45(2):109-19.Google Scholar
- Anderson, C.L. and Agarwal, R.Practicing safe computing: A multi-method empirical examination of home computer user security intentions[J].MIS Quarterly, 2010,34(3):613–643.Google ScholarDigital Library
- Ibrahimov, V.R., Mehdiyeva, G.Y.U., Yue, X.-G., Kaabar, M.K.A., Noeiaghdam, S., Juraev, D.A. Novel symmetric numerical methods for solving symmetric mathematical problems (2021) International Journal of Circuits, Systems and Signal Processing, 15, pp. 1545-1557. DOI: 10.46300/9106.2021.15.167.Google Scholar
- Liu, Z., Song, J., Wu, H., Gu, X., Zhao, Y., Yue, X., Shi, L. Impact of financial technology on regional green finance (2021) Computer Systems Science and Engineering, 39 (3), pp. 391-401. DOI: 10.32604/CSSE.2021.014527.Google Scholar
- Hu, J., Yue, X.-G., Teresiene, D., Ullah, I. How COVID19 pandemic affect film and drama industry in China: an evidence of nonlinear empirical analysis (2021) Economic Research-Ekonomska Istrazivanja. DOI: 10.1080/1331677X.2021.1937262.Google Scholar
Recommendations
Protection Motivation Theory in Information Systems Security Research: A Review of the Past and a Road Map for the Future
Protection motivation theory (PMT) is one of the most commonly used theories to examine information security behaviors. Our systematic review of the application of PMT in information systems (IS) security and the comparison with its application for ...
A Meta-Analysis of Studies on Protection Motivation Theory and Information Security Behaviour
Individuals' willingness to take security precautions is imperative to their own information security and the information security of the organizations they work within. This paper presents a meta-analysis of the protection motivation theory PMT to ...
Internet of Things security
The Internet of things (IoT) has recently become an important research topic because it integrates various sensors and objects to communicate directly with one another without human intervention. The requirements for the large-scale deployment of the ...
Comments