Reference Hub3
User Perceptions of Security Technologies

User Perceptions of Security Technologies

Douglas M. Kline, Ling He, Ulku Yaylacicegi
Copyright: © 2011 |Volume: 5 |Issue: 2 |Pages: 12
ISSN: 1930-1650|EISSN: 1930-1669|EISBN13: 9781613507568|DOI: 10.4018/jisp.2011040101
Cite Article Cite Article

MLA

Kline, Douglas M., et al. "User Perceptions of Security Technologies." IJISP vol.5, no.2 2011: pp.1-12. http://doi.org/10.4018/jisp.2011040101

APA

Kline, D. M., He, L., & Yaylacicegi, U. (2011). User Perceptions of Security Technologies. International Journal of Information Security and Privacy (IJISP), 5(2), 1-12. http://doi.org/10.4018/jisp.2011040101

Chicago

Kline, Douglas M., Ling He, and Ulku Yaylacicegi. "User Perceptions of Security Technologies," International Journal of Information Security and Privacy (IJISP) 5, no.2: 1-12. http://doi.org/10.4018/jisp.2011040101

Export Reference

Mendeley
Favorite Full-Issue Download

Abstract

In this paper, user perceptions of information systems security are explored through a study of university students. Server authentication, which is often ignored by users, clouded by system administrators, and exploited by hackers, is explored in detail, as it significantly affects usability and requires user knowledge and participation. The study also investigates the respondents’ consistency, gender differences, and assessment of their own knowledge. Although users appear knowledgeable about security technologies, they rely more on peer opinion and reputation of web sites when making security decisions.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.