Reference Hub15
Explaining Users' Security Behaviors with the Security Belief Model

Explaining Users' Security Behaviors with the Security Belief Model

Clay K. Williams, Donald Wynn, Ramana Madupalli, Elena Karahanna, Barbara K. Duncan
Copyright: © 2014 |Volume: 26 |Issue: 3 |Pages: 24
ISSN: 1546-2234|EISSN: 1546-5012|EISBN13: 9781466657748|DOI: 10.4018/joeuc.2014070102
Cite Article Cite Article

MLA

Williams, Clay K., et al. "Explaining Users' Security Behaviors with the Security Belief Model." JOEUC vol.26, no.3 2014: pp.23-46. http://doi.org/10.4018/joeuc.2014070102

APA

Williams, C. K., Wynn, D., Madupalli, R., Karahanna, E., & Duncan, B. K. (2014). Explaining Users' Security Behaviors with the Security Belief Model. Journal of Organizational and End User Computing (JOEUC), 26(3), 23-46. http://doi.org/10.4018/joeuc.2014070102

Chicago

Williams, Clay K., et al. "Explaining Users' Security Behaviors with the Security Belief Model," Journal of Organizational and End User Computing (JOEUC) 26, no.3: 23-46. http://doi.org/10.4018/joeuc.2014070102

Export Reference

Mendeley
Favorite Full-Issue Download

Abstract

Information security is often viewed as a technological matter. However, security professionals will readily admit that without safe practices by users, no amount or type of technology will be effective at preventing unauthorized intrusions. By paralleling the practices of information security and health prevention, a rationale for employing constructs from existing models of health behavior is established. A comprehensive and parsimonious model (the Security Belief Model) is developed to explain information security behavior intentions. The model is tested empirically based on a sample of 237 Indian professionals. The results of the empirical study indicate general support for the model, particularly including severity, susceptibility, benefits, and a cue to action as antecedents to the intention to perform preventive information security behaviors. The paper also discusses implications of the model and results for practitioners and possibilities for future research are included.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.