Reference Hub10
Perceptions of End-Users on the Requirements in Personal Firewall Software: An Exploratory Study

Perceptions of End-Users on the Requirements in Personal Firewall Software: An Exploratory Study

Sunil Hazari
Copyright: © 2005 |Volume: 17 |Issue: 3 |Pages: 19
ISSN: 1546-2234|EISSN: 1546-5012|ISSN: 1546-2234|EISBN13: 9781615200917|EISSN: 1546-5012|DOI: 10.4018/joeuc.2005070103
Cite Article Cite Article

MLA

Hazari, Sunil. "Perceptions of End-Users on the Requirements in Personal Firewall Software: An Exploratory Study." JOEUC vol.17, no.3 2005: pp.47-65. http://doi.org/10.4018/joeuc.2005070103

APA

Hazari, S. (2005). Perceptions of End-Users on the Requirements in Personal Firewall Software: An Exploratory Study. Journal of Organizational and End User Computing (JOEUC), 17(3), 47-65. http://doi.org/10.4018/joeuc.2005070103

Chicago

Hazari, Sunil. "Perceptions of End-Users on the Requirements in Personal Firewall Software: An Exploratory Study," Journal of Organizational and End User Computing (JOEUC) 17, no.3: 47-65. http://doi.org/10.4018/joeuc.2005070103

Export Reference

Mendeley
Favorite Full-Issue Download

Abstract

Information security is usually considered a technical discipline with much attention being focused on topics such as encryption, hacking, break-ins, and credit card theft. Security products such as anti-virus programs and personal firewall software, are now available for end-users to install on their computers to protect against threats endemic to networked computers. The behavioral aspects related to maintaining enterprise security have received little attention from researchers and practitioners. Using Q-sort analysis, this study used students as end-users in a graduate business management security course to investigate issues affecting selection of personal firewall software in organizations. Based on the Q-sort analysis of end-users in relation to seven variables identified from review of the information security literature, three distinct group characteristics emerged. Similarities and differences between groups are investigated and implications of these results to IT managers, vendors of security software and researchers in information security area are discussed.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.