Open Access. Powered by Scholars. Published by Universities.®
![Digital Commons Network](http://assets.bepress.com/20200205/img/dcn/DCsunburst.png)
Physical Sciences and Mathematics Commons™
Open Access. Powered by Scholars. Published by Universities.®
Articles 1 - 2 of 2
Full-Text Articles in Physical Sciences and Mathematics
Empirical Assessment Of Mobile Device Users’ Information Security Behavior Towards Data Breach: Leveraging Protection Motivation Theory, Anthony Duke Giwah
Empirical Assessment Of Mobile Device Users’ Information Security Behavior Towards Data Breach: Leveraging Protection Motivation Theory, Anthony Duke Giwah
CCE Theses and Dissertations
User information security behavior has been an area of growing demand in information systems (IS) research. Unfortunately, most of the previous research done in user information security behavior have been in broad contexts, therefore creating a gap in the literature of similar research that focuses on specific emerging technologies and trends. With the growing reliance on mobile devices to increase the flexibility, speed and efficiency in how we work, communicate, shop, seek information and entertain ourselves, it is obvious that these devices have become data warehouses and platform for data in transit.
This study was an empirical and quantitative study …
User Information Security Behavior In Professional Virtual Communities: A Technology Threat Avoidance Approach, Vivienne Forrester
User Information Security Behavior In Professional Virtual Communities: A Technology Threat Avoidance Approach, Vivienne Forrester
CCE Theses and Dissertations
The popularization of professional virtual communities (PVCs) as a platform for people to share experiences and knowledge has produced a paradox of convenience versus security. The desire to communicate results in disclosure where users experience ongoing professional and social interaction. Excessive disclosure and unsecured user security behavior in PVCs increase users’ vulnerability to technology threats. Nefarious entities frequently use PVCs such as LinkedIn to launch digital attacks. Hence, users are faced with a gamut of technology threats that may cause harm to professional and personal lives. Few studies, however, have examined users’ information security behavior and their motivation to engage …