Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Computer Sciences

Nova Southeastern University

Theses/Dissertations

2019

User information security behavior

Articles 1 - 2 of 2

Full-Text Articles in Physical Sciences and Mathematics

Empirical Assessment Of Mobile Device Users’ Information Security Behavior Towards Data Breach: Leveraging Protection Motivation Theory, Anthony Duke Giwah Jan 2019

Empirical Assessment Of Mobile Device Users’ Information Security Behavior Towards Data Breach: Leveraging Protection Motivation Theory, Anthony Duke Giwah

CCE Theses and Dissertations

User information security behavior has been an area of growing demand in information systems (IS) research. Unfortunately, most of the previous research done in user information security behavior have been in broad contexts, therefore creating a gap in the literature of similar research that focuses on specific emerging technologies and trends. With the growing reliance on mobile devices to increase the flexibility, speed and efficiency in how we work, communicate, shop, seek information and entertain ourselves, it is obvious that these devices have become data warehouses and platform for data in transit.

This study was an empirical and quantitative study …


User Information Security Behavior In Professional Virtual Communities: A Technology Threat Avoidance Approach, Vivienne Forrester Jan 2019

User Information Security Behavior In Professional Virtual Communities: A Technology Threat Avoidance Approach, Vivienne Forrester

CCE Theses and Dissertations

The popularization of professional virtual communities (PVCs) as a platform for people to share experiences and knowledge has produced a paradox of convenience versus security. The desire to communicate results in disclosure where users experience ongoing professional and social interaction. Excessive disclosure and unsecured user security behavior in PVCs increase users’ vulnerability to technology threats. Nefarious entities frequently use PVCs such as LinkedIn to launch digital attacks. Hence, users are faced with a gamut of technology threats that may cause harm to professional and personal lives. Few studies, however, have examined users’ information security behavior and their motivation to engage …