SlideShare a Scribd company logo
Contextual Difference and Intention to
Perform Information Security Behaviours
Against Malware in a BYOD Environment: a
Protection Motivation Theory Approach
Duy P.T. Dang, Siddhi Pittayachawan
and Mathews Z. Nkhoma
Background:
1. Information security behavioural research is shifting its
focus on transitioning intention and behaviours
•Increase uses of personal mobile devices
•Increase adoption of BYOD policy
—> created more opportunities to use the Internet at
anytime and any places for non-work activities

2
Background:
Non-work activities are those that bring enjoyable experiences to
the users (Li and Siponen 2011)
•Young-adult Australian browses websites (90%), uses social
network sites (71%), downloads audio and video content (33%)
(ACMA 2013)
•General Australian Internet users check emails frequently (95%),
browse websites (88%) and download files (63%)
Background:
2. There are more malware threats on mobile devices
targeting non-work activities
• 23% of 30 billions spam contained malware links,
increase of social engineering attacks etc.
• 58% increase of mobile malware compared to 2011
(Symantec 2013)

4
The problem:
With the increase uses of mobile devices and adoption
of BYOD policy, currently we have no clue about
whether the users may behave differently in different
contexts and jeopardise online safety
—> this research will explore this problem

5
Research question:
•To what extent the impacts of the cognitive process
on intention to perform malware avoidance
behaviours have changed across the contexts?

6
Conceptual
model
Illustrated based on Protection
Motivation Theory (Rogers 1975)

7
Methodology:
• Method: Multiple-group SEM
• Sample description: HE students using Internet in
BYOD environment for non-work activities
• Sample size: 252

8
Goodness of Fit:
χ2(34) = 21.032; p = 0.960; RMSEA = 0.000; SRMR = 0.0302;
CFI = 1.000 —> specified model fitted the data
*Fit criteria
p-value > 0.01; RMSEA < 0.06; SRMR < 0.07; CFI > 0.96

9
Reliability:
Criteria for good reliability: ≥ 0.70

10
Findings

11
Small differences:
Vulnerability on Intention: only existed in university context.
Self-Efficacy on Intention: stronger in university context.
Vulnerability on Response Cost: stronger in university context.
(1) security loopholes at home
(2) factors were perceived differently? Multiple facets or
dimensions?

12
Inconsistent findings:
Rewards positively influences Intention: inconsistent
with previous studies and even the original theory.
 unique characteristics of HE students sample?
Implications for practice:
• Established one of the first milestones that focuses on
maintaining information security behaviours across
contexts (rather than reinforcing in one context).
• Raised awareness about the potential changes in how the
users intend to perform information security behaviours.
• Provided recommendations about designing and
implementing security training and measures (from results
of the extended conceptual model).

14
Implications for
research:
• Anticipated larger
changes in intention to
perform information
security behaviours
between contexts that
involve work-related
activities.

15
Implications for research:

•Suggested the potential different meanings of selfefficacy and vulnerability.
Limitations:
• Sample of HE students cannot represent the
population Internet users (to represent the
change of intention to perform across contexts)
• Only tested 2/4 areas suggested by Li and
Siponen (2011).

17
References:
• ACMA. (2013), Communications report 2011–12 series, Report 3–Smartphones
and tablets, Take-up and use in, Canberra.
• Li, Y. and Siponen, M. (2011), “A CALL FOR RESEARCH ON HOME USERS’
INFORMATION SECURITY BEHAVIOUR,” 15th Pacific Asia Conference on
Information Systems (PACIS).
• Rogers, R.W. (1975), “A protection motivation theory of fear appeals and
attitude change,” Journal of Psychology, no. 91, pp. 93–114.
• Symantec. (2013), INTERNET SECURITY THREAT REPORT 2013, Moutain View,
USA, Vol. 18. Retrieved from
http://www.symantec.com/security_response/publications/threatreport.jsp

18
Q&A
Further questions & comments please contact:
duy.dangphamthien@rmit.edu.vn

19

More Related Content

What's hot

AI & Education: A critical design exploration using self-monitoring in learning
AI & Education: A critical design exploration using self-monitoring in learningAI & Education: A critical design exploration using self-monitoring in learning
AI & Education: A critical design exploration using self-monitoring in learning
Eva Durall
 
Using Cognitive Dimensions Questionnaire to Evaluate the Usability of Securit...
Using Cognitive Dimensions Questionnaire to Evaluate the Usability of Securit...Using Cognitive Dimensions Questionnaire to Evaluate the Usability of Securit...
Using Cognitive Dimensions Questionnaire to Evaluate the Usability of Securit...
Chamila Wijayarathna
 
Keion_Lymon_Resume
Keion_Lymon_ResumeKeion_Lymon_Resume
Keion_Lymon_ResumeKeion Lymon
 
Perri Nejib_bio_March_6
Perri Nejib_bio_March_6Perri Nejib_bio_March_6
Perri Nejib_bio_March_6Perri Nejib
 
User-driven Technology Evaluation of eParticipation Systems
User-driven Technology Evaluation of eParticipation SystemsUser-driven Technology Evaluation of eParticipation Systems
User-driven Technology Evaluation of eParticipation Systems
Sotiris Koussouris
 
Threat landscape 4.0
Threat landscape 4.0Threat landscape 4.0
Threat landscape 4.0
Dr. C.V. Suresh Babu
 
Wireless technology
Wireless technologyWireless technology
Wireless technologyon997997
 
How Does Cybersecurity Relate to Safety?
How Does Cybersecurity Relate to Safety?How Does Cybersecurity Relate to Safety?
How Does Cybersecurity Relate to Safety?
Michigan State University Research
 
The case for ubuntu linux operating system performance and usabil
The case for ubuntu linux operating system performance and usabilThe case for ubuntu linux operating system performance and usabil
The case for ubuntu linux operating system performance and usabil
Maurice Dawson
 
Ux event ut lab slideshare - v2
Ux event   ut lab slideshare - v2Ux event   ut lab slideshare - v2
Ux event ut lab slideshare - v2gilesmoore
 
DRP for website
DRP for websiteDRP for website
DRP for websiteKaty Karas
 
Object Recognition-based Mnemonics Mobile App for Senior Adults Communication
Object Recognition-based Mnemonics Mobile App for Senior Adults CommunicationObject Recognition-based Mnemonics Mobile App for Senior Adults Communication
Object Recognition-based Mnemonics Mobile App for Senior Adults Communication
Aravind Sesagiri Raamkumar
 
EMR Implementation Considerations Slides
EMR Implementation Considerations SlidesEMR Implementation Considerations Slides
EMR Implementation Considerations Slides
PiLNAfrica
 
BASICS OF MOBILE COMPUTING
BASICS OF MOBILE COMPUTINGBASICS OF MOBILE COMPUTING
BASICS OF MOBILE COMPUTING
VENNILAV6
 
The use of mobile devices in high stakes remotely delivered assessments and t...
The use of mobile devices in high stakes remotely delivered assessments and t...The use of mobile devices in high stakes remotely delivered assessments and t...
The use of mobile devices in high stakes remotely delivered assessments and t...
Brian Marwensdy
 
Digital Competences: Trends & Issues in Estonia
Digital Competences: Trends & Issues in EstoniaDigital Competences: Trends & Issues in Estonia
Digital Competences: Trends & Issues in EstoniaMart Laanpere
 
Carlos Teixeira and Laura Forlano: Digital Manufacturing and the Future of In...
Carlos Teixeira and Laura Forlano: Digital Manufacturing and the Future of In...Carlos Teixeira and Laura Forlano: Digital Manufacturing and the Future of In...
Carlos Teixeira and Laura Forlano: Digital Manufacturing and the Future of In...
RSD Relating Systems Thinking and Design
 
Us ignite-update-connectedcollab
Us ignite-update-connectedcollabUs ignite-update-connectedcollab
Us ignite-update-connectedcollab
US-Ignite
 

What's hot (20)

APF2015-slides-general
APF2015-slides-generalAPF2015-slides-general
APF2015-slides-general
 
Tech issues
Tech issuesTech issues
Tech issues
 
AI & Education: A critical design exploration using self-monitoring in learning
AI & Education: A critical design exploration using self-monitoring in learningAI & Education: A critical design exploration using self-monitoring in learning
AI & Education: A critical design exploration using self-monitoring in learning
 
Using Cognitive Dimensions Questionnaire to Evaluate the Usability of Securit...
Using Cognitive Dimensions Questionnaire to Evaluate the Usability of Securit...Using Cognitive Dimensions Questionnaire to Evaluate the Usability of Securit...
Using Cognitive Dimensions Questionnaire to Evaluate the Usability of Securit...
 
Keion_Lymon_Resume
Keion_Lymon_ResumeKeion_Lymon_Resume
Keion_Lymon_Resume
 
Perri Nejib_bio_March_6
Perri Nejib_bio_March_6Perri Nejib_bio_March_6
Perri Nejib_bio_March_6
 
User-driven Technology Evaluation of eParticipation Systems
User-driven Technology Evaluation of eParticipation SystemsUser-driven Technology Evaluation of eParticipation Systems
User-driven Technology Evaluation of eParticipation Systems
 
Threat landscape 4.0
Threat landscape 4.0Threat landscape 4.0
Threat landscape 4.0
 
Wireless technology
Wireless technologyWireless technology
Wireless technology
 
How Does Cybersecurity Relate to Safety?
How Does Cybersecurity Relate to Safety?How Does Cybersecurity Relate to Safety?
How Does Cybersecurity Relate to Safety?
 
The case for ubuntu linux operating system performance and usabil
The case for ubuntu linux operating system performance and usabilThe case for ubuntu linux operating system performance and usabil
The case for ubuntu linux operating system performance and usabil
 
Ux event ut lab slideshare - v2
Ux event   ut lab slideshare - v2Ux event   ut lab slideshare - v2
Ux event ut lab slideshare - v2
 
DRP for website
DRP for websiteDRP for website
DRP for website
 
Object Recognition-based Mnemonics Mobile App for Senior Adults Communication
Object Recognition-based Mnemonics Mobile App for Senior Adults CommunicationObject Recognition-based Mnemonics Mobile App for Senior Adults Communication
Object Recognition-based Mnemonics Mobile App for Senior Adults Communication
 
EMR Implementation Considerations Slides
EMR Implementation Considerations SlidesEMR Implementation Considerations Slides
EMR Implementation Considerations Slides
 
BASICS OF MOBILE COMPUTING
BASICS OF MOBILE COMPUTINGBASICS OF MOBILE COMPUTING
BASICS OF MOBILE COMPUTING
 
The use of mobile devices in high stakes remotely delivered assessments and t...
The use of mobile devices in high stakes remotely delivered assessments and t...The use of mobile devices in high stakes remotely delivered assessments and t...
The use of mobile devices in high stakes remotely delivered assessments and t...
 
Digital Competences: Trends & Issues in Estonia
Digital Competences: Trends & Issues in EstoniaDigital Competences: Trends & Issues in Estonia
Digital Competences: Trends & Issues in Estonia
 
Carlos Teixeira and Laura Forlano: Digital Manufacturing and the Future of In...
Carlos Teixeira and Laura Forlano: Digital Manufacturing and the Future of In...Carlos Teixeira and Laura Forlano: Digital Manufacturing and the Future of In...
Carlos Teixeira and Laura Forlano: Digital Manufacturing and the Future of In...
 
Us ignite-update-connectedcollab
Us ignite-update-connectedcollabUs ignite-update-connectedcollab
Us ignite-update-connectedcollab
 

Viewers also liked

07 communication
07 communication07 communication
07 communicationIrfan Khan
 
Key Trends and Opportunities in Business Mobility and Enterprise Communications
Key Trends and Opportunities in Business Mobility and Enterprise CommunicationsKey Trends and Opportunities in Business Mobility and Enterprise Communications
Key Trends and Opportunities in Business Mobility and Enterprise CommunicationsRaúl Castañón Martínez
 
Communication models
Communication modelsCommunication models
Communication modelsfeueacmrq
 
Mobile VAS Forum: Finding Opportunities In A Year Of Economic Uncertainty
Mobile VAS Forum: Finding Opportunities In A Year Of Economic UncertaintyMobile VAS Forum: Finding Opportunities In A Year Of Economic Uncertainty
Mobile VAS Forum: Finding Opportunities In A Year Of Economic Uncertainty
Raúl Castañón Martínez
 
Adaptive Access Contextual Security for Application Delivery Networks
Adaptive Access Contextual Security for Application Delivery NetworksAdaptive Access Contextual Security for Application Delivery Networks
Adaptive Access Contextual Security for Application Delivery Networks
digitallibrary
 
Bots are hot: what the bots revolution means for IT
Bots are hot: what the bots revolution means for ITBots are hot: what the bots revolution means for IT
Bots are hot: what the bots revolution means for IT
Raúl Castañón Martínez
 
Introducing the Communication Process
Introducing the Communication ProcessIntroducing the Communication Process
Introducing the Communication Process
RamseyProComm
 
Project report on online trading and demat
Project report on online trading and dematProject report on online trading and demat
Project report on online trading and dematsankar922
 
Lease Station Introduction
Lease Station IntroductionLease Station Introduction
Lease Station Introductionscottowens
 
Lease Station Introduction
Lease Station IntroductionLease Station Introduction
Lease Station Introductionscottowens
 
Important articles about internet business
Important articles about internet businessImportant articles about internet business
Important articles about internet business
Mohammad Rashid
 
Dang and Nkhoma (2013), "Information Availability as Driver of Information Se...
Dang and Nkhoma (2013), "Information Availability as Driver of Information Se...Dang and Nkhoma (2013), "Information Availability as Driver of Information Se...
Dang and Nkhoma (2013), "Information Availability as Driver of Information Se...
tduy0506
 
Portfolio
PortfolioPortfolio
Portfolio
caseyleigh09
 
Professional Overview
Professional OverviewProfessional Overview
Professional Overview
alunin_msk
 
Transactional model of communacation.
Transactional model of communacation.Transactional model of communacation.
Transactional model of communacation.
Renelyn Mechaca Espino
 
Project report on online trading and demat
Project report on online trading and dematProject report on online trading and demat
Project report on online trading and dematsankar922
 
Dang, D. (2014), “Predicting Insider’s Malicious Security Behaviours: A Gener...
Dang, D. (2014), “Predicting Insider’s Malicious Security Behaviours: A Gener...Dang, D. (2014), “Predicting Insider’s Malicious Security Behaviours: A Gener...
Dang, D. (2014), “Predicting Insider’s Malicious Security Behaviours: A Gener...
tduy0506
 
Η ασπίδα του Αχιλλέα
Η ασπίδα του ΑχιλλέαΗ ασπίδα του Αχιλλέα
Η ασπίδα του Αχιλλέα
FRANTIOPI
 

Viewers also liked (20)

07 communication
07 communication07 communication
07 communication
 
Key Trends and Opportunities in Business Mobility and Enterprise Communications
Key Trends and Opportunities in Business Mobility and Enterprise CommunicationsKey Trends and Opportunities in Business Mobility and Enterprise Communications
Key Trends and Opportunities in Business Mobility and Enterprise Communications
 
Communication models
Communication modelsCommunication models
Communication models
 
Mobile VAS Forum: Finding Opportunities In A Year Of Economic Uncertainty
Mobile VAS Forum: Finding Opportunities In A Year Of Economic UncertaintyMobile VAS Forum: Finding Opportunities In A Year Of Economic Uncertainty
Mobile VAS Forum: Finding Opportunities In A Year Of Economic Uncertainty
 
Adaptive Access Contextual Security for Application Delivery Networks
Adaptive Access Contextual Security for Application Delivery NetworksAdaptive Access Contextual Security for Application Delivery Networks
Adaptive Access Contextual Security for Application Delivery Networks
 
Bots are hot: what the bots revolution means for IT
Bots are hot: what the bots revolution means for ITBots are hot: what the bots revolution means for IT
Bots are hot: what the bots revolution means for IT
 
Introducing the Communication Process
Introducing the Communication ProcessIntroducing the Communication Process
Introducing the Communication Process
 
Project report on online trading and demat
Project report on online trading and dematProject report on online trading and demat
Project report on online trading and demat
 
Lease Station Introduction
Lease Station IntroductionLease Station Introduction
Lease Station Introduction
 
Lease Station Introduction
Lease Station IntroductionLease Station Introduction
Lease Station Introduction
 
Important articles about internet business
Important articles about internet businessImportant articles about internet business
Important articles about internet business
 
Dang and Nkhoma (2013), "Information Availability as Driver of Information Se...
Dang and Nkhoma (2013), "Information Availability as Driver of Information Se...Dang and Nkhoma (2013), "Information Availability as Driver of Information Se...
Dang and Nkhoma (2013), "Information Availability as Driver of Information Se...
 
Portfolio
PortfolioPortfolio
Portfolio
 
Professional Overview
Professional OverviewProfessional Overview
Professional Overview
 
Transactional model of communacation.
Transactional model of communacation.Transactional model of communacation.
Transactional model of communacation.
 
Project report on online trading and demat
Project report on online trading and dematProject report on online trading and demat
Project report on online trading and demat
 
Dang, D. (2014), “Predicting Insider’s Malicious Security Behaviours: A Gener...
Dang, D. (2014), “Predicting Insider’s Malicious Security Behaviours: A Gener...Dang, D. (2014), “Predicting Insider’s Malicious Security Behaviours: A Gener...
Dang, D. (2014), “Predicting Insider’s Malicious Security Behaviours: A Gener...
 
Datafolha 25/07
Datafolha 25/07Datafolha 25/07
Datafolha 25/07
 
Η ασπίδα του Αχιλλέα
Η ασπίδα του ΑχιλλέαΗ ασπίδα του Αχιλλέα
Η ασπίδα του Αχιλλέα
 
Presentazione apr 2014
Presentazione apr 2014Presentazione apr 2014
Presentazione apr 2014
 

Similar to Dang et al. (2013), "Contextual difference and intention to perform information security behaviours: a Protection Motivation Theory approach", ACIS 2013

Implementing Best Practices.pptx
Implementing Best Practices.pptxImplementing Best Practices.pptx
Implementing Best Practices.pptx
damilolasunmola
 
Implementing cybersecurity best practices and new technology ppt (1).pptx
Implementing cybersecurity best practices and new technology ppt (1).pptxImplementing cybersecurity best practices and new technology ppt (1).pptx
Implementing cybersecurity best practices and new technology ppt (1).pptx
damilolasunmola
 
PSQH July-Aug 2015 Simplified ST Model - Woods-Pestotnik
PSQH July-Aug 2015 Simplified ST Model - Woods-PestotnikPSQH July-Aug 2015 Simplified ST Model - Woods-Pestotnik
PSQH July-Aug 2015 Simplified ST Model - Woods-PestotnikMichael Woods, MD, MMM
 
DOES DIGITAL NATIVE STATUS IMPACT END-USER ANTIVIRUS USAGE?
DOES DIGITAL NATIVE STATUS IMPACT END-USER ANTIVIRUS USAGE?DOES DIGITAL NATIVE STATUS IMPACT END-USER ANTIVIRUS USAGE?
DOES DIGITAL NATIVE STATUS IMPACT END-USER ANTIVIRUS USAGE?
IJCNCJournal
 
Running head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docx
Running head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docxRunning head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docx
Running head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docx
jeanettehully
 
Running head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docx
Running head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docxRunning head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docx
Running head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docx
glendar3
 
Running head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docx
Running head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docxRunning head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docx
Running head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docx
todd581
 
Recapitulating the development initiatives of a robust information security s...
Recapitulating the development initiatives of a robust information security s...Recapitulating the development initiatives of a robust information security s...
Recapitulating the development initiatives of a robust information security s...
IOSR Journals
 
google-experts-VS-regular-users
google-experts-VS-regular-usersgoogle-experts-VS-regular-users
google-experts-VS-regular-usersThomas Hughes
 
Components of a Model of Cybersecurity Behavior Adoption
Components of a Model of Cybersecurity Behavior AdoptionComponents of a Model of Cybersecurity Behavior Adoption
Components of a Model of Cybersecurity Behavior Adoption
University of North Carolina at Charlotte
 
Appling tracking game system to measure user behavior toward cybersecurity p...
Appling tracking game system to measure user behavior toward  cybersecurity p...Appling tracking game system to measure user behavior toward  cybersecurity p...
Appling tracking game system to measure user behavior toward cybersecurity p...
IJECEIAES
 
When Worlds Collide: Tracking the Trends at the Intersection of Social, Mobil...
When Worlds Collide: Tracking the Trends at the Intersection of Social, Mobil...When Worlds Collide: Tracking the Trends at the Intersection of Social, Mobil...
When Worlds Collide: Tracking the Trends at the Intersection of Social, Mobil...
mkeane
 
The DETER Project: Towards Structural Advances in Experimental Cybersecurity ...
The DETER Project: Towards Structural Advances in Experimental Cybersecurity ...The DETER Project: Towards Structural Advances in Experimental Cybersecurity ...
The DETER Project: Towards Structural Advances in Experimental Cybersecurity ...
DETER-Project
 
IRJET- Deterrence Theory for Evaluating Information Security Factors in E-Hea...
IRJET- Deterrence Theory for Evaluating Information Security Factors in E-Hea...IRJET- Deterrence Theory for Evaluating Information Security Factors in E-Hea...
IRJET- Deterrence Theory for Evaluating Information Security Factors in E-Hea...
IRJET Journal
 
201120 Yunha Han
201120 Yunha Han201120 Yunha Han
201120 Yunha Han
ivaderivader
 
2014 the future evolution of cybersecurity
2014 the future evolution of cybersecurity2014 the future evolution of cybersecurity
2014 the future evolution of cybersecurity
Matthew Rosenquist
 
How We Will Fail in Privacy and Ethics for the Emerging Internet of Things
How We Will Fail in Privacy and Ethics for the Emerging Internet of ThingsHow We Will Fail in Privacy and Ethics for the Emerging Internet of Things
How We Will Fail in Privacy and Ethics for the Emerging Internet of Things
Jason Hong
 
144 presentation iee_tel2021
144 presentation iee_tel2021144 presentation iee_tel2021
144 presentation iee_tel2021
Malinka Ivanova
 
State of endpoint risk v3
State of endpoint risk v3State of endpoint risk v3
State of endpoint risk v3Lumension
 
State of endpoint risk v3
State of endpoint risk v3State of endpoint risk v3
State of endpoint risk v3Lumension
 

Similar to Dang et al. (2013), "Contextual difference and intention to perform information security behaviours: a Protection Motivation Theory approach", ACIS 2013 (20)

Implementing Best Practices.pptx
Implementing Best Practices.pptxImplementing Best Practices.pptx
Implementing Best Practices.pptx
 
Implementing cybersecurity best practices and new technology ppt (1).pptx
Implementing cybersecurity best practices and new technology ppt (1).pptxImplementing cybersecurity best practices and new technology ppt (1).pptx
Implementing cybersecurity best practices and new technology ppt (1).pptx
 
PSQH July-Aug 2015 Simplified ST Model - Woods-Pestotnik
PSQH July-Aug 2015 Simplified ST Model - Woods-PestotnikPSQH July-Aug 2015 Simplified ST Model - Woods-Pestotnik
PSQH July-Aug 2015 Simplified ST Model - Woods-Pestotnik
 
DOES DIGITAL NATIVE STATUS IMPACT END-USER ANTIVIRUS USAGE?
DOES DIGITAL NATIVE STATUS IMPACT END-USER ANTIVIRUS USAGE?DOES DIGITAL NATIVE STATUS IMPACT END-USER ANTIVIRUS USAGE?
DOES DIGITAL NATIVE STATUS IMPACT END-USER ANTIVIRUS USAGE?
 
Running head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docx
Running head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docxRunning head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docx
Running head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docx
 
Running head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docx
Running head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docxRunning head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docx
Running head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docx
 
Running head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docx
Running head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docxRunning head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docx
Running head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docx
 
Recapitulating the development initiatives of a robust information security s...
Recapitulating the development initiatives of a robust information security s...Recapitulating the development initiatives of a robust information security s...
Recapitulating the development initiatives of a robust information security s...
 
google-experts-VS-regular-users
google-experts-VS-regular-usersgoogle-experts-VS-regular-users
google-experts-VS-regular-users
 
Components of a Model of Cybersecurity Behavior Adoption
Components of a Model of Cybersecurity Behavior AdoptionComponents of a Model of Cybersecurity Behavior Adoption
Components of a Model of Cybersecurity Behavior Adoption
 
Appling tracking game system to measure user behavior toward cybersecurity p...
Appling tracking game system to measure user behavior toward  cybersecurity p...Appling tracking game system to measure user behavior toward  cybersecurity p...
Appling tracking game system to measure user behavior toward cybersecurity p...
 
When Worlds Collide: Tracking the Trends at the Intersection of Social, Mobil...
When Worlds Collide: Tracking the Trends at the Intersection of Social, Mobil...When Worlds Collide: Tracking the Trends at the Intersection of Social, Mobil...
When Worlds Collide: Tracking the Trends at the Intersection of Social, Mobil...
 
The DETER Project: Towards Structural Advances in Experimental Cybersecurity ...
The DETER Project: Towards Structural Advances in Experimental Cybersecurity ...The DETER Project: Towards Structural Advances in Experimental Cybersecurity ...
The DETER Project: Towards Structural Advances in Experimental Cybersecurity ...
 
IRJET- Deterrence Theory for Evaluating Information Security Factors in E-Hea...
IRJET- Deterrence Theory for Evaluating Information Security Factors in E-Hea...IRJET- Deterrence Theory for Evaluating Information Security Factors in E-Hea...
IRJET- Deterrence Theory for Evaluating Information Security Factors in E-Hea...
 
201120 Yunha Han
201120 Yunha Han201120 Yunha Han
201120 Yunha Han
 
2014 the future evolution of cybersecurity
2014 the future evolution of cybersecurity2014 the future evolution of cybersecurity
2014 the future evolution of cybersecurity
 
How We Will Fail in Privacy and Ethics for the Emerging Internet of Things
How We Will Fail in Privacy and Ethics for the Emerging Internet of ThingsHow We Will Fail in Privacy and Ethics for the Emerging Internet of Things
How We Will Fail in Privacy and Ethics for the Emerging Internet of Things
 
144 presentation iee_tel2021
144 presentation iee_tel2021144 presentation iee_tel2021
144 presentation iee_tel2021
 
State of endpoint risk v3
State of endpoint risk v3State of endpoint risk v3
State of endpoint risk v3
 
State of endpoint risk v3
State of endpoint risk v3State of endpoint risk v3
State of endpoint risk v3
 

Recently uploaded

Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
Rohit Gautam
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
danishmna97
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
DianaGray10
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
Neo4j
 
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofszkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
Alex Pruden
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
Neo4j
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Aggregage
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
DianaGray10
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
KAMESHS29
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
sonjaschweigert1
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
DianaGray10
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Malak Abu Hammad
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
Neo4j
 

Recently uploaded (20)

Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
 
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofszkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
 

Dang et al. (2013), "Contextual difference and intention to perform information security behaviours: a Protection Motivation Theory approach", ACIS 2013

  • 1. Contextual Difference and Intention to Perform Information Security Behaviours Against Malware in a BYOD Environment: a Protection Motivation Theory Approach Duy P.T. Dang, Siddhi Pittayachawan and Mathews Z. Nkhoma
  • 2. Background: 1. Information security behavioural research is shifting its focus on transitioning intention and behaviours •Increase uses of personal mobile devices •Increase adoption of BYOD policy —> created more opportunities to use the Internet at anytime and any places for non-work activities 2
  • 3. Background: Non-work activities are those that bring enjoyable experiences to the users (Li and Siponen 2011) •Young-adult Australian browses websites (90%), uses social network sites (71%), downloads audio and video content (33%) (ACMA 2013) •General Australian Internet users check emails frequently (95%), browse websites (88%) and download files (63%)
  • 4. Background: 2. There are more malware threats on mobile devices targeting non-work activities • 23% of 30 billions spam contained malware links, increase of social engineering attacks etc. • 58% increase of mobile malware compared to 2011 (Symantec 2013) 4
  • 5. The problem: With the increase uses of mobile devices and adoption of BYOD policy, currently we have no clue about whether the users may behave differently in different contexts and jeopardise online safety —> this research will explore this problem 5
  • 6. Research question: •To what extent the impacts of the cognitive process on intention to perform malware avoidance behaviours have changed across the contexts? 6
  • 7. Conceptual model Illustrated based on Protection Motivation Theory (Rogers 1975) 7
  • 8. Methodology: • Method: Multiple-group SEM • Sample description: HE students using Internet in BYOD environment for non-work activities • Sample size: 252 8
  • 9. Goodness of Fit: χ2(34) = 21.032; p = 0.960; RMSEA = 0.000; SRMR = 0.0302; CFI = 1.000 —> specified model fitted the data *Fit criteria p-value > 0.01; RMSEA < 0.06; SRMR < 0.07; CFI > 0.96 9
  • 10. Reliability: Criteria for good reliability: ≥ 0.70 10
  • 12. Small differences: Vulnerability on Intention: only existed in university context. Self-Efficacy on Intention: stronger in university context. Vulnerability on Response Cost: stronger in university context. (1) security loopholes at home (2) factors were perceived differently? Multiple facets or dimensions? 12
  • 13. Inconsistent findings: Rewards positively influences Intention: inconsistent with previous studies and even the original theory.  unique characteristics of HE students sample?
  • 14. Implications for practice: • Established one of the first milestones that focuses on maintaining information security behaviours across contexts (rather than reinforcing in one context). • Raised awareness about the potential changes in how the users intend to perform information security behaviours. • Provided recommendations about designing and implementing security training and measures (from results of the extended conceptual model). 14
  • 15. Implications for research: • Anticipated larger changes in intention to perform information security behaviours between contexts that involve work-related activities. 15
  • 16. Implications for research: •Suggested the potential different meanings of selfefficacy and vulnerability.
  • 17. Limitations: • Sample of HE students cannot represent the population Internet users (to represent the change of intention to perform across contexts) • Only tested 2/4 areas suggested by Li and Siponen (2011). 17
  • 18. References: • ACMA. (2013), Communications report 2011–12 series, Report 3–Smartphones and tablets, Take-up and use in, Canberra. • Li, Y. and Siponen, M. (2011), “A CALL FOR RESEARCH ON HOME USERS’ INFORMATION SECURITY BEHAVIOUR,” 15th Pacific Asia Conference on Information Systems (PACIS). • Rogers, R.W. (1975), “A protection motivation theory of fear appeals and attitude change,” Journal of Psychology, no. 91, pp. 93–114. • Symantec. (2013), INTERNET SECURITY THREAT REPORT 2013, Moutain View, USA, Vol. 18. Retrieved from http://www.symantec.com/security_response/publications/threatreport.jsp 18
  • 19. Q&A Further questions & comments please contact: duy.dangphamthien@rmit.edu.vn 19

Editor's Notes

  1. Information security behavioural research has been playing vital roles in keeping the online safety for both individuals and organisations. And it is the duty of the practitioners and academics to keep up with the rapid developments of technologies and propose new ways of ensuring the users would behave appropriate when encoutering cyber-threats The background of this research is set in the current situation of the information security landscape. Accordingly, Li and Siponen (2011) pointed out that the intention to perform info sec behaviours is becoming more transitioning. &lt;explain transitioning&gt; The reasons are that there is an increase number of personal mobile devices uses such as laptops, mobile phones and tablets. Second reason is companies and organisations are rapidly adopting BYOD policy. For instance, at RMIT University you can use your own devices to get access to the shared resources and applications.
  2. What is non-work activities Li and Siponen categorised work and non-work activities. Non-work are those that bring enjoyable experiences to the users.
  3. Explain PMT: PMT was originally used in medical research to help patients to keep healthy lifestyle. Recently it has been applied in info sec research such as intention to comply with regulations.
  4. Method: We ran SEM (simultaneously in 2 contexts) to measure the impacts of cognitive process on intention to perform malware avoidance behaviours; then We compared the regression effect sizes.
  5. DON’T CALL THEM BETA WEIGHTS, CALL THEM EFFECT SIZES
  6. users didn’t feel vulnerable at home and felt more supported at uni. Vulnerability failed to reduce Cost at home.