SlideShare a Scribd company logo
Reliable Behavioural Factors in the Information Security
Context
Peter Mayer
SECUSO - Security, Usability, Society
Technische Universität Darmstadt
[email protected]
Alexandra Kunz
SECUSO - Security, Usability, Society
Technische Universität Darmstadt
[email protected]
Melanie Volkamer
SECUSO - Security, Usability, Society
Technische Universität Darmstadt
Privacy and Security Research Group
Karlstad University
[email protected]
ABSTRACT
Users do often not behave securely when using information
technol-
ogy. Many studies have tried to identify the factors of
behavioural
theories which can increase secure behaviour. The goal of this
work
is to identify which of the factors are reliably associated with
secure
behaviour across multiple studies. Those factors are of interest
to in-
formation security professionals since addressing them in
security
awareness and education campaigns can help improving security
related processes of users. To attain our goal, we conducted a
sys-
tematic literature review and assessed the reliability of the
factors
based on the effect sizes reported in the literature. Our results
indi-
cate that 11 out of the 14 factors from well established
behavioural
theories can be associated with reliable effects in the
information
security context. These factors cover very different aspects:
influ-
ence of the users skills, whether the environment makes it
possible
to exhibit secure behaviour, the influence of friends or co-
workers,
and the perceived properties of the secure behaviour (e.g.
response
cost). Also, we identify areas, where more studies are needed to
increase the confidence of the factors’ reliability assessment.
CCS CONCEPTS
• Security and privacy → Social aspects of security and pri-
vacy; Usability in security and privacy;
KEYWORDS
Behavioural Theories, Behavioural Factors, Information
Security
ACM Reference format:
Peter Mayer, Alexandra Kunz, and Melanie Volkamer. 2017.
Reliable Be-
havioural Factors in the Information Security Context. In
Proceedings of
ARES ’17, Reggio Calabria, Italy, August 29-September 01,
2017, 10 pages.
https://doi.org/10.1145/3098954.3098986
1 INTRODUCTION
Users do often not behave securely when using information
tech-
nology (e.g. they do not check links before clicking them or do
not
Permission to make digital or hard copies of all or part of this
work for personal or
classroom use is granted without fee provided that copies are
not made or distributed
for profit or commercial advantage and that copies bear this
notice and the full citation
on the first page. Copyrights for components of this work
owned by others than the
author(s) must be honored. Abstracting with credit is permitted.
To copy otherwise, or
republish, to post on servers or to redistribute to lists, requires
prior specific permission
and/or a fee. Request permissions from [email protected]
ARES ’17, August 29-September 01, 2017, Reggio Calabria,
Italy
© 2017 Copyright held by the owner/author(s). Publication
rights licensed to Associa-
tion for Computing Machinery.
ACM ISBN 978-1-4503-5257-4/17/08.. .$15.00
https://doi.org/10.1145/3098954.3098986
perform backups regularly). This can raise severe security
issues
and has led to users being referred to as the weakest link in the
security chain [40]. In many other contexts such as anti-
smoking
campaigns [38] or pedestrian safety [19] researchers have
studied
for many years which factors influence (in)adequate human be-
haviour. Actually, there is an entire research area on
behavioural
theories. Theories that have been applied in many areas are for
instance Protection Motivation Theory [39] or Theory of
Planned
Behaviour [1], but more specialized theories such as General
Deter-
rence Theory [21] originating from criminology research exist.
The
question, however, is which of the behavioural factors
comprised
in these theories also apply in the information security context.
More recently, several of these theories have been evaluated
in information security (IS) research e.g. Protection Motivation
Theory in the context of anti-malware software use [6] or
Theory
of Planned behaviour in the context of compliance with security
policies [36]. Some of the studied behavioural factors were
shown to
have a significant influence on human behaviour in the IS
context,
some in several studies, others only in some, and again others
were
shown to have significant influence in different directions.
The goal of this work is to identify those behavioural factors
which exhibit reliable effects in the information security
context
across different studies published in the literature. Note that we
use the term factor regardless of the nomenclature used in the
respective theories (e.g. factor, construct, technique, etc.).
To achieve this goal, we conducted a systematic literature
review
of studies investigating the following behavioural theories
which
have been studied in the IS context by several researchers: Pro-
tection Motivation Theory, Theory of Planned Behaviour,
General
Deterrence Theory, and Technology Acceptance Model. In total,
these theories contain 14 behavioural factors.
Out of the 14 factors in our investigation, eleven factors seem
to
be reliably associated with secure behaviour in the IS context,
i.e. the
effect sizes of these factors are reliably beyond certain
thresholds:
nine (namely self-efficacy, response cost, response efficacy,
per-
ceived severity of threats, subjective norms, perceived
behavioural
control, perceived certainty of sanctions, perceived severity of
sanc-
tions, and perceived ease of use) are associated with a weak
effect
(i.e. standardised effect size ≥ 0.1) and two (namely attitude and
perceived usefulness) are associated with a medium effect (i.e.
stan-
dardised effect size ≥ 0.3). The remaining three factors cannot
be
associated with reliable effects in the IS context.
While the two factors associated with reliable medium effects
might be the focus of attention for IS professionals, our results
also
indicate the other the factors should not be disregarded to
render
https://doi.org/10.1145/3098954.3098986
https://doi.org/10.1145/3098954.3098986
ARES ’17, August 29-September 01, 2017, Reggio Calabria,
Italy
Maladaptive
RewardsSelf-efficacy
Perceived
VulnerabilityResponse Costs
Perceived Severity
of ThreatsResponse efficacy
Coping Appraisal Threat Appraisal
Fear
Behavioural Intention (Protection Motivation)
Actual Behaviour
Figure 1: The Protection Motivation Theory with all its standard
factors (white background) and the factors added later on
(grey background).
their efforts most effective. Additionally, we find that for some
factors the evidence is still scarce. In particular for the factors
of
the General Deterrence Theory more studies are needed to
increase
the confidence of the reliability assessment.
The remainder of this work is structured as follows: First, we
present the necessary background for our investigation and in-
troduce the behavioural theories relevant for this work (section
2). Then, we describe the methodology applied to reach the goal
of this work (section 3). Thereafter, we present the results of
our
systematic literature review, and assemble the set of reliable
factors
from all factors evaluated in the literature (section 4). Then, we
discuss our methodology, our findings, the limitations of this
work,
and implications for future research (section 5). Last but not
least,
we summarise and conclude (section 6).
2 BACKGROUND
In this section we outline the background underlying this work.
First, we introduce the related work by Lebek et al. [34], which
served as starting point for our investigation. Then we describe
the
theories and behavioural factors considered in our investigation.
2.1 Starting Point
Lebek et al. [34] present a comprehensive literature review of
be-
havioural theories which were evaluated in the IS context. It
was
conducted in 2013. Their goal was to identify those theories that
were studied most frequently in the IS context. In total, they
found
54 theories which were studied; four of these were identified as
be-
ing most frequently studied: Protection Motivation Theory
(PMT),
Theory of Planned Behaviour (TPB), General Deterrence Theory
(GDT), and Technology Acceptance Model (TAM). The goal of
our
research is to assess the reliability of the behavioural factors
com-
prised in these theories across the studies in published
literature.
We decided to focus on these four theories to ensure multiple
stud-
ies are available for our assessment. Therefore, we consider all
the
papers identified by Lebek et al. [34] in their literature review
which
investigate factors of these four theories. Additionally, we
consider
literature studying one of the four theories that was published
after
their original survey, as outlined in section 3. We decided to
base
our work on the review of Lebek et al. [34] despite an
alternative
by Sommestad et al. [44] being available due to two reasons.
Firstly,
Sommestad et al. focus solely on compliance with security
policies
and therefore exclude studies investigating important aspects of
IS-related behaviour usually not found in organisational
security
policies (e.g. checking links before clicking on them), thereby
ig-
noring the context of non-organisational IS. Secondly, Lebek et
al.
searched for studies published in 2000 or later, while
Sommestad et
al. only included publications from 2006 onward.
2.2 Description of the Behavioural Theories
In this section, we briefly present the four behavioural theories
included in our investigation (i.e. Protection Motivation Theory,
Theory of Planned Behaviour, General Deterrence Theory, and
Technology Acceptance Model). For each theory, we first
describe
its overall concepts and then introduce all of its factors.
2.2.1 Protection Motivation Theory. Protection Motivation The-
ory (PMT) explains an individual’s reaction to warnings about
threats [39]. More formally termed, these warnings are called
fear
appeals, which “are persuasive messages designed to scare
people
by describing the terrible things that will happen to them if they
do not do what the message recommends” [46].
PMT posits that the reaction is based on two appraisal
processes,
the coping appraisal and the threat appraisal. The coping
appraisal
process includes three factors contributing to an individual’s
abil-
ity to cope with a threat, namely self-efficacy, response costs,
and
response efficacy. In order to yield a positive coping appraisal
(in
terms of protection motivation), self-efficacy and response
efficacy
must outweigh the response costs. The second process, threat
ap-
praisal, includes three factors as well: perceived severity of
threats,
perceived vulnerability to the threat, and maladaptive rewards
(also
termed benefits in some publications). These factors contribute
to
an individual’s threat perception. In order to yield a positive
threat
appraisal (in terms of protection motivation), the perceived
severity
and vulnerability have to outweigh the maladaptive rewards.
Figure 1 depicts an overview of PMT with all its core factors
and
the two factors fear and maladaptive rewards added later on [6].
One of the additional factors, fear, resides outside the two
appraisal
processes and is considered to be a result of the threat appraisal
process. All factors are explained in the following.
Self-efficacy. Self-efficacy represents an individual’s
perception
of her or his own ability to successfully exhibit a specific
behaviour
Reliable Behavioural Factors in the Information Security
Context ARES ’17, August 29-September 01, 2017, Reggio
Calabria, Italy
Self-EfficacySubjective NormsAttitude
Behavioural Intention (Planned Behaviour)
Actual Behaviour
Perceived Behavioural Control
Controllability
Figure 2: The Theory of Planned Behaviour with all factors.
(in the context of PMT a specific coping action). In the IS
domain, an
example might be whether a user is able to install security
updates
for their operating system on their own. Vicarious experiences
are
experiences made through observation and have been identified
as
an antecedent to self-efficacy [4, 29].
Response Cost. The response costs include all costs associated
with performing a coping action. Examples for such costs can
be
inconvenience incurred by performing the action (e.g. loss of
pro-
ductivity) or actual material costs (e.g. monetary costs). In the
IS
context, such response costs might be the time expenditure for
entering a password as part of a specific task.
Response Efficacy. The response efficacy refers to the belief
that a certain coping action will lead to the removal (or at least
a reduction) of the threat. In the IS context, an example might
be
whether an individual believes that checking links in emails
actually
prevents falling for phishing attacks.
Perceived Severity of Threats. The perceived severity of threats
refers to the magnitude of possible negative consequences a
threat
can cause. In the context of IS, this might be the amount of lost
sensitive data during an unwanted disclosure event.
Perceived Vulnerability. Vulnerability refers to the suscepti-
bility or likelihood of possible negative consequences if no
coping
action is taken. In the IS context, this might refer to an
individual’s
perception of the likelihood that she or he will become the
victim
of a cyberscam.
Maladaptive Rewards. This factor comprises all aspects of in-
trinsic or extrinsic motivation arising from exposure to the
threat.
In the IS context this might correspond to the amount of time an
individual saves when circumventing security procedures while
performing a task.
Fear. The perception of threats can lead to an unpleasant emo-
tional state: fear. Fear drives the individual to responses aiming
at decreasing the threat and in consequence also the fear
arousal.
Thereby, it is important to note that even horrific messages
must
not lead to the arousal of fear [3].
2.2.2 Theory of Planned Behaviour. The Theory of Planned Be-
haviour (TPB) evolved from the Theory of Reasoned Action and
explains how individuals form behavioural intentions [1]. It is
con-
sidered to be one of the most validated behavioural theories
[34].
TPB includes three primary factors: attitude, subjective norms,
and perceived behavioural control. Figure 2 depicts an overview
of
TPB and its factors.
Attitude. Attitude refers to an individual’s positive or negative
feelings towards and perceptions of a certain behaviour. It
describes
the value of a behaviour for an individual. In the IS context,
this
might refer to opinions about the usage of specific security
software
or tools.
Subjective Norms. Subjective norms represent the perceived
behavioural expectations set by the individual’s environment (in
particular close peers or people with higher authority). In the IS
context, an example for a subjective norm might be whether it is
considered usual behaviour to lock devices when they are not in
use, even among peers.
Perceived Behavioural Control. The perceived behavioural
control traditionally integrates two components: an individual’s
self-efficacy (as also included in PMT) and the perceived
controllabil-
ity. Controllability refers to an individual’s perception of
available
resources and opportunities as well as situational support (the
degree of how favourable the environment is [29]) allowing the
individual to actually exhibit desired behaviour [34]. In the
infor-
mation security context, an example covering all aspects of
TPB’s
perceived behavioural control might be whether an individual
has
both, the necessary privileges to install security software as
well as
the confidence and knowledge to operate such software.
2.2.3 General Deterrence Theory. General Deterrence Theory
(GDT) stems from research on rational decision making. It was
originally developed in the field of criminology, but is now
widely
adopted across different domains.
GDT posits that two factors, the perceived certainty of
sanctions
and the perceived severity of sanctions, influence the deterrence
regarding an illicit act [14]. The higher both of these factors
are,
the more individuals will be deterred from the act. Figure 3
depicts
an overview of GDT and its two factors.
Perceived Certainty of Sanctions. The perceived certainty
of sanctions refers to the likelihood, that an illicit act is
followed
by sanctions (i.e. punishment). In the context of IS, this might
be
the perception of an employee regarding monitoring of network
activity (and thus the detection of illicit traffic).
Perceived Severity of Sanctions. The perceived severity of
sanctions refers to the severity (i.e. magnitude) of sanctions
which
follow an illicit act. In the context of IS, this might be whether
an em-
ployee believes violations of the IS policy will have no
consequences
or even result in the termination of the employee’s contract.
ARES ’17, August 29-September 01, 2017, Reggio Calabria,
Italy
Perceived Severity
of Sanctions
Perceived Certainty
of Sanctions
Behavioural Intention (Deterrence)
Actual Behaviour
Figure 3: The General Deterrence Theory with its factors.
Perceived Ease of
Use
Perceived
Usefulness
Attitude
Actual Behaviour
Figure 4: The Technology Acceptance Model with its factors.
2.2.4 Technology Acceptance Model. The Technology Accep-
tance Model (TAM) explains an individual’s acceptance and
usage
of technological systems [15].
TAM posits that usage of technology is influenced by an
individ-
ual’s attitude towards the usage which in turn is influenced by
two
factors: the perceived usefulness of the system and the
perceived ease
of use [15]. Figure 4 depicts an overview of TAM and its
factors.
Note that we only consider the original version of TAM since
this
seems to be the one applied in IS research [34].
Perceived Usefulness. The perceived usefulness refers to an
individual’s subjective perception that using a specific system
in-
creases her or his effectiveness with regard to a specific task. In
the
IS context, this might be whether an IS tool actually solves an
IS
problem in the individual’s workflow.
Perceived Ease of Use. The perceived ease of use refers to
an individual’s subjective perception of whether using a
specific
system is free of effort. In the IS context, this might be whether
an
IS tool requires additional steps, which the individual has to
take,
before completing a task or whether it integrates with her or his
existing workflow seamlessly.
3 METHODOLOGY
The ultimate goal of this work is to identify factors of
behavioural
theories that are reliably associated with an individual’s inten-
tion to perform secure IS-related behaviour. To achieve this
goal,
we employ a three-step process. In the following we present our
methodology, outlining the procedures for each of these three
steps.
First Step – Literature Review: Based on the results of Lebek
et al. [34], we decided to focus on those four behavioural
theories
that were identified as being most frequently studied: Protection
Motivation Theory (PMT), Theory of Planned Behaviour (TPB),
General Deterrence Theory (GDT), and Technology Acceptance
Model (TAM). For the corresponding literature published before
2013, we rely on the papers identified by the literature review
of Lebek et al. [34]. In order to include research published since
their original review, we conducted a systematic literature
review
of quantitative empirical studies evaluating any of those four
be-
havioural theories in the IS context published since 2013.
Thereby,
we adopted Lebek et al.’s methodology. We searched through
the
ten databases AISeL, ScienceDirect, IEEEXplore, JSTOR,
Springer-
Link, ACM, Wiley, Emerald, InformsOnline and Palgrave
Macmillan
and included not only high-quality literature, but also literature
from smaller and less known sources. Note, detailed
explanations
and justifications regarding the search methodology can be
found
in the description of Lebek et al. in [34]. We adopted all search
terms (i.e. “security awareness”, “awareness training”,
“awareness
program”, “awareness campaign”, “security education”,
“security
motivation”, “security behavior” and “personnel security”) from
[34]. After eliminating all irrelevant search in the same way as
Lebek et al. [34] (non-academic publications such as white-
papers
or incomplete description of methodology) 13 additional
publica-
tions investigating behavioural theories were considered. Table
1
gives an overview of the results reported in the publications we
identified in our literature research.
Second Step – Identifying Relevant Literature: Next, we
filtered the studies we found in the first step. Lebek et al. [34]
focused on identifying which theories are studied in the IS
context,
no matter whether they were applied to increasing secure IS-
related
behaviour (e.g. checking links before clicking them) or to
decrease
IS misuse (e.g. unauthorised modification of data). We,
however,
explicitly focus on those factors which are reliably associated
with
an individual’s intention to increase secure IS-related
behaviour.
Consequently, we only included studies in our literature review
which investigated behavioural intention toward more secure
IS-
related behaviour and excluded all those studies investigating
the
effects of factors with relation to decreasing malicious
behaviour
or IS misuse, since decreasing misuse does not necessarily
imply
adopting more secure behaviour (e.g. factors stopping
individuals
to illegally access patient records might not convince
individuals
to check links before clicking them).
While table 1 in the appendix lists both types of studies and
which type they belong to, only those investigating effects on
the
individual’s intention to increase secure IS-related behaviour
are
considered in the third step. Additionally, all studies
investigating
increasing secure IS-related behaviour use structural equation
mod-
elling in their analysis and report path coefficients (which
already
represent standardised effect sizes, termed β). Consequently,
only
statistically significant results are considered, since non-
significant
results for path coefficients cannot be sensibly interpreted. In
the
following, we refer to the studies not sorted out in this step as
relevant studies.
Third Step – Identifying Reliable Factors: The final step is
identifying the reliable factors. The basis for this assessment
are the
effect sizes reported in the relevant studies. Due to the non-
linearity
of effect sizes, we will not present mean averages, but instead
look
at the overall picture drawn by the effect sizes for each factor in
our
investigation. Effect sizes will be interpreted as small (β ≥
0.10),
Reliable Behavioural Factors in the Information Security
Context ARES ’17, August 29-September 01, 2017, Reggio
Calabria, Italy
Figure 5: The effect sizes reported in the relevant studies for
each of the factors in our investigation. The factors maladaptive
rewards and fear are not shown since no relevant studies were
found in the literature review. PMT: Protection Motivation
Theory, SE: Self-efficacy, RC: Response Cost, RE: Response
Efficacy, PSoT: Perceived Severity of Threats, PV: Perceived
Vul-
nerability, TPB: Theory of Planned Behaviour, A: Attitude, SN:
Subjective Norms, PBC: Perceived Behavioural Control, GDT:
General Deterrence Theory, PCoS: Perceived Certainty of
Sanctions, PSoS: Perceived Severity of Sanctions, TAM:
Technology
Acceptance Model, PU: Perceived Usefulness, PEoU: Perceived
Ease of Use.
medium (β ≥ 0.30) or large (β ≥ 0.50), as suggested by Cohen
[12]
for Pearson’s correlation coefficient.
4 RESULTS
Figure 5 gives an overview of the standardized effect sizes
reported
in the literature for each of the factors in our investigation.
Note that
some publications report on multiple studies (i.e. in the
following,
the number of cited publications might be smaller than the
number
of studies referred to) and not all studies include all factors of
the
theories they are investigating (i.e. the number of relevant
studies
can vary between the factors). In the following, whenever we
refer
to an individual’s behavioural intention to increase secure IS-
related
behaviour, we use the shortened form BI.
4.1 Protection Motivation Theory
Self-efficacy. Three studies [5, 13] investigating the effect of
self-
efficacy on BI could be found in the literature review. All three
show
small effects (0.190 ≤ β ≤ 0.296), drawing a relatively clear
picture.
Therefore, our investigation indicates a reliable weak positive
effect
for self-efficacy on BI in the IS context.
Response Cost. The results for the response cost draw a similar
picture. Four relevant studies investigating this factor could be
identified in the literature review, resulting in a range of effect
sizes
of −0.142 ≤ β ≤ −0.675. Three of the four studies [6, 13]
indicated
a weak negative effect and one [6] reports a large negative
effect.
Therefore, our investigation indicates a reliable weak negative
effect
of response cost on BI in the IS context (i.e. response cost
correlates
with a decreased BI).
Response Efficacy. Four relevant studies investigating the ef-
fect of response efficacy on BI could be found in the literature
review. All reported a positive relationship. The resulting range
of
effect sizes is 0.060 ≤ β ≤ 0.310. While one study [41] failed to
meet the threshold for a weak effect, a funnel plot also
indicated
that it represented an outlier in the available data. Of the other
studies, one reported a medium effect [5] and five reported a
weak
effect [6, 13, 27, 28]. Overall, our investigation therefore
indicates a
weak positive reliable effect for response efficacy on BI.
Perceived Severity of Threats. Five relevant studies from the
literature research investigate the effect of the perceived
severity
of threats on BI. Four of those [5, 6, 13] report a weak positive
effect (0.120 ≤ β ≤ 0.276). In contrast, only one [27] indicates a
weak negative effect (β = −0.200). However, this study [27] has
a
relatively low number of participants and the study appeared as
an outlier in a funnel plot. Thus, our investigation suggests a
weak
positive reliable effect for the perceived severity of threats on
BI in
the IS context.
Perceived Vulnerability. Overall, two studies investigating
the relationship between perceived vulnerability and BI could
be
found in our own literature research and in the literature review
of
Lebek et al. [34]. One indicates a weak positive effect [13], the
other
indicates a positive relationship, but fails to reach the threshold
for the weak effect [27]. Therefore, our investigation indicates a
non-reliable positive effect for the perceived vulnerability on
BI.
Maladaptive Rewards. None of the studies investigating mal-
adaptive rewards held significant results. Thus, no assessment
of
its effects is possible.
Fear. Analogously to the maladaptive rewards, none of the stud-
ies investigating fear held significant results. Thus, no
assessment
of its effects is possible as well.
4.2 Theory of Planned Behaviour
Attitude. All relevant studies investigating the effect of attitude
on
BI show a positive relationship [2, 7–9, 16–18, 26, 27, 36, 49].
The
overall range of effect sizes is 0.180 ≤ β ≤ 0.537. Six show a
weak
effect, four a medium effect, and one a large effect. Therefore,
our
investigation indicates a reliable medium positive effect for
attitude
on BI in the IS context.
ARES ’17, August 29-September 01, 2017, Reggio Calabria,
Italy
Subjective Norms. From the fourteen relevant studies investi-
gating the effect of subjective norms on BI, thirteen report a
positive
effect, resulting in a range of 0.190 ≤ β ≤ 0.450. Eight report a
weak positive effect [2, 9, 18, 27, 28, 31, 35, 36] and five a
medium
positive effect [16, 23, 24, 26, 42]). In contrast, only one study
[10]
reports a weak negative effect (β = −0.139). This negative effect
is the smallest effect of all those reported in the literature.
There-
fore, our investigation suggests a reliable weak positive effect
for
subjective norms on BI in the IS context.
Perceived Behavioural Control. Fourteen relevant studies in-
vestigated the effect of TPB’s perceived behavioural control
(PBC).
Thereby, some studies investigated only one of PBC’s
components
(i.e. self-efficacy or controllability) and some studies
investigated
PBC as a whole, not distinguishing between the two
components.
Six relevant studies investigated PBC’s effect on BI as a whole.
All studies showed positive effects. Three [16, 17] found a
weak
positive effect and three [26, 35, 49] found a medium positive
effect
(0.160 ≤ β ≤ 0.430). One study [16] also indicated a medium
effect
of self efficacy on PBC (β = 0.390). Two studies [16, 17]
indicate a
weak effect of Controllability on PBC (β = 0.208 and β =
0.290).
Eight relevant studies investigated the effect of self-efficacy on
BI
(instead of the whole PBC construct). Seven [2, 9, 18, 24, 27,
28, 42]
report a weak effect and one [41] reports a medium effect,
resulting
in an overall range of 0.100 ≤ β ≤ 0.310. One relevant study
[18]
investigated the effect of Controllability on BI (instead of the
whole
construct), indicating a weak effect (β = 0.130).
Overall, our investigation indicates the consistency of the PBC
and its two components self-efficacy and controllability. It
suggests
for PBC and its components a weak reliable effect on BI.
4.3 General Deterrence Theory
Perceived Certainty of Sanctions. Two relevant studies [23, 24]
investigate the effect of the perceived certainty of sanctions on
BI.
Both report a weak positive effect (β = 0.155 and β = 0.260).
Thus,
our investigation indicates a reliable weak positive effect for
the
perceived certainty of sanctions on BI in the IS context.
Perceived Severity of Sanctions. The same two relevant stud-
ies [23, 24] reporting on the perceived certainty of sanctions,
also
report on the effect of the perceived severity of sanctions. Both
show a weak negative effect (β = −0.139 and β = −0.209).
There-
fore, our investigation indicates a reliable weak negative effect
on
BI in the IS context.
4.4 Technology Acceptance Model
Perceived Usefulness. Six relevant studies investigating the per-
ceived usefulness were identified in the literature review. Five
in-
vestigate the effect on the individual’s attitude. Three of those
[16, 17, 47] report a large effect (0.500 ≤ β ≤ 0.520) and two
[16, 22] report a weak effect (β = 0.270 and β = 0.298). Since
both weak effects are very close to the medium effect threshold
of β ≥ 0.30 and the majority of effects are large, we argue that
our investigation indicates the a reliable medium positive effect
for
perceived usefulness on BI in the IS context.
The one remaining study [31] investigates the effect of
perceived
usefulness on BI and reports a weak positive effect (β = 0.150).
Perceived Ease of Use. Overall, three relevant studies investi-
gated the perceived ease of use. Two of these [16, 47]
investigated
its effect on BI, both reporting weak positive effects (β = 0.260
and
β = 0.286). Therefore, our investigation indicates a reliable
weak
effect of perceived ease of use on BI in the IS context.
The remaining study [31] investigated the effect of perceived
ease of use on BI and reported a positive relationship, but failed
to
meet the threshold of a weak effect. However, [31] only
investigated
the indirect effect of the perceived ease of use on BI.
5 DISCUSSION
5.1 Reliable Factors
We find that 11 out of the 14 behavioural factors included in
our
investigation are – according to our assessment – reliably asso-
ciated with secure IS-related behaviour. However, the majority
of these factors (nine out of eleven) exhibit mostly weak
effects.
Namely these are: “self-efficacy”, “response cost”, “response
effi-
cacy”, “perceived severity of threats”, “subjective norms”,
“perceived
behavioural control”, “perceived certainty of sanctions”,
“perceived
severity of sanctions”, and “perceived ease of use”. Only the
two
factors “attitude” and “perceived usefulness” can be associated
with
reliable medium effects. This indicates that these two should be
of particular interest to anyone wishing to evoke more secure
IS-
related behaviour. However, while the two factors associated
with
reliable medium effects might be the focus of attention, the
other
factors should not be disregarded. IS professionals should
always
keep all of the reliable factors in mind as to render their efforts
most effective. In particular, ignoring one of the factors
associated
with reliable effects completely could render any effort to
increase
secure IS-related behaviour futile (e.g. fear appeals might not
lead
to more secure behaviour, if the self-effficacy of employees is
low).
Additionally, we find that in particular three of the factors asso-
ciated with reliable effects (i.e. perceived severity of threats,
subjec-
tive norms, and perceived severity of sanctions) would benefit
from
additional studies being available in the literature to increase
the
confidence of their assessment. For “perceived severity of
threats”,
the effect sizes reported in the literature rendered an assessment
difficult: one study reported a weak negative effect size, while
all
other studies indicated a weak positive effect. While the
negative
effect seems to be an outlier, more studies would help to assess
this
factor’s reliability with greater confidence. The same issue with
con-
flicting directions for the effect sizes arose for “subjective
norms”,
albeit to a much lesser extent. Since the number of relevant
studies
in the literature was much greater for this factor (14 for
subjective
norms vs. 5 for perceived severity of threats), the assessment
could
be made with much greater confidence. For the “perceived
severity
of sanctions” a different issue arose: we found effects which are
inverse of what could be expected (i.e. a negative effect instead
of a
positive effect). This indicates that more severe sanctions lead
to
less secure IS-related behaviour. While unintuitive at first
glance,
we argue that this might represent a known phenomenon [25],
where excessively severe sanctions do not have a repelling
effect,
but instead medium sanctions are more appropriate. The items
in
the respective studies (i.e. [23, 24]) mention employees being
ter-
minated after IS violations without any indication of what type
of
violation is meant (e.g. disclosing company secret data to the
public
Reliable Behavioural Factors in the Information Security
Context ARES ’17, August 29-September 01, 2017, Reggio
Calabria, Italy
vs. sending an unencrypted email). Therefore, it might be that
this
phenomenon was observed in the respective studies. More
research
is needed to determine the true influence of this phenomenon in
the IS context and give greater confidence in the assessment.
5.2 Excluded Factors
Three of the factors in our investigation (all being part of PMT)
proved not to be reliable in the IS context: “perceived
vulnerability”,
“maladaptive rewards”, and “fear”. For the “maladaptive
rewards”
no study in our literature review reported significant path
coeffi-
cients. Consequently, no assessment of its effect is possible.
More
research investigating this factor is required to determine what
effect (however small it may be) this factor has in the IS
context.
The exclusion of the “perceived vulnerability” as non-reliable
means that only the threat and its consequences seem to be
relevant
(represented by the three factors “perceived severity of threats”,
“perceived certainty of sanctions” and “perceived severity of
sanc-
tions”) in the IS context. In contrast, how vulnerable an
individual
is to these threats seems to plays no role. We believe this to be
a
surprising finding. While the factor is non-reliable, the
direction of
the relationship is (as one would expect) positive. However,
since
only two relevant studies were found in the literature research,
ad-
ditional evidence from future studies could increase the
confidence
of the assessment.
While none of the studies investigating fear as a factor for PMT
reported significant results, an interesting observation comes
from
the studies of Boss et al. [6] who included fear in their model.
When they only considered their high fear appeal condition in
the
analysis, all PMT factors became significant. Thus, a more
thorough
investigation of this factor might offer valuable insights.
5.3 Limitations
We only included studies in our literature review which
investigated
behavioural intention toward more secure IS-related behaviour
and
and excluded all those studies investigating the effects of
factors
with relation to decreasing IS misuse. We argue that these two
contexts (i.e. increasing secure IS-related behaviour and IS mis-
use) should be treated separately in investigations such as this
work. However, the overall low number of studies investigating
be-
havioural factors in the context of IS misuse in the literature
review
did not allow for a separate evaluation of the factors with
respect
to this context. Thus, studies investigating the effect of
behavioural
factors in the context of IS misuse might be valuable additions
to
the available literature.
The number of relevant studies for each of the 14 factors in our
investigation varied greatly. Especially for TAM’s “perceived
ease
of use”, Protection Motivation Theory’s “perceived
vulnerability”,
as well as General Deterrence Theory’s two factors “perceived
certainty of sanctions” and “perceived severity of sanctions”
only
two relevant studies were found in the literature research. For
GDT most studies seem to be placed in the context of IS misuse.
Thus their exclusion decreased the number of available studies
investigating GDT substantially from six to two. This of course
adds uncertainty to the assessment of reliability. While we
believe
that our assessments are sound when considering the available
evidence, further studies investigating these factors would allow
an assessment with greater confidence.
An issue in systematic literature reviews is a general tendency
that significant and positive results get published more often
than
insignificant or negative results. This publication bias affects
all
literature reviews and cannot be prevented methodologically.
Fun-
nel plots are a possibility to check whether this bias affects the
data collected in a systematic literature review [32]. An
inspection
of funnel plots for all factors in our study revealed only very
few
outliers, implying a low publication bias.
Basing our investigation on the work of Lebek et al. [34], we
only
included the most frequently studied theories identified by
them.
Other theories might offer further insights and provide
additional
reliable factors. However, less popular and less frequently
studied
behavioural theories and factors are likely to have the problem
of
scarcity of relevant studies investigating these factors.
Therefore
we argue, that they are less valuable in works like this which
are
focusing on reliability across multiple studies. In particular, all
the
further factors (cf. Table 1, category Further Factors) which
were
included by numerous studies, but which are not part of
established
theories were excluded in our investigation due to the scarcity
of
relevant studies and subtle differences in the factors’
definitions.
Also, while we employed the same rigorous process for our
literature review as Lebek et al. [34], the same limitations
apply.
For instance, non-peer-reviewed publications such as
whitepapers
were excluded. While we argue this increases the overall quality
of
our results, it might also mean that we missed valid results.
6 CONCLUSION
In this work, we identify factors from behavioural theories
which
are associated with reliable effects on individuals intention to
in-
crease secure IS-related behaviour. Thereby, we enable IS
profes-
sionals to appropriate the most influential factors for future
efforts
to direct users towards more secure behaviour. This renders the
design of appropriate awareness and education materials much
more efficient.
Our discussion of this work’s findings outlines several areas
where further research is needed to increase the confidence of
reliability assessments of some of the behavioural factors in our
investigation. In addition, we see two directions of future work.
Firstly, our findings should be applied to design and create
appro-
priate IS awareness and education materials, allowing a
subsequent
validation of the identified set of reliable factors. When
designing
awareness materials (e.g. in the form of teasing texts or
slogans),
it might be possible to maximise their effectiveness by
addressing
the different reliable factors with appropriate wordings in the
ma-
terials. These texts and slogans could be created for various
topics
(e.g. password security, privacy settings, etc.), enabling the
easy
deployment of awareness campaigns by IS professionals
covering
all these topics.
Secondly, research has identified several reasons users voice as
justification for insecure behaviour in qualitative studies (e.g.
[33,
43, 45]). Volkamer et al. [45] provide a broad overview of 17
different
such reasons for insecure behaviour, formulating their model of
precaution adoption. Investigating which reliable factors can be
used to address which of the reasons in their model most
effectively
ARES ’17, August 29-September 01, 2017, Reggio Calabria,
Italy
could give IS professionals an additional tool to optimise their
IS
awareness and education efforts through formulations targeting
specific reasons with the most appropriate factors.
7 ACKNOWLEDGMENT
This work has been developed within the project ‘KMU
AWARE’
which is funded by the German Federal Ministry for Economic
Affairs and Energy. Moreover, it has been supported in part by
the
German Federal Ministry of Education and Research (BMBF)
within
CRISP (www.crisp-da.de/). The authors assume responsibility
for
the content.
REFERENCES
[1] Icek Ajzen. 1991. The theory of planned behavior.
Organizational Behavior and
Human Decision Processes 50, 2 (Dec. 1991), 179–211.
[2] Ahmad Al-Omari, Omar El-Gayar, and Amit Deokar. 2012.
Information security
policy compliance: The role of information security awareness.
In Proceedings of
the Eighteenth Americas Conference on Information Systems.
[3] Maria Bada and Angela Sasse. 2014. Cyber Security
Awareness Campaigns - Why
do they fail to change behaviour? Technical Report. GCSCC.
[4] A Bandura. 1977. Self-efficacy: toward a unifying theory of
behavioral change.
Psychological review (1977).
[5] Stefan Bauer and Edward W N Bernroider. 2015. The
Effects of Awareness
Programs on Information Security in Banks: The Roles of
Protection Motivation
and Monitoring. In Human Aspects of Information Security,
Privacy, and Trust.
Springer International Publishing, Cham, 154–164.
[6] S R Boss, D F Galletta, P B Lowry, Gregory D Moody, and
Peter Polak. 2015. What
do systems users have to fear? Using fear appeals to engender
threats and fear
that motivate protective security behaviors. MIS Quarterly 39, 4
(2015), 837–864.
[7] Burcu Bulgurcu, Hasan Cavusoglu, and Izak Benbasat. 2009.
Effects of individual
and organization based beliefs and the moderating role of work
experience on
insiders’ good security behaviors. In International Conference
on Computational
Science and Engineering. 476–481.
[8] Burcu Bulgurcu, Hasan Cavusoglu, and Izak Benbasat. 2009.
Roles of informa-
tion security awareness and perceived fairness in information
security policy
compliance. In AMCIS 2009 Proceedings.
[9] Burcu Bulgurcu, Hasan Cavusoglu, and Izak Benbasat. 2010.
Information se-
curity policy compliance: an empirical study of rationality-
based beliefs and
information security awareness. MIS quarterly 34, 3 (2010),
523–548.
[10] Lijiao Cheng, Ying Li, Wenli Li, Eric Holm, and Qingguo
Zhai. 2013. Understand-
ing the violation of IS security policy in organizations: An
integrated model
based on social control and deterrence theory. Computers &
Security 39 (Nov.
2013), 447–459.
[11] Amanda M Y Chu, Patrick Y K Chau, and Mike K P So.
2014. Explaining the
Misuse of Information Systems Resources in the Workplace: A
Dual-Process
Approach. Journal of Business Ethics 131, 1 (July 2014), 209–
225.
[12] J Cohen. 1988. Statistical power analysis for the behavioral
sciences (2nd ed.).
Academic Press (1988).
[13] Duy Dang-Pham and Siddhi Pittayachawan. 2015.
Comparing intention to avoid
malware across contexts in a BYOD-enabled Australian
university: A Protection
Motivation Theory approach. Computers & Security 48 (Feb.
2015), 281–297.
[14] John D’Arcy, Anat Hovav, and Dennis Galletta. 2009. User
Awareness of Security
Countermeasures and Its Impact on Information Systems
Misuse: A Deterrence
Approach. Information Systems Research 20, 1 (2009), 79.
[15] Fred D Davis Jr. 1986. A technology acceptance model for
empirically testing
new end-user information systems: Theory and results. Ph.D.
Dissertation. Mas-
sachusetts Institute of Technology.
[16] Tamara Dinev, Jahyun Goo, Qing Hu, and Kichan Nam.
2009. User behaviour
towards protective information technologies: the role of
national cultural differ-
ences. Information Systems Journal 19, 4 (2009), 391–412.
[17] Tamara Dinev and Qing Hu. 2007. The centrality of
awareness in the formation
of user behavioral intention toward protective information
technologies. Journal
of the Association for Information Systems 8, 7 (2007), 386–
408.
[18] Hadrian Geri Djajadikerta, Saiyidi Mat Roni, and Terri
Trireksani. 2015. Dysfunc-
tional information system behaviors are not all created the
same: Challenges to
the generalizability of security-based research. Information &
management 52, 8
(Dec. 2015), 1012–1024.
[19] Daphne Evans and Paul Norman. 2003. Predicting
adolescent pedestriansâĂŹ
road-crossing intentions: an application and extension of the
Theory of Planned
Behaviour. Health Education Research 18, 3 (2003), 267.
[20] Ali Farooq, Johanna Isoaho, Seppo Virtanen, and Jouni
Isoaho. 2015. Informa-
tion Security Awareness in Educational Institution: An Analysis
of Students’
Individual Factors. In 2015 IEEE TrustcomBigDataSEISPA.
IEEE, 352–359.
[21] Jack P Gibbs. 1975. Crime, punishment, and deterrence.
[22] Tejaswini Herath, Rui Chen, Jingguo Wang, Ketan Banjara,
Jeff Wilbur, and
H. Raghav Rao. 2014. Security services as coping mechanisms:
an investigation
into user intention to adopt an email authentication service.
Information Systems
Journal 24, 1 (2014), 61–84.
[23] Tejaswini Herath and H Raghav Rao. 2009. Encouraging
information security be-
haviors in organizations: Role of penalties, pressures and
perceived effectiveness.
Decision Support Systems 47, 2 (2009), 154–165.
[24] Tejaswini Herath and H Raghav Rao. 2009. Protection
motivation and deterrence:
a framework for security policy compliance in organisations.
European Journal
of Information Systems 18, 2 (2009), 106–125.
[25] Michael A Hogg and Graham M Vaughan. 2010. Essentials
of Social Psychology.
[26] Qing Hu, Tamara Dinev, Paul Hart, and Donna Cooke.
2012. Managing em-
ployee compliance with information security policies: The
critical role of top
management and organizational culture. Decision Sciences 43, 4
(2012), 615–659.
[27] Princely Ifinedo. 2012. Understanding information systems
security policy
compliance: An integration of the theory of planned behavior
and the protection
motivation theory. Computers & Security 31, 1 (2012), 83–95.
[28] Allen C Johnston and Merrill Warkentin. 2010. Fear
appeals and information
security behaviors: an empirical study. MIS quarterly (2010),
549–566.
[29] Allen C Johnston, Barbara Wech, Eric Jack, and Micah
Beavers. 2010. Reigning in
the Remote Employee: Applying Social Learning Theory to
Explain Information
Security Policy Compliance Attitudes. In Americas Conf. on
Information Systems.
[30] Miranda Kajtazi and Burcu Bulgurcu. 2013. Information
Security Policy Compli-
ance: An Empirical Study on Escalation of Commitment. In
Nineteenth Americas
Conference on Information Systems.
[31] Jungsun Sunny Kim and Bo Bernhard. 2014. Factors
influencing hotel customers’
intention to use a fingerprint system. Journal of Hospitality and
Tourism Tech-
nology 5, 2 (Aug. 2014), 98–125.
[32] Barbara Kitchenham. 2004. Procedures for performing
systematic reviews. Keele,
UK, Keele University 33, 2004 (2004), 1–26.
[33] Ross Koppel, Jim Blythe, Vijay Kothari, and Sean Smith.
2016. Beliefs about
Cybersecurity Rules and Passwords: A Comparison of Two
Survey Samples
of Cybersecurity Professionals Versus Regular Users. In
Symposium on Usable
Privacy and Security.
[34] Benedikt Lebek, Jorg Uffen, Michael H Breitner, Markus
Neumann, and Bernd
Hohler. 2013. Employees’ Information Security Awareness and
Behavior: A
Literature Review. 46th Hawaii International Conf. on System
Sciences (2013).
[35] Moez Limayem and Sabine Gabriele Hirt. 2003. Force of
habit and information
systems usage: Theory and initial validation. Journal of the
Association for
Information Systems 4, 1 (2003), 65–95.
[36] Seppo Pahnila, Mikko Siponen, and Adam Mahmood. 2007.
Employees’ behavior
towards IS security policy compliance. In 40th Annual Hawaii
International
Conference On System Sciences. IEEE.
[37] Malcolm Pattinson, Marcus Butavicius, Kathryn Parsons,
Agata McCormac, and
Dragana Calic. 2015. Factors that Influence Information
Security Behavior: An
Australian Web-Based Study. In Human Aspects of Information
Security, Privacy,
and Trust. Springer International Publishing, Cham, 231–241.
[38] Cornelia Pechmann, Guangzhi Zhao, Marvin E Goldberg,
and Ellen Thomas
Reibling. 2003. What to convey in antismoking advertisements
for adolescents:
The use of protection motivation theory to identify effective
message themes.
Journal of Marketing 67, 2 (2003), 1–18.
[39] R W Rogers. 1975. A protection motivation theory of fear
appeals and attitude
change1. The journal of psychology (1975).
[40] Bruce Schneier. 2000. Secrets and Lies. John Wiley and
Sons.
[41] Mikko Siponen, Seppo Pahnila, and Adam Mahmood. 2007.
EmployeesâĂŹ ad-
herence to information security policies: an empirical study. In
IFIP International
Information Security Conference. Springer, 133–144.
[42] Mikko Siponen, Seppo Pahnila, and M Adam Mahmood.
2010. Compliance with
information security policies: An empirical investigation.
Computer 43, 2 (2010),
64–71.
[43] Daniel J Solove. 2007. I’ve got nothing to hide and other
misunderstandings of
privacy. San Diego Law Review 44 (2007), 745.
[44] Teodor Sommestad, Jonas Hallberg, Kristoffer Lundholm,
and Johan Bengts-
son. 2014. Variables influencing information security policy
compliance. Inf.
Management & Comp. Sec. 22, 1 (March 2014), 42–75.
[45] Melanie Volkamer, Karen Renaud, Oksana Kulyk, and
Sinem Emeröz. 2015. A
Socio-Technical Investigation into Smartphone Security. In
Security and Trust
Management. Springer International Publishing, Cham, 265–
273.
[46] Kim Witte. 1992. Putting the fear back into fear appeals:
The extended parallel
process model. Communications Monographs 59, 4 (June 1992),
329–349.
[47] Yajiong Xue, Huigang Liang, and Liansheng Wu. 2011.
Punishment, justice, and
compliance in mandatory IT settings. Inf. Sys. Research 22, 2
(2011), 400–414.
[48] Chang-Gyu Yang and Hee-Jun Lee. 2015. A study on the
antecedents of healthcare
information protection intention. Inf. Sys. Frontiers 18, 2
(2015), 253–263.
[49] Jie Zhang, Brian J Reithel, and Han Li. 2009. Impact of
perceived technical
protection on security behaviors. Inf. Man. & Comp. Sec. 17, 4
(2009), 330–340.
Reliable Behavioural Factors in the Information Security
Context ARES ’17, August 29-September 01, 2017, Reggio
Calabria, Italy
T
ab
le
1:
O
ve
rv
ie
w
of
th
e
re
su
lt
s
of
ou
r
li
te
ra
tu
re
re
vi
ew
.
T
h
eo
ri
es
ar
e
or
de
re
d
al
on
g
th
e
n
u
m
be
r
of
p
u
bl
ic
at
io
n
s
off
er
in
g
da
ta
fo
r
th
em
(d
en
ot
ed
by
th
e
n
u
m
be
r
in
p
ar
en
th
es
es
in
th
e
h
ea
di
n
g
fo
r
ea
ch
th
eo
ry
).
In
ca
se
a
p
u
bl
ic
at
io
n
is
li
st
ed
m
u
lt
ip
le
ti
m
es
fo
r
th
e
sa
m
e
fa
ct
or
,e
ac
h
li
st
in
g
co
rr
es
p
on
ds
to
on
e
st
u
dy
in
th
e
p
u
bl
ic
at
io
n
.P
M
T
=
P
ro
te
ct
io
n
M
ot
iv
at
io
n
T
h
eo
ry
,T
P
B
=
T
h
eo
ry
of
P
la
n
n
ed
B
eh
av
io
u
r,
T
A
M
=
T
ec
h
n
ol
og
y
A
cc
ep
ta
n
ce
M
od
el
,E
T
=
E
xp
ec
ta
n
cy
T
h
eo
ry
,G
D
T
=
G
en
er
al
D
et
er
re
n
ce
T
h
eo
ry
,N
T
=
N
eu
tr
al
is
at
io
n
T
h
eo
ry
,F
F
=
Fu
rt
h
er
Fa
ct
or
s,
B
I
=
B
eh
av
io
u
ra
l
In
te
n
ti
on
,A
B
=
A
ct
u
al
B
eh
av
io
u
r,
IS
A
=
In
fo
rm
at
io
n
ec
u
ri
ty
A
w
ar
en
es
s.
D
es
cr
ip
ti
on
s
of
al
l
fu
rt
h
er
fa
ct
or
s
ar
e
be
yo
n
d
th
e
sc
op
e
of
th
is
w
or
k
,b
u
t
ca
n
be
fo
u
n
d
in
th
e
re
sp
ec
ti
ve
p
u
bl
ic
at
io
n
s.
T
h
e
co
lu
m
n
co
n
te
xt
de
n
ot
es
w
h
et
h
er
th
e
st
u
dy
in
ve
st
ig
at
ed
in
cr
ea
si
n
g
se
cu
re
IS
-r
el
at
ed
be
h
av
io
u
r
(i
n
cr
ea
se
)
or
de
cr
ea
si
n
g
IS
m
is
u
se
(d
ec
re
as
e)
.T
h
e
co
lu
m
n
Si
g.
de
n
ot
es
th
e
si
gn
ifi
ca
n
ce
of
th
e
eff
ec
t
as
re
p
or
te
d
in
th
e
li
te
ra
tu
re
,w
h
er
e
-p
≥
0.
05
,*
p
<
0.
05
,*
*
p
<
0.
01
an
d
**
*
p
<
0.
00
1
Fa
ct
or
/C
on
st
ru
ct
/
It
em
s
D
ep
en
de
n
t
It
em
s
A
u
th
or
s
C
on
te
xt
Si
g.
β
N
P
ar
ti
ci
p
an
ts
In
de
p
en
de
n
t
V
ar
ia
bl
e
V
ar
ia
bl
e
P
ro
te
ct
io
n
M
ot
iv
at
io
n
T
h
eo
ry
(4
)
PM
T
-
Pe
rc
ei
ve
d
Se
ve
ri
ty
of
T
hr
ea
ts
2
B
I
2
B
os
s
et
al
.[
6]
in
cr
ea
se
**
0,
27
6
10
4
St
ud
en
ts
PM
T
-
Pe
rc
ei
ve
d
Se
ve
ri
ty
of
T
hr
ea
ts
3
B
I
3
B
os
s
et
al
.[
6]
in
cr
ea
se
-
0,
03
0
10
4
St
ud
en
ts
PM
T
-
Pe
rc
ei
ve
d
Se
ve
ri
ty
of
T
hr
ea
ts
3
B
I
3
B
au
er
an
d
B
er
nr
oi
de
r
[5
]
in
cr
ea
se
**
*
0,
20
0
18
3
Em
pl
oy
ee
s
PM
T
-
Pe
rc
ei
ve
d
Se
ve
ri
ty
of
T
hr
ea
ts
3
B
I
4
Ya
ng
an
d
Le
e
[4
8]
de
cr
ea
se
**
*
-0
,3
15
22
2
Em
pl
oy
ee
s
PM
T
-
Pe
rc
ei
ve
d
Se
ve
ri
ty
of
T
hr
ea
ts
4
B
I
3
D
an
g-
Ph
am
an
d
Pi
tt
ay
ac
ha
w
an
[1
3]
in
cr
ea
se
**
*
0,
11
5
25
0
St
ud
en
ts
PM
T
-
Pe
rc
ei
ve
d
Se
ve
ri
ty
of
T
hr
ea
ts
4
B
I
3
D
an
g-
Ph
am
an
d
Pi
tt
ay
ac
ha
w
an
[1
3]
in
cr
ea
se
**
*
0,
12
0
25
0
St
ud
en
ts
PM
T
-
Pe
rc
ei
ve
d
Se
ve
ri
ty
of
T
hr
ea
ts
3
Fe
ar
6
B
os
s
et
al
.[
6]
in
cr
ea
se
**
0,
39
6
10
4
St
ud
en
ts
PM
T
-
Pe
rc
ei
ve
d
Se
ve
ri
ty
of
T
hr
ea
ts
2
Fe
ar
4
B
os
s
et
al
.[
6]
in
cr
ea
se
**
*
0,
28
2
10
4
St
ud
en
ts
PM
T
-
Pe
rc
ei
ve
d
V
ul
ne
ra
bi
lit
y
2
B
I
2
B
os
s
et
al
.[
6]
in
cr
ea
se
-
-0
,1
11
10
4
St
ud
en
ts
PM
T
-
Pe
rc
ei
ve
d
V
ul
ne
ra
bi
lit
y
3
B
I
3
B
os
s
et
al
.[
6]
in
cr
ea
se
-
0,
00
9
10
4
St
ud
en
ts
PM
T
-
Pe
rc
ei
ve
d
V
ul
ne
ra
bi
lit
y
3
B
I
3
B
au
er
an
d
B
er
nr
oi
de
r
[5
]
in
cr
ea
se
-
0,
09
0
18
3
Em
pl
oy
ee
s
PM
T
-
Pe
rc
ei
ve
d
V
ul
ne
ra
bi
lit
y
3
B
I
4
Ya
ng
an
d
Le
e
[4
8]
de
cr
ea
se
-
0,
03
3
22
2
Em
pl
oy
ee
s
PM
T
-
Pe
rc
ei
ve
d
V
ul
ne
ra
bi
lit
y
3
B
I
4
Ya
ng
an
d
Le
e
[4
8]
de
cr
ea
se
**
*
0,
16
0
22
2
Em
pl
oy
ee
s
PM
T
-
Pe
rc
ei
ve
d
V
ul
ne
ra
bi
lit
y
4
B
I
3
D
an
g-
Ph
am
an
d
Pi
tt
ay
ac
ha
w
an
[1
3]
in
cr
ea
se
*
0,
07
4
25
0
St
ud
en
ts
PM
T
-
Pe
rc
ei
ve
d
V
ul
ne
ra
bi
lit
y
4
B
I
3
D
an
g-
Ph
am
an
d
Pi
tt
ay
ac
ha
w
an
[1
3]
in
cr
ea
se
-
-0
,0
37
25
0
St
ud
en
ts
PM
T
-
Pe
rc
ei
ve
d
V
ul
ne
ra
bi
lit
y
2
Fe
ar
4
B
os
s
et
al
.[
6]
in
cr
ea
se
**
0,
26
5
10
4
St
ud
en
ts
PM
T
-
Pe
rc
ei
ve
d
V
ul
ne
ra
bi
lit
y
3
Fe
ar
6
B
os
s
et
al
.[
6]
in
cr
ea
se
**
*
0,
77
5
10
4
St
ud
en
ts
PM
T
-
M
al
ad
ap
tiv
e
Re
w
ar
ds
4
B
I
3
D
an
g-
Ph
am
an
d
Pi
tt
ay
ac
ha
w
an
[1
3]
in
cr
ea
se
-
0,
06
4
25
0
St
ud
en
ts
PM
T
-
M
al
ad
ap
tiv
e
Re
w
ar
ds
4
B
I
3
D
an
g-
Ph
am
an
d
Pi
tt
ay
ac
ha
w
an
[1
3]
in
cr
ea
se
-
0,
06
0
25
0
St
ud
en
ts
PM
T
-
M
al
ad
ap
tiv
e
Re
w
ar
ds
7
B
I
3
B
os
s
et
al
.[
6]
in
cr
ea
se
-
0,
06
0
25
0
St
ud
en
ts
PM
T
-
Re
sp
on
se
C
os
ts
4
B
I
2
B
os
s
et
al
.[
6]
in
cr
ea
se
**
*
-0
,6
75
10
4
St
ud
en
ts
PM
T
-
Re
sp
on
se
C
os
ts
4
B
I
3
B
os
s
et
al
.[
6]
in
cr
ea
se
**
*
-0
,1
42
10
4
St
ud
en
ts
PM
T
-
Re
sp
on
se
C
os
ts
4
B
I
3
D
an
g-
Ph
am
an
d
Pi
tt
ay
ac
ha
w
an
[1
3]
in
cr
ea
se
**
*
0,
17
5
25
0
St
ud
en
ts
PM
T
-
Re
sp
on
se
C
os
ts
4
B
I
3
D
an
g-
Ph
am
an
d
Pi
tt
ay
ac
ha
w
an
[1
3]
in
cr
ea
se
**
*
-0
,1
86
25
0
St
ud
en
ts
PM
T
-
Re
sp
on
se
Effi
ca
cy
2
B
I
3
B
au
er
an
d
B
er
nr
oi
de
r
[5
]
in
cr
ea
se
**
*
0,
31
0
18
3
Em
pl
oy
ee
s
PM
T
-
Re
sp
on
se
Effi
ca
cy
2
B
I
2
B
os
s
et
al
.[
6]
in
cr
ea
se
-
0,
12
2
10
4
St
ud
en
ts
PM
T
-
Re
sp
on
se
Effi
ca
cy
3
B
I
3
B
os
s
et
al
.[
6]
in
cr
ea
se
*
0,
20
1
10
4
St
ud
en
ts
PM
T
-
Re
sp
on
se
Effi
ca
cy
3
B
I
4
Ya
ng
an
d
Le
e
[4
8]
de
cr
ea
se
-
0,
06
9
22
2
Em
pl
oy
ee
s
PM
T
-
Re
sp
on
se
Effi
ca
cy
3
B
I
4
Ya
ng
an
d
Le
e
[4
8]
de
cr
ea
se
**
*
0,
40
8
22
2
Em
pl
oy
ee
s
PM
T
-
Re
sp
on
se
Effi
ca
cy
3
B
I
3
D
an
g-
Ph
am
an
d
Pi
tt
ay
ac
ha
w
an
[1
3]
in
cr
ea
se
**
*
0,
19
7
25
0
St
ud
en
ts
PM
T
-
Re
sp
on
se
Effi
ca
cy
3
B
I
3
D
an
g-
Ph
am
an
d
Pi
tt
ay
ac
ha
w
an
[1
3]
in
cr
ea
se
**
*
0,
23
4
25
0
St
ud
en
ts
PM
T
-
Se
lf
Effi
ca
cy
3
B
I
4
Ya
ng
an
d
Le
e
[4
8]
de
cr
ea
se
**
*
0,
26
9
22
2
Em
pl
oy
ee
s
PM
T
-
Se
lf-
Effi
ca
cy
3
B
I
3
B
au
er
an
d
B
er
nr
oi
de
r
[5
]
in
cr
ea
se
**
*
0,
28
0
18
3
Em
pl
oy
ee
s
PM
T
-
Se
lf-
effi
ca
cy
10
B
I
2
B
os
s
et
al
.[
6]
in
cr
ea
se
-
-0
,0
62
10
4
St
ud
en
ts
PM
T
-
Se
lf-
effi
ca
cy
3
B
I
3
B
os
s
et
al
.[
6]
in
cr
ea
se
-
-0
,1
03
10
4
St
ud
en
ts
PM
T
-
Se
lf-
Effi
ca
cy
3
B
I
3
D
an
g-
Ph
am
an
d
Pi
tt
ay
ac
ha
w
an
[1
3]
in
cr
ea
se
**
*
0,
29
6
25
0
St
ud
en
ts
PM
T
-
Se
lf-
Effi
ca
cy
3
B
I
3
D
an
g-
Ph
am
an
d
Pi
tt
ay
ac
ha
w
an
[1
3]
in
cr
ea
se
**
*
0,
19
0
25
0
St
ud
en
ts
PM
T
-
Fe
ar
4
B
I
2
B
os
s
et
al
.[
6]
in
cr
ea
se
-
0,
08
4
10
4
St
ud
en
ts
PM
T
-
Fe
ar
4
B
I
2
B
os
s
et
al
.[
6]
in
cr
ea
se
-
0,
04
7
10
4
St
ud
en
ts
T
h
eo
ry
of
P
la
n
n
ed
B
eh
av
io
u
r
(4
)
T
PB
-
A
tt
itu
de
2
B
I
5
D
ja
ja
di
ke
rt
a
et
al
.[
18
]
in
cr
ea
se
**
*
0,
45
0
38
7
Em
pl
oy
ee
s
T
PB
-
A
tt
itu
de
3
B
I
3
C
hu
et
al
.[
11
]
de
cr
ea
se
-
0,
02
8
20
8
-
T
PB
-
A
tt
itu
de
3
D
ES
3
C
hu
et
al
.[
11
]
de
cr
ea
se
**
*
0,
39
1
20
8
-
T
PB
-
Pe
rc
ei
ve
d
B
eh
av
io
ur
al
C
on
tr
ol
3
B
I
3
C
hu
et
al
.[
11
]
de
cr
ea
se
**
*
0,
22
2
20
8
-
T
PB
-
Pe
rc
ei
ve
d
B
eh
av
io
ur
al
C
on
tr
ol
3
D
ES
3
C
hu
et
al
.[
11
]
de
cr
ea
se
**
0,
22
1
20
8
-
T
B
P
-
PB
C
-
C
on
tr
ol
ov
er
re
so
ur
ce
s
3
B
I
5
D
ja
ja
di
ke
rt
a
et
al
.[
18
]
in
cr
ea
se
**
0,
13
0
38
7
Em
pl
oy
ee
s
T
PB
-
PB
C
-
C
on
tr
ol
ov
er
ou
tc
om
es
2
B
I
5
D
ja
ja
di
ke
rt
a
et
al
.[
18
]
in
cr
ea
se
*
0,
10
0
38
7
Em
pl
oy
ee
s
C
on
ti
nu
ed
on
ne
xt
pa
ge
ARES ’17, August 29-September 01, 2017, Reggio Calabria,
Italy
T
ab
le
1
–
co
n
ti
n
u
ed
fr
om
pr
ev
io
u
s
pa
ge
Fa
ct
or
/C
on
st
ru
ct
/
It
em
s
D
ep
en
de
n
t
It
em
s
A
u
th
or
s
C
on
te
xt
Si
g.
β
N
P
ar
ti
ci
p
an
ts
In
de
p
en
de
n
t
V
ar
ia
bl
e
V
ar
ia
bl
e
T
PB
-
Su
bj
ec
tiv
e
N
or
m
s
3
B
I
5
D
ja
ja
di
ke
rt
a
et
al
.[
18
]
in
cr
ea
se
**
*
0,
24
0
38
7
Em
pl
oy
ee
s
T
PB
-
Su
bj
ec
tiv
e
N
or
m
s
3
B
I
3
C
hu
et
al
.[
11
]
de
cr
ea
se
-
-0
,0
27
20
8
-
T
PB
-
Su
bj
ec
tiv
e
N
or
m
s
4
B
I
2
C
he
ng
et
al
.[
10
]
de
cr
ea
se
*
-0
,1
39
18
5
Em
pl
oy
ee
s
T
PB
-
Su
bj
ec
tiv
e
N
or
m
s
-
B
I
-
K
im
an
d
B
er
nh
ar
d
[3
1]
in
cr
ea
se
*
0,
28
0
68
5
C
us
to
m
er
s
T
PB
-
Su
bj
ec
tiv
e
N
or
m
s
3
D
ES
3
C
hu
et
al
.[
11
]
de
cr
ea
se
-
0,
08
4
20
8
-
G
en
er
al
D
et
er
re
n
ce
T
h
eo
ry
(1
)
G
D
T
-
Pe
rc
ei
ve
d
C
er
ta
in
ty
of
Sa
nc
tio
ns
3
B
I
2
C
he
ng
et
al
.[
10
]
de
cr
ea
se
-
0,
02
7
18
5
Em
pl
oy
ee
s
G
D
T
-
Pe
rc
ei
ve
d
Se
ve
ri
ty
of
Sa
nc
tio
ns
5
B
I
2
C
he
ng
et
al
.[
10
]
de
cr
ea
se
**
*
-0
,3
11
18
5
Em
pl
oy
ee
s
T
ec
h
n
ol
og
y
A
cc
ep
ta
n
ce
M
od
el
(1
)
TA
M
-
Pe
rc
ei
ve
d
Ea
se
of
U
se
-
B
I
-
K
im
an
d
B
er
nh
ar
d
[3
1]
in
cr
ea
se
*
0,
06
0
68
5
C
us
to
m
er
s
TA
M
-
Pe
rc
ei
ve
d
U
se
fu
ln
es
s
-
B
I
-
K
im
an
d
B
er
nh
ar
d
[3
1]
in
cr
ea
se
*
0,
15
0
68
5
C
us
to
m
er
s
Fu
rt
h
er
Fa
ct
or
s
FF
-
A
bi
lit
y
to
C
on
tr
ol
Im
pu
ls
iv
ity
3
A
B
21
Pa
tt
in
so
n
et
al
.[
37
]
in
cr
ea
se
**
0,
12
0
50
0
Em
pl
oy
ee
s
FF
-
A
tt
ac
hm
en
tt
o
Jo
b
3
B
I
2
C
he
ng
et
al
.[
10
]
de
cr
ea
se
**
-0
,1
85
18
5
Em
pl
oy
ee
s
FF
-
A
tt
ac
hm
en
tt
o
O
rg
an
iz
at
io
n
3
B
I
2
C
he
ng
et
al
.[
10
]
de
cr
ea
se
**
-0
,1
94
18
5
Em
pl
oy
ee
s
FF
-
B
el
ie
f
3
B
I
2
C
he
ng
et
al
.[
10
]
de
cr
ea
se
**
*
-0
,1
53
18
5
Em
pl
oy
ee
s
FF
-
C
o-
w
or
ke
r
B
eh
av
io
ur
3
B
I
2
C
he
ng
et
al
.[
10
]
de
cr
ea
se
**
*
0,
13
6
18
5
Em
pl
oy
ee
s
FF
-
C
om
m
itm
en
t
3
B
I
2
C
he
ng
et
al
.[
10
]
de
cr
ea
se
**
*
-0
,1
83
18
5
Em
pl
oy
ee
s
FF
-
D
es
ir
e
fo
r
IS
cr
iti
ca
lb
eh
av
io
ur
3
A
B
4
C
hu
et
al
.[
11
]
de
cr
ea
se
*
0,
17
4
20
8
-
FF
-
D
es
ir
e
fo
r
IS
cr
iti
ca
lb
eh
av
io
ur
3
B
I
3
C
hu
et
al
.[
11
]
de
cr
ea
se
**
*
0,
71
9
20
8
-
FF
-
D
is
ci
pl
in
es
(p
ro
fe
ss
io
n)
1
IS
A
w
ar
en
es
s
10
Fa
ro
oq
et
al
.[
20
]
in
cr
ea
se
-
-
61
4
St
ud
en
ts
FF
-
Fa
m
ili
ar
ity
W
ith
C
om
pu
te
rs
13
A
B
21
Pa
tt
in
so
n
et
al
.[
37
]
in
cr
ea
se
*
-0
,1
00
50
0
Em
pl
oy
ee
s
FF
-
In
fo
rm
at
io
n
A
sy
m
m
et
ry
3
T
PB
-
A
tt
itu
de
3
K
aj
ta
zi
an
d
B
ul
gu
rc
u
[3
0]
in
cr
ea
se
*
-0
,3
30
37
6
Em
pl
oy
ee
s
FF
-
In
vo
lv
em
en
t
3
B
I
2
C
he
ng
et
al
.[
10
]
de
cr
ea
se
-
0,
00
1
18
5
Em
pl
oy
ee
s
FF
-
In
fo
rm
at
io
n
Se
cu
ri
ty
A
w
ar
en
es
s
3
B
I
3
B
au
er
an
d
B
er
nr
oi
de
r
[5
]
in
cr
ea
se
*
0,
15
0
18
3
Em
pl
oy
ee
s
FF
-
In
fo
rm
at
io
n
Se
cu
ri
ty
A
w
ar
en
es
s
3
PM
T
-
PS
3
B
au
er
an
d
B
er
nr
oi
de
r
[5
]
in
cr
ea
se
**
0,
16
0
18
3
Em
pl
oy
ee
s
FF
-
In
fo
rm
at
io
n
Se
cu
ri
ty
A
w
ar
en
es
s
3
PM
T
-
PV
3
B
au
er
an
d
B
er
nr
oi
de
r
[5
]
in
cr
ea
se
**
*
-0
,2
10
18
3
Em
pl
oy
ee
s
FF
-
In
fo
rm
at
io
n
Se
cu
ri
ty
A
w
ar
en
es
s
3
PM
T
-
RE
2
B
au
er
an
d
B
er
nr
oi
de
r
[5
]
in
cr
ea
se
**
*
0,
43
0
18
3
Em
pl
oy
ee
s
FF
-
In
fo
rm
at
io
n
Se
cu
ri
ty
A
w
ar
en
es
s
3
PM
T
-
SE
3
B
au
er
an
d
B
er
nr
oi
de
r
[5
]
in
cr
ea
se
**
*
0,
50
0
18
3
Em
pl
oy
ee
s
FF
-
Le
ve
lo
fE
du
ca
tio
n
C
om
pl
et
ed
1
A
B
21
Pa
tt
in
so
n
et
al
.[
37
]
in
cr
ea
se
-
-0
,0
30
50
0
Em
pl
oy
ee
s
FF
-
A
gr
ee
ab
le
ne
ss
2
A
B
21
Pa
tt
in
so
n
et
al
.[
37
]
in
cr
ea
se
**
*
0,
15
0
50
0
Em
pl
oy
ee
s
FF
-
C
on
sc
ie
nt
io
us
ne
ss
2
A
B
21
Pa
tt
in
so
n
et
al
.[
37
]
in
cr
ea
se
**
*
0,
37
0
50
0
Em
pl
oy
ee
s
FF
-
Ex
tr
av
er
si
on
2
A
B
21
Pa
tt
in
so
n
et
al
.[
37
]
in
cr
ea
se
-
-0
,0
10
50
0
Em
pl
oy
ee
s
FF
-
N
eu
ro
tic
is
m
(E
m
ot
io
na
lS
ta
bi
lit
y)
2
A
B
21
Pa
tt
in
so
n
et
al
.[
37
]
in
cr
ea
se
-
0,
04
0
50
0
Em
pl
oy
ee
s
FF
-
O
pe
nn
es
s
2
A
B
21
Pa
tt
in
so
n
et
al
.[
37
]
in
cr
ea
se
**
0,
12
0
50
0
Em
pl
oy
ee
s
FF
-
Sa
fe
ty
of
Re
so
ur
ce
s
6
T
PB
-
A
tt
itu
de
3
K
aj
ta
zi
an
d
B
ul
gu
rc
u
[3
0]
in
cr
ea
se
*
0,
41
0
37
6
Em
pl
oy
ee
s
FF
-
Tr
ai
ni
ng
1
IS
A
w
ar
en
es
s
10
Fa
ro
oq
et
al
.[
20
]
in
cr
ea
se
**
-
61
4
St
ud
en
ts
FF
-
W
or
k
Im
pe
di
m
en
t
4
T
PB
-
A
tt
itu
de
3
K
aj
ta
zi
an
d
B
ul
gu
rc
u
[3
0]
in
cr
ea
se
-
-0
,0
60
37
6
Em
pl
oy
ee
s
FF
-
W
or
ki
ng
Ex
pe
ri
en
ce
1
IS
A
w
ar
en
es
s
10
Fa
ro
oq
et
al
.[
20
]
in
cr
ea
se
-
-
61
4
St
ud
en
ts
B
eh
av
io
u
ra
l
In
te
n
ti
on
B
I
3
A
B
4
C
hu
et
al
.[
11
]
de
cr
ea
se
**
*
0,
36
5
20
8
-
B
I
3
A
B
3
B
au
er
an
d
B
er
nr
oi
de
r
[5
]
in
cr
ea
se
**
*
0,
56
0
18
3
Em
pl
oy
ee
s
B
I
2
A
B
-
B
os
s
et
al
.[
6]
in
cr
ea
se
**
*
0,
51
9
10
4
St
ud
en
ts
B
I
3
A
B
-
B
os
s
et
al
.[
6]
in
cr
ea
se
**
0,
19
7
10
4
St
ud
en
ts
Abstract1 Introduction2 Background2.1 Starting Point2.2
Description of the Behavioural Theories3 Methodology4
Results4.1 Protection Motivation Theory4.2 Theory of Planned
Behaviour4.3 General Deterrence Theory4.4 Technology
Acceptance Model5 Discussion5.1 Reliable Factors5.2 Excluded
Factors5.3 Limitations6 Conclusion7
AcknowledgmentReferences
WRITING A CRITICAL REVIEW
What is a critical review?
A critical review is much more than a simple summary; it is an
analysis and evaluation of a book, article,
or other medium. Writing a good critical review requires that
you understand the material, and that you
know how to analyze and evaluate that material using
appropriate criteria.
Steps to writing an effective critical review:
Reading
Skim the whole text to determine the overall thesis, structure
and methodology. This will help you better
understand how the different elements fit together once you
begin reading carefully.
Read critically. It is not enough to simply understand what the
author is saying; it is essential to
challenge it. Examine how the article is structured, the types of
reasons or evidence used to support the
conclusions, and whether the author is reliant on underlying
assumptions or theoretical frameworks. Take
copious notes that reflect what the text means AND what you
think about it.
Analyzing
Examine all elements. All aspects of the text—the structure,
the methods, the reasons and evidence, the
conclusions, and, especially, the logical connections between all
of these—should be considered.
The types of questions asked will vary depending on the
discipline in which you are writing, but the
following samples will provide a good starting point:
Structure What type of text is it? (For example: Is it a primary
source or secondary
source? Is it original research or a comment on original
research?)
What are the different sections and how do they fit together?
Are any of the sections particularly effective (or ineffective)?
Methodology Is the research quantitative or qualitative?
Does the methodology have any weaknesses?
How does the design of the study address the hypothesis?
Reasons/Evidence What sources does the author use (interviews,
peer-reviewed journals,
government reports, journal entries, newspaper accounts, etc.)?
What types of reasoning are employed (inductive, deductive,
abductive)?
What type of evidence is provided (empirical, statistical,
logical, etc.)?
Are there any gaps in the evidence (or reasoning)?
Conclusions Does the data adequately support the conclusion
drawn by the researcher(s)?
Are other interpretations plausible?
Are the conclusions dependent on a particular theoretical
formulation?
What does the work contribute to the field?
Logic What assumptions does the author make?
Does the author account for all of the data, or are portions left
out?
What alternative perspectives remain unconsidered?
Are there any logical flaws in the construction of the argument?
© Allyson Skene. The Writing Centre, University of Toronto at
Scarborough. See terms and conditions for use at
http://www.utsc.utoronto.ca/~tlsweb/TWC/webresources/terms.
htm
Writing
Formulate a thesis based on your overall evaluation. A strong
thesis will acknowledge both strengths
and limitations.
E.g. While the article reports significant research supporting the
view that certain types of computer
use can have a positive impact on a student’s GPA, the
conclusion that game playing alone can
improve student achievement is based on a misinterpretation of
the evidence.
Not: This article misinterprets key evidence to support the
conclusion that game playing can improve GPA.
Ensure that your thesis answers the assignment. If you are asked
to write a review of a single text, with
no outside sources, then your essay should focus strictly on the
material in the text and your analysis and
evaluation of it. If you are asked to write about more than one
work, or to draw connections between an
article or book and the course material, then your review should
address these concerns.
Choose a structure that will best allow you to support your
thesis within the required page constraints.
The first example below works well with shorter assignments,
but the risk is that too much time will be
spent developing the overview, and too little time on the
evaluation. The second example works better for
longer reviews because it provides the relevant description with
the analysis and evaluation, allowing the
reader to follow the argument easily.
Two common structures used for critical reviews:
Example 1 Example 2
Introduction
Overview of the text
Evaluation of the text
� Point 1
� Point 2
� Point 3
� Point 4 …(continue as necessary)
Conclusion
Introduction (with thesis)
Point 1: Explanation and evaluation
Point 2: Explanation and evaluation
Point 3: Explanation and evaluation
(continue elaborating as many points as
necessary)
Conclusion
Important: Avoid presenting your points in a laundry-list style.
Synthesize the information as much as
possible.
“Laundry-List” Style of Presentation Synthesized Argument.
The article cites several different studies in support
of the argument that playing violent video games can
have a positive impact on student achievement.
These studies refer to educational games and other
types of computer use. The argument is not logically
well constructed. Educational games are not the same
as violent video games. The article also ignores data
indicating that people with the highest GPA are those
that reported low computer use. Also, different types
of computer use could include things like researching
or word-processing, and these activities are very
different from playing violent video games.
The evidence cited in the article does not support the
overall conclusion that playing violent games improves
GPA. One study only examines educational games in
relation to GPA, so it is questionable whether the same
findings will hold true for other types of games. Another
study does not distinguish between different types of
computer use, making it difficult to assess whether it is
game playing or activities such as research and writing
that contributed to improvements in GPA. Further, the
author disregards relevant data that indicates that students
with the highest GPAs are those who report low
computer use, which means that a direct correlation
between game playing and GPA cannot be supported.
Reliable Behavioural Factors in the Information SecurityCont.docx

More Related Content

Similar to Reliable Behavioural Factors in the Information SecurityCont.docx

System Dynamics Based Insider Threats Modeling
System Dynamics Based Insider Threats ModelingSystem Dynamics Based Insider Threats Modeling
System Dynamics Based Insider Threats Modeling
IJNSA Journal
 
NIST Privacy Engineering Working Group -- Risk Models
 NIST Privacy Engineering Working Group -- Risk Models NIST Privacy Engineering Working Group -- Risk Models
NIST Privacy Engineering Working Group -- Risk Models
David Sweigert
 
Running head cyber security competition framework cyber securi
Running head cyber security competition framework cyber securiRunning head cyber security competition framework cyber securi
Running head cyber security competition framework cyber securi
DIPESH30
 
E1804012536
E1804012536E1804012536
E1804012536
IOSR Journals
 
Security Culture, Top Management, and Training on Security Effectiveness: A C...
Security Culture, Top Management, and Training on Security Effectiveness: A C...Security Culture, Top Management, and Training on Security Effectiveness: A C...
Security Culture, Top Management, and Training on Security Effectiveness: A C...
IJCNCJournal
 
SECURITY CULTURE, TOP MANAGEMENT, AND TRAINING ON SECURITY EFFECTIVENESS: A C...
SECURITY CULTURE, TOP MANAGEMENT, AND TRAINING ON SECURITY EFFECTIVENESS: A C...SECURITY CULTURE, TOP MANAGEMENT, AND TRAINING ON SECURITY EFFECTIVENESS: A C...
SECURITY CULTURE, TOP MANAGEMENT, AND TRAINING ON SECURITY EFFECTIVENESS: A C...
IJCNCJournal
 
Designing Schneier’s Five Step Risk Analysis Process into an Online Role Play...
Designing Schneier’s Five Step Risk Analysis Process into an Online Role Play...Designing Schneier’s Five Step Risk Analysis Process into an Online Role Play...
Designing Schneier’s Five Step Risk Analysis Process into an Online Role Play...
Nicola Marae Allain, PhD
 
Information Security Management System: Emerging Issues and Prospect
Information Security Management System: Emerging Issues and ProspectInformation Security Management System: Emerging Issues and Prospect
Information Security Management System: Emerging Issues and Prospect
IOSR Journals
 
A REVIEW OF SECURITY INTEGRATION TECHNIQUE IN AGILE SOFTWARE DEVELOPMENT
A REVIEW OF SECURITY INTEGRATION TECHNIQUE IN AGILE SOFTWARE DEVELOPMENTA REVIEW OF SECURITY INTEGRATION TECHNIQUE IN AGILE SOFTWARE DEVELOPMENT
A REVIEW OF SECURITY INTEGRATION TECHNIQUE IN AGILE SOFTWARE DEVELOPMENT
ijseajournal
 
Comparative Analysis of Information Security Governance Fram
Comparative Analysis of Information Security Governance FramComparative Analysis of Information Security Governance Fram
Comparative Analysis of Information Security Governance Fram
LynellBull52
 
Executable Security Policies: Specification and Validation of Security Policies
Executable Security Policies: Specification and Validation of Security PoliciesExecutable Security Policies: Specification and Validation of Security Policies
Executable Security Policies: Specification and Validation of Security Policies
ijwmn
 
A SURVEY ON TECHNIQUES REQUIREMENTS FOR INTEGRATEING SAFETY AND SECURITY ENGI...
A SURVEY ON TECHNIQUES REQUIREMENTS FOR INTEGRATEING SAFETY AND SECURITY ENGI...A SURVEY ON TECHNIQUES REQUIREMENTS FOR INTEGRATEING SAFETY AND SECURITY ENGI...
A SURVEY ON TECHNIQUES REQUIREMENTS FOR INTEGRATEING SAFETY AND SECURITY ENGI...
IJCSES Journal
 
Application of Q methodology in critical success factors of information secur...
Application of Q methodology in critical success factors of information secur...Application of Q methodology in critical success factors of information secur...
Application of Q methodology in critical success factors of information secur...
stuimrozsm
 
Information Systems Security & Strategy
Information Systems Security & StrategyInformation Systems Security & Strategy
Information Systems Security & Strategy
Tony Hauxwell
 
SECURE SERVICES: INTEGRATING SECURITY DIMENSION INTO THE SA&D
SECURE SERVICES: INTEGRATING SECURITY DIMENSION INTO THE SA&D SECURE SERVICES: INTEGRATING SECURITY DIMENSION INTO THE SA&D
SECURE SERVICES: INTEGRATING SECURITY DIMENSION INTO THE SA&D
cscpconf
 
Healthcares Vulnerability to Ransomware AttacksResearch questio
Healthcares Vulnerability to Ransomware AttacksResearch questioHealthcares Vulnerability to Ransomware AttacksResearch questio
Healthcares Vulnerability to Ransomware AttacksResearch questio
SusanaFurman449
 
Ch.5 rq (1)
Ch.5 rq (1)Ch.5 rq (1)
Ch.5 rq (1)
anthnydvs
 
System Adoption: Socio-Technical Integration
System Adoption: Socio-Technical IntegrationSystem Adoption: Socio-Technical Integration
System Adoption: Socio-Technical Integration
The International Journal of Business Management and Technology
 
TECHNOLOGY ACCEPTANCE MODELS & FRAMEWORKS
TECHNOLOGY ACCEPTANCE MODELS & FRAMEWORKSTECHNOLOGY ACCEPTANCE MODELS & FRAMEWORKS
TECHNOLOGY ACCEPTANCE MODELS & FRAMEWORKS
Hamed Taherdoost
 
Strategic HRM Plan Grading GuideHRM498 Version 42.docx
Strategic HRM Plan Grading GuideHRM498 Version 42.docxStrategic HRM Plan Grading GuideHRM498 Version 42.docx
Strategic HRM Plan Grading GuideHRM498 Version 42.docx
florriezhamphrey3065
 

Similar to Reliable Behavioural Factors in the Information SecurityCont.docx (20)

System Dynamics Based Insider Threats Modeling
System Dynamics Based Insider Threats ModelingSystem Dynamics Based Insider Threats Modeling
System Dynamics Based Insider Threats Modeling
 
NIST Privacy Engineering Working Group -- Risk Models
 NIST Privacy Engineering Working Group -- Risk Models NIST Privacy Engineering Working Group -- Risk Models
NIST Privacy Engineering Working Group -- Risk Models
 
Running head cyber security competition framework cyber securi
Running head cyber security competition framework cyber securiRunning head cyber security competition framework cyber securi
Running head cyber security competition framework cyber securi
 
E1804012536
E1804012536E1804012536
E1804012536
 
Security Culture, Top Management, and Training on Security Effectiveness: A C...
Security Culture, Top Management, and Training on Security Effectiveness: A C...Security Culture, Top Management, and Training on Security Effectiveness: A C...
Security Culture, Top Management, and Training on Security Effectiveness: A C...
 
SECURITY CULTURE, TOP MANAGEMENT, AND TRAINING ON SECURITY EFFECTIVENESS: A C...
SECURITY CULTURE, TOP MANAGEMENT, AND TRAINING ON SECURITY EFFECTIVENESS: A C...SECURITY CULTURE, TOP MANAGEMENT, AND TRAINING ON SECURITY EFFECTIVENESS: A C...
SECURITY CULTURE, TOP MANAGEMENT, AND TRAINING ON SECURITY EFFECTIVENESS: A C...
 
Designing Schneier’s Five Step Risk Analysis Process into an Online Role Play...
Designing Schneier’s Five Step Risk Analysis Process into an Online Role Play...Designing Schneier’s Five Step Risk Analysis Process into an Online Role Play...
Designing Schneier’s Five Step Risk Analysis Process into an Online Role Play...
 
Information Security Management System: Emerging Issues and Prospect
Information Security Management System: Emerging Issues and ProspectInformation Security Management System: Emerging Issues and Prospect
Information Security Management System: Emerging Issues and Prospect
 
A REVIEW OF SECURITY INTEGRATION TECHNIQUE IN AGILE SOFTWARE DEVELOPMENT
A REVIEW OF SECURITY INTEGRATION TECHNIQUE IN AGILE SOFTWARE DEVELOPMENTA REVIEW OF SECURITY INTEGRATION TECHNIQUE IN AGILE SOFTWARE DEVELOPMENT
A REVIEW OF SECURITY INTEGRATION TECHNIQUE IN AGILE SOFTWARE DEVELOPMENT
 
Comparative Analysis of Information Security Governance Fram
Comparative Analysis of Information Security Governance FramComparative Analysis of Information Security Governance Fram
Comparative Analysis of Information Security Governance Fram
 
Executable Security Policies: Specification and Validation of Security Policies
Executable Security Policies: Specification and Validation of Security PoliciesExecutable Security Policies: Specification and Validation of Security Policies
Executable Security Policies: Specification and Validation of Security Policies
 
A SURVEY ON TECHNIQUES REQUIREMENTS FOR INTEGRATEING SAFETY AND SECURITY ENGI...
A SURVEY ON TECHNIQUES REQUIREMENTS FOR INTEGRATEING SAFETY AND SECURITY ENGI...A SURVEY ON TECHNIQUES REQUIREMENTS FOR INTEGRATEING SAFETY AND SECURITY ENGI...
A SURVEY ON TECHNIQUES REQUIREMENTS FOR INTEGRATEING SAFETY AND SECURITY ENGI...
 
Application of Q methodology in critical success factors of information secur...
Application of Q methodology in critical success factors of information secur...Application of Q methodology in critical success factors of information secur...
Application of Q methodology in critical success factors of information secur...
 
Information Systems Security & Strategy
Information Systems Security & StrategyInformation Systems Security & Strategy
Information Systems Security & Strategy
 
SECURE SERVICES: INTEGRATING SECURITY DIMENSION INTO THE SA&D
SECURE SERVICES: INTEGRATING SECURITY DIMENSION INTO THE SA&D SECURE SERVICES: INTEGRATING SECURITY DIMENSION INTO THE SA&D
SECURE SERVICES: INTEGRATING SECURITY DIMENSION INTO THE SA&D
 
Healthcares Vulnerability to Ransomware AttacksResearch questio
Healthcares Vulnerability to Ransomware AttacksResearch questioHealthcares Vulnerability to Ransomware AttacksResearch questio
Healthcares Vulnerability to Ransomware AttacksResearch questio
 
Ch.5 rq (1)
Ch.5 rq (1)Ch.5 rq (1)
Ch.5 rq (1)
 
System Adoption: Socio-Technical Integration
System Adoption: Socio-Technical IntegrationSystem Adoption: Socio-Technical Integration
System Adoption: Socio-Technical Integration
 
TECHNOLOGY ACCEPTANCE MODELS & FRAMEWORKS
TECHNOLOGY ACCEPTANCE MODELS & FRAMEWORKSTECHNOLOGY ACCEPTANCE MODELS & FRAMEWORKS
TECHNOLOGY ACCEPTANCE MODELS & FRAMEWORKS
 
Strategic HRM Plan Grading GuideHRM498 Version 42.docx
Strategic HRM Plan Grading GuideHRM498 Version 42.docxStrategic HRM Plan Grading GuideHRM498 Version 42.docx
Strategic HRM Plan Grading GuideHRM498 Version 42.docx
 

More from carlt4

Reorganizing a company can be very difficult and time consuming. It .docx
Reorganizing a company can be very difficult and time consuming. It .docxReorganizing a company can be very difficult and time consuming. It .docx
Reorganizing a company can be very difficult and time consuming. It .docx
carlt4
 
Renting vs Buying Home (22)NameSample StudentDateJune 3, 201922R.docx
Renting vs Buying Home (22)NameSample StudentDateJune 3, 201922R.docxRenting vs Buying Home (22)NameSample StudentDateJune 3, 201922R.docx
Renting vs Buying Home (22)NameSample StudentDateJune 3, 201922R.docx
carlt4
 
Rent and view one of the films from the list below. You should view .docx
Rent and view one of the films from the list below. You should view .docxRent and view one of the films from the list below. You should view .docx
Rent and view one of the films from the list below. You should view .docx
carlt4
 
reparea 1,050- to 1,400-word paper in which you discuss causes o.docx
reparea 1,050- to 1,400-word paper in which you discuss causes o.docxreparea 1,050- to 1,400-word paper in which you discuss causes o.docx
reparea 1,050- to 1,400-word paper in which you discuss causes o.docx
carlt4
 
Rene CaraoylQuestions to be answeredWhat is the main .docx
Rene CaraoylQuestions to be answeredWhat is the main .docxRene CaraoylQuestions to be answeredWhat is the main .docx
Rene CaraoylQuestions to be answeredWhat is the main .docx
carlt4
 
Renal FailurePatient ProfileJ.M. is a 37-year-old woman.docx
Renal FailurePatient ProfileJ.M. is a 37-year-old woman.docxRenal FailurePatient ProfileJ.M. is a 37-year-old woman.docx
Renal FailurePatient ProfileJ.M. is a 37-year-old woman.docx
carlt4
 
Renewable and Waste to Energy (ENVR 0016)-Spring -2020 -CW (As.docx
Renewable and Waste to Energy (ENVR 0016)-Spring -2020 -CW (As.docxRenewable and Waste to Energy (ENVR 0016)-Spring -2020 -CW (As.docx
Renewable and Waste to Energy (ENVR 0016)-Spring -2020 -CW (As.docx
carlt4
 
Rene Descartes. The Philosophical Works of Descartes. Translat.docx
Rene Descartes. The Philosophical Works of Descartes. Translat.docxRene Descartes. The Philosophical Works of Descartes. Translat.docx
Rene Descartes. The Philosophical Works of Descartes. Translat.docx
carlt4
 
Renaissance MadrigalsStep 1Click on this link (Links t.docx
Renaissance MadrigalsStep 1Click on this link (Links t.docxRenaissance MadrigalsStep 1Click on this link (Links t.docx
Renaissance MadrigalsStep 1Click on this link (Links t.docx
carlt4
 
Renaissance History and Religion – Which three (3) historical or cul.docx
Renaissance History and Religion – Which three (3) historical or cul.docxRenaissance History and Religion – Which three (3) historical or cul.docx
Renaissance History and Religion – Which three (3) historical or cul.docx
carlt4
 
Renal Case StudyA 51 year old Caucasian-American female pres.docx
Renal Case StudyA 51 year old Caucasian-American female pres.docxRenal Case StudyA 51 year old Caucasian-American female pres.docx
Renal Case StudyA 51 year old Caucasian-American female pres.docx
carlt4
 
Removal of cash payments at LOCLBus Ltd.OverviewLOCLBus Ltd .docx
Removal of cash payments at LOCLBus Ltd.OverviewLOCLBus Ltd .docxRemoval of cash payments at LOCLBus Ltd.OverviewLOCLBus Ltd .docx
Removal of cash payments at LOCLBus Ltd.OverviewLOCLBus Ltd .docx
carlt4
 
Remove or Replace Header Is Not Doc TitleGoals of Counseling Se.docx
Remove or Replace Header Is Not Doc TitleGoals of Counseling Se.docxRemove or Replace Header Is Not Doc TitleGoals of Counseling Se.docx
Remove or Replace Header Is Not Doc TitleGoals of Counseling Se.docx
carlt4
 
RemRem $Header sh_cremv.sql 01-feb-2001.151321 ahunold Exp $.docx
RemRem $Header sh_cremv.sql 01-feb-2001.151321 ahunold Exp $.docxRemRem $Header sh_cremv.sql 01-feb-2001.151321 ahunold Exp $.docx
RemRem $Header sh_cremv.sql 01-feb-2001.151321 ahunold Exp $.docx
carlt4
 
Remote AuthenticationMore companies are allowing users to work.docx
Remote AuthenticationMore companies are allowing users to work.docxRemote AuthenticationMore companies are allowing users to work.docx
Remote AuthenticationMore companies are allowing users to work.docx
carlt4
 
Reminders and Announcements Exam 2 due, Group Formation .docx
Reminders and Announcements Exam 2 due, Group Formation .docxReminders and Announcements Exam 2 due, Group Formation .docx
Reminders and Announcements Exam 2 due, Group Formation .docx
carlt4
 
Remember When it comes time to submit Unit 2 Journals, please s.docx
Remember When it comes time to submit Unit 2 Journals, please s.docxRemember When it comes time to submit Unit 2 Journals, please s.docx
Remember When it comes time to submit Unit 2 Journals, please s.docx
carlt4
 
Remember to use the same brick and mortar business or organization y.docx
Remember to use the same brick and mortar business or organization y.docxRemember to use the same brick and mortar business or organization y.docx
Remember to use the same brick and mortar business or organization y.docx
carlt4
 
Remember to support your answers with at least 2 referencesa.docx
Remember to support your answers with at least 2 referencesa.docxRemember to support your answers with at least 2 referencesa.docx
Remember to support your answers with at least 2 referencesa.docx
carlt4
 
Remember to include a definition for the concept you chose and .docx
Remember to include a definition for the concept you chose and .docxRemember to include a definition for the concept you chose and .docx
Remember to include a definition for the concept you chose and .docx
carlt4
 

More from carlt4 (20)

Reorganizing a company can be very difficult and time consuming. It .docx
Reorganizing a company can be very difficult and time consuming. It .docxReorganizing a company can be very difficult and time consuming. It .docx
Reorganizing a company can be very difficult and time consuming. It .docx
 
Renting vs Buying Home (22)NameSample StudentDateJune 3, 201922R.docx
Renting vs Buying Home (22)NameSample StudentDateJune 3, 201922R.docxRenting vs Buying Home (22)NameSample StudentDateJune 3, 201922R.docx
Renting vs Buying Home (22)NameSample StudentDateJune 3, 201922R.docx
 
Rent and view one of the films from the list below. You should view .docx
Rent and view one of the films from the list below. You should view .docxRent and view one of the films from the list below. You should view .docx
Rent and view one of the films from the list below. You should view .docx
 
reparea 1,050- to 1,400-word paper in which you discuss causes o.docx
reparea 1,050- to 1,400-word paper in which you discuss causes o.docxreparea 1,050- to 1,400-word paper in which you discuss causes o.docx
reparea 1,050- to 1,400-word paper in which you discuss causes o.docx
 
Rene CaraoylQuestions to be answeredWhat is the main .docx
Rene CaraoylQuestions to be answeredWhat is the main .docxRene CaraoylQuestions to be answeredWhat is the main .docx
Rene CaraoylQuestions to be answeredWhat is the main .docx
 
Renal FailurePatient ProfileJ.M. is a 37-year-old woman.docx
Renal FailurePatient ProfileJ.M. is a 37-year-old woman.docxRenal FailurePatient ProfileJ.M. is a 37-year-old woman.docx
Renal FailurePatient ProfileJ.M. is a 37-year-old woman.docx
 
Renewable and Waste to Energy (ENVR 0016)-Spring -2020 -CW (As.docx
Renewable and Waste to Energy (ENVR 0016)-Spring -2020 -CW (As.docxRenewable and Waste to Energy (ENVR 0016)-Spring -2020 -CW (As.docx
Renewable and Waste to Energy (ENVR 0016)-Spring -2020 -CW (As.docx
 
Rene Descartes. The Philosophical Works of Descartes. Translat.docx
Rene Descartes. The Philosophical Works of Descartes. Translat.docxRene Descartes. The Philosophical Works of Descartes. Translat.docx
Rene Descartes. The Philosophical Works of Descartes. Translat.docx
 
Renaissance MadrigalsStep 1Click on this link (Links t.docx
Renaissance MadrigalsStep 1Click on this link (Links t.docxRenaissance MadrigalsStep 1Click on this link (Links t.docx
Renaissance MadrigalsStep 1Click on this link (Links t.docx
 
Renaissance History and Religion – Which three (3) historical or cul.docx
Renaissance History and Religion – Which three (3) historical or cul.docxRenaissance History and Religion – Which three (3) historical or cul.docx
Renaissance History and Religion – Which three (3) historical or cul.docx
 
Renal Case StudyA 51 year old Caucasian-American female pres.docx
Renal Case StudyA 51 year old Caucasian-American female pres.docxRenal Case StudyA 51 year old Caucasian-American female pres.docx
Renal Case StudyA 51 year old Caucasian-American female pres.docx
 
Removal of cash payments at LOCLBus Ltd.OverviewLOCLBus Ltd .docx
Removal of cash payments at LOCLBus Ltd.OverviewLOCLBus Ltd .docxRemoval of cash payments at LOCLBus Ltd.OverviewLOCLBus Ltd .docx
Removal of cash payments at LOCLBus Ltd.OverviewLOCLBus Ltd .docx
 
Remove or Replace Header Is Not Doc TitleGoals of Counseling Se.docx
Remove or Replace Header Is Not Doc TitleGoals of Counseling Se.docxRemove or Replace Header Is Not Doc TitleGoals of Counseling Se.docx
Remove or Replace Header Is Not Doc TitleGoals of Counseling Se.docx
 
RemRem $Header sh_cremv.sql 01-feb-2001.151321 ahunold Exp $.docx
RemRem $Header sh_cremv.sql 01-feb-2001.151321 ahunold Exp $.docxRemRem $Header sh_cremv.sql 01-feb-2001.151321 ahunold Exp $.docx
RemRem $Header sh_cremv.sql 01-feb-2001.151321 ahunold Exp $.docx
 
Remote AuthenticationMore companies are allowing users to work.docx
Remote AuthenticationMore companies are allowing users to work.docxRemote AuthenticationMore companies are allowing users to work.docx
Remote AuthenticationMore companies are allowing users to work.docx
 
Reminders and Announcements Exam 2 due, Group Formation .docx
Reminders and Announcements Exam 2 due, Group Formation .docxReminders and Announcements Exam 2 due, Group Formation .docx
Reminders and Announcements Exam 2 due, Group Formation .docx
 
Remember When it comes time to submit Unit 2 Journals, please s.docx
Remember When it comes time to submit Unit 2 Journals, please s.docxRemember When it comes time to submit Unit 2 Journals, please s.docx
Remember When it comes time to submit Unit 2 Journals, please s.docx
 
Remember to use the same brick and mortar business or organization y.docx
Remember to use the same brick and mortar business or organization y.docxRemember to use the same brick and mortar business or organization y.docx
Remember to use the same brick and mortar business or organization y.docx
 
Remember to support your answers with at least 2 referencesa.docx
Remember to support your answers with at least 2 referencesa.docxRemember to support your answers with at least 2 referencesa.docx
Remember to support your answers with at least 2 referencesa.docx
 
Remember to include a definition for the concept you chose and .docx
Remember to include a definition for the concept you chose and .docxRemember to include a definition for the concept you chose and .docx
Remember to include a definition for the concept you chose and .docx
 

Recently uploaded

Types of Herbal Cosmetics its standardization.
Types of Herbal Cosmetics its standardization.Types of Herbal Cosmetics its standardization.
Types of Herbal Cosmetics its standardization.
Ashokrao Mane college of Pharmacy Peth-Vadgaon
 
Smart-Money for SMC traders good time and ICT
Smart-Money for SMC traders good time and ICTSmart-Money for SMC traders good time and ICT
Smart-Money for SMC traders good time and ICT
simonomuemu
 
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdfANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
Priyankaranawat4
 
Digital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments UnitDigital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments Unit
chanes7
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
Peter Windle
 
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama UniversityNatural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Akanksha trivedi rama nursing college kanpur.
 
clinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdfclinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdf
Priyankaranawat4
 
Advanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docxAdvanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docx
adhitya5119
 
Assessment and Planning in Educational technology.pptx
Assessment and Planning in Educational technology.pptxAssessment and Planning in Educational technology.pptx
Assessment and Planning in Educational technology.pptx
Kavitha Krishnan
 
MARY JANE WILSON, A “BOA MÃE” .
MARY JANE WILSON, A “BOA MÃE”           .MARY JANE WILSON, A “BOA MÃE”           .
MARY JANE WILSON, A “BOA MÃE” .
Colégio Santa Teresinha
 
The History of Stoke Newington Street Names
The History of Stoke Newington Street NamesThe History of Stoke Newington Street Names
The History of Stoke Newington Street Names
History of Stoke Newington
 
The Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collectionThe Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collection
Israel Genealogy Research Association
 
writing about opinions about Australia the movie
writing about opinions about Australia the moviewriting about opinions about Australia the movie
writing about opinions about Australia the movie
Nicholas Montgomery
 
Liberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdfLiberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdf
WaniBasim
 
How to Fix the Import Error in the Odoo 17
How to Fix the Import Error in the Odoo 17How to Fix the Import Error in the Odoo 17
How to Fix the Import Error in the Odoo 17
Celine George
 
Life upper-Intermediate B2 Workbook for student
Life upper-Intermediate B2 Workbook for studentLife upper-Intermediate B2 Workbook for student
Life upper-Intermediate B2 Workbook for student
NgcHiNguyn25
 
Azure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHatAzure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHat
Scholarhat
 
Top five deadliest dog breeds in America
Top five deadliest dog breeds in AmericaTop five deadliest dog breeds in America
Top five deadliest dog breeds in America
Bisnar Chase Personal Injury Attorneys
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
TechSoup
 
The simplified electron and muon model, Oscillating Spacetime: The Foundation...
The simplified electron and muon model, Oscillating Spacetime: The Foundation...The simplified electron and muon model, Oscillating Spacetime: The Foundation...
The simplified electron and muon model, Oscillating Spacetime: The Foundation...
RitikBhardwaj56
 

Recently uploaded (20)

Types of Herbal Cosmetics its standardization.
Types of Herbal Cosmetics its standardization.Types of Herbal Cosmetics its standardization.
Types of Herbal Cosmetics its standardization.
 
Smart-Money for SMC traders good time and ICT
Smart-Money for SMC traders good time and ICTSmart-Money for SMC traders good time and ICT
Smart-Money for SMC traders good time and ICT
 
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdfANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
 
Digital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments UnitDigital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments Unit
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
 
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama UniversityNatural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
 
clinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdfclinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdf
 
Advanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docxAdvanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docx
 
Assessment and Planning in Educational technology.pptx
Assessment and Planning in Educational technology.pptxAssessment and Planning in Educational technology.pptx
Assessment and Planning in Educational technology.pptx
 
MARY JANE WILSON, A “BOA MÃE” .
MARY JANE WILSON, A “BOA MÃE”           .MARY JANE WILSON, A “BOA MÃE”           .
MARY JANE WILSON, A “BOA MÃE” .
 
The History of Stoke Newington Street Names
The History of Stoke Newington Street NamesThe History of Stoke Newington Street Names
The History of Stoke Newington Street Names
 
The Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collectionThe Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collection
 
writing about opinions about Australia the movie
writing about opinions about Australia the moviewriting about opinions about Australia the movie
writing about opinions about Australia the movie
 
Liberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdfLiberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdf
 
How to Fix the Import Error in the Odoo 17
How to Fix the Import Error in the Odoo 17How to Fix the Import Error in the Odoo 17
How to Fix the Import Error in the Odoo 17
 
Life upper-Intermediate B2 Workbook for student
Life upper-Intermediate B2 Workbook for studentLife upper-Intermediate B2 Workbook for student
Life upper-Intermediate B2 Workbook for student
 
Azure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHatAzure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHat
 
Top five deadliest dog breeds in America
Top five deadliest dog breeds in AmericaTop five deadliest dog breeds in America
Top five deadliest dog breeds in America
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
 
The simplified electron and muon model, Oscillating Spacetime: The Foundation...
The simplified electron and muon model, Oscillating Spacetime: The Foundation...The simplified electron and muon model, Oscillating Spacetime: The Foundation...
The simplified electron and muon model, Oscillating Spacetime: The Foundation...
 

Reliable Behavioural Factors in the Information SecurityCont.docx

  • 1. Reliable Behavioural Factors in the Information Security Context Peter Mayer SECUSO - Security, Usability, Society Technische Universität Darmstadt [email protected] Alexandra Kunz SECUSO - Security, Usability, Society Technische Universität Darmstadt [email protected] Melanie Volkamer SECUSO - Security, Usability, Society Technische Universität Darmstadt Privacy and Security Research Group Karlstad University [email protected] ABSTRACT Users do often not behave securely when using information technol- ogy. Many studies have tried to identify the factors of behavioural theories which can increase secure behaviour. The goal of this work is to identify which of the factors are reliably associated with secure behaviour across multiple studies. Those factors are of interest to in-
  • 2. formation security professionals since addressing them in security awareness and education campaigns can help improving security related processes of users. To attain our goal, we conducted a sys- tematic literature review and assessed the reliability of the factors based on the effect sizes reported in the literature. Our results indi- cate that 11 out of the 14 factors from well established behavioural theories can be associated with reliable effects in the information security context. These factors cover very different aspects: influ- ence of the users skills, whether the environment makes it possible to exhibit secure behaviour, the influence of friends or co- workers, and the perceived properties of the secure behaviour (e.g. response cost). Also, we identify areas, where more studies are needed to increase the confidence of the factors’ reliability assessment. CCS CONCEPTS • Security and privacy → Social aspects of security and pri- vacy; Usability in security and privacy; KEYWORDS Behavioural Theories, Behavioural Factors, Information Security ACM Reference format: Peter Mayer, Alexandra Kunz, and Melanie Volkamer. 2017. Reliable Be- havioural Factors in the Information Security Context. In Proceedings of
  • 3. ARES ’17, Reggio Calabria, Italy, August 29-September 01, 2017, 10 pages. https://doi.org/10.1145/3098954.3098986 1 INTRODUCTION Users do often not behave securely when using information tech- nology (e.g. they do not check links before clicking them or do not Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected] ARES ’17, August 29-September 01, 2017, Reggio Calabria, Italy © 2017 Copyright held by the owner/author(s). Publication rights licensed to Associa- tion for Computing Machinery. ACM ISBN 978-1-4503-5257-4/17/08.. .$15.00 https://doi.org/10.1145/3098954.3098986 perform backups regularly). This can raise severe security issues and has led to users being referred to as the weakest link in the security chain [40]. In many other contexts such as anti- smoking
  • 4. campaigns [38] or pedestrian safety [19] researchers have studied for many years which factors influence (in)adequate human be- haviour. Actually, there is an entire research area on behavioural theories. Theories that have been applied in many areas are for instance Protection Motivation Theory [39] or Theory of Planned Behaviour [1], but more specialized theories such as General Deter- rence Theory [21] originating from criminology research exist. The question, however, is which of the behavioural factors comprised in these theories also apply in the information security context. More recently, several of these theories have been evaluated in information security (IS) research e.g. Protection Motivation Theory in the context of anti-malware software use [6] or Theory of Planned behaviour in the context of compliance with security policies [36]. Some of the studied behavioural factors were shown to have a significant influence on human behaviour in the IS context, some in several studies, others only in some, and again others were shown to have significant influence in different directions. The goal of this work is to identify those behavioural factors which exhibit reliable effects in the information security context across different studies published in the literature. Note that we use the term factor regardless of the nomenclature used in the respective theories (e.g. factor, construct, technique, etc.).
  • 5. To achieve this goal, we conducted a systematic literature review of studies investigating the following behavioural theories which have been studied in the IS context by several researchers: Pro- tection Motivation Theory, Theory of Planned Behaviour, General Deterrence Theory, and Technology Acceptance Model. In total, these theories contain 14 behavioural factors. Out of the 14 factors in our investigation, eleven factors seem to be reliably associated with secure behaviour in the IS context, i.e. the effect sizes of these factors are reliably beyond certain thresholds: nine (namely self-efficacy, response cost, response efficacy, per- ceived severity of threats, subjective norms, perceived behavioural control, perceived certainty of sanctions, perceived severity of sanc- tions, and perceived ease of use) are associated with a weak effect (i.e. standardised effect size ≥ 0.1) and two (namely attitude and perceived usefulness) are associated with a medium effect (i.e. stan- dardised effect size ≥ 0.3). The remaining three factors cannot be associated with reliable effects in the IS context. While the two factors associated with reliable medium effects might be the focus of attention for IS professionals, our results also indicate the other the factors should not be disregarded to render
  • 6. https://doi.org/10.1145/3098954.3098986 https://doi.org/10.1145/3098954.3098986 ARES ’17, August 29-September 01, 2017, Reggio Calabria, Italy Maladaptive RewardsSelf-efficacy Perceived VulnerabilityResponse Costs Perceived Severity of ThreatsResponse efficacy Coping Appraisal Threat Appraisal Fear Behavioural Intention (Protection Motivation) Actual Behaviour Figure 1: The Protection Motivation Theory with all its standard factors (white background) and the factors added later on (grey background). their efforts most effective. Additionally, we find that for some factors the evidence is still scarce. In particular for the factors of the General Deterrence Theory more studies are needed to increase the confidence of the reliability assessment.
  • 7. The remainder of this work is structured as follows: First, we present the necessary background for our investigation and in- troduce the behavioural theories relevant for this work (section 2). Then, we describe the methodology applied to reach the goal of this work (section 3). Thereafter, we present the results of our systematic literature review, and assemble the set of reliable factors from all factors evaluated in the literature (section 4). Then, we discuss our methodology, our findings, the limitations of this work, and implications for future research (section 5). Last but not least, we summarise and conclude (section 6). 2 BACKGROUND In this section we outline the background underlying this work. First, we introduce the related work by Lebek et al. [34], which served as starting point for our investigation. Then we describe the theories and behavioural factors considered in our investigation. 2.1 Starting Point Lebek et al. [34] present a comprehensive literature review of be- havioural theories which were evaluated in the IS context. It was conducted in 2013. Their goal was to identify those theories that were studied most frequently in the IS context. In total, they found 54 theories which were studied; four of these were identified as be- ing most frequently studied: Protection Motivation Theory (PMT), Theory of Planned Behaviour (TPB), General Deterrence Theory (GDT), and Technology Acceptance Model (TAM). The goal of
  • 8. our research is to assess the reliability of the behavioural factors com- prised in these theories across the studies in published literature. We decided to focus on these four theories to ensure multiple stud- ies are available for our assessment. Therefore, we consider all the papers identified by Lebek et al. [34] in their literature review which investigate factors of these four theories. Additionally, we consider literature studying one of the four theories that was published after their original survey, as outlined in section 3. We decided to base our work on the review of Lebek et al. [34] despite an alternative by Sommestad et al. [44] being available due to two reasons. Firstly, Sommestad et al. focus solely on compliance with security policies and therefore exclude studies investigating important aspects of IS-related behaviour usually not found in organisational security policies (e.g. checking links before clicking on them), thereby ig- noring the context of non-organisational IS. Secondly, Lebek et al. searched for studies published in 2000 or later, while Sommestad et al. only included publications from 2006 onward. 2.2 Description of the Behavioural Theories
  • 9. In this section, we briefly present the four behavioural theories included in our investigation (i.e. Protection Motivation Theory, Theory of Planned Behaviour, General Deterrence Theory, and Technology Acceptance Model). For each theory, we first describe its overall concepts and then introduce all of its factors. 2.2.1 Protection Motivation Theory. Protection Motivation The- ory (PMT) explains an individual’s reaction to warnings about threats [39]. More formally termed, these warnings are called fear appeals, which “are persuasive messages designed to scare people by describing the terrible things that will happen to them if they do not do what the message recommends” [46]. PMT posits that the reaction is based on two appraisal processes, the coping appraisal and the threat appraisal. The coping appraisal process includes three factors contributing to an individual’s abil- ity to cope with a threat, namely self-efficacy, response costs, and response efficacy. In order to yield a positive coping appraisal (in terms of protection motivation), self-efficacy and response efficacy must outweigh the response costs. The second process, threat ap- praisal, includes three factors as well: perceived severity of threats, perceived vulnerability to the threat, and maladaptive rewards (also termed benefits in some publications). These factors contribute to
  • 10. an individual’s threat perception. In order to yield a positive threat appraisal (in terms of protection motivation), the perceived severity and vulnerability have to outweigh the maladaptive rewards. Figure 1 depicts an overview of PMT with all its core factors and the two factors fear and maladaptive rewards added later on [6]. One of the additional factors, fear, resides outside the two appraisal processes and is considered to be a result of the threat appraisal process. All factors are explained in the following. Self-efficacy. Self-efficacy represents an individual’s perception of her or his own ability to successfully exhibit a specific behaviour Reliable Behavioural Factors in the Information Security Context ARES ’17, August 29-September 01, 2017, Reggio Calabria, Italy Self-EfficacySubjective NormsAttitude Behavioural Intention (Planned Behaviour) Actual Behaviour Perceived Behavioural Control Controllability Figure 2: The Theory of Planned Behaviour with all factors.
  • 11. (in the context of PMT a specific coping action). In the IS domain, an example might be whether a user is able to install security updates for their operating system on their own. Vicarious experiences are experiences made through observation and have been identified as an antecedent to self-efficacy [4, 29]. Response Cost. The response costs include all costs associated with performing a coping action. Examples for such costs can be inconvenience incurred by performing the action (e.g. loss of pro- ductivity) or actual material costs (e.g. monetary costs). In the IS context, such response costs might be the time expenditure for entering a password as part of a specific task. Response Efficacy. The response efficacy refers to the belief that a certain coping action will lead to the removal (or at least a reduction) of the threat. In the IS context, an example might be whether an individual believes that checking links in emails actually prevents falling for phishing attacks. Perceived Severity of Threats. The perceived severity of threats refers to the magnitude of possible negative consequences a threat can cause. In the context of IS, this might be the amount of lost sensitive data during an unwanted disclosure event. Perceived Vulnerability. Vulnerability refers to the suscepti-
  • 12. bility or likelihood of possible negative consequences if no coping action is taken. In the IS context, this might refer to an individual’s perception of the likelihood that she or he will become the victim of a cyberscam. Maladaptive Rewards. This factor comprises all aspects of in- trinsic or extrinsic motivation arising from exposure to the threat. In the IS context this might correspond to the amount of time an individual saves when circumventing security procedures while performing a task. Fear. The perception of threats can lead to an unpleasant emo- tional state: fear. Fear drives the individual to responses aiming at decreasing the threat and in consequence also the fear arousal. Thereby, it is important to note that even horrific messages must not lead to the arousal of fear [3]. 2.2.2 Theory of Planned Behaviour. The Theory of Planned Be- haviour (TPB) evolved from the Theory of Reasoned Action and explains how individuals form behavioural intentions [1]. It is con- sidered to be one of the most validated behavioural theories [34]. TPB includes three primary factors: attitude, subjective norms, and perceived behavioural control. Figure 2 depicts an overview of TPB and its factors. Attitude. Attitude refers to an individual’s positive or negative
  • 13. feelings towards and perceptions of a certain behaviour. It describes the value of a behaviour for an individual. In the IS context, this might refer to opinions about the usage of specific security software or tools. Subjective Norms. Subjective norms represent the perceived behavioural expectations set by the individual’s environment (in particular close peers or people with higher authority). In the IS context, an example for a subjective norm might be whether it is considered usual behaviour to lock devices when they are not in use, even among peers. Perceived Behavioural Control. The perceived behavioural control traditionally integrates two components: an individual’s self-efficacy (as also included in PMT) and the perceived controllabil- ity. Controllability refers to an individual’s perception of available resources and opportunities as well as situational support (the degree of how favourable the environment is [29]) allowing the individual to actually exhibit desired behaviour [34]. In the infor- mation security context, an example covering all aspects of TPB’s perceived behavioural control might be whether an individual has both, the necessary privileges to install security software as well as the confidence and knowledge to operate such software. 2.2.3 General Deterrence Theory. General Deterrence Theory (GDT) stems from research on rational decision making. It was originally developed in the field of criminology, but is now
  • 14. widely adopted across different domains. GDT posits that two factors, the perceived certainty of sanctions and the perceived severity of sanctions, influence the deterrence regarding an illicit act [14]. The higher both of these factors are, the more individuals will be deterred from the act. Figure 3 depicts an overview of GDT and its two factors. Perceived Certainty of Sanctions. The perceived certainty of sanctions refers to the likelihood, that an illicit act is followed by sanctions (i.e. punishment). In the context of IS, this might be the perception of an employee regarding monitoring of network activity (and thus the detection of illicit traffic). Perceived Severity of Sanctions. The perceived severity of sanctions refers to the severity (i.e. magnitude) of sanctions which follow an illicit act. In the context of IS, this might be whether an em- ployee believes violations of the IS policy will have no consequences or even result in the termination of the employee’s contract. ARES ’17, August 29-September 01, 2017, Reggio Calabria, Italy Perceived Severity of Sanctions
  • 15. Perceived Certainty of Sanctions Behavioural Intention (Deterrence) Actual Behaviour Figure 3: The General Deterrence Theory with its factors. Perceived Ease of Use Perceived Usefulness Attitude Actual Behaviour Figure 4: The Technology Acceptance Model with its factors. 2.2.4 Technology Acceptance Model. The Technology Accep- tance Model (TAM) explains an individual’s acceptance and usage of technological systems [15]. TAM posits that usage of technology is influenced by an individ- ual’s attitude towards the usage which in turn is influenced by two factors: the perceived usefulness of the system and the perceived ease of use [15]. Figure 4 depicts an overview of TAM and its factors. Note that we only consider the original version of TAM since
  • 16. this seems to be the one applied in IS research [34]. Perceived Usefulness. The perceived usefulness refers to an individual’s subjective perception that using a specific system in- creases her or his effectiveness with regard to a specific task. In the IS context, this might be whether an IS tool actually solves an IS problem in the individual’s workflow. Perceived Ease of Use. The perceived ease of use refers to an individual’s subjective perception of whether using a specific system is free of effort. In the IS context, this might be whether an IS tool requires additional steps, which the individual has to take, before completing a task or whether it integrates with her or his existing workflow seamlessly. 3 METHODOLOGY The ultimate goal of this work is to identify factors of behavioural theories that are reliably associated with an individual’s inten- tion to perform secure IS-related behaviour. To achieve this goal, we employ a three-step process. In the following we present our methodology, outlining the procedures for each of these three steps. First Step – Literature Review: Based on the results of Lebek et al. [34], we decided to focus on those four behavioural theories that were identified as being most frequently studied: Protection
  • 17. Motivation Theory (PMT), Theory of Planned Behaviour (TPB), General Deterrence Theory (GDT), and Technology Acceptance Model (TAM). For the corresponding literature published before 2013, we rely on the papers identified by the literature review of Lebek et al. [34]. In order to include research published since their original review, we conducted a systematic literature review of quantitative empirical studies evaluating any of those four be- havioural theories in the IS context published since 2013. Thereby, we adopted Lebek et al.’s methodology. We searched through the ten databases AISeL, ScienceDirect, IEEEXplore, JSTOR, Springer- Link, ACM, Wiley, Emerald, InformsOnline and Palgrave Macmillan and included not only high-quality literature, but also literature from smaller and less known sources. Note, detailed explanations and justifications regarding the search methodology can be found in the description of Lebek et al. in [34]. We adopted all search terms (i.e. “security awareness”, “awareness training”, “awareness program”, “awareness campaign”, “security education”, “security motivation”, “security behavior” and “personnel security”) from [34]. After eliminating all irrelevant search in the same way as Lebek et al. [34] (non-academic publications such as white- papers or incomplete description of methodology) 13 additional publica- tions investigating behavioural theories were considered. Table 1
  • 18. gives an overview of the results reported in the publications we identified in our literature research. Second Step – Identifying Relevant Literature: Next, we filtered the studies we found in the first step. Lebek et al. [34] focused on identifying which theories are studied in the IS context, no matter whether they were applied to increasing secure IS- related behaviour (e.g. checking links before clicking them) or to decrease IS misuse (e.g. unauthorised modification of data). We, however, explicitly focus on those factors which are reliably associated with an individual’s intention to increase secure IS-related behaviour. Consequently, we only included studies in our literature review which investigated behavioural intention toward more secure IS- related behaviour and excluded all those studies investigating the effects of factors with relation to decreasing malicious behaviour or IS misuse, since decreasing misuse does not necessarily imply adopting more secure behaviour (e.g. factors stopping individuals to illegally access patient records might not convince individuals to check links before clicking them). While table 1 in the appendix lists both types of studies and which type they belong to, only those investigating effects on the individual’s intention to increase secure IS-related behaviour
  • 19. are considered in the third step. Additionally, all studies investigating increasing secure IS-related behaviour use structural equation mod- elling in their analysis and report path coefficients (which already represent standardised effect sizes, termed β). Consequently, only statistically significant results are considered, since non- significant results for path coefficients cannot be sensibly interpreted. In the following, we refer to the studies not sorted out in this step as relevant studies. Third Step – Identifying Reliable Factors: The final step is identifying the reliable factors. The basis for this assessment are the effect sizes reported in the relevant studies. Due to the non- linearity of effect sizes, we will not present mean averages, but instead look at the overall picture drawn by the effect sizes for each factor in our investigation. Effect sizes will be interpreted as small (β ≥ 0.10), Reliable Behavioural Factors in the Information Security Context ARES ’17, August 29-September 01, 2017, Reggio Calabria, Italy Figure 5: The effect sizes reported in the relevant studies for each of the factors in our investigation. The factors maladaptive
  • 20. rewards and fear are not shown since no relevant studies were found in the literature review. PMT: Protection Motivation Theory, SE: Self-efficacy, RC: Response Cost, RE: Response Efficacy, PSoT: Perceived Severity of Threats, PV: Perceived Vul- nerability, TPB: Theory of Planned Behaviour, A: Attitude, SN: Subjective Norms, PBC: Perceived Behavioural Control, GDT: General Deterrence Theory, PCoS: Perceived Certainty of Sanctions, PSoS: Perceived Severity of Sanctions, TAM: Technology Acceptance Model, PU: Perceived Usefulness, PEoU: Perceived Ease of Use. medium (β ≥ 0.30) or large (β ≥ 0.50), as suggested by Cohen [12] for Pearson’s correlation coefficient. 4 RESULTS Figure 5 gives an overview of the standardized effect sizes reported in the literature for each of the factors in our investigation. Note that some publications report on multiple studies (i.e. in the following, the number of cited publications might be smaller than the number of studies referred to) and not all studies include all factors of the theories they are investigating (i.e. the number of relevant studies can vary between the factors). In the following, whenever we refer to an individual’s behavioural intention to increase secure IS- related behaviour, we use the shortened form BI.
  • 21. 4.1 Protection Motivation Theory Self-efficacy. Three studies [5, 13] investigating the effect of self- efficacy on BI could be found in the literature review. All three show small effects (0.190 ≤ β ≤ 0.296), drawing a relatively clear picture. Therefore, our investigation indicates a reliable weak positive effect for self-efficacy on BI in the IS context. Response Cost. The results for the response cost draw a similar picture. Four relevant studies investigating this factor could be identified in the literature review, resulting in a range of effect sizes of −0.142 ≤ β ≤ −0.675. Three of the four studies [6, 13] indicated a weak negative effect and one [6] reports a large negative effect. Therefore, our investigation indicates a reliable weak negative effect of response cost on BI in the IS context (i.e. response cost correlates with a decreased BI). Response Efficacy. Four relevant studies investigating the ef- fect of response efficacy on BI could be found in the literature review. All reported a positive relationship. The resulting range of effect sizes is 0.060 ≤ β ≤ 0.310. While one study [41] failed to meet the threshold for a weak effect, a funnel plot also indicated that it represented an outlier in the available data. Of the other studies, one reported a medium effect [5] and five reported a weak
  • 22. effect [6, 13, 27, 28]. Overall, our investigation therefore indicates a weak positive reliable effect for response efficacy on BI. Perceived Severity of Threats. Five relevant studies from the literature research investigate the effect of the perceived severity of threats on BI. Four of those [5, 6, 13] report a weak positive effect (0.120 ≤ β ≤ 0.276). In contrast, only one [27] indicates a weak negative effect (β = −0.200). However, this study [27] has a relatively low number of participants and the study appeared as an outlier in a funnel plot. Thus, our investigation suggests a weak positive reliable effect for the perceived severity of threats on BI in the IS context. Perceived Vulnerability. Overall, two studies investigating the relationship between perceived vulnerability and BI could be found in our own literature research and in the literature review of Lebek et al. [34]. One indicates a weak positive effect [13], the other indicates a positive relationship, but fails to reach the threshold for the weak effect [27]. Therefore, our investigation indicates a non-reliable positive effect for the perceived vulnerability on BI. Maladaptive Rewards. None of the studies investigating mal- adaptive rewards held significant results. Thus, no assessment of its effects is possible. Fear. Analogously to the maladaptive rewards, none of the stud-
  • 23. ies investigating fear held significant results. Thus, no assessment of its effects is possible as well. 4.2 Theory of Planned Behaviour Attitude. All relevant studies investigating the effect of attitude on BI show a positive relationship [2, 7–9, 16–18, 26, 27, 36, 49]. The overall range of effect sizes is 0.180 ≤ β ≤ 0.537. Six show a weak effect, four a medium effect, and one a large effect. Therefore, our investigation indicates a reliable medium positive effect for attitude on BI in the IS context. ARES ’17, August 29-September 01, 2017, Reggio Calabria, Italy Subjective Norms. From the fourteen relevant studies investi- gating the effect of subjective norms on BI, thirteen report a positive effect, resulting in a range of 0.190 ≤ β ≤ 0.450. Eight report a weak positive effect [2, 9, 18, 27, 28, 31, 35, 36] and five a medium positive effect [16, 23, 24, 26, 42]). In contrast, only one study [10] reports a weak negative effect (β = −0.139). This negative effect is the smallest effect of all those reported in the literature. There- fore, our investigation suggests a reliable weak positive effect for subjective norms on BI in the IS context.
  • 24. Perceived Behavioural Control. Fourteen relevant studies in- vestigated the effect of TPB’s perceived behavioural control (PBC). Thereby, some studies investigated only one of PBC’s components (i.e. self-efficacy or controllability) and some studies investigated PBC as a whole, not distinguishing between the two components. Six relevant studies investigated PBC’s effect on BI as a whole. All studies showed positive effects. Three [16, 17] found a weak positive effect and three [26, 35, 49] found a medium positive effect (0.160 ≤ β ≤ 0.430). One study [16] also indicated a medium effect of self efficacy on PBC (β = 0.390). Two studies [16, 17] indicate a weak effect of Controllability on PBC (β = 0.208 and β = 0.290). Eight relevant studies investigated the effect of self-efficacy on BI (instead of the whole PBC construct). Seven [2, 9, 18, 24, 27, 28, 42] report a weak effect and one [41] reports a medium effect, resulting in an overall range of 0.100 ≤ β ≤ 0.310. One relevant study [18] investigated the effect of Controllability on BI (instead of the whole construct), indicating a weak effect (β = 0.130). Overall, our investigation indicates the consistency of the PBC
  • 25. and its two components self-efficacy and controllability. It suggests for PBC and its components a weak reliable effect on BI. 4.3 General Deterrence Theory Perceived Certainty of Sanctions. Two relevant studies [23, 24] investigate the effect of the perceived certainty of sanctions on BI. Both report a weak positive effect (β = 0.155 and β = 0.260). Thus, our investigation indicates a reliable weak positive effect for the perceived certainty of sanctions on BI in the IS context. Perceived Severity of Sanctions. The same two relevant stud- ies [23, 24] reporting on the perceived certainty of sanctions, also report on the effect of the perceived severity of sanctions. Both show a weak negative effect (β = −0.139 and β = −0.209). There- fore, our investigation indicates a reliable weak negative effect on BI in the IS context. 4.4 Technology Acceptance Model Perceived Usefulness. Six relevant studies investigating the per- ceived usefulness were identified in the literature review. Five in- vestigate the effect on the individual’s attitude. Three of those [16, 17, 47] report a large effect (0.500 ≤ β ≤ 0.520) and two [16, 22] report a weak effect (β = 0.270 and β = 0.298). Since both weak effects are very close to the medium effect threshold of β ≥ 0.30 and the majority of effects are large, we argue that our investigation indicates the a reliable medium positive effect for perceived usefulness on BI in the IS context.
  • 26. The one remaining study [31] investigates the effect of perceived usefulness on BI and reports a weak positive effect (β = 0.150). Perceived Ease of Use. Overall, three relevant studies investi- gated the perceived ease of use. Two of these [16, 47] investigated its effect on BI, both reporting weak positive effects (β = 0.260 and β = 0.286). Therefore, our investigation indicates a reliable weak effect of perceived ease of use on BI in the IS context. The remaining study [31] investigated the effect of perceived ease of use on BI and reported a positive relationship, but failed to meet the threshold of a weak effect. However, [31] only investigated the indirect effect of the perceived ease of use on BI. 5 DISCUSSION 5.1 Reliable Factors We find that 11 out of the 14 behavioural factors included in our investigation are – according to our assessment – reliably asso- ciated with secure IS-related behaviour. However, the majority of these factors (nine out of eleven) exhibit mostly weak effects. Namely these are: “self-efficacy”, “response cost”, “response effi- cacy”, “perceived severity of threats”, “subjective norms”, “perceived behavioural control”, “perceived certainty of sanctions”, “perceived severity of sanctions”, and “perceived ease of use”. Only the
  • 27. two factors “attitude” and “perceived usefulness” can be associated with reliable medium effects. This indicates that these two should be of particular interest to anyone wishing to evoke more secure IS- related behaviour. However, while the two factors associated with reliable medium effects might be the focus of attention, the other factors should not be disregarded. IS professionals should always keep all of the reliable factors in mind as to render their efforts most effective. In particular, ignoring one of the factors associated with reliable effects completely could render any effort to increase secure IS-related behaviour futile (e.g. fear appeals might not lead to more secure behaviour, if the self-effficacy of employees is low). Additionally, we find that in particular three of the factors asso- ciated with reliable effects (i.e. perceived severity of threats, subjec- tive norms, and perceived severity of sanctions) would benefit from additional studies being available in the literature to increase the confidence of their assessment. For “perceived severity of threats”, the effect sizes reported in the literature rendered an assessment difficult: one study reported a weak negative effect size, while all other studies indicated a weak positive effect. While the negative
  • 28. effect seems to be an outlier, more studies would help to assess this factor’s reliability with greater confidence. The same issue with con- flicting directions for the effect sizes arose for “subjective norms”, albeit to a much lesser extent. Since the number of relevant studies in the literature was much greater for this factor (14 for subjective norms vs. 5 for perceived severity of threats), the assessment could be made with much greater confidence. For the “perceived severity of sanctions” a different issue arose: we found effects which are inverse of what could be expected (i.e. a negative effect instead of a positive effect). This indicates that more severe sanctions lead to less secure IS-related behaviour. While unintuitive at first glance, we argue that this might represent a known phenomenon [25], where excessively severe sanctions do not have a repelling effect, but instead medium sanctions are more appropriate. The items in the respective studies (i.e. [23, 24]) mention employees being ter- minated after IS violations without any indication of what type of violation is meant (e.g. disclosing company secret data to the public Reliable Behavioural Factors in the Information Security
  • 29. Context ARES ’17, August 29-September 01, 2017, Reggio Calabria, Italy vs. sending an unencrypted email). Therefore, it might be that this phenomenon was observed in the respective studies. More research is needed to determine the true influence of this phenomenon in the IS context and give greater confidence in the assessment. 5.2 Excluded Factors Three of the factors in our investigation (all being part of PMT) proved not to be reliable in the IS context: “perceived vulnerability”, “maladaptive rewards”, and “fear”. For the “maladaptive rewards” no study in our literature review reported significant path coeffi- cients. Consequently, no assessment of its effect is possible. More research investigating this factor is required to determine what effect (however small it may be) this factor has in the IS context. The exclusion of the “perceived vulnerability” as non-reliable means that only the threat and its consequences seem to be relevant (represented by the three factors “perceived severity of threats”, “perceived certainty of sanctions” and “perceived severity of sanc- tions”) in the IS context. In contrast, how vulnerable an individual is to these threats seems to plays no role. We believe this to be a surprising finding. While the factor is non-reliable, the direction of
  • 30. the relationship is (as one would expect) positive. However, since only two relevant studies were found in the literature research, ad- ditional evidence from future studies could increase the confidence of the assessment. While none of the studies investigating fear as a factor for PMT reported significant results, an interesting observation comes from the studies of Boss et al. [6] who included fear in their model. When they only considered their high fear appeal condition in the analysis, all PMT factors became significant. Thus, a more thorough investigation of this factor might offer valuable insights. 5.3 Limitations We only included studies in our literature review which investigated behavioural intention toward more secure IS-related behaviour and and excluded all those studies investigating the effects of factors with relation to decreasing IS misuse. We argue that these two contexts (i.e. increasing secure IS-related behaviour and IS mis- use) should be treated separately in investigations such as this work. However, the overall low number of studies investigating be- havioural factors in the context of IS misuse in the literature review did not allow for a separate evaluation of the factors with respect to this context. Thus, studies investigating the effect of behavioural
  • 31. factors in the context of IS misuse might be valuable additions to the available literature. The number of relevant studies for each of the 14 factors in our investigation varied greatly. Especially for TAM’s “perceived ease of use”, Protection Motivation Theory’s “perceived vulnerability”, as well as General Deterrence Theory’s two factors “perceived certainty of sanctions” and “perceived severity of sanctions” only two relevant studies were found in the literature research. For GDT most studies seem to be placed in the context of IS misuse. Thus their exclusion decreased the number of available studies investigating GDT substantially from six to two. This of course adds uncertainty to the assessment of reliability. While we believe that our assessments are sound when considering the available evidence, further studies investigating these factors would allow an assessment with greater confidence. An issue in systematic literature reviews is a general tendency that significant and positive results get published more often than insignificant or negative results. This publication bias affects all literature reviews and cannot be prevented methodologically. Fun- nel plots are a possibility to check whether this bias affects the data collected in a systematic literature review [32]. An inspection of funnel plots for all factors in our study revealed only very few outliers, implying a low publication bias.
  • 32. Basing our investigation on the work of Lebek et al. [34], we only included the most frequently studied theories identified by them. Other theories might offer further insights and provide additional reliable factors. However, less popular and less frequently studied behavioural theories and factors are likely to have the problem of scarcity of relevant studies investigating these factors. Therefore we argue, that they are less valuable in works like this which are focusing on reliability across multiple studies. In particular, all the further factors (cf. Table 1, category Further Factors) which were included by numerous studies, but which are not part of established theories were excluded in our investigation due to the scarcity of relevant studies and subtle differences in the factors’ definitions. Also, while we employed the same rigorous process for our literature review as Lebek et al. [34], the same limitations apply. For instance, non-peer-reviewed publications such as whitepapers were excluded. While we argue this increases the overall quality of our results, it might also mean that we missed valid results. 6 CONCLUSION
  • 33. In this work, we identify factors from behavioural theories which are associated with reliable effects on individuals intention to in- crease secure IS-related behaviour. Thereby, we enable IS profes- sionals to appropriate the most influential factors for future efforts to direct users towards more secure behaviour. This renders the design of appropriate awareness and education materials much more efficient. Our discussion of this work’s findings outlines several areas where further research is needed to increase the confidence of reliability assessments of some of the behavioural factors in our investigation. In addition, we see two directions of future work. Firstly, our findings should be applied to design and create appro- priate IS awareness and education materials, allowing a subsequent validation of the identified set of reliable factors. When designing awareness materials (e.g. in the form of teasing texts or slogans), it might be possible to maximise their effectiveness by addressing the different reliable factors with appropriate wordings in the ma- terials. These texts and slogans could be created for various topics (e.g. password security, privacy settings, etc.), enabling the easy deployment of awareness campaigns by IS professionals covering all these topics.
  • 34. Secondly, research has identified several reasons users voice as justification for insecure behaviour in qualitative studies (e.g. [33, 43, 45]). Volkamer et al. [45] provide a broad overview of 17 different such reasons for insecure behaviour, formulating their model of precaution adoption. Investigating which reliable factors can be used to address which of the reasons in their model most effectively ARES ’17, August 29-September 01, 2017, Reggio Calabria, Italy could give IS professionals an additional tool to optimise their IS awareness and education efforts through formulations targeting specific reasons with the most appropriate factors. 7 ACKNOWLEDGMENT This work has been developed within the project ‘KMU AWARE’ which is funded by the German Federal Ministry for Economic Affairs and Energy. Moreover, it has been supported in part by the German Federal Ministry of Education and Research (BMBF) within CRISP (www.crisp-da.de/). The authors assume responsibility for the content. REFERENCES [1] Icek Ajzen. 1991. The theory of planned behavior. Organizational Behavior and
  • 35. Human Decision Processes 50, 2 (Dec. 1991), 179–211. [2] Ahmad Al-Omari, Omar El-Gayar, and Amit Deokar. 2012. Information security policy compliance: The role of information security awareness. In Proceedings of the Eighteenth Americas Conference on Information Systems. [3] Maria Bada and Angela Sasse. 2014. Cyber Security Awareness Campaigns - Why do they fail to change behaviour? Technical Report. GCSCC. [4] A Bandura. 1977. Self-efficacy: toward a unifying theory of behavioral change. Psychological review (1977). [5] Stefan Bauer and Edward W N Bernroider. 2015. The Effects of Awareness Programs on Information Security in Banks: The Roles of Protection Motivation and Monitoring. In Human Aspects of Information Security, Privacy, and Trust. Springer International Publishing, Cham, 154–164. [6] S R Boss, D F Galletta, P B Lowry, Gregory D Moody, and Peter Polak. 2015. What do systems users have to fear? Using fear appeals to engender threats and fear that motivate protective security behaviors. MIS Quarterly 39, 4 (2015), 837–864. [7] Burcu Bulgurcu, Hasan Cavusoglu, and Izak Benbasat. 2009. Effects of individual and organization based beliefs and the moderating role of work experience on
  • 36. insiders’ good security behaviors. In International Conference on Computational Science and Engineering. 476–481. [8] Burcu Bulgurcu, Hasan Cavusoglu, and Izak Benbasat. 2009. Roles of informa- tion security awareness and perceived fairness in information security policy compliance. In AMCIS 2009 Proceedings. [9] Burcu Bulgurcu, Hasan Cavusoglu, and Izak Benbasat. 2010. Information se- curity policy compliance: an empirical study of rationality- based beliefs and information security awareness. MIS quarterly 34, 3 (2010), 523–548. [10] Lijiao Cheng, Ying Li, Wenli Li, Eric Holm, and Qingguo Zhai. 2013. Understand- ing the violation of IS security policy in organizations: An integrated model based on social control and deterrence theory. Computers & Security 39 (Nov. 2013), 447–459. [11] Amanda M Y Chu, Patrick Y K Chau, and Mike K P So. 2014. Explaining the Misuse of Information Systems Resources in the Workplace: A Dual-Process Approach. Journal of Business Ethics 131, 1 (July 2014), 209– 225. [12] J Cohen. 1988. Statistical power analysis for the behavioral sciences (2nd ed.). Academic Press (1988).
  • 37. [13] Duy Dang-Pham and Siddhi Pittayachawan. 2015. Comparing intention to avoid malware across contexts in a BYOD-enabled Australian university: A Protection Motivation Theory approach. Computers & Security 48 (Feb. 2015), 281–297. [14] John D’Arcy, Anat Hovav, and Dennis Galletta. 2009. User Awareness of Security Countermeasures and Its Impact on Information Systems Misuse: A Deterrence Approach. Information Systems Research 20, 1 (2009), 79. [15] Fred D Davis Jr. 1986. A technology acceptance model for empirically testing new end-user information systems: Theory and results. Ph.D. Dissertation. Mas- sachusetts Institute of Technology. [16] Tamara Dinev, Jahyun Goo, Qing Hu, and Kichan Nam. 2009. User behaviour towards protective information technologies: the role of national cultural differ- ences. Information Systems Journal 19, 4 (2009), 391–412. [17] Tamara Dinev and Qing Hu. 2007. The centrality of awareness in the formation of user behavioral intention toward protective information technologies. Journal of the Association for Information Systems 8, 7 (2007), 386– 408. [18] Hadrian Geri Djajadikerta, Saiyidi Mat Roni, and Terri Trireksani. 2015. Dysfunc- tional information system behaviors are not all created the same: Challenges to
  • 38. the generalizability of security-based research. Information & management 52, 8 (Dec. 2015), 1012–1024. [19] Daphne Evans and Paul Norman. 2003. Predicting adolescent pedestriansâĂŹ road-crossing intentions: an application and extension of the Theory of Planned Behaviour. Health Education Research 18, 3 (2003), 267. [20] Ali Farooq, Johanna Isoaho, Seppo Virtanen, and Jouni Isoaho. 2015. Informa- tion Security Awareness in Educational Institution: An Analysis of Students’ Individual Factors. In 2015 IEEE TrustcomBigDataSEISPA. IEEE, 352–359. [21] Jack P Gibbs. 1975. Crime, punishment, and deterrence. [22] Tejaswini Herath, Rui Chen, Jingguo Wang, Ketan Banjara, Jeff Wilbur, and H. Raghav Rao. 2014. Security services as coping mechanisms: an investigation into user intention to adopt an email authentication service. Information Systems Journal 24, 1 (2014), 61–84. [23] Tejaswini Herath and H Raghav Rao. 2009. Encouraging information security be- haviors in organizations: Role of penalties, pressures and perceived effectiveness. Decision Support Systems 47, 2 (2009), 154–165. [24] Tejaswini Herath and H Raghav Rao. 2009. Protection motivation and deterrence: a framework for security policy compliance in organisations.
  • 39. European Journal of Information Systems 18, 2 (2009), 106–125. [25] Michael A Hogg and Graham M Vaughan. 2010. Essentials of Social Psychology. [26] Qing Hu, Tamara Dinev, Paul Hart, and Donna Cooke. 2012. Managing em- ployee compliance with information security policies: The critical role of top management and organizational culture. Decision Sciences 43, 4 (2012), 615–659. [27] Princely Ifinedo. 2012. Understanding information systems security policy compliance: An integration of the theory of planned behavior and the protection motivation theory. Computers & Security 31, 1 (2012), 83–95. [28] Allen C Johnston and Merrill Warkentin. 2010. Fear appeals and information security behaviors: an empirical study. MIS quarterly (2010), 549–566. [29] Allen C Johnston, Barbara Wech, Eric Jack, and Micah Beavers. 2010. Reigning in the Remote Employee: Applying Social Learning Theory to Explain Information Security Policy Compliance Attitudes. In Americas Conf. on Information Systems. [30] Miranda Kajtazi and Burcu Bulgurcu. 2013. Information Security Policy Compli- ance: An Empirical Study on Escalation of Commitment. In Nineteenth Americas Conference on Information Systems.
  • 40. [31] Jungsun Sunny Kim and Bo Bernhard. 2014. Factors influencing hotel customers’ intention to use a fingerprint system. Journal of Hospitality and Tourism Tech- nology 5, 2 (Aug. 2014), 98–125. [32] Barbara Kitchenham. 2004. Procedures for performing systematic reviews. Keele, UK, Keele University 33, 2004 (2004), 1–26. [33] Ross Koppel, Jim Blythe, Vijay Kothari, and Sean Smith. 2016. Beliefs about Cybersecurity Rules and Passwords: A Comparison of Two Survey Samples of Cybersecurity Professionals Versus Regular Users. In Symposium on Usable Privacy and Security. [34] Benedikt Lebek, Jorg Uffen, Michael H Breitner, Markus Neumann, and Bernd Hohler. 2013. Employees’ Information Security Awareness and Behavior: A Literature Review. 46th Hawaii International Conf. on System Sciences (2013). [35] Moez Limayem and Sabine Gabriele Hirt. 2003. Force of habit and information systems usage: Theory and initial validation. Journal of the Association for Information Systems 4, 1 (2003), 65–95. [36] Seppo Pahnila, Mikko Siponen, and Adam Mahmood. 2007. Employees’ behavior towards IS security policy compliance. In 40th Annual Hawaii International
  • 41. Conference On System Sciences. IEEE. [37] Malcolm Pattinson, Marcus Butavicius, Kathryn Parsons, Agata McCormac, and Dragana Calic. 2015. Factors that Influence Information Security Behavior: An Australian Web-Based Study. In Human Aspects of Information Security, Privacy, and Trust. Springer International Publishing, Cham, 231–241. [38] Cornelia Pechmann, Guangzhi Zhao, Marvin E Goldberg, and Ellen Thomas Reibling. 2003. What to convey in antismoking advertisements for adolescents: The use of protection motivation theory to identify effective message themes. Journal of Marketing 67, 2 (2003), 1–18. [39] R W Rogers. 1975. A protection motivation theory of fear appeals and attitude change1. The journal of psychology (1975). [40] Bruce Schneier. 2000. Secrets and Lies. John Wiley and Sons. [41] Mikko Siponen, Seppo Pahnila, and Adam Mahmood. 2007. EmployeesâĂŹ ad- herence to information security policies: an empirical study. In IFIP International Information Security Conference. Springer, 133–144. [42] Mikko Siponen, Seppo Pahnila, and M Adam Mahmood. 2010. Compliance with information security policies: An empirical investigation. Computer 43, 2 (2010), 64–71.
  • 42. [43] Daniel J Solove. 2007. I’ve got nothing to hide and other misunderstandings of privacy. San Diego Law Review 44 (2007), 745. [44] Teodor Sommestad, Jonas Hallberg, Kristoffer Lundholm, and Johan Bengts- son. 2014. Variables influencing information security policy compliance. Inf. Management & Comp. Sec. 22, 1 (March 2014), 42–75. [45] Melanie Volkamer, Karen Renaud, Oksana Kulyk, and Sinem Emeröz. 2015. A Socio-Technical Investigation into Smartphone Security. In Security and Trust Management. Springer International Publishing, Cham, 265– 273. [46] Kim Witte. 1992. Putting the fear back into fear appeals: The extended parallel process model. Communications Monographs 59, 4 (June 1992), 329–349. [47] Yajiong Xue, Huigang Liang, and Liansheng Wu. 2011. Punishment, justice, and compliance in mandatory IT settings. Inf. Sys. Research 22, 2 (2011), 400–414. [48] Chang-Gyu Yang and Hee-Jun Lee. 2015. A study on the antecedents of healthcare information protection intention. Inf. Sys. Frontiers 18, 2 (2015), 253–263. [49] Jie Zhang, Brian J Reithel, and Han Li. 2009. Impact of perceived technical protection on security behaviors. Inf. Man. & Comp. Sec. 17, 4
  • 43. (2009), 330–340. Reliable Behavioural Factors in the Information Security Context ARES ’17, August 29-September 01, 2017, Reggio Calabria, Italy T ab le 1: O ve rv ie w of th e re su lt s of ou r li te ra tu
  • 131. Em pl oy ee s C on ti nu ed on ne xt pa ge ARES ’17, August 29-September 01, 2017, Reggio Calabria, Italy T ab le 1 – co n ti n
  • 194. al .[ 6] in cr ea se ** 0, 19 7 10 4 St ud en ts Abstract1 Introduction2 Background2.1 Starting Point2.2 Description of the Behavioural Theories3 Methodology4 Results4.1 Protection Motivation Theory4.2 Theory of Planned Behaviour4.3 General Deterrence Theory4.4 Technology Acceptance Model5 Discussion5.1 Reliable Factors5.2 Excluded Factors5.3 Limitations6 Conclusion7 AcknowledgmentReferences WRITING A CRITICAL REVIEW What is a critical review?
  • 195. A critical review is much more than a simple summary; it is an analysis and evaluation of a book, article, or other medium. Writing a good critical review requires that you understand the material, and that you know how to analyze and evaluate that material using appropriate criteria. Steps to writing an effective critical review: Reading Skim the whole text to determine the overall thesis, structure and methodology. This will help you better understand how the different elements fit together once you begin reading carefully. Read critically. It is not enough to simply understand what the author is saying; it is essential to challenge it. Examine how the article is structured, the types of reasons or evidence used to support the conclusions, and whether the author is reliant on underlying assumptions or theoretical frameworks. Take copious notes that reflect what the text means AND what you think about it. Analyzing Examine all elements. All aspects of the text—the structure, the methods, the reasons and evidence, the conclusions, and, especially, the logical connections between all of these—should be considered. The types of questions asked will vary depending on the discipline in which you are writing, but the following samples will provide a good starting point: Structure What type of text is it? (For example: Is it a primary source or secondary
  • 196. source? Is it original research or a comment on original research?) What are the different sections and how do they fit together? Are any of the sections particularly effective (or ineffective)? Methodology Is the research quantitative or qualitative? Does the methodology have any weaknesses? How does the design of the study address the hypothesis? Reasons/Evidence What sources does the author use (interviews, peer-reviewed journals, government reports, journal entries, newspaper accounts, etc.)? What types of reasoning are employed (inductive, deductive, abductive)? What type of evidence is provided (empirical, statistical, logical, etc.)? Are there any gaps in the evidence (or reasoning)? Conclusions Does the data adequately support the conclusion drawn by the researcher(s)? Are other interpretations plausible? Are the conclusions dependent on a particular theoretical formulation? What does the work contribute to the field? Logic What assumptions does the author make? Does the author account for all of the data, or are portions left out? What alternative perspectives remain unconsidered? Are there any logical flaws in the construction of the argument? © Allyson Skene. The Writing Centre, University of Toronto at
  • 197. Scarborough. See terms and conditions for use at http://www.utsc.utoronto.ca/~tlsweb/TWC/webresources/terms. htm Writing Formulate a thesis based on your overall evaluation. A strong thesis will acknowledge both strengths and limitations. E.g. While the article reports significant research supporting the view that certain types of computer use can have a positive impact on a student’s GPA, the conclusion that game playing alone can improve student achievement is based on a misinterpretation of the evidence. Not: This article misinterprets key evidence to support the conclusion that game playing can improve GPA. Ensure that your thesis answers the assignment. If you are asked to write a review of a single text, with no outside sources, then your essay should focus strictly on the material in the text and your analysis and evaluation of it. If you are asked to write about more than one work, or to draw connections between an article or book and the course material, then your review should address these concerns. Choose a structure that will best allow you to support your thesis within the required page constraints. The first example below works well with shorter assignments, but the risk is that too much time will be spent developing the overview, and too little time on the evaluation. The second example works better for longer reviews because it provides the relevant description with the analysis and evaluation, allowing the reader to follow the argument easily.
  • 198. Two common structures used for critical reviews: Example 1 Example 2 Introduction Overview of the text Evaluation of the text � Point 1 � Point 2 � Point 3 � Point 4 …(continue as necessary) Conclusion Introduction (with thesis) Point 1: Explanation and evaluation Point 2: Explanation and evaluation Point 3: Explanation and evaluation (continue elaborating as many points as necessary) Conclusion Important: Avoid presenting your points in a laundry-list style. Synthesize the information as much as possible.
  • 199. “Laundry-List” Style of Presentation Synthesized Argument. The article cites several different studies in support of the argument that playing violent video games can have a positive impact on student achievement. These studies refer to educational games and other types of computer use. The argument is not logically well constructed. Educational games are not the same as violent video games. The article also ignores data indicating that people with the highest GPA are those that reported low computer use. Also, different types of computer use could include things like researching or word-processing, and these activities are very different from playing violent video games. The evidence cited in the article does not support the overall conclusion that playing violent games improves GPA. One study only examines educational games in relation to GPA, so it is questionable whether the same findings will hold true for other types of games. Another study does not distinguish between different types of computer use, making it difficult to assess whether it is game playing or activities such as research and writing that contributed to improvements in GPA. Further, the author disregards relevant data that indicates that students with the highest GPAs are those who report low computer use, which means that a direct correlation between game playing and GPA cannot be supported.