The Self-Efficacy Variable in Behavioral Information Security Research

Author(s):  
Wu He ◽  
Xiaohong Yuan ◽  
Xin Tian

2013 ◽  
Vol 32 ◽  
pp. 90-101 ◽  
Author(s):  
Robert E. Crossler ◽  
Allen C. Johnston ◽  
Paul Benjamin Lowry ◽  
Qing Hu ◽  
Merrill Warkentin ◽  
...  




Author(s):  
Isabelle J. Fagnot

The effectiveness of information security can be substantially limited by inappropriate and destructive human behaviors within an organization. As recent critical security incidents have shown, successful insider intrusions induce a fear of repeated disruptive behaviors within organizations, and can be more costly and damaging than outsider threats. Today, employees compose the majority of end-users. The wide variety of information that they handle in a multitude of work and non-work settings brings new challenges to organizations and drives technological and managerial change. Several areas of studies such as behavioral information security, information security governance and social engineering to name a few, have emerged in an attempt to understand the phenomena and suggest countermeasures and responses. This paper starts by defining behavioral information security and provides examples of security behaviors that have an impact on the overall security of an organization. Threats’ mitigations are then depicted followed by future trends.





2021 ◽  
Author(s):  
Jeffrey Stanton ◽  
Cavinda Caldera ◽  
Ashley Isaac ◽  
Kathryn Stam ◽  
Slawomir Marcinkowski

The success of information security appears to depend in part upon the effective behavior of the individuals involved in its use. Appropriate and constructive behavior by end users, system administrators, and others can enhance the effectiveness of information security while inappropriate and destructive behaviors can substantially inhibit its effectiveness. The present research focuses on “behavioral information security” which is defined as the complexes of human action that influence the availability, confidentiality, and integrity of information systems. Because research in this area is so new, in the present in study we focused on delineating and understanding the behavioral domain. Our goal for this study was to construct and test a taxonomy of information security behaviors. We expect that this knowledge can support later research efforts that focus on understanding the antecedents and consequences of information security behavior.



2011 ◽  
Vol 27 (3) ◽  
pp. 164-170 ◽  
Author(s):  
Anna Sundström

This study evaluated the psychometric properties of a self-report scale for assessing perceived driver competence, labeled the Self-Efficacy Scale for Driver Competence (SSDC), using item response theory analyses. Two samples of Swedish driving-license examinees (n = 795; n = 714) completed two versions of the SSDC that were parallel in content. Prior work, using classical test theory analyses, has provided support for the validity and reliability of scores from the SSDC. This study investigated the measurement precision, item hierarchy, and differential functioning for males and females of the items in the SSDC as well as how the rating scale functions. The results confirmed the previous findings; that the SSDC demonstrates sound psychometric properties. In addition, the findings showed that measurement precision could be increased by adding items that tap higher self-efficacy levels. Moreover, the rating scale can be improved by reducing the number of categories or by providing each category with a label.



2007 ◽  
Author(s):  
Michelle M. Buehl ◽  
Helenrose Fives ◽  
Jonathan D. Buehl


Sign in / Sign up

Export Citation Format

Share Document