語系:
繁體中文
English
說明(常見問題)
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Exploring Factors Influencing Self-E...
~
Reddy, Dinesh Sampangirama.
Exploring Factors Influencing Self-Efficacy in Information Security an Empirical Analysis by Integrating Multiple Theoretical Perspectives in the Context of Using Protective Information Technologies.
紀錄類型:
書目-語言資料,手稿 : Monograph/item
正題名/作者:
Exploring Factors Influencing Self-Efficacy in Information Security an Empirical Analysis by Integrating Multiple Theoretical Perspectives in the Context of Using Protective Information Technologies./
作者:
Reddy, Dinesh Sampangirama.
面頁冊數:
1 online resource (166 pages)
附註:
Source: Dissertation Abstracts International, Volume: 79-01(E), Section: B.
標題:
Information technology. -
電子資源:
click for full text (PQDT)
ISBN:
9780355166712
Exploring Factors Influencing Self-Efficacy in Information Security an Empirical Analysis by Integrating Multiple Theoretical Perspectives in the Context of Using Protective Information Technologies.
Reddy, Dinesh Sampangirama.
Exploring Factors Influencing Self-Efficacy in Information Security an Empirical Analysis by Integrating Multiple Theoretical Perspectives in the Context of Using Protective Information Technologies.
- 1 online resource (166 pages)
Source: Dissertation Abstracts International, Volume: 79-01(E), Section: B.
Thesis (Ph.D.)--The University of Texas at San Antonio, 2017.
Includes bibliographical references
Cybersecurity threats confront the Unites States on a daily basis, making them one of the major national security challenges. One approach to meeting these challenges is to improve user cybersecurity behavior. End user security behavior hinges on end user acceptance and use of the protective information technologies such as anti-virus and anti-spyware. A key and often researched predictor of user security behavior is self-efficacy in information security. Self-efficacy in information security is also modeled as a mediator between factors affecting self-efficacy in information security and the end user cybersecurity behavior. However, it is not clearly established in past literature on whether self-efficacy in information security is better modeled as a predictor or as a mediator. It is stressed in literature that we should find new ways to improve self-efficacy in information security. However, insufficient research has focused specifically on what factors influence self-efficacy in information security. Enhancement of self-efficacy in information security will further gain significance if self-efficacy is proven to be better modeled as a mediator than a predictor variable. Accordingly, the purpose of this research is to empirically investigate what factors influence self-efficacy in information security, and to examine the relative effect of each theorized factor (including self-efficacy) in increasing information security.
Electronic reproduction.
Ann Arbor, Mich. :
ProQuest,
2018
Mode of access: World Wide Web
ISBN: 9780355166712Subjects--Topical Terms:
559429
Information technology.
Index Terms--Genre/Form:
554714
Electronic books.
Exploring Factors Influencing Self-Efficacy in Information Security an Empirical Analysis by Integrating Multiple Theoretical Perspectives in the Context of Using Protective Information Technologies.
LDR
:03445ntm a2200337K 4500
001
912563
005
20180608112133.5
006
m o u
007
cr mn||||a|a||
008
190606s2017 xx obm 000 0 eng d
020
$a
9780355166712
035
$a
(MiAaPQ)AAI10608372
035
$a
(MiAaPQ)utsa:12307
035
$a
AAI10608372
040
$a
MiAaPQ
$b
eng
$c
MiAaPQ
100
1
$a
Reddy, Dinesh Sampangirama.
$3
1184982
245
1 0
$a
Exploring Factors Influencing Self-Efficacy in Information Security an Empirical Analysis by Integrating Multiple Theoretical Perspectives in the Context of Using Protective Information Technologies.
264
0
$c
2017
300
$a
1 online resource (166 pages)
336
$a
text
$b
txt
$2
rdacontent
337
$a
computer
$b
c
$2
rdamedia
338
$a
online resource
$b
cr
$2
rdacarrier
500
$a
Source: Dissertation Abstracts International, Volume: 79-01(E), Section: B.
500
$a
Advisers: Glenn Dietrich; Srinivasan Rao.
502
$a
Thesis (Ph.D.)--The University of Texas at San Antonio, 2017.
504
$a
Includes bibliographical references
520
$a
Cybersecurity threats confront the Unites States on a daily basis, making them one of the major national security challenges. One approach to meeting these challenges is to improve user cybersecurity behavior. End user security behavior hinges on end user acceptance and use of the protective information technologies such as anti-virus and anti-spyware. A key and often researched predictor of user security behavior is self-efficacy in information security. Self-efficacy in information security is also modeled as a mediator between factors affecting self-efficacy in information security and the end user cybersecurity behavior. However, it is not clearly established in past literature on whether self-efficacy in information security is better modeled as a predictor or as a mediator. It is stressed in literature that we should find new ways to improve self-efficacy in information security. However, insufficient research has focused specifically on what factors influence self-efficacy in information security. Enhancement of self-efficacy in information security will further gain significance if self-efficacy is proven to be better modeled as a mediator than a predictor variable. Accordingly, the purpose of this research is to empirically investigate what factors influence self-efficacy in information security, and to examine the relative effect of each theorized factor (including self-efficacy) in increasing information security.
520
$a
Using self-efficacy theory and security education training awareness (SETA) as a theoretical lens, a research model is developed with eight factors influencing self-efficacy in information security. Using 207 survey responses from home computer users, the data was analyzed using CB-SEM technique. The results show that cybersecurity conceptual knowledge, cybersecurtiy positive experience, cybersecurity observational learning and computer anxiety significantly influenced self-efficacy in information security. Results also show that self-efficacy is better modeled as a mediator variable than a predictor variable in order to better predict cybersecurity behavior.
533
$a
Electronic reproduction.
$b
Ann Arbor, Mich. :
$c
ProQuest,
$d
2018
538
$a
Mode of access: World Wide Web
650
4
$a
Information technology.
$3
559429
650
4
$a
Business administration.
$3
1148568
655
7
$a
Electronic books.
$2
local
$3
554714
690
$a
0489
690
$a
0310
710
2
$a
ProQuest Information and Learning Co.
$3
1178819
710
2
$a
The University of Texas at San Antonio.
$b
Information Systems and Cyber Security.
$3
1184983
856
4 0
$u
http://pqdd.sinica.edu.tw/twdaoapp/servlet/advanced?query=10608372
$z
click for full text (PQDT)
筆 0 讀者評論
多媒體
評論
新增評論
分享你的心得
Export
取書館別
處理中
...
變更密碼[密碼必須為2種組合(英文和數字)及長度為10碼以上]
登入