{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,2]],"date-time":"2024-09-02T12:33:45Z","timestamp":1725280425432},"reference-count":89,"publisher":"Association for Computing Machinery (ACM)","issue":"4","license":[{"start":{"date-parts":[[2014,11,21]],"date-time":"2014-11-21T00:00:00Z","timestamp":1416528000000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["SIGMIS Database"],"published-print":{"date-parts":[[2014,11,21]]},"abstract":"Security threats regularly affect users of home computers. As such, it is important to understand the practices of users for protecting their computers and networks, and to identify determinants of these practices. Several recent studies utilize Protection Motivation Theory (PMT) to explore these practices. However, these studies focus on one specific security protection behavior or on intentions to use a generic measure of security protection tools or techniques (practices). In contrast, this study empirically tests the effectiveness of PMT to explain a newly developed measure for collectively capturing several individual security practices. The results show that PMT explains an important portion of the variance in the unified security practices measure, and demonstrates the importance of explaining individual security practices as a whole as opposed to one particular behavior individually. Implications of the study for research and practice are discussed.<\/jats:p>","DOI":"10.1145\/2691517.2691521","type":"journal-article","created":{"date-parts":[[2014,11,24]],"date-time":"2014-11-24T15:29:41Z","timestamp":1416842981000},"page":"51-71","update-policy":"http:\/\/dx.doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":72,"title":["An Extended Perspective on Individual Security Behaviors"],"prefix":"10.1145","volume":"45","author":[{"given":"Robert","family":"Crossler","sequence":"first","affiliation":[{"name":"Mississippi State University, Mississippi State, MS, USA"}]},{"given":"France","family":"B\u00e9langer","sequence":"additional","affiliation":[{"name":"Virginia Tech, Blacksburg, VA, USA"}]}],"member":"320","published-online":{"date-parts":[[2014,11,21]]},"reference":[{"key":"e_1_2_1_1_1","volume-title":"Emerging Cyber Threats Report for","author":"Ahamad M.","year":"2009"},{"key":"e_1_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1108\/09685220510589334"},{"key":"e_1_2_1_3_1","first-page":"1543","volume-title":"Self-View, and Home Computer User Security Behavior Intentions,\" Twenty-Seventh International Conference on Information Systems","author":"Anderson C.","year":"2006"},{"key":"e_1_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.5555\/2017470.2017481"},{"key":"e_1_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1097\/01.mlr.0000103528.48582.7c"},{"key":"e_1_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.4018\/joeuc.2004070102"},{"key":"e_1_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1037\/0033-295X.84.2.191"},{"key":"e_1_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2011.29"},{"key":"e_1_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1057\/ejis.2009.8"},{"key":"e_1_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1080\/15536548.2006.10855789"},{"issue":"1","key":"e_1_2_1_11_1","first-page":"6","article-title":"The Effects of Computer Self-Efficacy on Direction-Following Behavior in Computer Assisted Instruction","volume":"19","author":"Carlson R. D.","year":"1992","journal-title":"Journal of Computer-Based Instruction"},{"key":"e_1_2_1_12_1","first-page":"295","volume-title":"Modern Methods for Business Research","author":"Chin W. W.","year":"1998"},{"key":"e_1_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.17705\/1CAIS.02057"},{"issue":"4","key":"e_1_2_1_14_1","first-page":"1","article-title":"An Empirical Study of Students' Computer Self-Efficacy: Differences among Four Academic Disciplines at a Large University","volume":"42","author":"Chung S. H.","year":"2002","journal-title":"The Journal of Computer Information Systems"},{"key":"e_1_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1177\/002224377901600110"},{"key":"e_1_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.2307\/249749"},{"key":"e_1_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1287\/isre.6.2.118"},{"key":"e_1_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.2307\/249688"},{"key":"e_1_2_1_19_1","volume-title":"The Quest for Complete Security Protection: An Empirical Analysis of an Individual's 360 Degree Protection from File and Data Loss,\" in: 18th Americas Conference on Information Systems","author":"Crossler R. E.","year":"2012"},{"key":"e_1_2_1_20_1","volume-title":"Determinants of Information Security End User Behavior,\" in: 2006 Annualy Internation Workshop (WISA 2006) of the AIS Special Interest Group on Netowrk and Internet Security (SIG-SEC)","author":"Crossler R. E.","year":"2006"},{"key":"e_1_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2012.09.010"},{"issue":"1","key":"e_1_2_1_22_1","first-page":"49","article-title":"Why IT Executives Should Help Employees Secure Their Home Computers","volume":"7","author":"Culnan M.","year":"2008","journal-title":"MIS Quarterly Executive"},{"key":"e_1_2_1_23_1","unstructured":"Damballa. 2011. \"Damballa Threat Report - First Half 2011 \" Retrieved April 15 2013 from https:\/\/www.damballa.com\/downloads\/r_pubs\/Damballa_Threat_Report-First_Half_2011.pdf. Damballa. 2011. \"Damballa Threat Report - First Half 2011 \" Retrieved April 15 2013 from https:\/\/www.damballa.com\/downloads\/r_pubs\/Damballa_Threat_Report-First_Half_2011.pdf."},{"key":"e_1_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1287\/isre.8.1.95"},{"key":"e_1_2_1_25_1","volume-title":"The Shifting Security Paradigm.\" Retrieved","author":"Deloitte","year":"2008"},{"key":"e_1_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1046\/j.1365-2575.2001.00099.x"},{"key":"e_1_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.17705\/1jais.00133"},{"key":"e_1_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.5465\/amr.1989.4308385"},{"issue":"2","key":"e_1_2_1_29_1","first-page":"95","article-title":"An Empirical Investigation into the Relationship between Computer Self-Efficacy, Anxiety, Experience, Support and Usage","volume":"44","author":"Fagan M. H.","year":"2003","journal-title":"The Journal of Computer Information Systems"},{"key":"e_1_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0169-7552(98)00028-2"},{"key":"e_1_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1559-1816.2000.tb02323.x"},{"key":"e_1_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1177\/002224378101800104"},{"key":"e_1_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2007.03.001"},{"key":"e_1_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2005.12.004"},{"key":"e_1_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0268-4012(97)00003-0"},{"key":"e_1_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.2753\/MIS0742-1222280208"},{"key":"e_1_2_1_37_1","doi-asserted-by":"crossref","DOI":"10.1007\/978-94-017-1988-9","volume-title":"Item Response Theory: Principles and Applications Kluwer Nijhoff Publishing","author":"Hambleton R. K.","year":"1985"},{"key":"e_1_2_1_38_1","volume-title":"Fundamentals of Item Response Theory Sage Publications","author":"Hambleton R. K.","year":"1991"},{"key":"e_1_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1002\/(SICI)1099-1379(199809)19:5<463::AID-JOB3899>3.0.CO;2-5"},{"issue":"9","key":"e_1_2_1_40_1","first-page":"29","article-title":"Item Response Theory and Health Outcomes Measurement in the 21st Century","volume":"38","author":"Hays R. D.","year":"2000","journal-title":"Med Care"},{"key":"e_1_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2009.02.005"},{"key":"e_1_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1057\/ejis.2009.6"},{"key":"e_1_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/1104004.1104010"},{"key":"e_1_2_1_44_1","doi-asserted-by":"crossref","DOI":"10.6028\/NIST.SP.800-124","volume-title":"Guidelines on Cell Phone and Pda Security,\" NIST Special Publication (800:124)","author":"Jansen W.","year":"2008"},{"key":"e_1_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1287\/isre.11.4.402.11869"},{"key":"e_1_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.5555\/2017470.2017478"},{"issue":"2","key":"e_1_2_1_47_1","first-page":"219","article-title":"Information Security Awareness Status of Full Time Employees","volume":"3","author":"Kim E. B.","year":"2005","journal-title":"The Business Review, Cambridge"},{"key":"e_1_2_1_48_1","unstructured":"Kindsight. 2012. \"Kindsight Security Labs Malware Report -- Q3 2012.\" Retrieved April 15 2013 from http:\/\/www.kindsight.net\/sites\/default\/files\/Kindsight_Security_Labs-Q312_Malware_Report-final.pdf. Kindsight. 2012. \"Kindsight Security Labs Malware Report -- Q3 2012.\" Retrieved April 15 2013 from http:\/\/www.kindsight.net\/sites\/default\/files\/Kindsight_Security_Labs-Q312_Malware_Report-final.pdf."},{"key":"e_1_2_1_49_1","article-title":"Microsoft Security Guru: Jot Down Your Passwords","author":"Kotadia M.","year":"2005","journal-title":"CNET News"},{"key":"e_1_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.2753\/MIS0742-1222250210"},{"key":"e_1_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.2753\/MIS0742-1222220407"},{"key":"e_1_2_1_52_1","first-page":"5","volume-title":"Toward Cost-Sensitive Modeling for Intrusion Detection and Response,\" Intrusion Detection (10: 1--2)","author":"Lee W.","year":"2002"},{"key":"e_1_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.17705\/1CAIS.01250"},{"key":"e_1_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.5555\/2017410.2017417"},{"key":"e_1_2_1_55_1","first-page":"85","article-title":"Optimizing Rating Scale Category Effectiveness","volume":"3","author":"Linacre J. M.","year":"2002","journal-title":"Journal of Applied Measurement"},{"key":"e_1_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1016\/0022-1031(83)90023-9"},{"key":"e_1_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.17705\/1jais.00112"},{"key":"e_1_2_1_58_1","volume-title":"The Crooks.\" Network World Retrieved","author":"Mullins R.","year":"2010"},{"key":"e_1_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.1111\/0272-4332.205065"},{"key":"e_1_2_1_60_1","volume-title":"Iphish: Phishing Vulnerabilities on Consumer Electronics,\" USENIX Workshop on Usability, Psychology, and Security","author":"Niu Y.","year":"2008"},{"key":"e_1_2_1_61_1","volume-title":"Psychometric Theory McGraw Hill","author":"Nunnally J.","year":"1978"},{"key":"e_1_2_1_62_1","volume-title":"Upper Saddle River","author":"Osterlind S. J.","year":"2006"},{"key":"e_1_2_1_63_1","unstructured":"PandaLabs. 2012. \"PandaLabs Quarterly Report April - June 2012.\" Retrieved April 15 2013 from http:\/\/press.pandasecurity.com\/wp-content\/uploads\/2012\/08\/Quarterly-Report-PandaLabs-April-June-2012.pdf. PandaLabs. 2012. \"PandaLabs Quarterly Report April - June 2012.\" Retrieved April 15 2013 from http:\/\/press.pandasecurity.com\/wp-content\/uploads\/2012\/08\/Quarterly-Report-PandaLabs-April-June-2012.pdf."},{"key":"e_1_2_1_64_1","volume-title":"Incorporated","author":"Pett M. A.","year":"1997"},{"key":"e_1_2_1_65_1","doi-asserted-by":"publisher","DOI":"10.5555\/2017356.2017358"},{"key":"e_1_2_1_66_1","volume-title":"SANS Institute","author":"Ranalli H. T.","year":"2003"},{"key":"e_1_2_1_67_1","doi-asserted-by":"publisher","DOI":"10.1057\/palgrave.ejis.3000714"},{"key":"e_1_2_1_68_1","volume-title":"Business Week","author":"Ricadela A.","year":"2007"},{"key":"e_1_2_1_69_1","unstructured":"Richardson R. \"2007 CSI Computer Crime and Security Survey \" Computer Security Institute. Richardson R. \"2007 CSI Computer Crime and Security Survey \" Computer Security Institute."},{"key":"e_1_2_1_70_1","volume-title":"Germany","author":"Ringle C. M.","year":"2005"},{"key":"e_1_2_1_71_1","doi-asserted-by":"publisher","DOI":"10.1080\/00223980.1975.9915803"},{"key":"e_1_2_1_72_1","first-page":"113","volume-title":"Protection Motivation Theory,\" in: Handbook of Health Behavior Research: Personal and Social Determinants","author":"Rogers R. W.","year":"1997"},{"key":"e_1_2_1_73_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2004.01.002"},{"key":"e_1_2_1_74_1","doi-asserted-by":"publisher","DOI":"10.1080\/08870449608400257"},{"key":"e_1_2_1_75_1","doi-asserted-by":"publisher","DOI":"10.1145\/1216218.1216224"},{"key":"e_1_2_1_76_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2004.07.001"},{"issue":"2","key":"e_1_2_1_77_1","first-page":"33","article-title":"A Decision Support System for Computer Literacy Training at Universities","volume":"46","author":"Stephens P.","year":"2005","journal-title":"The Journal of Computer Information Systems"},{"key":"e_1_2_1_78_1","doi-asserted-by":"publisher","DOI":"10.2307\/248922"},{"key":"e_1_2_1_79_1","doi-asserted-by":"crossref","first-page":"1","DOI":"10.4018\/978-1-93070-806-8","volume-title":"Qualitative Research in IS: Issues and Trends","author":"Trauth E.","year":"2001"},{"key":"e_1_2_1_80_1","doi-asserted-by":"publisher","DOI":"10.2307\/30036540"},{"key":"e_1_2_1_81_1","doi-asserted-by":"publisher","DOI":"10.1080\/108107396127988"},{"key":"e_1_2_1_82_1","unstructured":"Wolfe E. \"Edre 6794 Course Presentation \" Virginia Tech 2007. Wolfe E. \"Edre 6794 Course Presentation \" Virginia Tech 2007."},{"key":"e_1_2_1_83_1","unstructured":"Wolfe E. W. \"A Bootstrap Approach to Evaluating Person and Item Fit to the Rasch Model \" International Objective Measurement Workshop New York NY 2008. Wolfe E. W. \"A Bootstrap Approach to Evaluating Person and Item Fit to the Rasch Model \" International Objective Measurement Workshop New York NY 2008."},{"key":"e_1_2_1_84_1","first-page":"367","article-title":"A Protection Motivation Theory Approach to Home Wireless Security","author":"Woon I. M. Y.","year":"2005","journal-title":"Twenty-Sixth International Conference on Information Systems (ICIS)"},{"key":"e_1_2_1_85_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2008.04.005"},{"key":"e_1_2_1_86_1","volume-title":"Rating Scale Analysis: Rasch Measurement MESA Press","author":"Wright B. D.","year":"1982"},{"key":"e_1_2_1_87_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.im.2004.07.001"},{"key":"e_1_2_1_88_1","volume-title":"Identification and Authentication: Technology and Implementation Issues,\" The Communications of the Association for Information Systems ( (17)","author":"Zviran M.","year":"2006"},{"key":"e_1_2_1_89_1","doi-asserted-by":"publisher","DOI":"10.1080\/07421222.1999.11518226"}],"container-title":["ACM SIGMIS Database: the DATABASE for Advances in Information Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2691517.2691521","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,12,30]],"date-time":"2022-12-30T21:29:59Z","timestamp":1672435799000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2691517.2691521"}},"subtitle":["Protection Motivation Theory and a Unified Security Practices (USP) Instrument"],"short-title":[],"issued":{"date-parts":[[2014,11,21]]},"references-count":89,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2014,11,21]]}},"alternative-id":["10.1145\/2691517.2691521"],"URL":"https:\/\/doi.org\/10.1145\/2691517.2691521","relation":{},"ISSN":["0095-0033","1532-0936"],"issn-type":[{"value":"0095-0033","type":"print"},{"value":"1532-0936","type":"electronic"}],"subject":[],"published":{"date-parts":[[2014,11,21]]},"assertion":[{"value":"2014-11-21","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}