Please use this identifier to cite or link to this item: http://scholarbank.nus.edu.sg/handle/10635/42823
Title: A protection motivation theory approach to home wireless security
Authors: Woon, I.M.Y. 
Tan, G.W. 
Low, R.T.
Keywords: Computer security
Logistic regression analysis
Protection motivation theory
Wireless security
Issue Date: 2005
Source: Woon, I.M.Y.,Tan, G.W.,Low, R.T. (2005). A protection motivation theory approach to home wireless security. Association for Information Systems - 26th International Conference on Information Systems, ICIS 2005: Forever New Frontiers : 367-380. ScholarBank@NUS Repository.
Abstract: Research in socio-technical factors in computer security has traditionally focused on employees and their work practice within the premises of the organization. However, with universal access to computing and the diverse means of connecting such devices to each another and to the global Internet, work carried out has shifted outside one central physical location to encompass a variety of possible points-of-access that include homes, modern cafés, and public libraries. Given the ubiquity of wireless devices used for last-hop access to the Internet from home, we look at the security of home wireless networks. In this work, we identify the variables that affect the decision of home wireless network users to implement security features on their networks. Our study is based on the protection motivation theory. A survey was conducted on 189 home users to identify and characterize predictors that differentiate between users who secure their home wireless networks and those who don't. Results of the analysis identified the following variables as significant: perceived severity, response efficacy, self efficacy, and response cost.
Source Title: Association for Information Systems - 26th International Conference on Information Systems, ICIS 2005: Forever New Frontiers
URI: http://scholarbank.nus.edu.sg/handle/10635/42823
Appears in Collections:Staff Publications

Show full item record
Files in This Item:
There are no files associated with this item.

Page view(s)

167
checked on Dec 16, 2017

Google ScholarTM

Check


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.