Please use this identifier to cite or link to this item: https://scholarbank.nus.edu.sg/handle/10635/42823
DC FieldValue
dc.titleA protection motivation theory approach to home wireless security
dc.contributor.authorWoon, I.M.Y.
dc.contributor.authorTan, G.W.
dc.contributor.authorLow, R.T.
dc.date.accessioned2013-07-11T10:18:56Z
dc.date.available2013-07-11T10:18:56Z
dc.date.issued2005
dc.identifier.citationWoon, I.M.Y.,Tan, G.W.,Low, R.T. (2005). A protection motivation theory approach to home wireless security. Association for Information Systems - 26th International Conference on Information Systems, ICIS 2005: Forever New Frontiers : 367-380. ScholarBank@NUS Repository.
dc.identifier.urihttp://scholarbank.nus.edu.sg/handle/10635/42823
dc.description.abstractResearch in socio-technical factors in computer security has traditionally focused on employees and their work practice within the premises of the organization. However, with universal access to computing and the diverse means of connecting such devices to each another and to the global Internet, work carried out has shifted outside one central physical location to encompass a variety of possible points-of-access that include homes, modern cafés, and public libraries. Given the ubiquity of wireless devices used for last-hop access to the Internet from home, we look at the security of home wireless networks. In this work, we identify the variables that affect the decision of home wireless network users to implement security features on their networks. Our study is based on the protection motivation theory. A survey was conducted on 189 home users to identify and characterize predictors that differentiate between users who secure their home wireless networks and those who don't. Results of the analysis identified the following variables as significant: perceived severity, response efficacy, self efficacy, and response cost.
dc.sourceScopus
dc.subjectComputer security
dc.subjectLogistic regression analysis
dc.subjectProtection motivation theory
dc.subjectWireless security
dc.typeConference Paper
dc.contributor.departmentINFORMATION SYSTEMS
dc.description.sourcetitleAssociation for Information Systems - 26th International Conference on Information Systems, ICIS 2005: Forever New Frontiers
dc.description.page367-380
dc.identifier.isiutNOT_IN_WOS
Appears in Collections:Staff Publications

Show simple item record
Files in This Item:
There are no files associated with this item.

Google ScholarTM

Check


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.