Please use this identifier to cite or link to this item:
https://scholarbank.nus.edu.sg/handle/10635/42823
DC Field | Value | |
---|---|---|
dc.title | A protection motivation theory approach to home wireless security | |
dc.contributor.author | Woon, I.M.Y. | |
dc.contributor.author | Tan, G.W. | |
dc.contributor.author | Low, R.T. | |
dc.date.accessioned | 2013-07-11T10:18:56Z | |
dc.date.available | 2013-07-11T10:18:56Z | |
dc.date.issued | 2005 | |
dc.identifier.citation | Woon, I.M.Y.,Tan, G.W.,Low, R.T. (2005). A protection motivation theory approach to home wireless security. Association for Information Systems - 26th International Conference on Information Systems, ICIS 2005: Forever New Frontiers : 367-380. ScholarBank@NUS Repository. | |
dc.identifier.uri | http://scholarbank.nus.edu.sg/handle/10635/42823 | |
dc.description.abstract | Research in socio-technical factors in computer security has traditionally focused on employees and their work practice within the premises of the organization. However, with universal access to computing and the diverse means of connecting such devices to each another and to the global Internet, work carried out has shifted outside one central physical location to encompass a variety of possible points-of-access that include homes, modern cafés, and public libraries. Given the ubiquity of wireless devices used for last-hop access to the Internet from home, we look at the security of home wireless networks. In this work, we identify the variables that affect the decision of home wireless network users to implement security features on their networks. Our study is based on the protection motivation theory. A survey was conducted on 189 home users to identify and characterize predictors that differentiate between users who secure their home wireless networks and those who don't. Results of the analysis identified the following variables as significant: perceived severity, response efficacy, self efficacy, and response cost. | |
dc.source | Scopus | |
dc.subject | Computer security | |
dc.subject | Logistic regression analysis | |
dc.subject | Protection motivation theory | |
dc.subject | Wireless security | |
dc.type | Conference Paper | |
dc.contributor.department | INFORMATION SYSTEMS | |
dc.description.sourcetitle | Association for Information Systems - 26th International Conference on Information Systems, ICIS 2005: Forever New Frontiers | |
dc.description.page | 367-380 | |
dc.identifier.isiut | NOT_IN_WOS | |
Appears in Collections: | Staff Publications |
Show simple item record
Files in This Item:
There are no files associated with this item.
Google ScholarTM
Check
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.