“Security begins at home”: Determinants of home computer and mobile device security behavior

© 2017 Elsevier Ltd Personal computing users are vulnerable to information security threats, as they must independently make decisions about how to protect themselves, often with little understanding of technology or its implications. However, personal computing users are under-represented in securi...

Full description

Bibliographic Details
Main Authors: Thompson, Nik, McGill, T., Wang, X.
Format: Journal Article
Published: Elsevier Advanced Technology 2017
Online Access:http://hdl.handle.net/20.500.11937/55780
_version_ 1848759705433800704
author Thompson, Nik
McGill, T.
Wang, X.
author_facet Thompson, Nik
McGill, T.
Wang, X.
author_sort Thompson, Nik
building Curtin Institutional Repository
collection Online Access
description © 2017 Elsevier Ltd Personal computing users are vulnerable to information security threats, as they must independently make decisions about how to protect themselves, often with little understanding of technology or its implications. However, personal computing users are under-represented in security research studies, especially for mobile device use. The study described in this paper addresses this research gap by evaluating data from 629 home computer and mobile device users to improve understanding of security behavior in both contexts. The research model extends protection motivation theory by including the roles of social influences and psychological ownership, and by including actual behavior. The model was separately tested with home computer users and mobile device users and data reveals that some of the determinants of security behavior differ between home computer and mobile device use. The results show that perceived vulnerability, self-efficacy, response cost, descriptive norm and psychological ownership all influenced personal computing security intentions and behavior for both home computer users and mobile device users. However, perceived severity was only found to play a role in mobile device security behavior and neither response efficacy nor subjective norm influenced security intentions for either type of user. These findings are discussed in terms of their practical and research implications as well as generating new research opportunities into personal computing sec urity.
first_indexed 2025-11-14T10:04:08Z
format Journal Article
id curtin-20.500.11937-55780
institution Curtin University Malaysia
institution_category Local University
last_indexed 2025-11-14T10:04:08Z
publishDate 2017
publisher Elsevier Advanced Technology
recordtype eprints
repository_type Digital Repository
spelling curtin-20.500.11937-557802017-09-13T16:09:54Z “Security begins at home”: Determinants of home computer and mobile device security behavior Thompson, Nik McGill, T. Wang, X. © 2017 Elsevier Ltd Personal computing users are vulnerable to information security threats, as they must independently make decisions about how to protect themselves, often with little understanding of technology or its implications. However, personal computing users are under-represented in security research studies, especially for mobile device use. The study described in this paper addresses this research gap by evaluating data from 629 home computer and mobile device users to improve understanding of security behavior in both contexts. The research model extends protection motivation theory by including the roles of social influences and psychological ownership, and by including actual behavior. The model was separately tested with home computer users and mobile device users and data reveals that some of the determinants of security behavior differ between home computer and mobile device use. The results show that perceived vulnerability, self-efficacy, response cost, descriptive norm and psychological ownership all influenced personal computing security intentions and behavior for both home computer users and mobile device users. However, perceived severity was only found to play a role in mobile device security behavior and neither response efficacy nor subjective norm influenced security intentions for either type of user. These findings are discussed in terms of their practical and research implications as well as generating new research opportunities into personal computing sec urity. 2017 Journal Article http://hdl.handle.net/20.500.11937/55780 10.1016/j.cose.2017.07.003 Elsevier Advanced Technology restricted
spellingShingle Thompson, Nik
McGill, T.
Wang, X.
“Security begins at home”: Determinants of home computer and mobile device security behavior
title “Security begins at home”: Determinants of home computer and mobile device security behavior
title_full “Security begins at home”: Determinants of home computer and mobile device security behavior
title_fullStr “Security begins at home”: Determinants of home computer and mobile device security behavior
title_full_unstemmed “Security begins at home”: Determinants of home computer and mobile device security behavior
title_short “Security begins at home”: Determinants of home computer and mobile device security behavior
title_sort “security begins at home”: determinants of home computer and mobile device security behavior
url http://hdl.handle.net/20.500.11937/55780