Publication: How To Keep Your Information Secure Toward A Better Understanding Of Users Security Behavior
dc.contributor.author | Arenas, Álvaro | |
dc.contributor.author | Ray, Guatam | |
dc.contributor.author | Hidalgo, Antonio | |
dc.contributor.author | Urueña, Alberto | |
dc.contributor.ror | https://ror.org/02jjdwm75 | |
dc.date.accessioned | 2025-01-09T13:33:18Z | |
dc.date.available | 2025-01-09T13:33:18Z | |
dc.date.issued | 2024-01 | |
dc.description.abstract | Use of computers and the Internet is an integral part of our lives, with business becoming more digital. As a result, individuals are using their home computers to perform diverse tasks and to store sensitive data. This paper investigates the relative efficacy of two strategies to protect home computers from security threats: security tools and security activities. For the analysis, we collected data from over 1900 individuals in Spain, following an approach combining self- reported data, via an online survey, with actual data collected directly from home users' computers. The main contribution of the paper is to provide a model, based on routine activity theory, explaining the role of security tools and security activities in protecting personal computers from malware infection, thus offering an in-depth understanding of users' security behavior. Using multivariate, logit and probit regressions, our study reveals that having security tools is positively related with higher risk activities and more infections, while pursuing security activities reduces malware infections. These results have important implications for policy makers and organizations, reinforcing the view that security tools are not sufficient to protect users from malware infection, and the need to develop security education and awareness programs for computer users. | |
dc.description.peerreviewed | yes | |
dc.description.status | Published | |
dc.format | application/pdf | |
dc.identifier.citation | Arenas, Á., Ray, G., Hidalgo, A., & Urueña, A. (2024). How to keep your information secure? Toward a better understanding of users security behavior. Technological Forecasting and Social Change, 198, 123028. https://doi.org/10.1016/j.techfore.2023.123028 | |
dc.identifier.doi | https://doi.org/10.1016/j.techfore.2023.123028 | |
dc.identifier.issn | 1873-5509 | |
dc.identifier.uri | https://hdl.handle.net/20.500.14417/3427 | |
dc.journal.title | Technological Forecasting and Social Change | |
dc.language.iso | en | |
dc.publisher | Elsevier | |
dc.relation.department | Information Systems & Technology | |
dc.relation.entity | IE University | |
dc.relation.school | IE Business School | |
dc.rights | Attribution 4.0 International | |
dc.rights.accessRights | info:eu-repo/semantics/openAccess | |
dc.rights.uri | https://creativecommons.org/licenses/by/4.0/deed.es | |
dc.subject.keyword | Information security | |
dc.subject.keyword | Routine activity theory | |
dc.subject.keyword | Malware infection | |
dc.subject.keyword | Cyberattacks | |
dc.subject.keyword | Personal computer | |
dc.title | How To Keep Your Information Secure Toward A Better Understanding Of Users Security Behavior | |
dc.type | info:eu-repo/semantics/article | |
dc.version.type | info:eu-repo/semantics/publishedVersion | |
dc.volume.number | 198 | |
dspace.entity.type | Publication | |
relation.isAuthorOfPublication | 3016cfbe-52f6-44a3-9bc6-c180e3076894 | |
relation.isAuthorOfPublication.latestForDiscovery | 3016cfbe-52f6-44a3-9bc6-c180e3076894 |
Files
Original bundle
1 - 1 of 1
Loading...
- Name:
- How To Keep Your Information Secure Toward A Better Understanding Of Users Security Behavior.pdf
- Size:
- 672.01 KB
- Format:
- Adobe Portable Document Format
License bundle
1 - 1 of 1
No Thumbnail Available
- Name:
- license.txt
- Size:
- 2.83 KB
- Format:
- Item-specific license agreed to upon submission
- Description: