Publication:
How To Keep Your Information Secure Toward A Better Understanding Of Users Security Behavior

dc.contributor.authorArenas, Álvaro
dc.contributor.authorRay, Guatam
dc.contributor.authorHidalgo, Antonio
dc.contributor.authorUrueña, Alberto
dc.contributor.rorhttps://ror.org/02jjdwm75
dc.date.accessioned2025-01-09T13:33:18Z
dc.date.available2025-01-09T13:33:18Z
dc.date.issued2024-01
dc.description.abstractUse of computers and the Internet is an integral part of our lives, with business becoming more digital. As a result, individuals are using their home computers to perform diverse tasks and to store sensitive data. This paper investigates the relative efficacy of two strategies to protect home computers from security threats: security tools and security activities. For the analysis, we collected data from over 1900 individuals in Spain, following an approach combining self- reported data, via an online survey, with actual data collected directly from home users' computers. The main contribution of the paper is to provide a model, based on routine activity theory, explaining the role of security tools and security activities in protecting personal computers from malware infection, thus offering an in-depth understanding of users' security behavior. Using multivariate, logit and probit regressions, our study reveals that having security tools is positively related with higher risk activities and more infections, while pursuing security activities reduces malware infections. These results have important implications for policy makers and organizations, reinforcing the view that security tools are not sufficient to protect users from malware infection, and the need to develop security education and awareness programs for computer users.
dc.description.peerreviewedyes
dc.description.statusPublished
dc.formatapplication/pdf
dc.identifier.citationArenas, Á., Ray, G., Hidalgo, A., & Urueña, A. (2024). How to keep your information secure? Toward a better understanding of users security behavior. Technological Forecasting and Social Change, 198, 123028. https://doi.org/10.1016/j.techfore.2023.123028
dc.identifier.doihttps://doi.org/10.1016/j.techfore.2023.123028
dc.identifier.issn1873-5509
dc.identifier.urihttps://hdl.handle.net/20.500.14417/3427
dc.journal.titleTechnological Forecasting and Social Change
dc.language.isoen
dc.publisherElsevier
dc.relation.departmentInformation Systems & Technology
dc.relation.entityIE University
dc.relation.schoolIE Business School
dc.rightsAttribution 4.0 International
dc.rights.accessRightsinfo:eu-repo/semantics/openAccess
dc.rights.urihttps://creativecommons.org/licenses/by/4.0/deed.es
dc.subject.keywordInformation security
dc.subject.keywordRoutine activity theory
dc.subject.keywordMalware infection
dc.subject.keywordCyberattacks
dc.subject.keywordPersonal computer
dc.titleHow To Keep Your Information Secure Toward A Better Understanding Of Users Security Behavior
dc.typeinfo:eu-repo/semantics/article
dc.version.typeinfo:eu-repo/semantics/publishedVersion
dc.volume.number198
dspace.entity.typePublication
relation.isAuthorOfPublication3016cfbe-52f6-44a3-9bc6-c180e3076894
relation.isAuthorOfPublication.latestForDiscovery3016cfbe-52f6-44a3-9bc6-c180e3076894
Files
Original bundle
Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
How To Keep Your Information Secure Toward A Better Understanding Of Users Security Behavior.pdf
Size:
672.01 KB
Format:
Adobe Portable Document Format
License bundle
Now showing 1 - 1 of 1
No Thumbnail Available
Name:
license.txt
Size:
2.83 KB
Format:
Item-specific license agreed to upon submission
Description: