語系:
繁體中文
English
日文
簡体中文
說明(常見問題)
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
The adoption of computer security: A...
~
Claar, Chester L.
The adoption of computer security: An analysis of home personal computer user behavior using the health belief model.
紀錄類型:
書目-語言資料,印刷品 : Monograph/item
書名/作者:
The adoption of computer security: An analysis of home personal computer user behavior using the health belief model.
作者:
Claar, Chester L.
面頁冊數:
149 p.
附註:
Source: Dissertation Abstracts International, Volume: 72-06, Section: B, page: 3705.
Contained By:
Dissertation Abstracts International72-06B.
標題:
Information Technology.
標題:
Computer Science.
ISBN:
9781124567815
摘要、提要註:
The primary purpose of this research was to examine the adoption of computer security software in the home computer environment. The use of the Health Belief Model as a framework to design a model to examine home user adoption of computer security provided the basis for this research.
電子資源:
http://pqdd.sinica.edu.tw/twdaoapp/servlet/advanced?query=3449480
The adoption of computer security: An analysis of home personal computer user behavior using the health belief model.
Claar, Chester L.
The adoption of computer security: An analysis of home personal computer user behavior using the health belief model.
- 149 p.
Source: Dissertation Abstracts International, Volume: 72-06, Section: B, page: 3705.
Thesis (Ph.D.)--Utah State University, 2011.
The primary purpose of this research was to examine the adoption of computer security software in the home computer environment. The use of the Health Belief Model as a framework to design a model to examine home user adoption of computer security provided the basis for this research.
ISBN: 9781124567815Subjects--Topical Terms:
423447
Information Technology.
The adoption of computer security: An analysis of home personal computer user behavior using the health belief model.
LDR
:03412nam 2200373 4500
001
365224
005
20120516132916.5
008
121018s2011 ||||||||||||||||| ||eng d
020
$a
9781124567815
035
$a
(UMI)AAI3449480
035
$a
AAI3449480
040
$a
UMI
$c
UMI
100
1
$a
Claar, Chester L.
$3
475197
245
1 4
$a
The adoption of computer security: An analysis of home personal computer user behavior using the health belief model.
300
$a
149 p.
500
$a
Source: Dissertation Abstracts International, Volume: 72-06, Section: B, page: 3705.
500
$a
Adviser: Jeffrey J. Johnson.
502
$a
Thesis (Ph.D.)--Utah State University, 2011.
520
$a
The primary purpose of this research was to examine the adoption of computer security software in the home computer environment. The use of the Health Belief Model as a framework to design a model to examine home user adoption of computer security provided the basis for this research.
520
$a
The method of the investigation was a cross-sectional study using a self-reported web-based survey to test the theoretical model derived from the Health Belief Model. The survey targeted individuals who are responsible for the selection, installation, and maintenance of software on their home computers. The data collection relied on a snowball sampling technique that recruited a total of 186 participants who completed the online survey.
520
$a
The research model contains a total of 26 hypothesized relationships that were tested using multiple regression analysis techniques. The research model contains six main predicting variables (perceived vulnerability, perceived severity, perceived benefits, perceived barriers, self-efficacy, and cues to action) and four moderating variables (age, gender, education, and prior experience of attack). The model explains 30.4% of the variance in computer security usage, the dependent variable in the research model.
520
$a
The results demonstrate that certain constructs found in the Health Belief Model are more effective than others in motivating individuals to utilize computer security software. Specifically, the results show that perceived vulnerability (H1), perceived barriers (H4), self-efficacy (H5), and the two-way interactions of age and barriers (H8d), education and benefits (H9c), prior experience and perceived severity (H10b), and prior experience and self-efficacy (H10e) had significant effects on computer security usage. Additionally, prior experience was found to have a significant main effect on the dependent variable.
520
$a
Information from this research provides evidence that the Health Belief Model can be used to study the computer security usage behavior of home computer users. Further, the relationship of perceived vulnerability and computer security usage provides a way for practitioners to increase computer security usage behavior through targeted media campaigns.
590
$a
School code: 0241.
650
4
$a
Information Technology.
$3
423447
650
4
$a
Computer Science.
$3
423143
690
$a
0489
690
$a
0984
710
2
$a
Utah State University.
$b
Management Information Systems.
$3
423352
773
0
$t
Dissertation Abstracts International
$g
72-06B.
790
1 0
$a
Johnson, Jeffrey J.,
$e
advisor
790
1 0
$a
Paper, David J.
$e
committee member
790
1 0
$a
Ugray, Zsolt G.
$e
committee member
790
1 0
$a
Fadel, Kelly J.
$e
committee member
790
1 0
$a
Lown, Jean M.
$e
committee member
790
$a
0241
791
$a
Ph.D.
792
$a
2011
856
4 0
$u
http://pqdd.sinica.edu.tw/twdaoapp/servlet/advanced?query=3449480
筆 0 讀者評論
多媒體
多媒體檔案
http://pqdd.sinica.edu.tw/twdaoapp/servlet/advanced?query=3449480
評論
新增評論
分享你的心得
Export
取書館別
處理中
...
變更密碼
登入