Computer Security and Risky Computing Practices: A Rational Choice Perspective

Computer Security and Risky Computing Practices: A Rational Choice Perspective

Kregg Aytes (Idaho State University, USA) and Terry Connolly (University of Arizona, USA)
Copyright: © 2005 |Pages: 23
DOI: 10.4018/978-1-59140-474-3.ch013
OnDemand PDF Download:
$37.50

Abstract

Despite rapid technological advances in computer hardware and software, insecure behavior by individual computer users continues to be a significant source of direct cost and productivity loss. Why do individuals, many of whom are aware of the possible grave consequences of low-level insecure behaviors such as failure to backup work and disclosing passwords, continue to engage in unsafe computing practices? In this chapter we propose a conceptual model of this behavior as the outcome of a boundedly rational choice process. We explore this model in a survey of undergraduate students (N = 167) at two large public universities. We asked about the frequency with which they engaged in five commonplace but unsafe computing practices, and probed their decision processes with regard to these practices. Although our respondents saw themselves as knowledgeable, competent users and were broadly aware that serious consequences were quite likely to result, they reported frequent unsafe computing behaviors. We discuss the implications of these findings both for further research on risky computing practices and for training and enforcement policies that will be needed in the organizations that these students will be entering shortly.

Complete Chapter List

Search this Book:
Reset
Table of Contents
Acknowledgments
Mo Adam Mahmood
Chapter 1
James P. Downey, Summer E. Bartczak
During the 1980s and into the early 1990s, end user computing (EUC) was reported to be among the key concerns facing managers and organizations. Is... Sample PDF
End User Computing Research Issues and Trends (1990-2000)
$37.50
Chapter 2
Tanya McGill
End user development of applications forms a significant part of organizational systems development. This study investigates the role that... Sample PDF
The Effect of End User Development on End User Success
$37.50
Chapter 3
D. Sandy Staples, Peter B. Seddon
Goodhue and Thompson (1995) proposed the Technology-to-Performance Chain (TPC) model in 1995 to help end-users and organizations understand and make... Sample PDF
Testing the Technology-to-Performance Chain Model
$37.50
Chapter 4
Mun Y. Yi, Kun S. Im
Computer task performance is an essential driver of end user productivity. Recent research indicates that computer self-efficacy (CSE) is an... Sample PDF
The Role of Personal Goal and Self-Efficiency in Predicting Computer Task Performance
$37.50
Chapter 5
Steven A. Morris, Thomas E. Marshall
The importance of perceptions of control in explaining human behavior and motivation has been identified, investigated, and found to be significant... Sample PDF
Measurement of Perceived Control in Information Systems
$37.50
Chapter 6
Qingxiong Ma, Liping Liu
The technology acceptance model proposes that perceived ease of use and perceived usefulness predict the acceptance of information technology. Since... Sample PDF
The Technology Acceptance Model: A Meta-Analysis of Empirical Findings
$37.50
Chapter 7
Nory B. Jones, Thomas R. Kochtanek
Practitioners and academics often assume that investments in technology will lead to productivity improvements. While the literature provides many... Sample PDF
Success Factors in the Implementation of a Collaborative Technology and Resulting Productivity Improvements in a Small Business: An Exploratory Study
$37.50
Chapter 8
Evan W. Duggan, Cherian S. Thachenkary
Joint Application Development (JAD) was introduced in the late 1970s to solve many of the problems system users experienced with the conventional... Sample PDF
Supporting the JAD Facilitator with the Nominal Group Technique
$37.50
Chapter 9
Barbara Adams, Eta S. Berner, Joni Rousse Wyatt
User resistance is a common occurrence when new information systems are implemented within health care organizations. Individuals responsible for... Sample PDF
Applying Strategies to Overcome User Resistance in a Group of Clinical Managers to a Business Software Application: A Case Study
$37.50
Chapter 10
Bernd Carsten Stahl
Decisions regarding information assurance and IT security can affect individuals’ rights and obligations and thereby acquire a moral quality. The... Sample PDF
Responsibility for Information Assurance and Privacy: A Problem of Individual Ethics?
$37.50
Chapter 11
Mary C. Jones, R. Leon Price
This study examines organizational knowledge sharing in enterprise resource planning (ERP) implementation. Knowledge sharing in ERP implementation... Sample PDF
Organizational Knowledge Sharing in ERP Implementation: Lessons from Industry
$37.50
Chapter 12
Manish Gupta, Raghav Rao, Shambhu Upadhyaya
Information assurance is a key component in e-banking services. This article investigates the information assurance issues and tenets of e-banking... Sample PDF
Electronic Banking and Information Assurance Issues: Survey and Synthesis
$37.50
Chapter 13
Kregg Aytes, Terry Connolly
Despite rapid technological advances in computer hardware and software, insecure behavior by individual computer users continues to be a significant... Sample PDF
Computer Security and Risky Computing Practices: A Rational Choice Perspective
$37.50
Chapter 14
Merrill Warkentin, Kimberly Davis, Ernst Bekkering
The objective of information system security management is information assurance, which means to maintain confidentiality (privacy), integrity, and... Sample PDF
A TAM Analysis of an Alternative High-Security User Authentication Procedure
$37.50
Chapter 15
Kalyani Chatterjea
In-service upgrading has been an accepted avenue for retraining practicing teachers in Singapore to keep abreast of changing curriculum requirements... Sample PDF
A Blended Approach Learning Strategy for Teacher Development
$37.50
About the Editor
About the Authors