Little is known about the context sensitivity of users’ online security perceptions and behaviors to national and individual attributes, and there is inadequate research about the spectrum of users’ behaviors in dealing with online security threats. In addressing this gap, this paper draws on two complementary theoretical bases: (1) the contextualization of the protection motivation theory (PMT) to online security behavior and (2) a polycontextual lens for the cross-national comparison of users’ security behaviors in the United States and China. The conceptualized model is tested based on 718 survey observations collected from the United States and China. The results support our model and show the divergence between the United States, an ex...
It is a popular belief that humans are the weakest link in cyber-security. However, there has been l...
Online Social Media (OSM) websites have attracted millions of users by enabling them to socially int...
Recent trends in social network services (SNS) have taken the rates of personal information sharing,...
Protective technologies -- computer technologies that secure data and systems from viruses, unauthor...
The growth of internet usage is a global phenomenon with Africa not being left out. The continents a...
This study explores the role of online news media in directing people’s behavior in China. Previous ...
We conducted an online experiment (n=2,024) on a representative sample of internet users in Germany,...
The current study, using structural equation modeling, assesses the processual relationship between ...
With society now heavily invested in cyber-technology and most cyber-attacks due to human error, it ...
Part 4: End-User SecurityInternational audienceThe COVID-19 pandemic has forced individuals to adopt...
One hundred-sixty four participants from the United States, India and China completed a survey desig...
Individual internet users are commonly considered the weakest links in the cybersecurity chain. One ...
To reduce cyberattack risk, individuals are commonly encouraged to take security behaviors to preven...
We conducted an online experiment (n=2,024) on a representative sample of internet users in Germany,...
Information security is one of the important domains of information systems research today, with pro...
It is a popular belief that humans are the weakest link in cyber-security. However, there has been l...
Online Social Media (OSM) websites have attracted millions of users by enabling them to socially int...
Recent trends in social network services (SNS) have taken the rates of personal information sharing,...
Protective technologies -- computer technologies that secure data and systems from viruses, unauthor...
The growth of internet usage is a global phenomenon with Africa not being left out. The continents a...
This study explores the role of online news media in directing people’s behavior in China. Previous ...
We conducted an online experiment (n=2,024) on a representative sample of internet users in Germany,...
The current study, using structural equation modeling, assesses the processual relationship between ...
With society now heavily invested in cyber-technology and most cyber-attacks due to human error, it ...
Part 4: End-User SecurityInternational audienceThe COVID-19 pandemic has forced individuals to adopt...
One hundred-sixty four participants from the United States, India and China completed a survey desig...
Individual internet users are commonly considered the weakest links in the cybersecurity chain. One ...
To reduce cyberattack risk, individuals are commonly encouraged to take security behaviors to preven...
We conducted an online experiment (n=2,024) on a representative sample of internet users in Germany,...
Information security is one of the important domains of information systems research today, with pro...
It is a popular belief that humans are the weakest link in cyber-security. However, there has been l...
Online Social Media (OSM) websites have attracted millions of users by enabling them to socially int...
Recent trends in social network services (SNS) have taken the rates of personal information sharing,...