Information security is of universal concern to computer users from all walks of life. Though gender differences in technology adoption are well researched, scant attention has been devoted to the study of gender differences in information security. We address this research gap by investigating how information security perceptions and behaviours vary between genders in a study involving 624 home users. The results reveal that females exhibit significantly lower overall levels of security behaviour than males. Furthermore, individual perceptions and behaviours in many cases also vary by gender. Our work provides evidence that gender effects should be considered when formulating information security education, training, and awareness initiati...
Known age differences exist in relation to information and communication technology (ICT) use, attit...
This replication study is a methodological replication of Study 1 of Anderson and Agarwal (2010) (A&...
This open access book presents a systematic investigation into internationally comparable data gathe...
Information security is of universal concern to computer users from all walks of life. Though gender...
Information security is of universal concern to computer users from all walks of life. Though gender...
Information security is of universal concern to computer users from all walks of life. Though gender...
Purpose Information technology users often fail to adopt necessary security and privacy measures,...
This research aims to understand the gender difference on the email security perceptions and behavio...
Previous research has studied gender differences in people’s perceptions and behaviors toward inform...
Security breaches are prevalent in organizations and many of the breaches are attributed to human er...
Security breaches are prevalent in organizations and many of the breaches are attributed to human er...
Access to technology and the benefits derived from its use are not available on equal terms to men a...
This open access book presents a systematic investigation into internationally comparable data gathe...
The projects aim is to understand how gender may impact decision making within e-commerce. Current l...
This open access book presents a systematic investigation into internationally comparable data gathe...
Known age differences exist in relation to information and communication technology (ICT) use, attit...
This replication study is a methodological replication of Study 1 of Anderson and Agarwal (2010) (A&...
This open access book presents a systematic investigation into internationally comparable data gathe...
Information security is of universal concern to computer users from all walks of life. Though gender...
Information security is of universal concern to computer users from all walks of life. Though gender...
Information security is of universal concern to computer users from all walks of life. Though gender...
Purpose Information technology users often fail to adopt necessary security and privacy measures,...
This research aims to understand the gender difference on the email security perceptions and behavio...
Previous research has studied gender differences in people’s perceptions and behaviors toward inform...
Security breaches are prevalent in organizations and many of the breaches are attributed to human er...
Security breaches are prevalent in organizations and many of the breaches are attributed to human er...
Access to technology and the benefits derived from its use are not available on equal terms to men a...
This open access book presents a systematic investigation into internationally comparable data gathe...
The projects aim is to understand how gender may impact decision making within e-commerce. Current l...
This open access book presents a systematic investigation into internationally comparable data gathe...
Known age differences exist in relation to information and communication technology (ICT) use, attit...
This replication study is a methodological replication of Study 1 of Anderson and Agarwal (2010) (A&...
This open access book presents a systematic investigation into internationally comparable data gathe...