ICT USAGE CHARACTERISTICS AND COMPUTER SECURITY
DOI:
https://doi.org/10.20319/pijss.2018.33.10461063Keywords:
Demographic Factors, Computer Security, ICT Usage FrequencyAbstract
Although acquired-user security habits and user security awareness are qualified as the feeblest components in assuring the information and communication technologies security, they are deemed to be inevitable as well. While the technology in information processing domain efforts its best in establishing the highest plausible security, user awareness is still referred as the key-component. Human demographic factors, ICT usage frequency might have correlation with security related behavior routines, this dimension not to be known yet. Hence, in this study we examined the influence of ICT usage characteristics on secure computer usage behaviors. In order to investigate this relation, a survey was carried out with the participation of 466 individuals from diverse layers of the community. The results demonstrated that statistically noteworthy relations exist between several socio-demographic features, frequency and reason of ICT usage factors and secure computer usage.
References
Adams, A., & Sasse, M. A. (1999). Users are not the enemy. Communications of the ACM, 42(12), 40-46. https://doi.org/10.1145/322796.322806
Calhoun, K. J., Teng, J. T., & Cheon, M. J. (2002). Impact of national culture on information technology usage behaviour: an exploratory study of decision making in Korea and the USA. Behaviour & Information Technology, 21(4), 293-302. https://doi.org/10.1080/0144929021000013491
Chirkov, V., Ryan, R. M., Kim, Y., & Kaplan, U. (2003). Differentiating autonomy from individualism and independence: a self-determination theory perspective on internalization of cultural orientations and well-being. Journal of personality and social psychology, 84(1), 97. https://doi.org/10.1037/0022-3514.84.1.97
Choi, K. (2008, November 12). An Empirical Assessment of the Relationships between Demographic Variables and Risk Factors for Computer Crime, Paper presented at the annual meeting of the ASC Annual Meeting, St. Louis Adam's Mark, St. Louis, Missouri, Retrieved from http://citation.allacademic.com/meta/p_mla_apa_research_citation/2/6/1/ 6/3/p261632_index.html.
Cilliers, E. J. (2017). The Challenge of Teaching Generation Z. People: International Journal of Social Sciences, 3(1). https://dx.doi.org/10.20319/pijss.2017.31.188198
CSI 2009, Computer Security Institute (2009). CSI 2009 14th Annual CSI Computer Crime & Security Survey, Comprehensive Addition, Computer Security Institute. Retrieved from http://gocsi.com/sites/default/files/pdf_survey/CSI%20Survey%202009%20Comprehensive %20Edition.pdf
CSI 2010/2011, Computer Security Institute (2011). CSI Computer Crime and Security Survey 2010/2011.Retrieved from http://gocsi.com/survey
D'Arcy, J., & Hovav, A. (2007). Deterring internal information systems misuse. Communications of the ACM, 50(10), 113-117. https://doi.org/10.1145/1290958.1290971
Fang, X., & Yen, D. C. (2006). Demographics and behavior of Internet users in China. Technology in Society, 28(3), 363-387. https://doi.org/10.1016/j.techsoc.2006.06.005
Feleming N.C., & Nellis J.G. (2000). Principles of Applied Statistics 2nd Edition, Thomson Business Press, 2000, ISBN: 1-86152-586-9.
Fisher, Y., & Bendas-Jacob, O. (2006). Measuring internet usage: The Israeli case. International Journal of Human-Computer Studies, 64(10), 984-997. https://doi.org/10.1016/j.ijhcs.2006.05.003
Gatautis, R. (2008). The impact of ICT on public and private sectors in Lithuania. Engineering economics, 59(4).
Gross, J. B., & Rosson, M. B. (2007, March). Looking for trouble: understanding end-user security management. In Proceedings of the 2007 Symposium on Computer Human interaction For the Management of information Technology (p. 10). ACM. https://doi.org/10.1145/1234772.1234786
Gupta, P. B., Gould, S. J., & Pola, B. (2004). “To pirate or not to pirate”: A comparative study of the ethical versus other influences on the consumer’s software acquisition-mode decision. Journal of Business Ethics, 55(3), 255-274. https://doi.org/10.1007/s10551-004-0991-1
Herzberg, A., & Jbara, A. (2008). Security and identification indicators for browsers against spoofing and phishing attacks. ACM Transactions on Internet Technology (TOIT), 8(4), 16. https://doi.org/10.1145/1391949.1391950
Hui, T. K., & Wan, D. (2007). Factors affecting Internet shopping behaviour in Singapore: gender and educational issues. International Journal of Consumer Studies, 31(3), 310-316. https://doi.org/10.1111/j.1470-6431.2006.00554.x
Jin, K. G., Drozdenko, R., & Bassett, R. (2007). Information technology professionals’ perceived organizational values and managerial ethics: An empirical study. Journal of Business Ethics, 71(2), 149-159. https://doi.org/10.1007/s10551-006-9131-4
Kang, R., Dabbish, L., Fruchter, N., & Kiesler, S. (2015, July). My data just goes everywhere: user mental models of the internet and implications for privacy and security. In Symposium on Usable Privacy and Security (SOUPS) (pp. 39-52). Berkeley, CA: USENIX Association.
Lau, E. K. W. (2003). An empirical study of software piracy. Business Ethics: A European Review, 12(3), 233-245. https://doi.org/10.1111/1467-8608.00323
Lightner, N. J., Yenisey, M. M., Ozok, A. A., & Salvendy, G. (2002). Shopping behaviour and preferences in e-commerce of Turkish and American university students: implications from cross-cultural design. Behaviour & Information Technology, 21(6), 373-385. https://doi.org/10.1080/0144929021000071316
Masrom, M., & Ismail, Z. (2008). Examining the influence of demographic factors on ethical awareness: computer use and security. Living, Working and Learning Beyond, 558.
Milton, J. S., & Arnold, J. C. (2002). Introduction to probability and statistics: principles and applications for engineering and the computing sciences. McGraw-Hill, Inc..
Montero, D., Yannuzzi, M., Shaw, A., Jacquin, L., Pastor, A., Serral-Gracia, R., ... & Nemirovsky, M. (2015). Virtualized security at the network edge: a user-centric approach. IEEE Communications Magazine, 53(4), 176-186. https://doi.org/10.1109/MCOM.2015.7081092
Nurkhin, A., & Arief, S. (2015). The Determinant Of Student’s Intention To Use Mobile Learning. PEOPLE: International Journal of Social Sciences, 1(1). https://dx.doi.org/10.20319/pijss.2015.s11.102117
Palfreyman, K., & Rodden, T. (1996, November). A protocol for user awareness on the World Wide Web. In Proceedings of the 1996 ACM conference on Computer supported cooperative work (pp. 130-139). ACM. https://doi.org/10.1145/240080.240236
Schneier, B. (2011). Secrets and lies: digital security in a networked world. John Wiley & Sons.
Shore, B., Venkatachalam, A. R., Solorzano, E., Burn, J. M., Hassan, S. Z., & Janczewski, L. J. (2001). Softlifting and piracy: Behavior across cultures. Technology in Society, 23(4), 563-581. https://doi.org/10.1016/S0160-791X(01)00037-9
Stanton, J. M., Stam, K. R., Mastrangelo, P., & Jolton, J. (2005). Analysis of end user security behaviors. Computers & security, 24(2), 124-133. https://doi.org/10.1016/j.cose.2004.07.001
Shropshire, J., Warkentin, M., & Sharma, S. (2015). Personality, attitudes, and intentions: predicting initial adoption of information security behavior. Computers & Security, 49, 177-191. https://doi.org/10.1016/j.cose.2015.01.002
Sin Tan, K., Choy Chong, S., Lin, B., & Cyril Eze, U. (2009). Internet-based ICT adoption: evidence from Malaysian SMEs. Industrial Management & Data Systems, 109(2), 224-244. https://doi.org/10.1108/02635570910930118
Teo, T. S., & Lim, V. K. (2000). Gender differences in internet usage and task preferences. Behaviour & Information Technology, 19(4), 283-295. https://doi.org/10.1080/01449290050086390
Thomson, E. S., & Laing, A. W. (2003). “The Net Generation”: Children and Young People, the Internet and Online Shopping. Journal of Marketing Management, 19(3-4), 491-512. https://doi.org/10.1080/0267257X.2003.9728221 https://doi.org/10.1362/026725703321663764
UNPAN 2008, From e-Government to Connected Governance. United Nations e-Government Survey 2008, United Nations New York. Retrieved from http://unpan1.un.org/intradoc/ groups/public/documents/un/unpan028607.pdf
Ur Rehman, M. S., Salam, Z. A., & Tareq, M. A. (2016). Tele-Pay a Substitute of Conventional Banking: A Conceptual Study. PEOPLE: International Journal of Social Sciences, 2(2). http://dx.doi.org/10.20319/pijss.2016.22.3040
West, R. (2008). The psychology of security. Communications of the ACM, 51(4), 34-40. https://doi.org/10.1145/1330311.1330320
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2018 İbrahim Akman, Atila Bostan
This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.