ICT USAGE CHARACTERISTICS AND COMPUTER SECURITY

Authors

  • İbrahim Akman Department of Computer Engineering, Atılım University, Ankara, Turkey
  • Atila Bostan Department of Computer Engineering, Atılım University, Ankara, Turkey

DOI:

https://doi.org/10.20319/pijss.2018.33.10461063

Keywords:

Demographic Factors, Computer Security, ICT Usage Frequency

Abstract

Although acquired-user security habits and user security awareness are qualified as the feeblest components in assuring the information and communication technologies security, they are deemed to be inevitable as well. While the technology in information processing domain efforts its best in establishing the highest plausible security, user awareness is still referred as the key-component. Human demographic factors, ICT usage frequency might have correlation with security related behavior routines, this dimension not to be known yet. Hence, in this study we examined the influence of ICT usage characteristics on secure computer usage behaviors. In order to investigate this relation, a survey was carried out with the participation of 466 individuals from diverse layers of the community. The results demonstrated that statistically noteworthy relations exist between several socio-demographic features, frequency and reason of ICT usage factors and secure computer usage. 

References

Adams, A., & Sasse, M. A. (1999). Users are not the enemy. Communications of the ACM, 42(12), 40-46. https://doi.org/10.1145/322796.322806

Calhoun, K. J., Teng, J. T., & Cheon, M. J. (2002). Impact of national culture on information technology usage behaviour: an exploratory study of decision making in Korea and the USA. Behaviour & Information Technology, 21(4), 293-302. https://doi.org/10.1080/0144929021000013491

Chirkov, V., Ryan, R. M., Kim, Y., & Kaplan, U. (2003). Differentiating autonomy from individualism and independence: a self-determination theory perspective on internalization of cultural orientations and well-being. Journal of personality and social psychology, 84(1), 97. https://doi.org/10.1037/0022-3514.84.1.97

Choi, K. (2008, November 12). An Empirical Assessment of the Relationships between Demographic Variables and Risk Factors for Computer Crime, Paper presented at the annual meeting of the ASC Annual Meeting, St. Louis Adam's Mark, St. Louis, Missouri, Retrieved from http://citation.allacademic.com/meta/p_mla_apa_research_citation/2/6/1/ 6/3/p261632_index.html.

Cilliers, E. J. (2017). The Challenge of Teaching Generation Z. People: International Journal of Social Sciences, 3(1). https://dx.doi.org/10.20319/pijss.2017.31.188198

CSI 2009, Computer Security Institute (2009). CSI 2009 14th Annual CSI Computer Crime & Security Survey, Comprehensive Addition, Computer Security Institute. Retrieved from http://gocsi.com/sites/default/files/pdf_survey/CSI%20Survey%202009%20Comprehensive %20Edition.pdf

CSI 2010/2011, Computer Security Institute (2011). CSI Computer Crime and Security Survey 2010/2011.Retrieved from http://gocsi.com/survey

D'Arcy, J., & Hovav, A. (2007). Deterring internal information systems misuse. Communications of the ACM, 50(10), 113-117. https://doi.org/10.1145/1290958.1290971

Fang, X., & Yen, D. C. (2006). Demographics and behavior of Internet users in China. Technology in Society, 28(3), 363-387. https://doi.org/10.1016/j.techsoc.2006.06.005

Feleming N.C., & Nellis J.G. (2000). Principles of Applied Statistics 2nd Edition, Thomson Business Press, 2000, ISBN: 1-86152-586-9.

Fisher, Y., & Bendas-Jacob, O. (2006). Measuring internet usage: The Israeli case. International Journal of Human-Computer Studies, 64(10), 984-997. https://doi.org/10.1016/j.ijhcs.2006.05.003

Gatautis, R. (2008). The impact of ICT on public and private sectors in Lithuania. Engineering economics, 59(4).

Gross, J. B., & Rosson, M. B. (2007, March). Looking for trouble: understanding end-user security management. In Proceedings of the 2007 Symposium on Computer Human interaction For the Management of information Technology (p. 10). ACM. https://doi.org/10.1145/1234772.1234786

Gupta, P. B., Gould, S. J., & Pola, B. (2004). “To pirate or not to pirate”: A comparative study of the ethical versus other influences on the consumer’s software acquisition-mode decision. Journal of Business Ethics, 55(3), 255-274. https://doi.org/10.1007/s10551-004-0991-1

Herzberg, A., & Jbara, A. (2008). Security and identification indicators for browsers against spoofing and phishing attacks. ACM Transactions on Internet Technology (TOIT), 8(4), 16. https://doi.org/10.1145/1391949.1391950

Hui, T. K., & Wan, D. (2007). Factors affecting Internet shopping behaviour in Singapore: gender and educational issues. International Journal of Consumer Studies, 31(3), 310-316. https://doi.org/10.1111/j.1470-6431.2006.00554.x

Jin, K. G., Drozdenko, R., & Bassett, R. (2007). Information technology professionals’ perceived organizational values and managerial ethics: An empirical study. Journal of Business Ethics, 71(2), 149-159. https://doi.org/10.1007/s10551-006-9131-4

Kang, R., Dabbish, L., Fruchter, N., & Kiesler, S. (2015, July). My data just goes everywhere: user mental models of the internet and implications for privacy and security. In Symposium on Usable Privacy and Security (SOUPS) (pp. 39-52). Berkeley, CA: USENIX Association.

Lau, E. K. W. (2003). An empirical study of software piracy. Business Ethics: A European Review, 12(3), 233-245. https://doi.org/10.1111/1467-8608.00323

Lightner, N. J., Yenisey, M. M., Ozok, A. A., & Salvendy, G. (2002). Shopping behaviour and preferences in e-commerce of Turkish and American university students: implications from cross-cultural design. Behaviour & Information Technology, 21(6), 373-385. https://doi.org/10.1080/0144929021000071316

Masrom, M., & Ismail, Z. (2008). Examining the influence of demographic factors on ethical awareness: computer use and security. Living, Working and Learning Beyond, 558.

Milton, J. S., & Arnold, J. C. (2002). Introduction to probability and statistics: principles and applications for engineering and the computing sciences. McGraw-Hill, Inc..

Montero, D., Yannuzzi, M., Shaw, A., Jacquin, L., Pastor, A., Serral-Gracia, R., ... & Nemirovsky, M. (2015). Virtualized security at the network edge: a user-centric approach. IEEE Communications Magazine, 53(4), 176-186. https://doi.org/10.1109/MCOM.2015.7081092

Nurkhin, A., & Arief, S. (2015). The Determinant Of Student’s Intention To Use Mobile Learning. PEOPLE: International Journal of Social Sciences, 1(1). https://dx.doi.org/10.20319/pijss.2015.s11.102117

Palfreyman, K., & Rodden, T. (1996, November). A protocol for user awareness on the World Wide Web. In Proceedings of the 1996 ACM conference on Computer supported cooperative work (pp. 130-139). ACM. https://doi.org/10.1145/240080.240236

Schneier, B. (2011). Secrets and lies: digital security in a networked world. John Wiley & Sons.

Shore, B., Venkatachalam, A. R., Solorzano, E., Burn, J. M., Hassan, S. Z., & Janczewski, L. J. (2001). Softlifting and piracy: Behavior across cultures. Technology in Society, 23(4), 563-581. https://doi.org/10.1016/S0160-791X(01)00037-9

Stanton, J. M., Stam, K. R., Mastrangelo, P., & Jolton, J. (2005). Analysis of end user security behaviors. Computers & security, 24(2), 124-133. https://doi.org/10.1016/j.cose.2004.07.001

Shropshire, J., Warkentin, M., & Sharma, S. (2015). Personality, attitudes, and intentions: predicting initial adoption of information security behavior. Computers & Security, 49, 177-191. https://doi.org/10.1016/j.cose.2015.01.002

Sin Tan, K., Choy Chong, S., Lin, B., & Cyril Eze, U. (2009). Internet-based ICT adoption: evidence from Malaysian SMEs. Industrial Management & Data Systems, 109(2), 224-244. https://doi.org/10.1108/02635570910930118

Teo, T. S., & Lim, V. K. (2000). Gender differences in internet usage and task preferences. Behaviour & Information Technology, 19(4), 283-295. https://doi.org/10.1080/01449290050086390

Thomson, E. S., & Laing, A. W. (2003). “The Net Generation”: Children and Young People, the Internet and Online Shopping. Journal of Marketing Management, 19(3-4), 491-512. https://doi.org/10.1080/0267257X.2003.9728221 https://doi.org/10.1362/026725703321663764

UNPAN 2008, From e-Government to Connected Governance. United Nations e-Government Survey 2008, United Nations New York. Retrieved from http://unpan1.un.org/intradoc/ groups/public/documents/un/unpan028607.pdf

Ur Rehman, M. S., Salam, Z. A., & Tareq, M. A. (2016). Tele-Pay a Substitute of Conventional Banking: A Conceptual Study. PEOPLE: International Journal of Social Sciences, 2(2). http://dx.doi.org/10.20319/pijss.2016.22.3040

West, R. (2008). The psychology of security. Communications of the ACM, 51(4), 34-40. https://doi.org/10.1145/1330311.1330320

Downloads

Published

2018-01-29

How to Cite

Akman, I., & Bostan, A. (2018). ICT USAGE CHARACTERISTICS AND COMPUTER SECURITY. PEOPLE: International Journal of Social Sciences, 3(3), 1046–1063. https://doi.org/10.20319/pijss.2018.33.10461063