UUM Electronic Theses and Dissertation
UUM ETD | Universiti Utara Malaysian Electronic Theses and Dissertation
FAQs | Feedback | Search Tips | Sitemap

Information security threat avoidance behavior: an empirical investigation

Ling, Zhixuan (2019) Information security threat avoidance behavior: an empirical investigation. Masters thesis, Universiti Utara Malaysia.

[thumbnail of s822840_01.pdf] Text
s822840_01.pdf

Download (710kB)
[thumbnail of s822840_02.pdf] Text
s822840_02.pdf

Download (469kB)
[thumbnail of s822840_references.docx] Text
s822840_references.docx

Download (70kB)

Abstract

In recent years, with the continuous integration of information technology into daily life, users are facing more and more information security threats. Although many software and hardware protection methods have been put in place to achieve higher information security, the number of security incidents has not decreased. Traditionally, much of the work of providing security in information systems has focused on technology, and recent research has shown that user behavior does play a central role. Considering that end users are often the first line of defense and are often seen as the weakest link in information security, security defenses are very important. Therefore, the purpose of this study is to examine the relationship between perceived information security threats and information security behavior of users by using Technology Threat Avoidance Theory (TTAT). This study focuses on three types of threats: malware, data loss or leakage and identity theft. More importantly, a variety of information security behaviors were identified in this study, including password usage behavior, security software usage behavior, data storage behavior, physical security behavior, and proactive awareness behavior. Based on a survey data provided by 319 Internet users from a public university in Malaysia, the research results show that data loss or leakage is the most harmful threat to information security of users, followed by malware and identity theft. Moreover, these perceived threats have a positive impact on the five information security behaviors, where proactive awareness behavior is the top choice among these five information security behaviors.

Item Type: Thesis (Masters)
Supervisor : Abdul Talib, Yurita Yakimin
Item ID: 9404
Uncontrolled Keywords: information security threats, information security behaviors, technology threat avoidance theory (TTAT), password usage behavior, security software usage behavior, data storage behavior, physical security behavior, proactive awareness behavior
Subjects: T Technology > T Technology (General) > T58.5-58.64 Information technology
Divisions: Tunku Puteri Intan Safinaz School of Accountancy (TISSA)
Date Deposited: 29 May 2022 09:51
Last Modified: 29 May 2022 09:51
Department: Tunku Puteri Intan Safinaz School of Accauntancy (TISSA)
Name: Abdul Talib, Yurita Yakimin
URI: https://etd.uum.edu.my/id/eprint/9404

Actions (login required)

View Item
View Item