메뉴 건너뛰기




Volumn 28, Issue 8, 2009, Pages 816-826

Self-efficacy in information security: Its influence on end users' information security practice behavior

Author keywords

Information security; Information security practices; Self efficacy; Social cognitive theory; User behavior

Indexed keywords

INFORMATION SECURITY; INFORMATION SECURITY PRACTICE; SELF EFFICACY; SOCIAL COGNITIVE THEORY; USER BEHAVIORS;

EID: 71949094501     PISSN: 01674048     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.cose.2009.05.008     Document Type: Article
Times cited : (252)

References (68)
  • 1
    • 0034557459 scopus 로고    scopus 로고
    • Research report: the evolving relationship between general and specific computer self-efficacy-an empirical assessment
    • Agarwal R., Sambamurthy V., and Stair R.M. Research report: the evolving relationship between general and specific computer self-efficacy-an empirical assessment. Information Systems Research 11 4 (2000) 418-430
    • (2000) Information Systems Research , vol.11 , Issue.4 , pp. 418-430
    • Agarwal, R.1    Sambamurthy, V.2    Stair, R.M.3
  • 2
    • 34249871944 scopus 로고    scopus 로고
    • A qualitative study of users' view on information security
    • Albrechtsen E. A qualitative study of users' view on information security. Computers & Security 26 (2007) 276-289
    • (2007) Computers & Security , vol.26 , pp. 276-289
    • Albrechtsen, E.1
  • 5
    • 54849213300 scopus 로고    scopus 로고
    • White paper, AOL/NCSA (American Online and National Cyber Security Alliance)
    • AOL/NCSA. Online safety study. White paper (2005), AOL/NCSA (American Online and National Cyber Security Alliance)
    • (2005) Online safety study
  • 8
    • 0000018064 scopus 로고
    • Self-regulatory mechanisms governing the impact of social comparison on complex decision making
    • Bandura A., and Jourden F.J. Self-regulatory mechanisms governing the impact of social comparison on complex decision making. Journal of Personality and Social Psychology 60 6 (1991) 941-951
    • (1991) Journal of Personality and Social Psychology , vol.60 , Issue.6 , pp. 941-951
    • Bandura, A.1    Jourden, F.J.2
  • 9
    • 78049400376 scopus 로고    scopus 로고
    • Technical Report, British Department of Business Enterprise & Regulatory Reform
    • BERR. 2008 Information security breaches survey. Technical Report (2008), British Department of Business Enterprise & Regulatory Reform
    • (2008) 2008 Information security breaches survey
    • BERR1
  • 11
    • 0003095695 scopus 로고    scopus 로고
    • The partial least squares approach for structural equation modeling
    • Marcoulides G.A. (Ed), Lawrence Erlbaum Associates, Hillsdale, N.J
    • Chin W. The partial least squares approach for structural equation modeling. In: Marcoulides G.A. (Ed). Modern methods for business research (1998), Lawrence Erlbaum Associates, Hillsdale, N.J
    • (1998) Modern methods for business research
    • Chin, W.1
  • 14
    • 49149116092 scopus 로고
    • Computer self-efficacy: development of a measure and initial test
    • Compeau D.R., and Higgins C.A. Computer self-efficacy: development of a measure and initial test. MIS Quarterly 19 2 (1995) 189-211
    • (1995) MIS Quarterly , vol.19 , Issue.2 , pp. 189-211
    • Compeau, D.R.1    Higgins, C.A.2
  • 15
    • 55349113388 scopus 로고    scopus 로고
    • Computer self-efficacy: a review
    • Human computer interaction and management information systems: foundations. Zhang P., and Galletta D. (Eds), M.E. Sharpe, NJ [edited by V. Zwass]
    • Compeau D., Gravill J., Haggerty N., and Kelley H. Computer self-efficacy: a review. In: Zhang P., and Galletta D. (Eds). Human computer interaction and management information systems: foundations. Advances in information systems series vol. 4 (2006), M.E. Sharpe, NJ [edited by V. Zwass]
    • (2006) Advances in information systems series , vol.4
    • Compeau, D.1    Gravill, J.2    Haggerty, N.3    Kelley, H.4
  • 16
    • 84936823933 scopus 로고
    • User acceptance of computer technology: a comparison of two theoretical models
    • Davis F.D., Bagozzi R.P., and Warshaw P.R. User acceptance of computer technology: a comparison of two theoretical models. Management Science 35 8 (1989) 982-1003
    • (1989) Management Science , vol.35 , Issue.8 , pp. 982-1003
    • Davis, F.D.1    Bagozzi, R.P.2    Warshaw, P.R.3
  • 17
    • 0002698747 scopus 로고    scopus 로고
    • Information system security management in the new millennium
    • Dhillon G., and Backhouse J. Information system security management in the new millennium. Communications of the ACM 43 7 (2000) 125-128
    • (2000) Communications of the ACM , vol.43 , Issue.7 , pp. 125-128
    • Dhillon, G.1    Backhouse, J.2
  • 19
    • 51249172647 scopus 로고
    • Resistance to technological innovations: an examination of the role of self-efficacy and performance satisfaction
    • Ellen P.S., Bearden W.O., and Sharma S. Resistance to technological innovations: an examination of the role of self-efficacy and performance satisfaction. Journal of the Academy of Marketing Science 19 4 (1991) 297-307
    • (1991) Journal of the Academy of Marketing Science , vol.19 , Issue.4 , pp. 297-307
    • Ellen, P.S.1    Bearden, W.O.2    Sharma, S.3
  • 21
    • 84931201972 scopus 로고
    • The social psychology of self-efficacy
    • Gecas V. The social psychology of self-efficacy. Annual Review of Sociology 15 (1989) 291-316
    • (1989) Annual Review of Sociology , vol.15 , pp. 291-316
    • Gecas, V.1
  • 22
    • 0001240334 scopus 로고
    • Self-efficacy: implications for organizational behavior and human resource management
    • Gist M.E. Self-efficacy: implications for organizational behavior and human resource management. Academy of Management Review 12 3 (1987) 472-485
    • (1987) Academy of Management Review , vol.12 , Issue.3 , pp. 472-485
    • Gist, M.E.1
  • 23
    • 0000806910 scopus 로고
    • Self-efficacy: a theoretical analysis of its determinants and malleability
    • Gist M.E. Self-efficacy: a theoretical analysis of its determinants and malleability. Academy of Management Review 17 2 (1992) 183-211
    • (1992) Academy of Management Review , vol.17 , Issue.2 , pp. 183-211
    • Gist, M.E.1
  • 24
    • 26444447760 scopus 로고
    • Effects of alternative training methods on self-efficacy and performance in computer software training
    • Gist M.E., Schwoerer C.E., and Rosen B. Effects of alternative training methods on self-efficacy and performance in computer software training. Journal of Applied Psychology 74 6 (1989) 884-891
    • (1989) Journal of Applied Psychology , vol.74 , Issue.6 , pp. 884-891
    • Gist, M.E.1    Schwoerer, C.E.2    Rosen, B.3
  • 25
    • 0038569169 scopus 로고
    • Change in self in adulthood: the example of sense of control
    • Baltes P.B., and Brim O.G. (Eds), Academic Press, New York
    • Gurin P., and Brim Jr. O.G. Change in self in adulthood: the example of sense of control. In: Baltes P.B., and Brim O.G. (Eds). Life span development and behavior vol. 6 (1984), Academic Press, New York 28-334
    • (1984) Life span development and behavior , vol.6 , pp. 28-334
    • Gurin, P.1    Brim Jr., O.G.2
  • 27
  • 28
    • 0002704773 scopus 로고
    • A structural equation model of end-user satisfaction with a computer-based medical information system
    • Henry J.W., and Stone R.W. A structural equation model of end-user satisfaction with a computer-based medical information system. Information Resources Management Journal 7 3 (1994) 21-33
    • (1994) Information Resources Management Journal , vol.7 , Issue.3 , pp. 21-33
    • Henry, J.W.1    Stone, R.W.2
  • 29
    • 4544246468 scopus 로고    scopus 로고
    • Internet self-efficacy and electronic service acceptance
    • Hsu M.H., and Chiu C.M. Internet self-efficacy and electronic service acceptance. Decision Support Systems 38 (2004) 369-381
    • (2004) Decision Support Systems , vol.38 , pp. 369-381
    • Hsu, M.H.1    Chiu, C.M.2
  • 30
    • 0037550861 scopus 로고
    • Students as surrogates for managers in a decision-making environment: an experimental study
    • Hughes C.T., and Gibson M.L. Students as surrogates for managers in a decision-making environment: an experimental study. Journal of Management Information Systems 8 2 (1991) 153-166
    • (1991) Journal of Management Information Systems , vol.8 , Issue.2 , pp. 153-166
    • Hughes, C.T.1    Gibson, M.L.2
  • 31
    • 9744279768 scopus 로고    scopus 로고
    • Effects of the user participation in systems development by end users: a longitudinal field experiment
    • Hunton J.E., and Beeler J.D. Effects of the user participation in systems development by end users: a longitudinal field experiment. MIS Quarterly 21 4 (1997) 359-388
    • (1997) MIS Quarterly , vol.21 , Issue.4 , pp. 359-388
    • Hunton, J.E.1    Beeler, J.D.2
  • 33
    • 84900072340 scopus 로고    scopus 로고
    • National Institute of Standards and Technology, Technology Administration, U.S. Department of Commerce Special Report, p. 800-46
    • Kuhn D.R., Tracy M.C., and Frankel S.E. Security for telecommunicating and broadband communications (2002), National Institute of Standards and Technology, Technology Administration, U.S. Department of Commerce Special Report, p. 800-46
    • (2002) Security for telecommunicating and broadband communications
    • Kuhn, D.R.1    Tracy, M.C.2    Frankel, S.E.3
  • 34
    • 0040436852 scopus 로고    scopus 로고
    • Development and validation of ethical computer self-efficacy measures: the case of soft lifting
    • Kuo F.Y., and Hsu M.H. Development and validation of ethical computer self-efficacy measures: the case of soft lifting. Journal of Business Ethics 32 4 (2001) 299-315
    • (2001) Journal of Business Ethics , vol.32 , Issue.4 , pp. 299-315
    • Kuo, F.Y.1    Hsu, M.H.2
  • 35
    • 23344453209 scopus 로고    scopus 로고
    • Investigating factors affecting adoption of anti-spyware systems
    • Lee Y., and Kozar A. Investigating factors affecting adoption of anti-spyware systems. Communications of the ACM 48 8 (2005) 72-77
    • (2005) Communications of the ACM , vol.48 , Issue.8 , pp. 72-77
    • Lee, Y.1    Kozar, A.2
  • 36
    • 0030194196 scopus 로고    scopus 로고
    • Evaluating ethical decision making and computer use
    • Loch K.D., and Conger S. Evaluating ethical decision making and computer use. Communication of the ACM 39 7 (1996) 74-83
    • (1996) Communication of the ACM , vol.39 , Issue.7 , pp. 74-83
    • Loch, K.D.1    Conger, S.2
  • 38
    • 0000729074 scopus 로고
    • Social cognitive variables in the prediction of client motivation and attribution
    • Longo D.A., Lent R.W., and Brown S.D. Social cognitive variables in the prediction of client motivation and attribution. Journal of Counseling Psychology 39 4 (1992) 447-452
    • (1992) Journal of Counseling Psychology , vol.39 , Issue.4 , pp. 447-452
    • Longo, D.A.1    Lent, R.W.2    Brown, S.D.3
  • 39
    • 71949086030 scopus 로고    scopus 로고
    • Financial Times Limited, London, England
    • Mackenzie K. Employees may be opening the door to criminals (May 30, 2006), Financial Times Limited, London, England. http://www.ft.com/cms/s/458807fe-efec-11da-b80e-0000779e2340.html
    • (2006) Employees may be opening the door to criminals
    • Mackenzie, K.1
  • 40
    • 0032341068 scopus 로고    scopus 로고
    • The multilevel and multifaceted characteristics of computer self-efficacy
    • Marakas G.M., Yi M.Y., and Johnson R.D. The multilevel and multifaceted characteristics of computer self-efficacy. Information Systems Research 9 2 (1998) 126-163
    • (1998) Information Systems Research , vol.9 , Issue.2 , pp. 126-163
    • Marakas, G.M.1    Yi, M.Y.2    Johnson, R.D.3
  • 43
    • 71949113937 scopus 로고    scopus 로고
    • National Cyber Security Alliance
    • NCSA. How safe are you? Interactive web document (2004), National Cyber Security Alliance. http://www.staysafeonline.info/home-quiz.html
    • (2004) How safe are you? Interactive web document
    • NCSA1
  • 44
    • 0025395496 scopus 로고
    • Mechanisms governing empowerment effects: a self-efficacy analysis
    • Ozer E.M., and Bandura A. Mechanisms governing empowerment effects: a self-efficacy analysis. Journal of Personality and Social Psychology 58 3 (1990) 472-486
    • (1990) Journal of Personality and Social Psychology , vol.58 , Issue.3 , pp. 472-486
    • Ozer, E.M.1    Bandura, A.2
  • 45
    • 0036567998 scopus 로고    scopus 로고
    • A field study of computer self-efficacy beliefs as an outcome of training: the role of computer playfulness, computer knowledge, and performance during training
    • Potosky D. A field study of computer self-efficacy beliefs as an outcome of training: the role of computer playfulness, computer knowledge, and performance during training. Computers in Human Behavior 18 3 (2002) 241-255
    • (2002) Computers in Human Behavior , vol.18 , Issue.3 , pp. 241-255
    • Potosky, D.1
  • 47
    • 55849105212 scopus 로고    scopus 로고
    • Information security awareness in higher education: an exploratory study
    • Rezgui Y., and Marks A. Information security awareness in higher education: an exploratory study. Computers & Security 27 (2008) 241-253
    • (2008) Computers & Security , vol.27 , pp. 241-253
    • Rezgui, Y.1    Marks, A.2
  • 48
    • 71949097968 scopus 로고    scopus 로고
    • Web document, CERT Coordination Center, Software Engineering Institute, Carnegie Mellon University
    • Rogers L.R. The goal of computer security or what's yours until you say otherwise!. Web document (2004), CERT Coordination Center, Software Engineering Institute, Carnegie Mellon University. http://www.cert.org/homeusers/goalof_computersecurity.html
    • (2004) The goal of computer security or what's yours until you say otherwise!
    • Rogers, L.R.1
  • 50
    • 0003538232 scopus 로고
    • Computer security-threats, vulnerabilities, and countermeasures
    • Smith M. Computer security-threats, vulnerabilities, and countermeasures. Information Age 11 4 (1989) 205-210
    • (1989) Information Age , vol.11 , Issue.4 , pp. 205-210
    • Smith, M.1
  • 52
    • 0002323214 scopus 로고    scopus 로고
    • Social cognitive theory and self-efficacy: going beyond traditional motivational and behavioral approaches
    • Stajkovic F.L., and Luthans B.C. Social cognitive theory and self-efficacy: going beyond traditional motivational and behavioral approaches. Organizational Dynamics 26 4 (1998) 62-74
    • (1998) Organizational Dynamics , vol.26 , Issue.4 , pp. 62-74
    • Stajkovic, F.L.1    Luthans, B.C.2
  • 53
    • 0033260584 scopus 로고    scopus 로고
    • A self-efficacy theory explanation for the management of remote workers in virtual organizations
    • Staples D.S., Hulland J.S., and Higgins C.A. A self-efficacy theory explanation for the management of remote workers in virtual organizations. Organization Science 10 6 (1999) 758-776
    • (1999) Organization Science , vol.10 , Issue.6 , pp. 758-776
    • Staples, D.S.1    Hulland, J.S.2    Higgins, C.A.3
  • 55
    • 0000280419 scopus 로고
    • Effective IS security: an empirical study
    • Straub D.W. Effective IS security: an empirical study. Information Systems Research 1 3 (1990) 255-276
    • (1990) Information Systems Research , vol.1 , Issue.3 , pp. 255-276
    • Straub, D.W.1
  • 56
    • 0001133137 scopus 로고    scopus 로고
    • Coping with systems risk: security planning models for management decision making
    • Straub D.W., and Welke R.J. Coping with systems risk: security planning models for management decision making. MIS Quarterly 22 4 (1998) 441-469
    • (1998) MIS Quarterly , vol.22 , Issue.4 , pp. 441-469
    • Straub, D.W.1    Welke, R.J.2
  • 57
    • 0000703119 scopus 로고
    • Assessing IT usage: the role of prior experience
    • Taylor S., and Todd P. Assessing IT usage: the role of prior experience. MIS Quarterly 19 4 (1995) 561-570
    • (1995) MIS Quarterly , vol.19 , Issue.4 , pp. 561-570
    • Taylor, S.1    Todd, P.2
  • 58
    • 1042268474 scopus 로고    scopus 로고
    • An empirical examination of individual traits as antecedents to computer anxiety and computer self-efficacy
    • Thatcher J.B., and Perrewe P.L. An empirical examination of individual traits as antecedents to computer anxiety and computer self-efficacy. MIS Quarterly 26 4 (2002) 381-396
    • (2002) MIS Quarterly , vol.26 , Issue.4 , pp. 381-396
    • Thatcher, J.B.1    Perrewe, P.L.2
  • 59
    • 0032671610 scopus 로고    scopus 로고
    • Computer self-efficacy, training effectiveness and user attitudes: an empirical study
    • Torkzadeh R., Pflughoeft K., and Hall L. Computer self-efficacy, training effectiveness and user attitudes: an empirical study. Behavior and Information Technology 28 4 (1999) 299-309
    • (1999) Behavior and Information Technology , vol.28 , Issue.4 , pp. 299-309
    • Torkzadeh, R.1    Pflughoeft, K.2    Hall, L.3
  • 60
    • 23344447680 scopus 로고    scopus 로고
    • Why spyware poses multiple threats to security
    • Thompson R. Why spyware poses multiple threats to security. Communications of the ACM 48 8 (2005) 41-43
    • (2005) Communications of the ACM , vol.48 , Issue.8 , pp. 41-43
    • Thompson, R.1
  • 61
    • 1542382496 scopus 로고    scopus 로고
    • User acceptance of information technology: toward a unified view
    • Venkatesh V., Morris M.G., Davis F.D., and Davis G.B. User acceptance of information technology: toward a unified view. MIS Quarterly 27 3 (2003) 425-478
    • (2003) MIS Quarterly , vol.27 , Issue.3 , pp. 425-478
    • Venkatesh, V.1    Morris, M.G.2    Davis, F.D.3    Davis, G.B.4
  • 62
    • 71949099784 scopus 로고    scopus 로고
    • American express warns of 'Security Measures' phishing scam
    • Washkuch F. American express warns of 'Security Measures' phishing scam. SC Magazine (May 25, 2006)
    • (2006) SC Magazine
    • Washkuch, F.1
  • 63
    • 4243198165 scopus 로고    scopus 로고
    • Enemy at the gate: threats to information security
    • Whitman M.E. Enemy at the gate: threats to information security. Communications of the ACM 46 8 (August 2003) 91-95
    • (2003) Communications of the ACM , vol.46 , Issue.8 , pp. 91-95
    • Whitman, M.E.1
  • 67
    • 0000744744 scopus 로고
    • Social cognitive theory of organizational management
    • Wood R., and Bandura A. Social cognitive theory of organizational management. Academy of Management Review 14 3 (1989) 361-384
    • (1989) Academy of Management Review , vol.14 , Issue.3 , pp. 361-384
    • Wood, R.1    Bandura, A.2
  • 68
    • 85007849857 scopus 로고    scopus 로고
    • Relationships among computer self-efficacy, attitude toward computers, and desirability of learning computing skills
    • Zhang Y., and Espinoza S. Relationships among computer self-efficacy, attitude toward computers, and desirability of learning computing skills. Journal of Research on Computing in Education 30 4 (1998) 420-436
    • (1998) Journal of Research on Computing in Education , vol.30 , Issue.4 , pp. 420-436
    • Zhang, Y.1    Espinoza, S.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.