dc.contributor.author | Xie, Yitian | |
dc.date.accessioned | 2022-06-01T13:10:16Z | |
dc.date.available | 2022-06-01T13:10:16Z | |
dc.date.issued | 2022 | |
dc.identifier.isbn | 978-951-39-9317-7 | |
dc.identifier.uri | https://jyx.jyu.fi/handle/123456789/81409 | |
dc.description.abstract | The Internet has connected almost everything in our daily life, making information systems security (ISec) an important issue not only to organizations but also to personal users. Despite the increasing number of users of Internet-connected IT, there is insufficient research into how users make their ISec-related decisions (i.e., the cognitive appraisals), their decision-making process under the influence of emotion (i.e., the emotional motivation), user characteristics (e.g., user involvement, years of use), or whether they have enough ISec knowledge to make the right decision to secure their information and computing environment (i.e., the knowledge level).
This dissertation contributes to bridging these research gaps by focusing on three studies that explore the security-related decision-making process among personal users. By using novel theoretical perspectives and revisiting some of the “old” theoretical assumptions, we offer insights of value to both academics and practitioners. Three studies are tested and reported that provide insights into the cognitive appraisals, emotional motivation, user characteristics, and ISec knowledge of personal users’ decision-making process regarding security-related behavior.
By considering additional theories and constructs and revisiting the theoretical and methodology perspectives, this dissertation provides several contributions to behavioral ISec studies. The results of the empirical study provide new insights into the cognitive mediation process, the decision-making process under the influence of defensive avoidance, and personal users’ self-regulated ability to protect their personal computing devices.
Keywords: cognitive mediation, defensive avoidance, information security knowledge, threat appeals, boundary condition, conceptualization, instrument development | en |
dc.format.mimetype | application/pdf | |
dc.language.iso | eng | |
dc.publisher | Jyväskylän yliopisto | |
dc.relation.ispartofseries | JYU Dissertations | |
dc.relation.haspart | <b>Artikkeli I:</b> Xie, Y., Siponen, M., Moody, G., & Zheng, X. The cognitive mediation
process in threat-based theories in IS security. <i>Major revision in Computers & Security.</i> | |
dc.relation.haspart | <b>Artikkeli II:</b> Xie, Y., Siponen, M., Moody, G., & Zheng, X. (2022). Discovering the Interplay between Defensive Avoidance and Continued Use Intention of Anti-malware Software among Experienced Home Users : A Moderated Mediation Model. <i>Information and Management, 59(2), Article 103586.</i> DOI: <a href="https://doi.org/10.1016/j.im.2021.103586"target="_blank"> 10.1016/j.im.2021.103586</a> | |
dc.relation.haspart | <b>Artikkeli III:</b> Xie, Y., & Siponen, M. Declarative and procedural information security
knowledge of the general public: Conceptualization and instrument development. <i>Unpublished Manuscript.</i> | |
dc.rights | In Copyright | |
dc.title | A multi-theoretical perspective on conceptualization and contextualization of IS security behavior | |
dc.type | doctoral thesis | |
dc.identifier.urn | URN:ISBN:978-951-39-9317-7 | |
dc.contributor.tiedekunta | Faculty of Information Technology | en |
dc.contributor.tiedekunta | Informaatioteknologian tiedekunta | fi |
dc.contributor.yliopisto | University of Jyväskylä | en |
dc.contributor.yliopisto | Jyväskylän yliopisto | fi |
dc.type.coar | http://purl.org/coar/resource_type/c_db06 | |
dc.relation.issn | 2489-9003 | |
dc.rights.copyright | © The Author & University of Jyväskylä | |
dc.rights.accesslevel | openAccess | |
dc.type.publication | doctoralThesis | |
dc.format.content | fulltext | |
dc.rights.url | https://rightsstatements.org/page/InC/1.0/ | |