Commenced in January 2007
Paper Count: 30174
Use of Persuasive Technology to Change End-Users- IT Security Aware Behaviour: A Pilot Study
Abstract:Persuasive technology has been applied in marketing, health, environmental conservation, safety and other domains and is found to be quite effective in changing people-s attitude and behaviours. This research extends the application domains of persuasive technology to information security awareness and uses a theory-driven approach to evaluate the effectiveness of a web-based program developed based on the principles of persuasive technology to improve the information security awareness of end users. The findings confirm the existence of a very strong effect of the webbased program in raising users- attitude towards information security aware behavior. This finding is useful to the IT researchers and practitioners in developing appropriate and effective education strategies for improving the information security attitudes for endusers.
Digital Object Identifier (DOI): doi.org/10.5281/zenodo.1083939Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1921
 Stanton, J. M., Kathryn R.S., Indira G. & Cavinda C., "Examining the linkage between organizational commitment and information security"-, in IEEE International Conference on Systems, Man and Cybernetics. pp: 2501-2506, 2003.
 Deloitte, ÔÇÿ2005 Global security survey-, Deloitte, available at: http://www.deloitte.com/dtt/cda/doc/content/2005%20Global%20Securit y%20Survey%281%29.pdf, 2005
 CIO, "CIO research reports", CIO, available at: http://www2.cio.com/research/surveyreport.cfm?id=93, 2005
 Straub D. W., "Effective IS security: an empirical study"-, Information System Research, Vol.1, No.2, pp:255-277, 1990.
 Straub, D. W. and Welke, R. J., "Coping with systems risk: Security planning models for management decision making", MIS Q, Vol.22, No. 4, pp: 441-469, 1998.
 Leach, J., "Improving user security behaviour", Computers and Security. Vol.22, No.8, pp: 685-692, 2003.
 AUSCERT, "2006 Australian Computer Crime and Security Survey", Available at: www.auscert.org.au, 2006
 Ajzen, I., and Fishbein, M. Understanding attitudes and predicting social behaviour, Englewood Cliffs, NJ: Prentic-Hall, 1980.
 Thomson, M. and R. von Solms, 1998, ÔÇÿInformation security awareness: educating your users effectively-, Information Management and computer security, Vol.6, No.4, pp: 167-173.
 Fogg B.J., Persuasive Technology: using computers to change what we think and do, Morgan Kaufmann Publishers, CA, 2003
 Fogg B.J., ÔÇÿPersuasive Computers: Perspectives and Research Directions-, CHI98 Conference of ACM (CA: ACM Press, 1998), pp: 225-232.
 Fogg B.J. and Clifford Nass, ÔÇÿHow users reciprocate to computers: an experiment that demonstrates behaviour change-, in Extended Abstracts of the CHI97 Conference of the ACM/SIGCHI (New York: ACM Press, 1997), pp: 331-332.
 Lapolla, N.A. and Salvucci, A., ÔÇÿEvaluation of a Youth Driving Simulator Program-, available at: http://apha.confex.com/apha/128am/techprogram/paper_13286.htm, 2000.
 Lenert L, Mu├▒oz RF, Stoddard J, Delucchi K, Bansod A, Skoczen S, Pérez-Stable EJ., ÔÇÿDesign and Pilot Evaluation of an Internet smoking cessation program-, J AM Med Inform Assoc., 10 (1), pp:16-20, 2003.
 Ajzen, I.´╝îÔÇÿThe theory of planned behaviour-, Organizational Behaviour and Human Decision Processes, 50, 179-211, 1991.
 Siponen, M. T., ÔÇÿA conceptual foundation for organizational information security awareness-, Information Management and Computer Security, Vol.8, No.1, pp: 31-41, 2000.
 IJsselsteijn, W.A., de Kort, Y.A.W., Midden, C., Eggen, B., and van den Hoven, E., ÔÇÿPersuasive technology for human well-being: setting the scene-, Persuasive 06 Eindhoven: Springer, 2006
 Chau, P., ÔÇÿAn empirical assessment of a modified technology acceptance model-, Journal of Management Information Systems, Vol.13 No. 2, pp: 185-205, 1996.
 Mathieson, K., ÔÇÿPredicting user intentions: comparing the technology acceptance model with the theory of planned behaviour-, Information System Research, Vol. 3, No. 2, pp: 173-191, 1991.
 Chan, D.K.-S., and Fishbein, M. , 1993, ÔÇÿDeterminants of college women-s intentions to tell their partners to use condoms-, Journal of Applied Social Psychology, 23, pp: 1445-1470.
 Libbus, K., ÔÇÿWomen-s beliefs concerning condom acquisition and use-, Public Health Nursing, 12, pp: 341-347, 1995.
 Reinecke, J., Schmidt, P., and Ajzen, I., ÔÇÿApplication of the theory of planned behaviour to adolescents- condom use: A panel study-, Journal of Applied Social Psychology, 26, pp: 749-772, 1996.
 Ajzen, I.,and Madden, T. J., ÔÇÿPrediction of goal-directed behaviour: Attitudes, intentions, and perceived behavioural control-, Journal of Experimental Social Psychology, 22, pp: 453-474, 1986.
 Prislin, R.,andKovrlija, N., ÔÇÿPredicting behaviour of high and lowselfmonitors: an application of the theory of planned behaviour-, Psychological Reports, 70, pp:1131-1138, 1992.
 Ajzen, I., and Driver, B. E., ÔÇÿApplication of the theory of planned behaviour to leisure choice-, Journal of Leisure Research, 24, pp:207- 224, 1992
 Godin, G.,Valois, P. and Lepage, L., ÔÇÿThe pattern of influence of perceived behavioural control upon exercising behaviour: an application of Ajzen-s theory of planned behaviour-, Journal of Behavioural Medicine, 16, pp: 81-102, 1993.
 Theodorakis, Y., ÔÇÿPlanned behaviour, attitude strength, role identity, and the prediction of exercise behaviour-, The Sport Psychologist, 8, pp:149- 165, 1994
 Valois, P., Turgeon, H., Godin, G., Blondeau, D., and Cote, F., ÔÇÿInfluence of a persuasive strategy on nursing students- beliefs and attitudes toward provision of care to people living with HIV/AIDS-, Journal of Nursing Education, 40, pp: 354-358, 2001.
 Quine, L., Rutter D. R. and Arnold L., ÔÇÿPersuading school-age cyclists to use safety helmets: effectiveness of an intervention based on the theory of planned behaviour-, British Journal of Health Psychology, 6, pp: 327- 345, 2001.
 Gehringer, E.F. "Choosing Passwords: Security and Human Factors", International Symposium on Technology and Society, ISTAS-02, pp 369-373, 2002.
 Microsoft 2006. "Strong Passwords: How to Create and Use Them." Retrieved 29 August, 2006 from http://www.microsoft.com/athome/security/privacy/ password.mspx
 Monash University "Unwanted/Unsolicited Email or Spam." Retrieved 25 August, 2006 from http://www.its.monash.edu.au/staff/email/spam/, 2006a
 Monash University 2006b. "Beware of Malicious Emails and Web Pages." Retrieved 25 August, 2006 from http://www.its.monash.edu.au/staff/security/staff-only/home/emails.html
 Zviran, M., and Haga, W.J. "Password Security: An Empirical Study,", Journal of Management Information Systems, (15:4), pp 161-185, 1999.
 Lyman J. "Spam Costs $20 Billion Each Year in Lost Productivity", Retrieved 3 November, 2006 from http://www.linuxinsider.com/story/32478.html, 2003.
 CERT "Email Bombing and Spamming." Retrieved 6 November, 2006, from http://www.cert.org/tech_tips/email_bombing_spamming.html, 2002.
 O- Reilly, D. "10-step Security." Retrieved 29 August, 2006 from http://www.pcworld.com/article/id,122500-page,1/article.html, 2005.
 University of California. "Email Safety Tips." Retrieved 11 June, 2008 from http://www.security.uci.edu/email/, 2006.
 OECD Report "Malicious Software (Malware): A security threat to the internet economy", Ministerial Background Report, Seoul, Korea, 17-18 June., 2008.
 CAIDA "CAIDA Analysis of Code-Red." Retrieved 25 October, 2006, from http://www.caida.org/analysis/security/code-red/, 2006
 CSI 2005. "2005 CSI/FBI Computer Crime and Security Survey." Retrieved 3 December, 2006 from http://www.cpppe.umd.edu/Bookstore/Documents/2005CSISurvey.pdf
 Plous S., The Psychology of Judgment and Decision Making, McGraw- Hill, New York, 1993.
 Ajzen, I, ÔÇÿConstructing a TPB Questionnaire: conceptual and methodological considerations-, available at: http://people.umass.edu/aizen/pdf/tpb.measurement.pdf, 2002.