Internet Security Readiness: The Influence of Internet Usage Level and Awareness on Internet Security Readiness Capital, Skill, and Actual Uptake/Use of Infrastructure

In this paper we applied our previously developed assessment framework to the data collected from an internet security readiness survey targeted at households. We used the assessment framework to compute an Internet Security Readiness index for each household, which was in turn derived from Internet Security Readiness capital, skill, and actual uptake/use of infrastructure indices. We then examined the relationships among overall Internet Security Readiness, and the capital, skill, and actual uptake/use of infrastructure related to Internet Security Readiness. In addition, we explored the influence of Internet usage level and experience on Internet Security Readiness.

[1]  Janet Morahan-Martin,et al.  Internet Abuse , 2005 .

[2]  서정연,et al.  Journal of Computing Science and Engineering(JCSE)의 국제화 작업 , 2010 .

[3]  Gustavo A. Santana Torrellas A Framework for Multi-Agent System Engineering using Ontology Domain Modelling for Security Architecture Risk Assessment in E-Commerce Security Services , 2004, NCA.

[4]  Mehdi Khosrow-Pour,et al.  The Social and Cognitive Impacts of E-Commerce on Modern Organizations , 2003 .

[5]  Erik Bohlin,et al.  Global Economy and Digital Society , 2004 .

[6]  Claire A. Simmers,et al.  Internet user satisfaction, job satisfaction and internet background: an exploratory study , 2002 .

[7]  Kevin McLean,et al.  Information Security Awareness - Selling the Cause , 1992, IFIP International Information Security Conference.

[8]  Nahid Shahmehri,et al.  Security Issues in E-Home Network and Software Infrastructures , 2001 .

[9]  Steven Furnell,et al.  Assessing the security perceptions of personal Internet users , 2007, Comput. Secur..

[10]  Marianne Swanson,et al.  Security metrics guide for information technology systems , 2003 .

[11]  Phil Spurling,et al.  Promoting security awareness and commitment , 1995, Inf. Manag. Comput. Secur..

[12]  Leon Reznik,et al.  Notice of Violation of IEEE Publication PrinciplesWhich models should be applied to measure computer security and information assurance? , 2003, The 12th IEEE International Conference on Fuzzy Systems, 2003. FUZZ '03..

[13]  Herbert J. Mattord,et al.  Principles of Information Security, 4th Edition , 2011 .

[14]  E. Rabinovitch Security On The Net , 1997, IEEE Communications Magazine.

[15]  R. LaRose,et al.  Understanding Internet Usage , 2001 .

[16]  Michael H. Kutner Applied Linear Statistical Models , 1974 .

[17]  David Wright,et al.  Towards Operational Measures of Computer Security , 1993, J. Comput. Secur..

[18]  Sang Hyuk Son,et al.  Applying Formal Methods to Modeling and Analysis of Real-time Data Streams , 2011, J. Comput. Sci. Eng..

[19]  A. Agresti,et al.  Statistical Methods for the Social Sciences , 1979 .

[20]  Magid Igbaria,et al.  An exploratory investigation of the antecedents and impact of Internet usage: an individual perspective , 1998, Proceedings of the Thirty-First Hawaii International Conference on System Sciences.

[21]  Richard Hackworth,et al.  OECD 'Guidelines for the Security of Information Systems" , 1993, Security and Control of Information Technology in Society.

[22]  V. Barnett,et al.  Applied Linear Statistical Models , 1975 .

[23]  David Kotz,et al.  Identifying Unusual Days , 2011, J. Comput. Sci. Eng..

[24]  A. Jones,et al.  A framework for the management of information security risks , 2007 .

[25]  Herbert J. Mattord,et al.  Principles of Information Security , 2004 .

[26]  Shirley C. Payne,et al.  A Guide to Security Metrics , 2007 .

[27]  Magid Igbaria,et al.  An exploratory investigation of the antecedents and impact of internet usage: An individual perspective , 2000, Behav. Inf. Technol..

[28]  Thompson S. H. Teo,et al.  Intrinsic and extrinsic motivation in Internet usage , 1999 .

[29]  Rossouw von Solms,et al.  Information security awareness: educating your users effectively , 1998, Inf. Manag. Comput. Secur..

[30]  Mikko T. Siponen,et al.  A conceptual foundation for organizational information security awareness , 2000, Inf. Manag. Comput. Secur..