Computer security self-efficacy effect: An extention of Technology-to-Performance chain model

Given a paucity of research and apparent lack of coherence in information system research, it seems that there is no consensus in the information system field as to how security fits into the information system acceptance, usage, success, utilization, and/or performance impact (effectiveness, efficiency, and satisfaction). This paper is part of an ongoing research project designed to extend the Technology-to-Performance Chain (TPC) model by including the Computer Security Self-Efficacy (CSSE) construct, a strategy of model extension suggested by several researchers. This project aims to examine the research conducted in the last decade in information system journals regarding security issues then based on social cognitive theory, to propose a construct to measure individuals' computer security self-efficacy. Based on the Technology-to-Performance Chain (TPC) model, this study design expected to models and tests relationship among computer security self-efficacy and secures online banking system performance impact. The study will try to answer the question “to what extent has the computer security self-efficacy affected user's perception of secure online banking system effectiveness”. After this research finished, the researcher assume that this study findings will provides an initial step towards understanding of the applicability of social cognitive theory in information system security domain and helps information security professionals design information systems considering the effect of computer security self-efficacy on secure information system.

[1]  Joseph A. Cazier,et al.  E-business differentiation through value-based trust , 2006, Inf. Manag..

[2]  Kate E. Stewart,et al.  The Diffusion of Online Banking , 2003 .

[3]  Gerold Riempp,et al.  The State of Research on Information Systems Success , 2009, Bus. Inf. Syst. Eng..

[4]  Brian T. Pentland,et al.  USE AND PRODUCTIVITY IN PERSONAL COMPUTING: AN EMPIRICAL TEST , 1989 .

[5]  Younghwa Lee,et al.  Investigating factors affecting the adoption of anti-spyware systems , 2005, CACM.

[6]  Siu-cheung Chan,et al.  Understanding Internet Banking Adoption and Use Behavior: A Hong Kong Perspective , 2004, J. Glob. Inf. Manag..

[7]  Xiaoni Zhang,et al.  What do consumers really know about spyware? , 2005, CACM.

[8]  Diane M. Strong,et al.  Extending task technology fit with computer self-efficacy , 2006, DATB.

[9]  David A. Wagner,et al.  Analyzing internet voting security , 2004, CACM.

[10]  Hanudin Amin Journal of Internet Banking and Commerce Internet Banking Adoption among Young Intellectuals , 2022 .

[11]  P. Hewer,et al.  Consumer attitude and the usage and adoption of home‐based banking in the United Kingdom , 2002 .

[12]  Madihah Mohd Saudi,et al.  Efficient STAKCERT KDD Processes in Worm Detection , 2011 .

[13]  Mark Keil,et al.  Usefulness and ease of use: field study evidence regarding task considerations , 1995, Decis. Support Syst..

[14]  Ephraim R. McLean,et al.  The DeLone and McLean Model of Information Systems Success: A Ten-Year Update , 2003, J. Manag. Inf. Syst..

[15]  Ephraim R. McLean,et al.  Information Systems Success: The Quest for the Dependent Variable , 1992, Inf. Syst. Res..

[16]  Jan Guynes Clark,et al.  Why there aren't more information security research studies , 2004, Inf. Manag..

[17]  Kenneth Jones Classroom response systems: Using task technology fit to explore impact potential , 2010 .

[18]  Amit Sachan,et al.  Competing in the Age of Information Technology in a Developing Economy: Experiences of an Indian Bank , 2006, J. Cases Inf. Technol..

[19]  Dale Goodhue,et al.  Supporting users of corporate data : the effect of I/S policy choices , 1988 .

[20]  A. Bandura,et al.  Mechanisms governing empowerment effects: a self-efficacy analysis. , 1990, Journal of personality and social psychology.

[21]  Gi Mun Kim,et al.  Understanding dynamics between initial trust and usage intentions of mobile banking , 2009, Inf. Syst. J..

[22]  Richard D. Johnson,et al.  The Multilevel and Multifaceted Character of Computer Self-Efficacy: Toward Clarification of the Construct and an Integrative Framework for Research , 1998, Inf. Syst. Res..

[23]  Deborah Compeau,et al.  Computer Self-Efficacy: Development of a Measure and Initial Test , 1995, MIS Q..

[24]  Sheng Wu,et al.  The Impact of Self-Monitoring on Theory of Planned Behavior:Study of Web Portal Usage , 2007 .

[25]  A. Bandura,et al.  Social foundation of thoughts and actions: A social cognitive theory , 1986 .

[26]  Young U. Ryu,et al.  Self-efficacy in information security: Its influence on end users' information security practice behavior , 2009, Comput. Secur..

[27]  A. Bandura Social cognitive theory: an agentic perspective. , 1999, Annual review of psychology.

[28]  H. Zandhessami,et al.  Determinants of user acceptance of internet banking: An empirical study , 2014 .

[29]  Blake Ives,et al.  The measurement of user information satisfaction , 1983, CACM.

[30]  A. Bandura,et al.  Social learning and personality development , 1964 .

[31]  Diane M. Strong,et al.  Extending the technology acceptance model with task-technology fit constructs , 1999, Inf. Manag..

[32]  William Wresch,et al.  Managerial Strategies Used to Overcome Technological Hurdles: A Review of E-Commerce Efforts Used by Innovative Caribbean Managers , 2006, J. Glob. Inf. Manag..

[33]  Dimitrios Zissis,et al.  Addressing cloud computing security issues , 2012, Future Gener. Comput. Syst..

[34]  A. Bandura,et al.  Self-regulatory mechanisms governing the impact of social comparison on complex decision making. , 1991 .

[35]  Viswanath Venkatesh,et al.  Technology Acceptance Model 3 and a Research Agenda on Interventions , 2008, Decis. Sci..

[36]  Viswanath Venkatesh,et al.  Predicting Collaboration Technology Use: Integrating Technology Adoption and Collaboration Research , 2010, J. Manag. Inf. Syst..

[37]  Detmar W. Straub,et al.  The measurement of the impacts of the IIC on the end‐users: The survey , 1997 .

[38]  Mohamad Noorman Masrek,et al.  Measuring campus portal effectiveness and the contributing factors , 2007 .

[39]  Fred D. Davis,et al.  User Acceptance of Computer Technology: A Comparison of Two Theoretical Models , 1989 .

[40]  Diane M. Strong,et al.  The Effect of Task and Tool Experience on Maintenance CASE Tool Usage , 2003, Inf. Resour. Manag. J..

[41]  JinKyu Lee,et al.  Secure knowledge management and the semantic web , 2005, CACM.

[42]  Richard A. M. Schilhavy,et al.  A Research Framework for Information Systems Security , 2006 .

[43]  L. R. Chao,et al.  An integrated system theory of information security management , 2003, Inf. Manag. Comput. Secur..

[44]  Paul A. Pavlou,et al.  Understanding and Predicting Electronic Commerce Adoption: An Extension of the Theory of Planned Behavior , 2006, MIS Q..

[45]  Mario Piattini,et al.  An Applicable Data Quality Model for Web Portal Data Consumers , 2008, World Wide Web.

[46]  Madihah Mohd Saudi,et al.  A new model for worm detection and response : development and evaluation of a new model based on knowledge discovery and data mining techniques to detect and respond to worm infection by integrating incident response, security metrics and apoptosis , 2011 .

[47]  N. Miller,et al.  Social Learning and Imitation , 1942 .

[48]  Dale L. Goodhue,et al.  User evaluations of MIS success: what are we really measuring? , 1992, Proceedings of the Twenty-Fifth Hawaii International Conference on System Sciences.

[49]  Lei Bao,et al.  Testing a new voting machine question methodology , 2008 .

[50]  Deborah Compeau,et al.  Social Cognitive Theory and Individual Reactions to Computing Technology: A Longitudinal Study , 1999, MIS Q..

[51]  A. Bandura Self-Efficacy: The Exercise of Control , 1997, Journal of Cognitive Psychotherapy.

[52]  Gordon B. Davis,et al.  User Acceptance of Information Technology: Toward a Unified View , 2003, MIS Q..

[53]  V. Zeithaml,et al.  E-S-QUAL A Multiple-Item Scale for Assessing Electronic Service Quality , 2004 .

[54]  Diane M. Strong,et al.  Assessing software maintenance tool utilization using task-technology fit and fitness-for-use models , 1998, J. Softw. Maintenance Res. Pract..

[55]  M. Smith Computer security-threats, vulnerabilities and countermeasures , 1989 .

[56]  Dale Goodhue,et al.  Task-Technology Fit and Individual Performance , 1995, MIS Q..

[57]  Subhash Sharma,et al.  Resistance to technological innovations: An examination of the role of self-efficacy and performance satisfaction , 1991 .

[58]  Diane M. Strong,et al.  Supporting software maintenance with software engineering tools: A Computed task-technology fit analysis , 1998, J. Syst. Softw..

[59]  Gerold Riempp,et al.  Development and validation of a model for assessing the success of employee portals , 2009, ECIS.

[60]  Honglei Li,et al.  Technology acceptance model for internet banking: an invariance analysis , 2005, Inf. Manag..

[61]  Dale L. Goodhue,et al.  The model underlying the measurement of the impacts of the IIC on the end‐users , 1997 .

[62]  Viswanath Venkatesh,et al.  User Acceptance Enablers in Individual Decision Making About Technology: Toward an Integrated Model , 2002, Decis. Sci..

[63]  Dale Goodhue,et al.  Understanding user evaluations of information systems , 1995 .

[64]  Viswanath Venkatesh,et al.  Adoption of Collaboration Technologies: Integrating Technology Acceptance and Collaboration Technology Research , 2008 .

[65]  Sammy W. Pearson,et al.  Development of a Tool for Measuring and Analyzing Computer User Satisfaction , 1983 .

[66]  Dale L. Goodhue,et al.  Development and Measurement Validity of a Task-Technology Fit Instrument for User Evaluations of Inf , 1998 .

[67]  Wanda J. Orlikowski,et al.  Research Commentary: Desperately Seeking the "IT" in IT Research - A Call to Theorizing the IT Artifact , 2001, Inf. Syst. Res..