An analysis of multiple factors relating to teachers' problematic information security behavior

Given the high Internet penetration rate and the huge repository of data stored online, there is a growing trend urging people to utilize data. However, the potential for the malicious use of data disclosed online necessitates attention. Risky information security behavior often leads to damage. Previous research has focused on information security behavior in the workplace; however, there has been little research on teachers' perceptions of their own information security behavior, in particular for teachers in primary and secondary education. For students at this age, their teachers can serve as models. Through understanding teachers' information security behavioral intentions and related protection motivation, we can design training programs for teachers and hence increase teachers' as well as students' normative judgment with regard to information security behavior. The purpose of this research is to explore those factors that relate to teachers' information security behavior as grounded in Protection Motivation Theory. Additionally, the construct of social norms was incorporated based on several studies. Overall, we wish to examine how perceived severity, vulnerability, response-efficacy, self-efficacy, response costs and social norms related to teachers' problematic information security behavior. Structural equation modeling was implemented to analyze the relationships. The results and implications are presented. We explored factors relating to in-service teachers' risky online safety behavior.Protection motivation theory was applied.The construct of social norms was incorporated into the model.Several factors were manifested to have relations to risky behavioral intention.Response efficacy and social norms have no relation to risky behavioral intention.

[1]  Norshidah Mohamed,et al.  Information privacy concerns, antecedents and privacy measure use in social networking sites: Evidence from Malaysia , 2012, Comput. Hum. Behav..

[2]  Albert L. Harris,et al.  Incorporating Ethics and Social Responsibility in IS Education , 2011, J. Inf. Syst. Educ..

[3]  Richard N. Landers,et al.  An Inconvenient Truth: Arbitrary Distinctions Between Organizational, Mechanical Turk, and Other Convenience Samples , 2015, Industrial and Organizational Psychology.

[4]  Young U. Ryu,et al.  Self-efficacy in information security: Its influence on end users' information security practice behavior , 2009, Comput. Secur..

[5]  Shian-Shyong Tseng,et al.  The mediating effect of anti-phishing self-efficacy between college students' internet self-efficacy and anti-phishing behavior and gender difference , 2016, Comput. Hum. Behav..

[6]  Mikko T. Siponen,et al.  Motivating IS security compliance: Insights from Habit and Protection Motivation Theory , 2012, Inf. Manag..

[7]  Ritu Agarwal,et al.  Practicing Safe Computing: A Multimedia Empirical Examination of Home Computer User Security Behavioral Intentions , 2010, MIS Q..

[8]  A. Bandura Self-efficacy: toward a unifying theory of behavioral change. , 1977, Psychology Review.

[9]  Yu Andy Wu,et al.  Impact of Users’ Security Awareness on Desktop Security Behavior: A Protection Motivation Theory Perspective , 2016, Inf. Syst. Manag..

[10]  Merrill Warkentin,et al.  Fear Appeals and Information Security Behaviors: An Empirical Study , 2010, MIS Q..

[11]  Atreyi Kankanhalli,et al.  Studying users' computer security behavior: A health belief perspective , 2009, Decis. Support Syst..

[12]  A. Koster,et al.  Predicting intentions to consume functional foods and supplements to offset memory loss using an adaptation of protection motivation theory , 2004, Appetite.

[13]  R. Rogers Cognitive and physiological processes in fear appeals and attitude change: a revised theory of prote , 1983 .

[14]  Cheolho Yoon,et al.  Exploring Factors That Influence Students’ Behaviors in Information Security , 2013 .

[15]  Chien Chou,et al.  Incidences and correlates of Internet anxiety among high school teachers in Taiwan , 2003, Comput. Hum. Behav..

[16]  Benjamin J. Li,et al.  Stop bugging me: an examination of adolescents' protection behavior against online harassment. , 2012, Journal of adolescence.

[17]  Seounmi Youn Teenagers' Perceptions of Online Privacy and Coping Behaviors: A Risk–Benefit Appraisal Approach , 2005 .

[18]  Frank Biocca,et al.  Internet attitudes and Internet use: some surprising findings from the HomeNetToo project , 2003, Int. J. Hum. Comput. Stud..

[19]  VanceAnthony,et al.  Motivating IS security compliance , 2012 .

[20]  Robert LaRose,et al.  Understanding online safety behaviors: A protection motivation theory perspective , 2016, Comput. Secur..

[21]  Chien Chou,et al.  Promoting awareness of Internet safety in Taiwan in-service teacher education: A ten-year experience , 2011, Internet High. Educ..

[22]  Jong Sun Park The Platform design of online Learning Support System for Network Based Teaching & Learning , 1998 .

[23]  M. Goldberg,et al.  What to Convey in Antismoking Advertisements for Adolescents: The use of Protection Motivation Theory to Identify Effective Message Themes , 2003 .

[24]  Detmar W. Straub,et al.  Security lapses and the omission of information security measures: A threat control model and empirical test , 2008, Comput. Hum. Behav..

[25]  Wilfred W. F. Lau,et al.  Adolescents' risky online behaviours: The influence of gender, religion, and parenting style , 2013, Comput. Hum. Behav..

[26]  Shuting Xu,et al.  Applying Protection Motivation Theory to Information Security Training for College Students , 2013 .

[27]  R. W. Rogers,et al.  A Protection Motivation Theory of Fear Appeals and Attitude Change1. , 1975, The Journal of psychology.

[28]  S. Upadhyaya,et al.  Internet and Online Information Privacy: An Exploratory Study of Preteens and Early Teens , 2009, IEEE Transactions on Professional Communication.

[29]  Robert LaRose,et al.  Sharing or Piracy? An Exploration of Downloading Behavior , 2005, J. Comput. Mediat. Commun..

[30]  Robert LaRose,et al.  Promoting personal responsibility for internet safety , 2008, CACM.

[31]  A. Bandura GUIDE FOR CONSTRUCTING SELF-EFFICACY SCALES , 2006 .

[32]  Wanlei Zhou,et al.  Security in the online e-learning environment , 2005, Fifth IEEE International Conference on Advanced Learning Technologies (ICALT'05).

[33]  Aakash Taneja,et al.  Rationality-based beliefs affecting individual's attitude and intention to use privacy controls on Facebook: An empirical investigation , 2014, Comput. Hum. Behav..

[34]  Chien Chou,et al.  The moderating effects of parenting styles on the relation between the internet attitudes and internet behaviors of high-school students in Taiwan , 2016, Comput. Educ..

[35]  Hong Lin,et al.  The ethics of instructional technology: issues and coping strategies experienced by professional technologists in design and training situations in higher education , 2007 .

[36]  Ann Dutton Ewbank,et al.  Moral Spaces in MySpace , 2009 .

[37]  Yunjie Calvin Xu,et al.  Studying Users' Computer Security Behavior Using the Health Belief Model , 2007, PACIS.

[38]  Panagiotes S. Anastasiades,et al.  Promoting Internet Safety in Greek Primary Schools: the Teacher's Role , 2011, J. Educ. Technol. Soc..

[39]  Martin Valcke,et al.  Internet parenting styles and the impact on Internet use of primary school children , 2010, Comput. Educ..

[40]  Princely Ifinedo,et al.  Understanding information systems security policy compliance: An integration of the theory of planned behavior and the protection motivation theory , 2012, Comput. Secur..

[41]  R. W. Rogers,et al.  Protection motivation and self-efficacy: A revised theory of fear appeals and attitude change , 1983 .

[42]  Kadir Beycioglu,et al.  A cyberphilosophical issue in education: Unethical computer using behavior - The case of prospective teachers , 2009, Comput. Educ..

[43]  Tammy Schellens,et al.  Exploring the Usefulness of School Education about Risks on Social Network Sites: A Survey Study , 2013, Journal of Media Literacy Education.

[44]  Robert LaRose,et al.  Online safety begins with you and me: Convincing Internet users to protect themselves , 2015, Comput. Hum. Behav..