Perceptions of End-Users on the Requirements in Personal Firewall Software: An Exploratory Study

Information security is usually considered a technical discipline with much attention being focused on topics such as encryption, hacking, break-ins, and credit card theft. Security products such as anti-virus programs and personal firewall software are now available for end-users to install on their computers to protect against threats endemic to networked computers. The behavioral aspects related to maintaining enterprise security have received little attention from researchers and practitioners. Using Q-sort analysis, this study used students as end users in a graduate business IDEA GROUP PUBLISHING This paper appears in the publication, Contemporary Issues in End User Computing edited by Mo Adam Mahmood © 2006, Idea Group Inc. 701 E. Chocolate Avenue, Suite 200, Hershey PA 17033-1240, USA Tel: 717/533-8845; Fax 717/533-8661; URL-http://www.idea-group.com ITB13146 46

[1]  Lori N. K. Leonard,et al.  Website Retailing: Electronic Supply Chain Replenishment , 2003, J. Organ. End User Comput..

[2]  Jo Ellen Moore,et al.  The Focus of Research in End User Computing: Where Have We Come Since the 1980s? , 2002, J. Organ. End User Comput..

[3]  Ciara Heavin,et al.  A Theoretical Model and Framework for Understanding Knowledge Management System Implementation , 2007, J. Organ. End User Comput..

[4]  Neil A. M. Maiden,et al.  Lessons learned during requirements acquisition for COTS systems , 1997, CACM.

[5]  Blake Ives,et al.  The measurement of user information satisfaction , 1983, CACM.

[6]  W. Stephenson The study of behavior , 1953 .

[7]  Kieran Mathieson,et al.  Predicting User Intentions: Comparing the Technology Acceptance Model with the Theory of Planned Behavior , 1991, Inf. Syst. Res..

[8]  Marcus Goncalves Firewalls Complete , 1998 .

[9]  Mikko T. Siponen,et al.  A conceptual foundation for organizational information security awareness , 2000, Inf. Manag. Comput. Secur..

[10]  Gloria Gery,et al.  Granting three wishes through performance-centered design , 1997, CACM.

[11]  Robert O. Briggs,et al.  Graduate business students as surrogates for executives in the evaluation of technology , 1996 .

[12]  Blake Ives,et al.  An empirical study of the impact of user involvement on system usage and information satisfaction , 1986, CACM.

[13]  R. J. Torres Practitioner's Handbook for User Interface Design and Development , 2001 .

[14]  Charles E. Grantham,et al.  Predicting the usage of an advanced communication technology , 1985 .

[15]  John Ingham,et al.  Why do people use information technology? A critical review of the technology acceptance model , 2003, Inf. Manag..

[16]  J. Doug Tygar,et al.  Why Johnny Can't Encrypt: A Usability Evaluation of PGP 5.0 , 1999, USENIX Security Symposium.

[17]  Rita C. Summers Secure Computing: Threats and Safeguards , 1996 .

[18]  Gary Hackbarth,et al.  Computer playfulness and anxiety: positive and negative mediators of the system experience effect on perceived ease of use , 2003, Inf. Manag..

[19]  Detmar W. Straub,et al.  Coping With Systems Risk: Security Planning Models for Management Decision Making , 1998, MIS Q..

[20]  Paul Kline,et al.  An easy guide to factor analysis , 1993 .

[21]  Nathaniel Good,et al.  Usability and privacy: a study of Kazaa P2P file-sharing , 2003, CHI '03.

[22]  James Backhouse,et al.  Current directions in IS security research: towards socio‐organizational perspectives , 2001, Inf. Syst. J..

[23]  Harold Joseph Highland,et al.  A view of information security tomorrow , 1993, Comput. Secur..

[24]  Steven R. Brown Political Subjectivity: Applications of Q Methodology in Political Science. , 1980 .

[25]  Elizabeth D. Zwicky,et al.  Building Internet firewalls (2nd ed.) , 2000 .

[26]  David Albury,et al.  Security of computer based information systems , 1986 .

[27]  Mo Adam Mahmood,et al.  Variables affecting information technology end-user satisfaction: a meta-analysis of the empirical literature , 2000, Int. J. Hum. Comput. Stud..

[28]  Abraham Seidmann,et al.  Two dimensions of software acquisition , 1996, CACM.

[29]  Dominik Dahlem,et al.  Semantic Composition of Web Portal Components , 2006, J. Organ. End User Comput..

[30]  Robert W. Stone,et al.  The Roles of Computer Self-Efficacy and Outcome Expectancy in Influencing the Computer End-User's Organizational Commitment , 2003, J. Organ. End User Comput..

[31]  Charles Cresson Wood A context for information systems security planning , 1988, Comput. Secur..

[32]  Sid L. Huff,et al.  CIO influence behaviors: the impact of technical background , 2003, Inf. Manag..

[33]  William J. Kettinger,et al.  Understanding the IS-user divide in IT innovation , 2002, CACM.

[34]  Marty V. Deise,et al.  Executive's Guide to E-Business: From Tactics to Strategy , 2000 .

[35]  Mike Chiasson,et al.  Factors influencing the formation of a user's perceptions and use of a DSS software innovation , 2001, DATB.

[36]  Richard T. Watson,et al.  Q-sorting and MIS Research: A Primer , 2002, Commun. Assoc. Inf. Syst..

[37]  Detmar W. Straub,et al.  Security concerns of system users: A study of perceptions of the adequacy of security , 1991, Inf. Manag..