Font Size: a A A

The socialization of secure computing practices for home internet users: A quantitative analysis of individual perceptions

Posted on:2016-06-04Degree:Ph.DType:Dissertation
University:Capella UniversityCandidate:Williams, Crystal DFull Text:PDF
GTID:1478390017482818Subject:Social research
Abstract/Summary:
This dissertation examines the socialization of secure computing practices for the basic or ordinary computer user via social media. There are a number of studies related to information security, the perceptions of technology users, and the role of media. However, the majority of the information security studies focus on organizations and employees, this study focuses upon the home Internet user. This quantitative, non-experimental correlative study was designed to assess factors that influence cyber defense behaviors of home Internet users as they relate to a diverse array of factors that influence protective actions and affect personal perceptions. Data was collected via a questionnaire using Likert-type surveys and closed-ended questions to assist in providing insight into the perceptions of cyber defense importance and actions of adult Internet users after exposure to various forms of information security and cyber risk reports via social media. One hundred and eleven (111) participants agreed to take the survey. A total of 85 surveys were fully completed and submitted. Multiple regression assisted in determining the relationship between variables. The problem addressed in this study examined the failure of internet users to adopt secure computing best practices in spite of possessing knowledge and familiarity with prevalent computer attacks. Five hypotheses related to the research question were tested. The results of the analysis showed that exposure to social media had a positive significant correlation with perceived susceptibility to attack; however, exposure to or awareness of vulnerability did not necessarily result in user action or adoption of secure computing practices.
Keywords/Search Tags:Secure computing practices, Internet users, Social, Perceptions, Information, Factors that influence
Related items