Exploring the Influences of Implementation Intention on Information Security Behaviors: A Laboratory Experiment

碩士 === 長庚大學 === 資訊管理學系 === 100 === Information security events have recently shown that users lack security awareness and do not exhibit security behaviors. Most of the existing studies apply the theory of planned behavior to explore individuals’ information security behaviors from the motivational...

Full description

Bibliographic Details
Main Authors: Ke Yu Chen, 陳可玗
Other Authors: G. Y. Liao
Format: Others
Published: 2012
Online Access:http://ndltd.ncl.edu.tw/handle/75557454584174084255
Description
Summary:碩士 === 長庚大學 === 資訊管理學系 === 100 === Information security events have recently shown that users lack security awareness and do not exhibit security behaviors. Most of the existing studies apply the theory of planned behavior to explore individuals’ information security behaviors from the motivational perspective. Under the same motivation, individuals could perform different behaviors. According to the concept of implement intentions (Gollwitzer, 1993, 1999), individuals may achieve goals by conscious planning. Implement intentions have been used widely to influence behaviors even including information systems usage.However, it hasn’t been seen that any information security study focuses on the behaviors during a longer time period while meanwhile attempting an examination on the behavioral measurement. Therefore, our study adopts a laboratory experiment method that explores information security behaviors in longer time and measures security behaviors with a measure validated by security experts. Our results show that implementation intentions may improve the information security behaviors in longer time, but could still be affected by reminding, questionnaire and subjective senses on environment.This study contributes with a successful trial to validate the effect of implement intentions on security behaviors. Besides, other factors obtained in a qualitative interview revealed some factors that could affect information security behaviors.