How to keep your information secure? Toward a better understanding of users security behavior

Álvaro Arenas, Gautam Ray, Antonio Hidalgo, Alberto Urueña

Research output: Contribution to journalArticlepeer-review

Abstract

Use of computers and the Internet is an integral part of our lives, with business becoming more digital. As a result, individuals are using their home computers to perform diverse tasks and to store sensitive data. This paper investigates the relative efficacy of two strategies to protect home computers from security threats: security tools and security activities. For the analysis, we collected data from over 1900 individuals in Spain, following an approach combining self- reported data, via an online survey, with actual data collected directly from home users' computers. The main contribution of the paper is to provide a model, based on routine activity theory, explaining the role of security tools and security activities in protecting personal computers from malware infection, thus offering an in-depth understanding of users' security behavior. Using multivariate, logit and probit regressions, our study reveals that having security tools is positively related with higher risk activities and more infections, while pursuing security activities reduces malware infections. These results have important implications for policy makers and organizations, reinforcing the view that security tools are not sufficient to protect users from malware infection, and the need to develop security education and awareness programs for computer users.

Original languageEnglish (US)
Article number123028
JournalTechnological Forecasting and Social Change
Volume198
DOIs
StatePublished - Jan 2024
Externally publishedYes

Bibliographical note

Publisher Copyright:
© 2023 The Authors

Keywords

  • Cyberattacks
  • Information security
  • Malware infection
  • Personal computer
  • Routine activity theory

Fingerprint

Dive into the research topics of 'How to keep your information secure? Toward a better understanding of users security behavior'. Together they form a unique fingerprint.

Cite this