Access the full text.
Sign up today, get DeepDyve free for 14 days.
Jacob Cohen (1992)
QUANTITATIVE METHODS IN PSYCHOLOGY A Power Primer
Andrew Gillam (2019)
Cyber security and human resource development implications for the enterprise
Mingnan Liu, Laura Wronski (2018)
Trap questions in online surveys: Results from three web survey experimentsInternational Journal of Market Research, 60
J. Jansen, P. Schaik (2017)
Comparing three models to explain precautionary online behavioural intentionsInf. Comput. Secur., 25
C. Fritz, P. Morris, Jennifer Richler (2012)
Effect size estimates: current use, calculations, and interpretation.Journal of experimental psychology. General, 141 1
R. Rogers (1975)
A Protection Motivation Theory of Fear Appeals and Attitude Change1.The Journal of psychology, 91 1
Sarah Reinhold, A. Gegenfurtner, D. Lewalter (2018)
Social Support and Motivation to Transfer as Predictors of Training Transfer: Testing Full and Partial Mediation Using Meta‐Analytic Structural Equation ModellingORG: Other Strategy & Organizational Behavior (Topic)
Yongqiang Sun, Nan Wang, Xiao-Liang Shen, J. Zhang (2015)
Location information disclosure in location-based social network services: Privacy calculus, benefit structure, and gender differencesComput. Hum. Behav., 52
Bartlomiej Hanus (2014)
The Impact of Information Security Awareness on Compliance with Information Security Policies: a Phishing Perspective
Margaret Gratian, Sruthi Bandi, M. Cukier, J. Dykstra, Amy Ginther (2018)
Correlating human traits and cyber security behavior intentionsComput. Secur., 73
T. Guin, Reg Baker, Joanne Mechling, Erica Ruyle (2012)
Myths and Realities of Respondent Engagement in Online SurveysInternational Journal of Market Research, 54
Psychological Bulletin, 112
B. Sawyer, V. Finomore, G. Funke, Vincent Mancuso, Brent Miller, J. Warm (2015)
Evaluating Cybersecurity Vulnerabilities with the Email Testbed: Effects of Training
D. Carpenter, Diana Young, P. Barrett, Alexander McLeod (2019)
Refining Technology Threat Avoidance TheoryCommun. Assoc. Inf. Syst., 44
S. Goel, K. Williams, Ersin Dincelli (2017)
Got Phished? Internet Security and Human VulnerabilityJ. Assoc. Inf. Syst., 18
J. Wilsem (2013)
‘Bought it, but Never Got it’ Assessing Risk Factors for Online Consumer Fraud VictimizationEuropean Sociological Review, 29
Rajarshi Chakraborthy, S. Bagchi‐Sen, Raghav Rao, S. Upadhyaya (2012)
An Exploration of Security and Privacy Behavior of Elders on the Internet and comparison with Younger Adults
Tamara Dinev, Paul Hart (2006)
An Extended Privacy Calculus Model for E-Commerce TransactionsInf. Syst. Res., 17
Miranda Kajtazi, H. Cavusoglu, I. Benbasat, D. Haftor (2018)
Escalation of commitment as an antecedent to noncompliance with information security policyInf. Comput. Secur., 26
(2017)
Understanding the relationship between human behavior and susceptibility to cyber attacks: a data-driven approach
A. Bandura (1977)
Self-efficacy: toward a unifying theory of behavioral change.Psychological review, 84 2
V. Agrawal, V. Agrawal (2017)
TRENDS IN IT HUMAN RESOURSES AND END-USERS INVOLVED IN IT APPLICATIONSJournal of International Technology and Information Management
Jakob Wirth, C. Maier, Sven Laumer (2019)
Subjective norm and the Privacy Calculus: Explaning Self-Disclosure on Social Networking sites
S. Albladi, G. Weir (2018)
User characteristics that influence judgment of social engineering attacks in social networksHuman-centric Computing and Information Sciences, 8
J. Jansen, S. Veenstra, Renske Zuurveen, W. Stol (2016)
Guarding against online threats: why entrepreneurs take protective measuresBehaviour & Information Technology, 35
R. Atkinson, J. Flint (2001)
Accessing Hidden and Hard-to-reach Populations: Snowball Research Strategies, 28
(2018)
The effect of perceived warning message characteristics on coping responses in data breach scenarios
Jakob Wirth, C. Maier, Sven Laumer (2018)
THE INFLUENCE OF RESIGNATION ON THE PRIVACY CALCULUS IN THE CONTEXT OF SOCIAL NETWORKING SITES: AN EMPIRICAL ANALYSIS
H. Tsai, M. Jiang, Saleem Alhabash, R. LaRose, Nora Rifon, S. Cotten (2016)
Understanding online safety behaviors: A protection motivation theory perspectiveComput. Secur., 59
Agata McCormac, Tara Zwaans, K. Parsons, D. Calic, M. Butavicius, M. Pattinson (2017)
Individual differences and Information Security AwarenessComput. Hum. Behav., 69
Huigang Liang, Yajiong Xue (2010)
Understanding Security Behaviors in Personal Computer Usage: A Threat Avoidance PerspectiveJ. Assoc. Inf. Syst., 11
Jessica Dawson, R. Thomson (2018)
The Future Cybersecurity Workforce: Going Beyond Technical Skills for Successful Cyber PerformanceFrontiers in Psychology, 9
J. Cebula, Mary Popeck, Lisa Young (2014)
A Taxonomy of Operational Cyber Security Risks Version 2
J. Meijers, J. Harte, G. Meynen, P. Cuijpers, E. Scherder (2018)
Reduced Self-Control after 3 Months of Imprisonment; A Pilot StudyFrontiers in Psychology, 9
Hanna Krasnova, Natasha Veltri, O. Günther (2012)
Self-disclosure and Privacy Calculus on Social Networking Sites: The Role of CultureBusiness & Information Systems Engineering, 4
Adams Js (1963)
Towards an understanding of inequityThe Journal of Abnormal and Social Psychology, 67
Mohd Anwar, Wu He, Ivan Ash, Xiaohong Yuan, L. Li, Li Xu (2017)
Gender difference and employees' cybersecurity behaviorsComput. Hum. Behav., 69
Steve Sheng, Mandy Holbrook, P. Kumaraguru, L. Cranor, J. Downs (2010)
Who falls for phish?: a demographic analysis of phishing susceptibility and effectiveness of interventionsProceedings of the SIGCHI Conference on Human Factors in Computing Systems
Xing Liu (2009)
STATISTICAL SOFTWARE APPLICATIONS & REVIEW Ordinal Regression Analysis: Fitting the Proportional Odds Model Using Stata, SAS and SPSS
Huigang Liang, Yajiong Xue (2009)
Avoidance of Information Technology Threats: A Theoretical PerspectiveMIS Q., 33
Diana Young, D. Carpenter, Alexander McLeod (2016)
Malware Avoidance Motivations and Behaviors: A Technology Threat Avoidance ReplicationAIS Trans. Replication Res., 2
D. Gefen, D. Straub, Marie-Claude Boudreau (2000)
Structural Equation Modeling and Regression: Guidelines for Research PracticeCommun. Assoc. Inf. Syst., 4
Bahae Samhan (2017)
Security behaviors of healthcare providers using HIT outside of work: A technology threat avoidance perspective2017 8th International Conference on Information and Communication Systems (ICICS)
K. Parsons, Agata McCormac, M. Butavicius, M. Pattinson, C. Jerram (2014)
Determining employee awareness using the Human Aspects of Information Security Questionnaire (HAIS-Q)Comput. Secur., 42
Hae-Young Kim (2013)
Statistical notes for clinical researchers: assessing normal distribution (2) using skewness and kurtosisRestorative Dentistry & Endodontics, 38
M. Culnan, Pam Armstrong (1999)
Information Privacy Concerns, Procedural Fairness, and Impersonal Trust: An Empirical InvestigationOrganization Science, 10
The purpose of this paper is to examine gender differences in predictors of technology threat avoidance motivation and behavior among working US adults. Implications were considered in regard to cybersecurity awareness training motivation and perceptions of need for protective cybersecurity behavior in the workplace.Design/methodology/approachA single-shot regression-based study used ordinal regression supported by K-means clustering to evaluate the moderating effects of gender on predictors of technology threat avoidance motivation and behavior on a sample of n = 206 US adult workers.FindingsThe regression model explained 47.5% of variance in avoidance motivation and 39% of avoidance behavior variance. Gender moderated predictive associations between several independent variables and avoidance motivation: perceived susceptibility, perceived effectiveness, perceived cost and self-efficacy. Gender also moderated the association between avoidance motivation and avoidance behavior.Research limitations/implicationsThe predictive impact of gender extends beyond the main effects in technology threat avoidance. Data frequency distributions and inter-variable relationships should be routinely considered in threat avoidance studies, especially if sample variables exhibit non-normal frequency distributions and nonlinear associations.Practical implicationsGender was significantly associated with threat avoidance motivation and avoidance behavior and exhibited notable associations with antecedents of avoidance motivation. Related insights can inform the design and delivery of training content relating to technology threat avoidance as organizations strive to more effectively leverage information technology end-users as protective assets for the enterprise.Originality/valueThe uniqueness of this study derives from its focus and findings regarding the moderating effects of gender on technology threat avoidance factors and techniques used to measure and evaluate the associations between them.
Information and Computer Security – Emerald Publishing
Published: Aug 17, 2021
Keywords: Gender; Avoidance behavior; Avoidance motivation; Technology threat avoidance; Workforce cyber security training
Read and print from thousands of top scholarly journals.
Already have an account? Log in
Bookmark this article. You can see your Bookmarks on your DeepDyve Library.
To save an article, log in first, or sign up for a DeepDyve account if you don’t already have one.
Copy and paste the desired citation format or use the link below to download a file formatted for EndNote
Access the full text.
Sign up today, get DeepDyve free for 14 days.
All DeepDyve websites use cookies to improve your online experience. They were placed on your computer when you launched this website. You can change your cookie settings through your browser.