By Topic

Information security knowledge and behavior: An adapted model of technology acceptance

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$33 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

1 Author(s)
Ping An Wang ; Graduate School of Computer and Information Sciences, Nova Southeastern University, Fort Lauderdale, USA

Information security risks have become a significant concern for users of computer information technology. However, users' behavior of acceptance and actual use of available information security solutions has not been commensurate with the level of their information security concerns. Traditional technology acceptance theory (TAM) emphasizes the factors of perceived usefulness and perceived ease of use in acceptance of technology. There has been little research focus and consensus on the role of knowledge in user adoptions of information security solutions. This paper proposes a new and adapted model of technology acceptance that focuses on the relationship between users' knowledge of information security and their behavioral intention to use information security solutions. This study employs a survey method that measures users' knowledge of information security and their attitude and intention toward using information security solutions. Statistical analysis of the results indicates a positive correlation between user knowledge of information security and user intention to adopt and use information security solutions.

Published in:

2010 2nd International Conference on Education Technology and Computer  (Volume:2 )

Date of Conference:

22-24 June 2010