Elsevier

Computers & Security

Volume 28, Issue 8, November 2009, Pages 816-826
Computers & Security

Self-efficacy in information security: Its influence on end users' information security practice behavior

https://doi.org/10.1016/j.cose.2009.05.008Get rights and content

Abstract

The ultimate success of information security depends on appropriate information security practice behaviors by the end users. Based on social cognitive theory, this study models and tests relationships among self-efficacy in information security, security practice behavior and motivation to strengthen security efforts. This study also explores antecedents to individuals' self-efficacy beliefs in information security. Results provide support for the many hypothesized relationships. This study provides an initial step toward understanding of the applicability of social cognitive theory in a new domain of information security. The results suggest that simply listing what not to do and penalties associated with a wrong doing in the users' information security policy alone will have a limited impact on effective implementation of security measures. The findings may help information security professionals design security awareness programs that more effectively increase the self-efficacy in information security.

Introduction

The increasing sophistication of information security threats and the ever-growing body of regulation has made information security a critical function within many sectors of business. Organizations devote significant resources to control threats imposed on their information security by securing their network using a combination of anti-virus/anti-spyware software, firewalls, intrusion detection and prevention systems, and content filtering software. However, this technical layer of defense to an organization's security can succumb to human failure. A laptop is left carelessly behind in a public area such as an Internet café. Through manipulation of social engineering, naïve users often reveal their passwords and e-mail the company directory or other sensitive and classified information (Winkler and Hayden, 2005). American Express warned their customers of a phishing scheme that presents itself as a security measure by the company and asks for social security number, mother's maiden name, and date of birth (Washkuch, 2006). Numerous other studies provide similar evidence (e.g., see Albrechtsen, 2007). For the past several years, malicious codes have been listed as one of dominating threats to information security (Power, 2008). Spyware is a type of malicious code intended to help an unauthorized entity break into users' computers to divulge private information (Thompson, 2005). It is a deliberate software attack that imposes substantial risk to both individual and organizational information security. Its primary means of accessing a system is a user's accidental or careless activation of a virus or a worm from an e-mail or a web site download (Whitman, 2003). Although the use of an anti-spyware program can effectively shield from such an attack, the adoption rate of such software by end users is as low as 10 percent (Lee and Kozar, 2005). Even, an installed anti-spyware program can be outdated losing its effectiveness if its detection database is not regularly updated. An estimate reports that more than half of all security breaches are due to social engineering and end users' careless behavior (Mackenzie, 2006).

These examples suggest that no matter how effective the technical layer of security, the security posture ultimately depends on appropriate end user behavior. However, information security has traditionally been treated as a technical problem, resulting in information security teams being staffed solely with technicians (Collette and Gentile, 2006). This skewed perspective of information security has resulted in overlooking the human factor issue, often referred to as the weakest point of a security chain (Angel, 1993). Concerns about this lack of consideration of the human factor in security programs have been raised in academic research (e.g., Bishop et al., 1997, Dhillon and Backhouse, 2000, Lee and Kozar, 2005, Spruit, 1995, Straub, 1990, Straub and Welke, 1998) as well as field studies (BERR, 2008, Ernst and Young, 2008). Some researchers in IS studied the human agent issue in the context of information security. For example, drawing upon criminology theory of general deterrence, Straub (1990) investigated the extent to which the severity and certainty of sanctions could influence computer abuse. Loch and Conger (1996) addressed attitudinal variables and social norms on ethical computer usage behavior. The main focus of these works is on how to deter an individual behavior, which is counterproductive to information security. The foundational assumption made by this line of research is that human agents have malicious intentions. Therefore, an external deterrent, such as punishment, needs to be introduced (Stanton et al., 2005). However, as evidenced above, there are many naïve user behaviors that are not intended but may cause detrimental effects on information security. In order to design a more effective security program for this group of users, understanding the factors that promote good end user behavior (i.e., control-enhancing behavior) is important. While there are some research efforts which address deterring bad end user behavior, little work has been done to promote good end user behavior in information security (Stanton et al., 2005, Whitman, 2003).

To address this need, we use social cognitive theory and explore its viability as a framework for understanding factors influencing end users' control-enhancing behavior. Social cognitive theory is concerned with how perceptions of self-efficacy affect peoples' motivation and action (Bandura, 1986). Self-efficacy is people's belief in their abilities to mobilize the motivation, cognitive resources, and courses of action needed to exercise control over given events (Ozer and Bandura, 1990). The theory appears to be particularly well suited to studying individual behavior in the domain of information security, because self-regulated behavior in terms of using information and information systems seems critically important for ensuring information security. Self-efficacy has been argued as the most focal or pervasive mechanism of human agency which motivates and regulates individual behavior (Bandura and Jourden, 1991).

In this paper, we are particularly interested in exploring (1) the degree to which self-efficacy predicts current security practice behavior (i.e., the use of security technology and security conscious care behavior); (2) the extent to which self-efficacy predicts motivation (i.e., intentions to continue and to strengthen their information security practices); and (3) the extent to which self-efficacy is related to previous relevant experiences and perceived general controllability of information security threats.

Because of the importance of end-user behavior for overall security, understanding factors influencing control-enhancing behavior could provide helpful benefits for information security professionals, managers, and auditors with an interest in assessing the effectiveness of an information security program. Furthermore, such an understanding helps in designing more focused training programs. This paper also extends the current understanding of self-efficacy in a new domain, information security.

The paper is organized as follows. In the next section, we discuss the concept of self-efficacy in information security. This is followed by a description of the research model and its hypotheses. The research method is then presented, followed by a discussion of the analysis and results. Finally, we discuss our findings and suggest future research and managerial implications.

Section snippets

Self-efficacy in information security

Self-efficacy is an important construct of social cognitive theory. It is a form of self-evaluation which is a proximal determinant of individual behavior (Bandura, 1986). People with a high level of self-efficacy have a stronger form of self conviction about their ability to mobilize motivation, cognitive resources, and courses of action needed to successfully execute a task (Stajkovic and Luthans, 1998). Self-efficacy influences the amount of effort, self regulation, and the initiation and

Subjects

A total of 415 graduate students majoring in business participated in this study. Respondents completed self-report questionnaires. Participations were voluntary. The sample consisted of 265 males and 150 females. The average age was 30.61 (s.d. = 6.27). They had 13 years of computer experience (s.d. = 4.56) and 8.7 years of Internet experience (s.d. = 2.43).

Some authors have noted potential problems related to the generalizability of findings of a study using student subjects to the real-world

Analysis and results

The research model was tested using partial least squares (PLS). With this method, we first assess the measurement model including the reliability and discriminant validity of the measures. Then, we fit the structural model to test the hypothesized paths between latent constructs. LVPLS version 1.8 (Lohmoller, 1986) was used to fit the model. The standard errors and t statistics were estimated using a bootstrapping procedure with 1000 resampling.

Discussion

Drawing upon social cognitive theory, this study extended the concept of self-efficacy in the context of information security and attempted to empirically test the influence of SEIS on users' current information security risk management behavior and their intention to strengthen security efforts. We also studied variables influencing the formation of self-efficacy in information security.

The findings of this study provide support for the research model. Individuals with high SEIS used more

Conclusions

This study has attempted to understand the factors influencing individuals' information security promoting behavior. Our results demonstrate that self-efficacy in information security does have substantial explanatory power regarding individuals' information security practice behavior both in terms of technology use and security conscious care behavior. Moreover, SEIS also influences the intention to continue individuals' security efforts. The weakness in user practice poses a bigger threat to

Hyeun-Suk Rhee is the Director of United Nations Asian Pacific Training Centre for Information and Communication Technology for Development (UN-APCICT). Prior to UN-APCICT, She served as a professor for two major universities in the United States of America: Georgia Tech and University of Texas at Dallas. She also served as Chief at the Information Technology Centre for Africa (ITCA). She received PhD from The Ohio State University where she also received several awards including the 1991

References (68)

  • A. Bandura

    Social foundations of thoughts and action: a social cognitive theory

    (1986)
  • A. Bandura

    Self-efficacy-the exercise of control

    (1997)
  • A. Bandura et al.

    Self-regulatory mechanisms governing the impact of social comparison on complex decision making

    Journal of Personality and Social Psychology

    (1991)
  • BERR

    2008 Information security breaches survey

    (2008)
  • M. Bishop et al.

    The threat from the net

    IEEE Spectrum

    (1997)
  • W. Chin

    The partial least squares approach for structural equation modeling

  • W. Chin

    Partial least squares for researchers: an overview and presentation of recent advances using the PLS approach

  • R. Collette et al.

    The security architect: bridging the gap between business, technology and security

    The Information Systems Security Association Journal

    (April 2006)
  • D.R. Compeau et al.

    Computer self-efficacy: development of a measure and initial test

    MIS Quarterly

    (1995)
  • D. Compeau et al.

    Computer self-efficacy: a review

  • F.D. Davis et al.

    User acceptance of computer technology: a comparison of two theoretical models

    Management Science

    (1989)
  • G. Dhillon et al.

    Information system security management in the new millennium

    Communications of the ACM

    (2000)
  • M.S. Eastin et al.

    Internet self-efficacy and the psychology of the digital divide

    Journal of Computer Mediated Communications

    (2000)
  • P.S. Ellen et al.

    Resistance to technological innovations: an examination of the role of self-efficacy and performance satisfaction

    Journal of the Academy of Marketing Science

    (1991)
  • Ernst et al.

    Moving beyond compliance: Ernst & Young's 2008 global information security survey

    (2008)
  • V. Gecas

    The social psychology of self-efficacy

    Annual Review of Sociology

    (1989)
  • M.E. Gist

    Self-efficacy: implications for organizational behavior and human resource management

    Academy of Management Review

    (1987)
  • M.E. Gist

    Self-efficacy: a theoretical analysis of its determinants and malleability

    Academy of Management Review

    (1992)
  • M.E. Gist et al.

    Effects of alternative training methods on self-efficacy and performance in computer software training

    Journal of Applied Psychology

    (1989)
  • P. Gurin et al.

    Change in self in adulthood: the example of sense of control

  • J.F. Hair et al.

    Multivariate data analysis

    (1998)
  • A.W. Harrison et al.

    The influence of individual differences on skill in end-user computing

    Journal of Management Information Systems

    (1992)
  • J.W. Henry et al.

    A structural equation model of end-user satisfaction with a computer-based medical information system

    Information Resources Management Journal

    (1994)
  • C.T. Hughes et al.

    Students as surrogates for managers in a decision-making environment: an experimental study

    Journal of Management Information Systems

    (1991)
  • Cited by (247)

    View all citing articles on Scopus

    Hyeun-Suk Rhee is the Director of United Nations Asian Pacific Training Centre for Information and Communication Technology for Development (UN-APCICT). Prior to UN-APCICT, She served as a professor for two major universities in the United States of America: Georgia Tech and University of Texas at Dallas. She also served as Chief at the Information Technology Centre for Africa (ITCA). She received PhD from The Ohio State University where she also received several awards including the 1991 President Citation and Teaching Excellence Award. She has published over 30 research articles in various internationally recognized journals and made presentations at conferences in the ICT field. She has served as a chair for a number of national and international conferences.

    Cheongtag Kim is a Professor of Psychology and Cognitive Science at the Seoul National University. He received B.A in psychology and M.A in psycholinguistics from Seoul National University, and Ph.D. in quantitative psychology from the Ohio State University. He began his academic career at Seoul National University in 1998 as an Assistant Professor and was promoted to Associate Professor in 2003 and Full Professor in 2008. He was the department chair from 2004 to 2006 and the director of Psychological Institute at Seoul National University from 2006 to 2007. He is the author of more than 30 publications on decision making, psychometrics, mathematical modeling of cognition in Psychological Methods, Journal of Personality and Social Psychology, Multivariate Behavioral Research, and several Korean Journals. His main interests are structural equation model, multilevel model, and test development.

    Young U. Ryu is Associate Professor of Information Systems at the School of Management, The University of Texas at Dallas. He holds a Ph.D. degree in Management Science and Information Systems from the McCombs Graduate School of Business, The University of Texas at Austin. He has studied applications of data mining & artificial intelligence technologies and decision science methods to the modeling & analysis of information systems. He currently works on data separation as information classification and machine learning, computer security, and social network analysis.

    View full text