DOI QR코드

DOI QR Code

Internet Security Readiness: The Influence of Internet Usage Level and Awareness on Internet Security Readiness Capital, Skill, and Actual Uptake/Use of Infrastructure

  • Ryoo, Jung-Woo (Division of Business and Engineering, Penn State Altoona) ;
  • Park, Eun-A (Department of Communication, Film, and Theater, University of New Haven)
  • Received : 2010.12.02
  • Accepted : 2011.03.03
  • Published : 2011.03.31

Abstract

In this paper we applied our previously developed assessment framework to the data collected from an internet security readiness survey targeted at households. We used the assessment framework to compute an Internet Security Readiness index for each household, which was in turn derived from Internet Security Readiness capital, skill, and actual uptake/use of infrastructure indices. We then examined the relationships among overall Internet Security Readiness, and the capital, skill, and actual uptake/use of infrastructure related to Internet Security Readiness. In addition, we explored the influence of Internet usage level and experience on Internet Security Readiness.

Keywords

References

  1. AGRESTI, A. AND FINLAY, B. 1997. Statistical Methods for the Social Sciences. 3rd ed. Prentice Hall, Upper Saddle River, NJ.
  2. ANANDARAJAN, M., SIMMERS, C., AND IGBARIA, M. 2000. An exploratory investigation of the antecedents and impact of internet usage: an individual perspective. Behaviour and Information Technology 19, 1, 69-85. https://doi.org/10.1080/014492900118803
  3. BARTOL, N., BATES, B., GOERTZEL, K. M., AND WINOGRAD, T. 2009. Measuring Cyber Security and Information Assurance: State-of-the-Art Report (SOAR). Information Assurance Technology Analysis Center, Herndon, VA.
  4. BOHLIN, E., LEVIN, S. L., SUNG, N., AND YOON, C. H. 2004. Global Economy and Digital Society. Elsevier, Boston, MA.
  5. COUNCIL OF EUROPE. 2011. Council of Europe--ETS no. 185--Convention on cybercrime. http://onventions.coe.int/Treaty/EN/Treaties/html/185.htm.
  6. ECONOMIST INTELLIGENCE UNIT. 2005. The 2005 e-readiness rankings. http://www.eiu.com/site_info.asp?info_name=eiu_2005_e_readiness_rankings&rf=0.
  7. EUROPEAN NETWORK AND INFORMATION SECURITY AGENCY. 2007. Information security awareness: local government and internet service providers (EN). http://www.enisa.europa.eu/act/ar/deliverables/2007/loc-gov/en.
  8. FURNELL, S. M., BRYANT, P., AND PHIPPEN, A. D. 2007. Assessing the security perceptions of personal Internet users. Computers and Security 26, 5, 410-417. https://doi.org/10.1016/j.cose.2007.03.001
  9. INFODEV. 2005. E-ready for what? http://www.infodev.org/en/Publication.3.html.
  10. JONES, A. 2007. A framework for the management of information security risks. BT Technology Journal 25, 1, 30-36. https://doi.org/10.1007/s10550-007-0005-9
  11. KHOSROWPOUR, M. 2004. The Social and Cognitive Impacts of E-Commerce on Modern Organizations. Idea Group Publishing, Hershey, PA.
  12. KUTNER, M. H. 2004. Applied Linear Statistical Models. 5th ed. McGraw-Hill Irwin, Boston, MA.
  13. LAROSE, R., MASTRO, D., AND EASTIN, M. S. 2001. Understanding Internet usage: a socialcognitive approach to uses and gratifications. Social Science Computer Review 19, 4, 395-413. https://doi.org/10.1177/089443930101900401
  14. LITTLEWOOD, B., BROCKLEHURST, S., FENTON, N., MELLOR, P., PAGE, S., WRIGHT, D., DOBSON, J., MCDERMID, J., AND GOLLMANN, D. 1993. Towards operational measures of computer security. Journal of Computer Security 2, 211-229. https://doi.org/10.3233/JCS-1993-22-308
  15. MCLEAN, K. 1992. Information security awareness-selling the cause. In Proceedings of the IFIP TC11, Eighth International Conference on Information Security: IT Security: The Need for International Cooperation, 179-193.
  16. MORAHAN-MARTIN, J. 2005. Internet abuse: addiction? disorder? symptom? alternative explanations? Social Science Computer Review 23, 1, 39-48. https://doi.org/10.1177/0894439304271533
  17. NAHID, A. H., SHAHMEHRI, N., BEDNARSKI, A., CHISALITA, I., NORDQVIST, U., SALDAMLI, L., SZENTIVANYI, D., AND OSTRING, M, UNIVERSITET, L. 2001. Security issues in ehome network and software infrastructures. In Proceedings of the 3rd Conference on Computer Science and Systems Engineering, 155-161.
  18. OECD. 2002. OECD guidelines for the security of information systems and networks: towards a culture of security. http://www.oecd.org/document/48/0,3746,en_2649_34255_15582250_1_1_1_1,00.html.
  19. PAYNE, S. C. 2010. A guide to security metrics. In Educause Security Professionals Conference.
  20. RABINOVITCH, E. 1997. Security on the net. IEEE Communications Magazine 35, 3, 22-24. https://doi.org/10.1109/MCOM.1997.581300
  21. REZNIK, L. 2003. Which models should be applied to measure computer security and information assurance? In IEEE International conference on Fuzzy Systems, St. Louis, MO, 1243-1248. https://doi.org/10.1109/FUZZ.2003.1206609
  22. RYOO, J. W., PARK, E. A., GIRARD, T., AND OSAGIE, S. 2006. Measuring internet security readiness: a study of household behavior. In Proceedings of the 16th Biennial Conference of the International Telecommunication Society, Beijing, China.
  23. SIMMERS, C. A. AND ANANDARAJAN, M. 2002.Internet user satisfaction, job satisfaction and internet background: an exploratory study. In Managing Web Usage in the Workplace, M. ANANDARAJAN AND C. A. SIMMERS, Eds. IGI Publishing, Hershey, PA, 168-185.
  24. SIPONEN, M. T. 2000. Conceptual foundation for organizational information security awareness. Information Management and Computer Security 8, 1, 31-41. https://doi.org/10.1108/09685220010371394
  25. SPURLING, P. 1995. Promoting security awareness and commitment. Information Management & Computer Security 3, 2, 20-26.
  26. SWANSON, M., BARTOL, N., SABATO, J., HASH, J., GRAFFO, L. 2003. Security Metrics Guide for Information Technology Systems. Technical Report. NIST Special Publication 800-55, U.S. National Institute of Standards and Technology.
  27. TEO, T. S. H., LIM, V. K. G., AND LAI, R. Y. C. 1999. Intrinsic and extrinsic motivation in Internet usage. Omega 27, 1, 25-37. https://doi.org/10.1016/S0305-0483(98)00028-0
  28. THE WORLD BANK. 2004. The World Bank Technology Risk Checklist (Version 7.3). The World Bank, Washington.
  29. THOMSON, M. E. AND VON SOLMS, R. 1997. An effective information security awareness programme for industry. In Proceedings of the WG 11.2 and WG 11.1 of the TC11 IFIP.
  30. TORRELLAS, G. A. S. 2004. A framework for multi-agent system engineering using ontology domain modelling for security architecture risk assessment in e-commerce security services. In Proceedings of the 3rd IEEE International Symposium on Network Computing and Applications, 409-412.
  31. VON SOLMS, R AND THOMSON, M. E. 1998. Information security awareness: educating your users effectively. Information Management and Computer Security 6, 4, 167-173. https://doi.org/10.1108/09685229810227649
  32. WHITMAN, M. E. AND MATTORD, H. J. 2007. Principles of Information Security. 3rd ed. Thomson Course Technology, Boston.

Cited by

  1. Design and implementation of an efficient defense mechanism against ARP spoofing attacks using AES and RSA vol.58, pp.1-2, 2013, https://doi.org/10.1016/j.mcm.2012.08.008
  2. Trust Based Dynamic Bandwidth Allocation Scheme for Ethernet Passive Optical Networks vol.83, pp.4, 2015, https://doi.org/10.1007/s11277-015-2571-3