Abstract
This paper is the result of research on the security perception of users in ICT services and equipment. We analyze the rationale of users to have an interest in security and to decide to change security parameters of equipment and services. We focus on the home environment, where more and more devices are (inter)connected to form a complex end-to-end chain in using online services. In our research, we constructed a model to determine the delta between the perceived overall security and the real security in home networks. To achieve an understanding of perception and how to identify the delta between perceived and real security, our work forms the basis for examining how perception relates to behaviour. Since humans are referred to as the weakest link in security, there are also differences in behaviour and desired behaviour from a security perspective.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
S. Bratus, C. Masone, S.W. Smith, “Why do street-smart people do stupid things online”, 2008
S.M. Furnell, P. Bryant, A.D. Phippen, “Assessing the security perceptions of personal internet users”, 2007
B. Schneier; The psychology of security, Essay, http://www.schneier.com/essay-155.html, 2008
B. Glassner; The Culture of Fear: Why Americans Are Afraid of the Wrong Things, 2000.
C.W Turner, M. Zavod, W Yurcik, “Factors that affect the perception of security and privacy of e-commerce websites”, 2001
John, O. P., & Srivastava, S. The Big-Five trait taxonomy: History, measurement, and theoretical perspectives. In L. A. Pervin & O. P. John (Eds.), Handbook of personality: Theory and research, New York: Guilford Press., 1999, Vol. 2, pp. 102–138.
Peter B. Myers with Myers, Isabel Briggs (1980, 1995). Gifts Differing: Understanding Personality Type. Mountain View, CA: Davies-Black Publishing. ISBN 0-89106-074-X
W. Abrahamse, L.Steg, C.Vlek and T.Rothengatter. The effect of tailored information, goal setting, and tailored feedback on household energy use, energy-related behaviours, and behavioural antecedents. Journal of Environmental Psychology 27 (2007) 265–276.
Morville, P. Ambient Findability: What We Find Changes Who We Become, User Experience Honeycomb, O’Reilly 2005
‘The Elements of User Experience’ model by Jesse James Garret available at http://www.jjg.net/ele-ments/pdfelements.pdf, 2000
Asgharpour, Liu, Camp, “Mental Models of Computer Security Risks”, WEIS 2007.
P. Stern; Toward a Coherent Theory of Envrionmentally Significant Behavior. Journal of Social Issues, 2000, 56(3), 407–424
Donald A. Norman, “Being Analog,” http://www.jnd.org/dn.mss/being_analog.html. Originally published as Chapter 7 of The Invisible Computer, MIT Press, 1998.
Daniel Gilbert, “If only gay sex caused global warming,” Los Angeles Times, July 2, 2006
Author information
Authors and Affiliations
Editor information
Rights and permissions
Copyright information
© 2010 Vieweg+Teubner | GWV Fachverlage GmbH
About this chapter
Cite this chapter
Wolthuis, R., Broenink, G., Fransen, F., Schultz, S., de Vries, A. (2010). Simple & Secure: Attitude and behaviour towards security and usability in internet products and services at home. In: Pohlmann, N., Reimer, H., Schneider, W. (eds) ISSE 2009 Securing Electronic Business Processes. Vieweg+Teubner. https://doi.org/10.1007/978-3-8348-9363-5_15
Download citation
DOI: https://doi.org/10.1007/978-3-8348-9363-5_15
Publisher Name: Vieweg+Teubner
Print ISBN: 978-3-8348-0958-2
Online ISBN: 978-3-8348-9363-5
eBook Packages: Computer ScienceComputer Science (R0)