Reference Hub61
Computer Security and Risky Computing Practices: A Rational Choice Perspective

Computer Security and Risky Computing Practices: A Rational Choice Perspective

Kregg Aytes, Terry Connolly
Copyright: © 2004 |Volume: 16 |Issue: 3 |Pages: 19
ISSN: 1546-2234|EISSN: 1546-5012|ISSN: 1546-2234|EISBN13: 9781615200955|EISSN: 1546-5012|DOI: 10.4018/joeuc.2004070102
Cite Article Cite Article

MLA

Aytes, Kregg, and Terry Connolly. "Computer Security and Risky Computing Practices: A Rational Choice Perspective." JOEUC vol.16, no.3 2004: pp.22-40. http://doi.org/10.4018/joeuc.2004070102

APA

Aytes, K. & Connolly, T. (2004). Computer Security and Risky Computing Practices: A Rational Choice Perspective. Journal of Organizational and End User Computing (JOEUC), 16(3), 22-40. http://doi.org/10.4018/joeuc.2004070102

Chicago

Aytes, Kregg, and Terry Connolly. "Computer Security and Risky Computing Practices: A Rational Choice Perspective," Journal of Organizational and End User Computing (JOEUC) 16, no.3: 22-40. http://doi.org/10.4018/joeuc.2004070102

Export Reference

Mendeley
Favorite Full-Issue Download

Abstract

Despite rapid technological advances in computer hardware and software, insecure behavior by individual computer users continues to be a significant source of direct cost and productivity loss. Why do individuals, many of whom are aware of the possible grave consequences of low-level insecure behaviors such as failure to backup work and disclosing passwords, continue to engage in unsafe computing practices? In this article we propose a conceptual model of this behavior as the outcome of a boundedly-rational choice process. We explore this model in a survey of undergraduate students (N = 167) at two large public universities. We asked about the frequency with which they engaged in five commonplace but unsafe computing practices, and probed their decision processes with regard to these practices. Although our respondents saw themselves as knowledgeable, competent users, and were broadly aware that serious consequences were quite likely to result, they reported frequent unsafe computing behaviors. We discuss the implications of these findings both for further research on risky computing practices and for training and enforcement policies that will be needed in the organizations these students will shortly be entering.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.