IDEAS home Printed from https://ideas.repec.org/a/taf/uipsxx/v9y2013i1p47-67.html
   My bibliography  Save this article

Applying Protection Motivation Theory to Information Security Training for College Students

Author

Listed:
  • Peter Meso
  • Yi Ding
  • Shuting Xu

Abstract

As Internet and Web technologies have been used in different fields by various organizations, cyber security has become a significant public concern for the society as a whole. There is a broad consensus on the need for broader and better training and education of the current and future workforce to be able to effectively deal with present, emergent and future cyber security challenges. However, cyber-security education tends to be constrained to computer and information science degree programs. Further, the courses within these programs tend to be offered via conventional instructional mechanisms that entail limited Hands-on learning experiences due to the difficulty, cost, and potential risks of setting up real world like Hands-on security training environments, which are often network-based. Considering cyber security education is a necessary need across all disciplines and majors, we have been undertaking a research project at a public college to (a) construct a model to study the influence of knowledge from lectures and Hands-on experience on security behavior using protection motivation theory (b) develop a series of laboratory based Information Security education modules as easy to tailor and scalable pedagogic tools for helping undergraduate students to comprehend information security at different levels, and (c) test the impact of these modules on students' post-training personal cyber security behavior. Our aim is to identify if indeed students do apply what they learn to confidently and intelligently address personal cyber security challenges, after they have completed these course modules. In this paper, we report (a) our theoretical model (b) the design of security pedagogy modules and, (c) the preliminary findings upon testing and surveying students' post-training knowledge and post-training behavior concerning the security topics covered in the training modules.

Suggested Citation

  • Peter Meso & Yi Ding & Shuting Xu, 2013. "Applying Protection Motivation Theory to Information Security Training for College Students," Journal of Information Privacy and Security, Taylor & Francis Journals, vol. 9(1), pages 47-67, January.
  • Handle: RePEc:taf:uipsxx:v:9:y:2013:i:1:p:47-67
    DOI: 10.1080/15536548.2013.10845672
    as

    Download full text from publisher

    File URL: http://hdl.handle.net/10.1080/15536548.2013.10845672
    Download Restriction: Access to full text is restricted to subscribers.

    File URL: https://libkey.io/10.1080/15536548.2013.10845672?utm_source=ideas
    LibKey link: if access is restricted and if your library uses this service, LibKey will redirect you to where you can use your library subscription to access this item
    ---><---

    As the access to this document is restricted, you may want to search for a different version of it.

    Citations

    Citations are extracted by the CitEc Project, subscribe to its RSS feed for this item.
    as


    Cited by:

    1. Nam, Taewoo, 2019. "Understanding the gap between perceived threats to and preparedness for cybersecurity," Technology in Society, Elsevier, vol. 58(C).
    2. Maurizio Cavallari, 2023. "Organizational Determinants and Compliance Behavior to Shape Information Security Plan," Academic Journal of Interdisciplinary Studies, Richtmann Publishing Ltd, vol. 12, November.
    3. Qin Yang & Young-Chan Lee, 2021. "Why Do People Hide Knowledge in the Online Knowledge Community? An Integrated Framework of Protection Motivation, Self-Determination, and Social Exchange Beliefs," Sustainability, MDPI, vol. 13(17), pages 1-24, September.

    More about this item

    Statistics

    Access and download statistics

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:taf:uipsxx:v:9:y:2013:i:1:p:47-67. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    We have no bibliographic references for this item. You can help adding them by using this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Chris Longhurst (email available below). General contact details of provider: http://www.tandfonline.com/uips .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.