Skip to main content

An Exploration of the Search for Information Security

  • Conference paper
  • 1174 Accesses

Part of the book series: Lecture Notes in Business Information Processing ((LNBIP,volume 52))

Abstract

People use search engines to seek information. This study investigates the motives that drive the search for information security knowledge via a search engine. We empirically examine the effects of network attacks and vulnerability disclosures on the frequency of search for information security knowledge. . We find that network attacks of current day and one day prior significantly impact the search, while vulnerability disclosure does not significantly affect the search.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Jansen, B.J.: The Comparative Effectiveness of Sponsored and Nonsponsored Links for Web E-commerce Queries. ACM Transactions on the Web 1(1), 3 (2007)

    Article  Google Scholar 

  2. Ybarra, M.L., Sumanb, M.: Help seeking behavior and the Internet: A national survey. International Journal of Medical Informatics 75(1), 29–41 (2006)

    Article  Google Scholar 

  3. Kumar, N., Mohan, K., Holowczak, R.: Locking the door but leaving the computer vulnerable: Factors inhibiting home users’ adoption of software firewalls. Decision Support Systems 46(1), 254–264 (2008)

    Article  Google Scholar 

  4. Liang, H., Xue, Y.: Avoidance of Information Technology Threats: A Theoretical Perspective. MIS Quarterly 33(1), 71–90 (2009)

    Google Scholar 

  5. Ng, B.-Y., Kankanhalli, A., Xu, Y.C.: Studying users’ computer security behavior: A health belief perspective. Decision Support Systems 46(4), 815–825 (2009)

    Article  Google Scholar 

  6. Furnell, S.M., Jusoh, A., Katsabas, D.: The challenges of understanding and using security: A survey of end-users. Computers & Security 25(1), 27–35 (2006)

    Article  Google Scholar 

  7. Png, I., Wang, C., Wang, Q.: The Deterrent and Displacement Effects of Information Security Enforcement: International Evidence. Journal of Management Information Systems 25(2), 125–144 (2008)

    Article  Google Scholar 

  8. Rogers, R.W.: A protection motivation theory of fear appeals and attitude change. Journal of Psychology 91(1), 93–114 (1975)

    Article  Google Scholar 

  9. Floyd, D.L., Prentice-Dunn, S., Rogers, R.W.: A Meta-Analysis of Research on Protection Motivation Theory. Journal of Applied Social Psychology 30(2), 407–429 (2000)

    Article  Google Scholar 

  10. Pass, G., Chowdhury, A., Torgeson, C.: A Picture of Search. In: the First International Conference on Scalable Information Systems (INFOSCALE 2006), Hong Kong (2006)

    Google Scholar 

  11. Pankratz, A.: Forecasting with Dynamic Regression Models. John Wiley & Sons, New York (1991)

    Book  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2010 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Wang, J., Xiao, N., Rao, H.R. (2010). An Exploration of the Search for Information Security. In: Sharman, R., Rao, H.R., Raghu, T.S. (eds) Exploring the Grand Challenges for Next Generation E-Business. WEB 2009. Lecture Notes in Business Information Processing, vol 52. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-17449-0_17

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-17449-0_17

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-17448-3

  • Online ISBN: 978-3-642-17449-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics