Abstract
Losing files and data on a personal computer is an issue that practitioners and researchers have addressed for a number of years. Properly mitigating this security threat requires a number of protective behaviors. In this paper, we present the protective behaviors that a panel of experts recommend be performed to mitigate this threat. We then measure individual computer users reported performance at these recommended behaviors and analyze them utilizing multi-dimensional scaling analysis. Results demonstrate that certain protective behaviors are more apt to be performed together while others stand apart. A mapping of the behaviors that are performed in relation to other behaviors is presented on two dimensions. These findings suggest that the two dimensions distinguishing these behaviors are automation and the perceived impact the behaviors have on mitigating file and data loss. The implications of these findings for practitioners and future research are discussed.
Recommended Citation
Crossler, Robert and Belanger, F, "The Quest for Complete Security Protection: An Empirical Analysis of an Individual’s 360 Degree Protection from File and Data Loss" (2012). AMCIS 2012 Proceedings. 14.
https://aisel.aisnet.org/amcis2012/proceedings/ISSecurity/14
The Quest for Complete Security Protection: An Empirical Analysis of an Individual’s 360 Degree Protection from File and Data Loss
Losing files and data on a personal computer is an issue that practitioners and researchers have addressed for a number of years. Properly mitigating this security threat requires a number of protective behaviors. In this paper, we present the protective behaviors that a panel of experts recommend be performed to mitigate this threat. We then measure individual computer users reported performance at these recommended behaviors and analyze them utilizing multi-dimensional scaling analysis. Results demonstrate that certain protective behaviors are more apt to be performed together while others stand apart. A mapping of the behaviors that are performed in relation to other behaviors is presented on two dimensions. These findings suggest that the two dimensions distinguishing these behaviors are automation and the perceived impact the behaviors have on mitigating file and data loss. The implications of these findings for practitioners and future research are discussed.