Research in socio-technical factors in computer security has traditionally focused on employees and their work practice within the premises of the organization. However, with universal access to computing and the diverse means of connecting such devices to each another and to the global Internet, work carried out has shifted outside one central physical location to encompass a variety of possible points-of-access that include homes, modern cafés, and public libraries. Given the ubiquity of wireless devices used for last-hop access to the Internet from home, we look at the security of home wireless networks. In this work, we identify the variables that affect the decision of home wireless network users to implement security features on their networks. Our study is based on the protection motivation theory. A survey was conducted on 189 home users to identify and characterize predictors that differentiate between users who secure their home wireless networks and those who don’t. Results of the analysis identified the following variables as significant: perceived severity, response efficacy, self efficacy, and response cost.
Woon, Irene; Tan, Gek-Woo; and Low, R., "A Protection Motivation Theory Approach to Home Wireless Security" (2005). ICIS 2005 Proceedings. 31.