Dimensions of protection behaviors: A systematic literature review
The term Bring Your Own Device (BYOD) has generated many hopes and fears among many users in this field related to behaviors of information protection. Threats of BYOD include illegal access to policy changes and information, disclosure of confidential details to the public, leakage of organization...
Saved in:
Main Authors: | , , , , |
---|---|
Other Authors: | |
Format: | Article |
Published: |
Little Lion Scientific
2023
|
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Summary: | The term Bring Your Own Device (BYOD) has generated many hopes and fears among many users in this field related to behaviors of information protection. Threats of BYOD include illegal access to policy changes and information, disclosure of confidential details to the public, leakage of organization data and privacy, access control, abuse, and lost of devices. This study examines the existing studies on various dimensions in conceptualizing the behaviors of information protection. Using a systematic method, we analyzed four major databases, including IEEE, Science Direct, SpringerLink, and Taylor & Francis, from which 57 articles were selected from the year 2010 to 2019. In this study, ten (10) dimensions are discussed: protection behaviors and its Perceived Severity, Perceived Vulnerability, Self-Efficacy, Response Efficacy, Response Cost, Subjective Norm, Attitude, Security Self-Efficacy, Information Security Awareness and Perceived Behavioral Control. � 2005 � ongoing JATIT & LLS. |
---|