The Effects of Knowledge on Security Technology Adoption: Results from a Quasi-Experiment

Wendy HUI, Siu Man LUI

Research output: Book Chapters | Papers in Conference ProceedingsConference paper (refereed)Researchpeer-review

4 Citations (Scopus)

Abstract

We conducted a quasi-experiment through an online survey to investigate the effects of information security knowledge on users' adoption of security technologies. We found that knowledge can affect adoption decision in multiple ways. On the one hand, knowledge tends to increase a user's self-efficacy in using the technology, which in turn increases the perceived usefulness of the technology, consistent with the Technology Acceptance Model (TAM). On the other hand, users who are knowledgeable about information security are less likely to come up with a poor adoption decision. These findings suggest that firms may need to use different strategies when trying to market security technologies to users with different knowledge levels. Furthermore, a firm that produces useful security technologies may wish to spend resources to educate users in order to increase their self-efficacy and their perceived usefulness of the technologies.
Original languageEnglish
Title of host publicationThe 5th International Conference on New Trends in Information Science and Service Science
PublisherIEEE
ISBN (Electronic)9781457706653
ISBN (Print)9788988678503
Publication statusPublished - 2011
Externally publishedYes
EventThe 5th International Conference on New Trends in Information Science and Service Science - Macau, Macau, Macao
Duration: 24 Oct 201126 Oct 2011

Conference

ConferenceThe 5th International Conference on New Trends in Information Science and Service Science
Abbreviated titleNISS
CountryMacao
CityMacau
Period24/10/1126/10/11

Bibliographical note

Published as proeedings, publisher: IEEE, page: 328-333.

Fingerprint Dive into the research topics of 'The Effects of Knowledge on Security Technology Adoption: Results from a Quasi-Experiment'. Together they form a unique fingerprint.

Cite this