•  
  •  
 
Perpetua: The UAH Journal of Undergraduate Research

College

College of Science

Department

Computer Science

Abstract

In an increasingly interdependent society characterized by omnipresent online communications, Information Systems security research is an important contributor in helping protect people and organizations from cyber-attacks. Cyber-attacks are increasing in their number and scope. In May 2017 a series of ransomware attacks affected hundreds of thousands of computers across the globe, causing significant loss of business. Understanding how people interact with IT threats is an integral step to cyber-security. In this paper, I modify and extend the model developed by Liang and Xue in their Technology Threat Avoidance Theory to evaluate the effects of source credibility on computer user’s behaviors.

Share

COinS
 
 

To view the content in your browser, please download Adobe Reader or, alternately,
you may Download the file to your hard drive.

NOTE: The latest versions of Adobe Reader do not support viewing PDF files within Firefox on Mac OS and if you are using a modern (Intel) Mac, there is no official plugin for viewing PDF files within the browser window.