College of Science
In an increasingly interdependent society characterized by omnipresent online communications, Information Systems security research is an important contributor in helping protect people and organizations from cyber-attacks. Cyber-attacks are increasing in their number and scope. In May 2017 a series of ransomware attacks affected hundreds of thousands of computers across the globe, causing significant loss of business. Understanding how people interact with IT threats is an integral step to cyber-security. In this paper, I modify and extend the model developed by Liang and Xue in their Technology Threat Avoidance Theory to evaluate the effects of source credibility on computer user’s behaviors.
"Source Credibility and Cybersecurity Behaviors,"
Perpetua: The UAH Journal of Undergraduate Research: Vol. 2:
1, Article 3.
Available at: https://louis.uah.edu/perpetua/vol2/iss1/3