Perpetua: The UAH Journal of Undergraduate Research


College of Science


Computer Science


In an increasingly interdependent society characterized by omnipresent online communications, Information Systems security research is an important contributor in helping protect people and organizations from cyber-attacks. Cyber-attacks are increasing in their number and scope. In May 2017 a series of ransomware attacks affected hundreds of thousands of computers across the globe, causing significant loss of business. Understanding how people interact with IT threats is an integral step to cyber-security. In this paper, I modify and extend the model developed by Liang and Xue in their Technology Threat Avoidance Theory to evaluate the effects of source credibility on computer user’s behaviors.



To view the content in your browser, please download Adobe Reader or, alternately,
you may Download the file to your hard drive.

NOTE: The latest versions of Adobe Reader do not support viewing PDF files within Firefox on Mac OS and if you are using a modern (Intel) Mac, there is no official plugin for viewing PDF files within the browser window.