IS Research Methods

advertisement

Ghana Institute of Management and Public Administration

Assignment

SOT 702B: IS RESEARCH METHODS

NAME:

Ibrahim Issahaku

Dennis Akomeah

Clement Yao Amedume

Samuel Ayeh

ID NO:

219003777

219003793

219003785

219003750

Lecturer: Dr. Peter Ebo Tobbin

Table of Contents Page

1.

Introduction

2.

Methodology

3.

Literature Review

4.

Constructs

5.

Limitations

6.

Addition to the

Body of Knowledge

7.

Conclusion

8.

Appendix

………………………………………..

………………………………………..

………………………………………..

………………………………………..

…………………………………….….

………………………………………..

………………………………………..

………………………………………..

2

2

3

4

5

5

5

6

1

1.

Introduction

Computers and computer networks have become an integral part of our social world. Securing this infrastructure, adopting protective measure and threat avoidance has become necessary as computer system vulnerabilities are increasingly becoming a major issue.

The adoption of personal computers and general access to telecommunications links such as the

Internet have strengthened the necessity for computer security. This submission reviews the work on two papers. We organize the review in 8 sections: Introduction, Methodology,

Literature Review , Constructs used, Limitations, Addition to body of knowledge, Conclusion and

Appendix .

Paper 1 : “The Adoption of Computer Security: An Analysis of Home Personal Computer User

Behavior Using the Health Belief Model” by Chester L. Claar

Paper 2: “An Extended Perspective on Individual Security Behaviors: Protection Motivation

Theory and a Unified Security Practices (USP) Instrument” by Robert Crossler & France

Belanger.

The two papers were examined carefully and various extracts and mind-mappings were done to outline the various concerns of both authors. This paper will draw out the similarities and differences in the approach of the two authors. The two papers have been noticed to have used the same domain, behavioral Practice on Personal Computer usage . Both papers examine behavioral actions toward the use of security practices. While Paper 1 lays emphasis on adoption,

Paper 2 seeks threat avoidance.

2.

Methodology

Robert and Frances reviewed previous security researches made and carried out surveys. They used Protection Motivation Theory (PMT) as foundation. While Chester also carried out surveys, the items on the survey are adapted from other research on information security and also used the

Health Belief Model (HBM) as a foundation. Both researches carried out reliability analysis of data to ensure that the same results can be obtained by independent researchers.

2

3.

Literature Review

Both documents agree that security is a Primary concern as the adoption of computers and computer networks have become ubiquitous. As Chester’s investigation adopts a measure to curb computer system vulnerabilities on personal computers at home, Robert and Frances focus on what protective measures users take to guard their home computers and networks against computer system vulnerabilities.

Interestingly both papers used models which focus on Protection. Chester used the Health Belief

Model (HBM) which was designed to test the protection by individuals against contracting diseases, while Robert and Frances also used Protection Motivation Theory (PMT) which can also be used in the protection against diseases. As PMT focuses on single protection behavior, this current study covers a multiplicity of individual security practices.

In the papers under discussion, these models have been used inversely in computer and network security domain. Chester examined the adoption of computer security software in home computer environment while Robert and Frances concentrated on expanding the understanding of PMT by empirically testing it using a Unified Measure of Security Related Practices (e.g.

Antivirus usage, Anti- Spyware Software Usage, Software Patches etc.)

A combination of online based survey and snowball technique was used in both researches. Both researches have a Positivist outlook as they carried out their findings by Quantitative Survey.

Chester used an online based survey and the target group was individuals involved in the selection, installation and maintenance of software on the home computer.

The scope of survey carried out by Frances and Robert is more varied as it used data collected from online and paper-based versions. The target group being spectators at a soccer tournament, online sampling of professional researchers and the researchers being asked to contact others.

The target group also included subscribers of graduate school listserv. Frances and Robert used a sampling size of 324. 55 on paper and 269 online. A final figure of 279 was used for data analysis While Chester used final figure 171 from one source for analysis.

3

A further highlight of the HBM model is that; the HBM model employed demographic variables

(sex, age, educational level and race), socio-psychological variables (personality, social class and peer pressure) and structural variables as independent variable as against four perceived dependent constructs. These variables turn to influence personal perception.

4.

Constructs

There is a slight variation in the constructs used.

Health Belief Model (HBM)

Constructs

Protection Motivation Theory (PMT)

Constructs

Perceived Severity Perceived Severity

Self-Efficacy(H5)

Perceived Vulnerability (H1)

Self-Efficacy

Perceived Vulnerability

Education and Benefit (H9c) Perceived Cost

Prior Experience and Perceived

Severity(H10b)

Response Efficacy

Prior Experience and perceived selfefficacy(H10c)

Two-way interaction of age and

Barriers(H8d)

Perceived Barriers(H4)

4

5.

Limitation

Chester admitted the study population is not widely distributed and there has been anonymous data collection leading to an inability to track invitations and resulting responses (snowball technique).

Also , Accessibility to survey online limits users without internet or who aren’t comfortable using the online portal.

Frances and Robert admitted the following limitations; leaving password trails was not included in the final USP instrument. Using caution when opening links in emails was also not in the USP measure due to results of the analyses. Future Technology may change practices which currently support the USP instrument.

6.

Addition to body of knowledge

Chester maintained that, perception of fear is a motivation for an individual to adopt computer security software and the constructs in HBM can be used to study computer security.

France and Robert adopted the tool, Unified Security Practice (USP) instrument as means of obtaining a wider view of individual behavior in avoiding IT threats.

7.

Conclusion

The Researchers of both papers were able to Achieve their objective based on their findings.

Chester proved successfully that a model used in the Health industry could also be applied in computer security. Some Constructs identified in Chester’s research were impactful in defining user’s computer security behavior. Robert & Frances extended the usage of PMT model by defining instruments which indicated useful computer health practices and its impact on the PMT model.

5

8.

Appendix

Extracts

Paper 1: The Adoption of Computer Security: An Analysis of Home Personal Computer

User Behaviour Using the Health Belief Model

Area of Research Motivations for implementing Computer Security

Ontology

Methodology

Limitation

Positivist

Web Based Survey – Questionnaire, Quantitative

Model

1.

Studied population not widely distributed.

2.

Anonymous data collection leading to an inability to track invitation and resulting responses (snow-ball technique).

3.

Self-reported usage could lead to self-report bias (monitor actual security task a person performs).

4.

Accessibility to survey online limits users without internet or who aren’t comfortable

Health Belief Model

Target Group

Context

Advantage Disadvantage

Fear belief as a motivating factor to secure personal computers is not present in current IS Research models.

Personal Computer Users responsible for implementing computer security.

Computer Security, Personal computer, Human behavior

6

Conclusion

Further Research

1.

Results demonstrate that certain constructs found in the Health

Belief Model are more effective than others in motivating individuals to utilize.

2.

Certain constructs like perceived vulnerability (fear factor) not present in current IS Research models.

1.

Foundation for developing new models to motivate users protect computer systems.

2.

New research with much larger sampling and diverse target group.

Emphasizes 1.

Behavioral intention of users to use computer security technology.

Paper 2: An Extended Perspective on Individual Security Behaviours: Protection

Motivation Theory and a Unified Security Practices (USP) Instrument

Area of Research Computer Security practices and determinants for their motivation

Ontology

Methodology

Positivist

Unstructured and Structured Interview, Paper-based Survey, Webbased Survey

7

Limitation

Model

Target Group

Context

Conclusion

Further Research

Emphasizes

Identified Threats

1.

Emerging exploitation of security vulnerabilities may render current findings inadequate (Need to be regularly updated).

2.

Anonymous data collection leading to an inability to track invitation and resulting responses (snowball technique).

3.

Self-reported usage could lead to self-report bias (monitor actual security task a person performs).

4.

Study limited to US respondents (A cross cultural study spanning several countries could provide more insight).

Protection Motivation Theory with Unified Security Practices

Students with access to security tools and internet, cross-section of society.

Information Security, Security Practices, Protection Motivation

Theory, Users

1.

Identifying security practices that users perform gives researcher avenue to study aspects of security users take seriously.

2.

Certain constructs like perceived vulnerability (fear factor) not present in current IS Research models.

1.

Research could also focus on security on mobile device.

2.

New research with much larger sampling and diverse target group.

1.

Types of specific computer security practices.

2.

Not only personal computer users but users in an

Organization.

File loss, Identity theft, reduction in computer performance

8

Download