Open access repository

Home Open access repository

In 2014, we launched our open-access repository which offers full text access to conference proceedings from many of our events including the INC and HAISA series. These papers are free to access and distribute (subject to citing the source).

» Openaccess proceedings » Twelfth International Symposium on Human Aspects of Information Security & Assurance (HAISA 2018)

Twelfth International Symposium on Human Aspects of Information Security & Assurance (HAISA 2018)

Twelfth International Symposium on Human Aspects of Information Security & Assurance (HAISA 2018)
Dundee, Scotland, UK, August 29-31, 2018
ISBN: 978-0-244-40254-9

Title: Investigating the Knowledge-Behaviour Gap in Mitigating Personal Information Compromise
Author(s): Jasmine Scott, Jacques Ophoff
Reference: pp236-245
Keywords: Information Security; Personal Information Compromise; Behavioural Skills; Motivation; Preventive Behaviour; Knowledge-Behaviour Gap; Information-Motivation-Behavioural (IMB) Skills Model
Abstract: In response to information threats users instinctively increase security measures, such as firewalls and anti-virus software. However, users do not give enough attention to their behaviour, more specifically, their security behavioural practices. This paper proposes that the knowledge-behaviour gap affects a user’s security behavioural practices and this, in effect, threatens personal information security. The knowledge-behaviour gap assesses why users do not put their information security and privacy knowledge into practice. The Information-Motivation-Behavioural Skills Model is used to highlight the different factors which affect the knowledge-behaviour gap, with empirical data collected using an online survey. Despite the wide conformity of opinions within literature, a key finding of this research is that users’ awareness of information security threats has an insignificant effect on their self-reported preventive behaviour. The significance of this finding is that users require a deeper technical understanding of information security threats to engage in effective preventive behaviour.
Download count: 142

How to get this paper:

Download a free PDF copy of this paperBuy this book at Lulu.com

PDF copy of this paper is free to download. You may distribute this copy providing you cite this page as the source.