Reactions to Internet Security Warnings: Personal versus University Computers
2016
- 238Usage
Metric Options: CountsSelecting the 1-year or 3-year option will change the metrics count to percentiles, illustrating how an article or review compares to other articles or reviews within the selected time period in the same journal. Selecting the 1-year option compares the metrics against other articles/reviews that were also published in the same calendar year. Selecting the 3-year option compares the metrics against other articles/reviews that were also published in the same calendar year plus the two years prior.
Example: if you select the 1-year option for an article published in 2019 and a metric category shows 90%, that means that the article or review is performing better than 90% of the other articles/reviews published in that journal in 2019. If you select the 3-year option for the same article published in 2019 and the metric category shows 90%, that means that the article or review is performing better than 90% of the other articles/reviews published in that journal in 2019, 2018 and 2017.
Citation Benchmarking is provided by Scopus and SciVal and is different from the metrics context provided by PlumX Metrics.
Example: if you select the 1-year option for an article published in 2019 and a metric category shows 90%, that means that the article or review is performing better than 90% of the other articles/reviews published in that journal in 2019. If you select the 3-year option for the same article published in 2019 and the metric category shows 90%, that means that the article or review is performing better than 90% of the other articles/reviews published in that journal in 2019, 2018 and 2017.
Citation Benchmarking is provided by Scopus and SciVal and is different from the metrics context provided by PlumX Metrics.
Metrics Details
- Usage238
- Downloads159
- Abstract Views79
Poster Description
Many organizations use computer security systems to protect their computers from viruses, intrusion, malware, and other hazards. Additional employees, computer security software, and employee training are time consuming and expensive. It would be beneficial to determine what could be implemented to promote behaviors among employees or students that help to increase computer security. The purpose of the present research is to determine if computer ownership plays a role in reactions to internet security pop-up warnings. University students are asked to bring their personally owned computers to the psychology lab to take a reading comprehension test. The participants are randomly assigned to use an institutional computer or their personal computer. They are told that they will be taking a reading comprehension test that is time sensitive. The researcher asks that they hold all questions until the end. The participants log into an internet web-site and begin. During the reading comprehension test, a pop-up internet security warning appears on their computer screen. The internet security pop-up is based on an actual security warning pop-up and on current research and recommendations for creation of successful security pop-up warnings. The reactions of the participants can be used to determine if any differences exist between reactions to internet security warnings on personally owned computers as opposed to institutionally owned computers. This knowledge impacts organizational policies regarding computer ownership in a way that saves the organization time and money.
Bibliographic Details
Provide Feedback
Have ideas for a new metric? Would you like to see something else here?Let us know