Author List: Wang, Jingguo; Xiao, Nan; Rao, H. Raghav;
Information Systems Research, 2015, Volume 26, Issue 3, Page 619-633.
Information security (IS) threats are increasingly pervasive, and search engines are being used by the public as the primary tool for searching for relevant information. This research investigates the following two questions: (1) How can different IS threats be characterized and distinguished in terms of their risk characteristics? and (2) how are risk characteristics related to public searches for information on IS threats? Applying psychometric analysis, our analyses of survey data first show that unknown risk and dread risk are two underlying dimensions that can characterize different IS threats. Drawing broadly on the literature of information foraging theory, we examine the influence of risk characteristics on public searches for information on these threats. We utilize a search engine log to extract searches related to IS threats. We develop and estimate a system of equations with correlated individual-specific error terms using the Markov Chain Monte Carlo method. We find that the two risk characteristics exert differential impacts on information search behavior (including types of information sought, number of pages viewed, and length of query). The implications for IS research and practice are discussed.
Keywords: information-seeking behavior ; information security threats ; risk characteristics ; psychometric analysis ; Markov Chain Monte Carlo
Algorithm:

List of Topics

#0 0.163 information types different type sources analysis develop used behavior specific conditions consider improve using alternative understanding data available main target
#217 0.163 search information display engine results engines displays retrieval effectiveness relevant process ranking depth searching economics create functions incorporate low terms
#276 0.159 satisfaction information systems study characteristics data results using user related field survey empirical quality hypotheses important success various indicate tested
#56 0.125 information security interview threats attacks theory fear vulnerability visibility president vulnerabilities pmt behaviors enforcement appeals protection insiders attackers precautions vice
#11 0.091 structural pls measurement modeling equation research formative squares partial using indicators constructs construct statistical models researchers latent analysis results sem
#264 0.090 risk risks management associated managing financial appropriate losses expected future literature reduce loss approach alternative mitigate failures failure cause mitigation
#116 0.064 research study influence effects literature theoretical use understanding theory using impact behavior insights examine influences mechanisms specifically context perspective findings