Unrealistic optimism on information security management
Information security is a critical issue that many firms face these days. While increasing incidents of information security breaches have generated extensive publicity, previous studies repeatedly expose low levels of managerial awareness and commitment, a key obstacle to achieving a good informati...
Saved in:
Published in | Computers & security Vol. 31; no. 2; pp. 221 - 232 |
---|---|
Main Authors | , , |
Format | Journal Article |
Language | English |
Published |
Amsterdam
Elsevier Ltd
01.03.2012
Elsevier Sequoia S.A |
Subjects | |
Online Access | Get full text |
ISSN | 0167-4048 1872-6208 |
DOI | 10.1016/j.cose.2011.12.001 |
Cover
Abstract | Information security is a critical issue that many firms face these days. While increasing incidents of information security breaches have generated extensive publicity, previous studies repeatedly expose low levels of managerial awareness and commitment, a key obstacle to achieving a good information security posture. The main motivation of our study emanates from this phenomenon that the increased vulnerability to information security breaches is coupled with the low level of managerial awareness and commitment regarding information security threats. We report this dissonance by addressing a cognitive bias called optimistic bias. Using a survey, we study if MIS executives are subject to such a bias in their vulnerability perceptions of information security. We find that they demonstrate optimistic bias in risk perception on information security domain. The extent of this optimistic bias is greater with a distant comparison target with fewer information sharing activities. This optimistic bias is also found to be related to perception of controllability with information security threats. In order to overcome the effects of optimistic bias, firms need more security awareness training and systematic treatments of security threats instead of relying on ad hoc approach to security measure implementation. |
---|---|
AbstractList | Information security is a critical issue that many firms face these days. While increasing incidents of information security breaches have generated extensive publicity, previous studies repeatedly expose low levels of managerial awareness and commitment, a key obstacle to achieving a good information security posture. The main motivation of our study emanates from this phenomenon that the increased vulnerability to information security breaches is coupled with the low level of managerial awareness and commitment regarding information security threats. We report this dissonance by addressing a cognitive bias called optimistic bias. Using a survey, we study if MIS executives are subject to such a bias in their vulnerability perceptions of information security. We find that they demonstrate optimistic bias in risk perception on information security domain. The extent of this optimistic bias is greater with a distant comparison target with fewer information sharing activities. This optimistic bias is also found to be related to perception of controllability with information security threats. In order to overcome the effects of optimistic bias, firms need more security awareness training and systematic treatments of security threats instead of relying on ad hoc approach to security measure implementation. Information security is a critical issue that many firms face these days. While increasing incidents of information security breaches have generated extensive publicity, previous studies repeatedly expose low levels of managerial awareness and commitment, a key obstacle to achieving a good information security posture. The main motivation of our study emanates from this phenomenon that the increased vulnerability to information security breaches is coupled with the low level of managerial awareness and commitment regarding information security threats. We report this dissonance by addressing a cognitive bias called optimistic bias. Using a survey, we study if MIS executives are subject to such a bias in their vulnerability perceptions of information security. We find that they demonstrate optimistic bias in risk perception on information security domain. The extent of this optimistic bias is greater with a distant comparison target with fewer information sharing activities. This optimistic bias is also found to be related to perception of controllability with information security threats. In order to overcome the effects of optimistic bias, firms need more security awareness training and systematic treatments of security threats instead of relying on ad hoc approach to security measure implementation. [PUBLICATION ABSTRACT] |
Author | Ryu, Young U. Kim, Cheong-Tag Rhee, Hyeun-Suk |
Author_xml | – sequence: 1 givenname: Hyeun-Suk surname: Rhee fullname: Rhee, Hyeun-Suk email: sukrhee@gmail.com organization: United Nations – Asian and Pacific Training Centre for Information and Communication Technology for Development (UN-APCICT), 7-50 Songdo-dong, Yeonsu-gu, Incheon, South Korea – sequence: 2 givenname: Young U. surname: Ryu fullname: Ryu, Young U. email: ryoung@utdallas.edu organization: School of Management, The University of Texas at Dallas, Mail Stop SM 33, 800 W. Campbell Rd., Richardson, TX 75090-3021, United States – sequence: 3 givenname: Cheong-Tag surname: Kim fullname: Kim, Cheong-Tag email: ctkim@snu.ac.kr organization: Department of Psychology, School of Social Science, Seoul National University, 599 Gwanak-ro, Gwanak-gu, Seoul 151-742, South Korea |
BookMark | eNp9kD1PwzAQhi1UJNrCH2CqmFgSbMdxHIkFVXxJlVjobDnOBblK7GI7SP33OJSpQ6e74Xle3b0LNLPOAkK3BOcEE_6wy7ULkFNMSE5ojjG5QHMiKppxisUMzRNUZQwzcYUWIewSUHEh5qjaWg-qNyEavXL7aAYThpWzK2M75wcVTdoD6NGbeFgNyqovGMDGa3TZqT7Azf9cou3L8-f6Ldt8vL6vnzaZLjiOWY27gqim5aXu0qq00g1rSNVUpCaYtxwLohhWjFasKcu6qBlXLaNF3QisOS6W6P6Yu_fue4QQZTpQQ98rC24MMn1fcyZYOaF3J-jOjd6m62RNC8poaiJB4ghp70Lw0Elt4t-X0SvTp7wpksudnAqVU6GSUJn6Sio9UffeDMofzkuPRwlSST8GvAzagNXQGg86ytaZc_ov6KSQNA |
CODEN | CPSEDU |
CitedBy_id | crossref_primary_10_1108_ICS_02_2023_0023 crossref_primary_10_1016_j_chb_2021_106791 crossref_primary_10_1108_ICS_06_2017_0042 crossref_primary_10_1145_3462766_3462770 crossref_primary_10_1080_08874417_2020_1864680 crossref_primary_10_1108_TG_11_2019_0112 crossref_primary_10_4018_IJSITA_2018070103 crossref_primary_10_1080_08874417_2015_11645769 crossref_primary_10_1016_j_indmarman_2023_04_001 crossref_primary_10_1016_j_chb_2017_10_007 crossref_primary_10_1108_IMCS_07_2013_0053 crossref_primary_10_1080_0144929X_2023_2230305 crossref_primary_10_1108_INTR_04_2022_0238 crossref_primary_10_12677_AP_2022_123100 crossref_primary_10_3790_zverswiss_2024_1430701 crossref_primary_10_4236_jis_2023_142007 crossref_primary_10_1016_j_cose_2023_103099 crossref_primary_10_1016_j_actpsy_2023_103990 crossref_primary_10_1016_j_im_2023_103753 crossref_primary_10_1007_s11573_020_00972_4 crossref_primary_10_1016_j_cose_2021_102403 crossref_primary_10_1080_08874417_2019_1650676 crossref_primary_10_1007_s13369_020_04524_4 crossref_primary_10_1016_j_tifs_2020_11_017 crossref_primary_10_4018_JCIT_2018070104 crossref_primary_10_1108_JEIM_06_2018_0110 crossref_primary_10_1108_ICS_08_2017_0058 crossref_primary_10_1016_j_cose_2015_04_006 crossref_primary_10_62273_TRBS2965 crossref_primary_10_2753_MIS0742_1222300202 crossref_primary_10_1108_ICS_09_2018_0106 crossref_primary_10_1016_j_cose_2022_103046 crossref_primary_10_1016_j_chb_2017_05_038 crossref_primary_10_1109_ACCESS_2021_3122433 crossref_primary_10_1145_3210530_3210538 crossref_primary_10_1093_cybsec_tyad018 crossref_primary_10_1016_j_cose_2014_10_007 crossref_primary_10_1016_j_ssci_2021_105240 crossref_primary_10_1108_ICS_12_2018_0138 crossref_primary_10_1016_j_ijcip_2015_12_003 crossref_primary_10_1016_j_cose_2023_103249 crossref_primary_10_1142_S0219622015500364 crossref_primary_10_1371_journal_pone_0238739 crossref_primary_10_3182_20130606_3_XK_4037_00045 crossref_primary_10_1002_hbe2_312 crossref_primary_10_4018_IJSSE_2017100101 crossref_primary_10_1108_ICS_09_2015_0041 crossref_primary_10_1109_ACCESS_2023_3243183 crossref_primary_10_1108_IMDS_08_2024_0752 crossref_primary_10_1109_MITP_2016_27 crossref_primary_10_1007_s10796_016_9714_2 crossref_primary_10_1016_j_ijinfomgt_2015_11_009 crossref_primary_10_1016_j_cose_2024_103812 crossref_primary_10_1093_cybsec_tyaf005 crossref_primary_10_2139_ssrn_4170550 crossref_primary_10_1016_j_cose_2016_05_004 crossref_primary_10_1016_j_cose_2014_05_003 crossref_primary_10_1108_ITP_09_2019_0458 crossref_primary_10_1080_08874417_2019_1697860 crossref_primary_10_1016_j_martra_2022_100065 crossref_primary_10_1371_journal_pone_0163050 crossref_primary_10_4018_IJISP_291702 |
Cites_doi | 10.1046/j.1365-2575.2001.00099.x 10.1111/j.1559-1816.1993.tb01088.x 10.1037/0033-2909.84.5.888 10.1007/BF03394867 10.2307/249574 10.1080/08870449408407475 10.1037/0022-3514.39.5.806 10.2307/2667105 10.1108/09685220010371394 10.1037/0033-2909.90.2.245 10.1521/jscp.1996.15.1.9 10.1016/S0167-4048(02)00504-7 10.1177/0146167284103006 10.1257/jep.11.1.109 10.1037/0022-3514.43.1.5 10.1037/0022-3514.58.3.472 10.1287/isre.1.3.255 10.1016/0378-7206(91)90024-V 10.2307/249551 10.1037/0022-3514.65.4.781 10.1037/0022-3514.67.3.366 10.1177/001872675400700202 10.1111/j.2044-8295.1993.tb02461.x 10.1080/09654310701747936 10.1037/0022-3514.68.5.804 10.2307/3151718 10.1287/mnsc.36.4.422 10.1037/0022-3514.50.3.502 10.2307/249452 10.1207/S15324834BASP2104_4 10.1016/0883-9026(88)90020-1 10.1521/jscp.1996.15.1.53 10.1111/j.1559-1816.1996.tb01778.x 10.1023/A:1024119208153 10.1086/468160 10.1086/467732 10.5465/AMJ.2005.17843947 10.1037/h0076486 10.1287/mnsc.33.11.1404 10.1037/0033-2909.106.2.231 10.1016/0001-4575(89)90024-9 10.1177/0146167291175001 10.1037/0022-3514.32.2.311 10.1007/BF00846146 10.1016/S0167-4048(00)04021-9 10.1521/soco.1986.4.4.353 10.1080/0887044022000004920 10.1111/j.1467-6494.1995.tb00315.x 10.1521/jscp.1996.15.1.1 10.1111/j.2044-8309.1994.tb01035.x 10.1111/0272-4332.204041 10.1207/S15327957PSPR0501_5 10.2307/2685844 10.1016/0001-6918(92)90054-H |
ContentType | Journal Article |
Copyright | 2011 Elsevier Ltd Copyright Elsevier Sequoia S.A. Mar 2012 |
Copyright_xml | – notice: 2011 Elsevier Ltd – notice: Copyright Elsevier Sequoia S.A. Mar 2012 |
DBID | AAYXX CITATION 7SC 8FD JQ2 K7. L7M L~C L~D |
DOI | 10.1016/j.cose.2011.12.001 |
DatabaseName | CrossRef Computer and Information Systems Abstracts Technology Research Database ProQuest Computer Science Collection ProQuest Criminal Justice (Alumni) Advanced Technologies Database with Aerospace Computer and Information Systems Abstracts Academic Computer and Information Systems Abstracts Professional |
DatabaseTitle | CrossRef ProQuest Criminal Justice (Alumni) Technology Research Database Computer and Information Systems Abstracts – Academic ProQuest Computer Science Collection Computer and Information Systems Abstracts Advanced Technologies Database with Aerospace Computer and Information Systems Abstracts Professional |
DatabaseTitleList | ProQuest Criminal Justice (Alumni) Computer and Information Systems Abstracts |
DeliveryMethod | fulltext_linktorsrc |
Discipline | Computer Science |
EISSN | 1872-6208 |
EndPage | 232 |
ExternalDocumentID | 2593947851 10_1016_j_cose_2011_12_001 S0167404811001441 |
Genre | Feature |
GroupedDBID | --K --M -~X .DC .~1 0R~ 1B1 1RT 1~. 1~5 29F 4.4 457 4G. 5GY 5VS 7-5 71M 8P~ 9JN AACTN AAEDT AAEDW AAIAV AAIKJ AAKOC AALRI AAOAW AAQFI AAQXK AAXUO AAYFN ABBOA ABFSI ABMAC ABXDB ABYKQ ACDAQ ACGFO ACGFS ACNNM ACRLP ACZNC ADBBV ADEZE ADHUB ADJOM ADMUD AEBSH AEKER AENEX AFFNX AFKWA AFTJW AGHFR AGUBO AGYEJ AHHHB AHZHX AIALX AIEXJ AIKHN AITUG AJBFU AJOXV ALMA_UNASSIGNED_HOLDINGS AMFUW AMRAJ AOUOD ASPBG AVWKF AXJTR AZFZN BKOJK BKOMP BLXMC CS3 DU5 E.L EBS EFJIC EFLBG EJD EO8 EO9 EP2 EP3 FDB FEDTE FGOYB FIRID FNPLU FYGXN G-2 G-Q GBLVA GBOLZ HLX HLZ HVGLF HZ~ IHE J1W KOM LG8 LG9 M41 MO0 MS~ N9A O-L O9- OAUVE OZT P-8 P-9 P2P PC. PQQKQ Q38 R2- RIG RNS ROL RPZ RXW SBC SBM SDF SDG SDP SES SEW SPC SPCBC SSV SSZ T5K TAE TN5 TWZ WH7 WUQ XJE XPP XSW YK3 ZMT ~G- AATTM AAXKI AAYWO AAYXX ABJNI ABWVN ACRPL ACVFH ADCNI ADNMO AEIPS AEUPX AFJKZ AFPUW AFXIZ AGCQF AGQPQ AGRNS AIGII AIIUN AKBMS AKRWK AKYEP ANKPU APXCP BNPGV CITATION SSH 7SC 8FD EFKBS JQ2 K7. L7M L~C L~D |
ID | FETCH-LOGICAL-c360t-90f31abd65cf0f3acacb4b17b719106d6081a40a4274b5593946ad4239b80c603 |
IEDL.DBID | AIKHN |
ISSN | 0167-4048 |
IngestDate | Thu Sep 04 22:15:19 EDT 2025 Mon Jul 14 07:39:23 EDT 2025 Tue Jul 01 03:48:11 EDT 2025 Thu Apr 24 22:51:07 EDT 2025 Fri Feb 23 02:20:12 EST 2024 |
IsPeerReviewed | true |
IsScholarly | true |
Issue | 2 |
Keywords | Optimistic bias Risk perception Risk management Information security Awareness Perceived controllability |
Language | English |
License | https://www.elsevier.com/tdm/userlicense/1.0 |
LinkModel | DirectLink |
MergedId | FETCHMERGED-LOGICAL-c360t-90f31abd65cf0f3acacb4b17b719106d6081a40a4274b5593946ad4239b80c603 |
Notes | SourceType-Scholarly Journals-1 ObjectType-Feature-1 content type line 14 ObjectType-Article-2 content type line 23 |
PQID | 923242208 |
PQPubID | 46289 |
PageCount | 12 |
ParticipantIDs | proquest_miscellaneous_1019648450 proquest_journals_923242208 crossref_citationtrail_10_1016_j_cose_2011_12_001 crossref_primary_10_1016_j_cose_2011_12_001 elsevier_sciencedirect_doi_10_1016_j_cose_2011_12_001 |
ProviderPackageCode | CITATION AAYXX |
PublicationCentury | 2000 |
PublicationDate | March 2012 2012-3-00 20120301 |
PublicationDateYYYYMMDD | 2012-03-01 |
PublicationDate_xml | – month: 03 year: 2012 text: March 2012 |
PublicationDecade | 2010 |
PublicationPlace | Amsterdam |
PublicationPlace_xml | – name: Amsterdam |
PublicationTitle | Computers & security |
PublicationYear | 2012 |
Publisher | Elsevier Ltd Elsevier Sequoia S.A |
Publisher_xml | – name: Elsevier Ltd – name: Elsevier Sequoia S.A |
References | Buehler, Griffin, Ross (bib19) 1994; 67 Patrick, Skinner, Connell (bib69) 1993; 65 Tajfel, Turner (bib83) 1986 McKenna (bib61) 1993; 84 Power (bib71) 2001; 7 Bandura, Reese, Adams (bib12) 1982; 43 Nosworthy (bib66) 2000; 19 Harris (bib39) 1996; 15 Straub (bib80) 1990; 1 Armitage, Conner, Loach, Willerts (bib9) 1999; 21 Brown (bib17) 1986; 4 Hoorens, Buunk (bib44) 1993; 23 Klein, Helweg-Larsen (bib48) 2002; 17 Babcock, Loewenstein (bib11) 1997; 11 Weinstein (bib87) 1987; 10 Ajzen, Fishbein (bib5) 1977; 84 CERT (bib21) 2002 Harris, Middleton (bib40) 1994; 33 Will (bib89) 1981; 90 Efron, Gong (bib28) 1983; 37 Adams (bib1) 1999 Laplace (bib51) 1951 Chin (bib22) 1998 Suarez (bib82) 2005; 48 (bib73) 2009 Hoorens (bib43) 1996; 15 Baron, Hershey, Kunreuther (bib13) 2000; 20 Schwarzer (bib76) 1994; 9 Niederman, Brancheau, Wetherbe (bib65) 1991; 14 Straub, Welke (bib81) 1998; 22 Wood (bib90) 1989; 106 DTI (bib26) 2004 Scarfone, Souppaya, Cody, Orebaugh (bib75) 2008 ISO (bib45) 2005 Loewenstein, Issacharoff, Camerer, Babcock (bib54) 1993; 22 Lohmoller (bib55) 1986 Helweg-Larsen, Shepperd (bib41) 2001; 5 MacCrimmon, Wehrung (bib58) 1990; 36 Langer (bib50) 1975; 32 Rothman, Klein, Weinstein (bib74) 1996; 26 Dhillon, Backhouse (bib25) 2001; 11 March, Shapira (bib59) 1987; 33 GAO (bib36) 1999 Smith (bib79) 1989; 11 Ozer, Bandura (bib68) 1990; 58 Zakay (bib91) 1984; 34 Armstrong, Overton (bib10) 1977; 51 Loch, Carr, Warkentin (bib53) 1992; 16 Skinner (bib78) 1995 Kankanhalli, Teo, Tan, Wei (bib47) 1996; 12 Flyvbjerg (bib33) 2004 Mitnick, Simon (bib64) 2002 Wayment, Taylor (bib85) 1995; 63 Baskerville (bib14) 1989 Kahneman, Tversky (bib46) 1979; vol. 12 Miller, Ross (bib62) 1975; 82 Camp, Wolfram (bib20) 2000 Ernst & Young (bib30) 2004 Otten, van der Pligt (bib67) 1992; 80 Ahuja (bib2) 2000; 45 Brewer (bib16) 1991; 17 Dutta, Roy (bib27) 2003 Weinstein (bib86) 1980; 39 Mitnick (bib63) 2003; 81 Ajzen (bib4) 2002/2006 Goodhue, Straub (bib37) 1991; 20 Applied Computer Research, Inc. (bib7) 2004 Weinstein, Klein (bib88) 1996; 15 Perloff, Fetzer (bib70) 1986; 50 Cooper, Woo, Dunkelberg (bib23) 1988; 3 Lovallo, Kahneman (bib57) 2003; 81 DeJoy (bib24) 1989; 21 Hair, Anderson, Tatham, Black (bib38) 1998 Festinger (bib31) 1954; 7 Masters, Keil (bib60) 1987 Levine, Green (bib52) 1984; 10 Fornell, Bookstein (bib32) 1982; 19 Flyvbjerg (bib34) 2008; 16 GAO (bib35) 1998 Hone, Eloff (bib42) 2002; 21 Erenberg (bib29) 2005 Alicke, Klotz, Breitenbecher, Yurak, Vredenburg (bib3) 1995; 68 Becker, Rosenstock (bib15) 1987; 2 Varian (bib84) 2002 Priest, Klein (bib72) 1984; 13 Applied Computer Research, Inc. (bib8) 2004 AOL/NCSA (bib6) 2004 Lohmoller (bib56) 1989 Kunreuther, Heal (bib49) 2003; 26 Siponen (bib77) 2000; 8 Hair (10.1016/j.cose.2011.12.001_bib38) 1998 Smith (10.1016/j.cose.2011.12.001_bib79) 1989; 11 Kankanhalli (10.1016/j.cose.2011.12.001_bib47) 1996; 12 Dhillon (10.1016/j.cose.2011.12.001_bib25) 2001; 11 Skinner (10.1016/j.cose.2011.12.001_bib78) 1995 Loch (10.1016/j.cose.2011.12.001_bib53) 1992; 16 Helweg-Larsen (10.1016/j.cose.2011.12.001_bib41) 2001; 5 ISO (10.1016/j.cose.2011.12.001_bib45) 2005 Ajzen (10.1016/j.cose.2011.12.001_bib4) 2002 Camp (10.1016/j.cose.2011.12.001_bib20) 2000 Harris (10.1016/j.cose.2011.12.001_bib40) 1994; 33 McKenna (10.1016/j.cose.2011.12.001_bib61) 1993; 84 Rothman (10.1016/j.cose.2011.12.001_bib74) 1996; 26 Lohmoller (10.1016/j.cose.2011.12.001_bib55) 1986 Flyvbjerg (10.1016/j.cose.2011.12.001_bib33) 2004 Brewer (10.1016/j.cose.2011.12.001_bib16) 1991; 17 Goodhue (10.1016/j.cose.2011.12.001_bib37) 1991; 20 Siponen (10.1016/j.cose.2011.12.001_bib77) 2000; 8 Fornell (10.1016/j.cose.2011.12.001_bib32) 1982; 19 Ozer (10.1016/j.cose.2011.12.001_bib68) 1990; 58 Straub (10.1016/j.cose.2011.12.001_bib81) 1998; 22 Buehler (10.1016/j.cose.2011.12.001_bib19) 1994; 67 Power (10.1016/j.cose.2011.12.001_bib71) 2001; 7 Hoorens (10.1016/j.cose.2011.12.001_bib43) 1996; 15 Niederman (10.1016/j.cose.2011.12.001_bib65) 1991; 14 Tajfel (10.1016/j.cose.2011.12.001_bib83) 1986 Chin (10.1016/j.cose.2011.12.001_bib22) 1998 Armstrong (10.1016/j.cose.2011.12.001_bib10) 1977; 51 Hoorens (10.1016/j.cose.2011.12.001_bib44) 1993; 23 Weinstein (10.1016/j.cose.2011.12.001_bib87) 1987; 10 Kunreuther (10.1016/j.cose.2011.12.001_bib49) 2003; 26 Dutta (10.1016/j.cose.2011.12.001_bib27) 2003 Scarfone (10.1016/j.cose.2011.12.001_bib75) 2008 Babcock (10.1016/j.cose.2011.12.001_bib11) 1997; 11 Alicke (10.1016/j.cose.2011.12.001_bib3) 1995; 68 GAO (10.1016/j.cose.2011.12.001_bib35) 1998 Suarez (10.1016/j.cose.2011.12.001_bib82) 2005; 48 Priest (10.1016/j.cose.2011.12.001_bib72) 1984; 13 Bandura (10.1016/j.cose.2011.12.001_bib12) 1982; 43 Levine (10.1016/j.cose.2011.12.001_bib52) 1984; 10 Ernst & Young (10.1016/j.cose.2011.12.001_bib30) 2004 Patrick (10.1016/j.cose.2011.12.001_bib69) 1993; 65 Weinstein (10.1016/j.cose.2011.12.001_bib88) 1996; 15 Langer (10.1016/j.cose.2011.12.001_bib50) 1975; 32 Armitage (10.1016/j.cose.2011.12.001_bib9) 1999; 21 Ajzen (10.1016/j.cose.2011.12.001_bib5) 1977; 84 Harris (10.1016/j.cose.2011.12.001_bib39) 1996; 15 Efron (10.1016/j.cose.2011.12.001_bib28) 1983; 37 Zakay (10.1016/j.cose.2011.12.001_bib91) 1984; 34 Applied Computer Research, Inc. (10.1016/j.cose.2011.12.001_bib8) 2004 Nosworthy (10.1016/j.cose.2011.12.001_bib66) 2000; 19 Varian (10.1016/j.cose.2011.12.001_bib84) 2002 Miller (10.1016/j.cose.2011.12.001_bib62) 1975; 82 AOL/NCSA (10.1016/j.cose.2011.12.001_bib6) 2004 (10.1016/j.cose.2011.12.001_bib73) 2009 GAO (10.1016/j.cose.2011.12.001_bib36) 1999 Kahneman (10.1016/j.cose.2011.12.001_bib46) 1979; vol. 12 Loewenstein (10.1016/j.cose.2011.12.001_bib54) 1993; 22 Ahuja (10.1016/j.cose.2011.12.001_bib2) 2000; 45 Hone (10.1016/j.cose.2011.12.001_bib42) 2002; 21 Adams (10.1016/j.cose.2011.12.001_bib1) 1999 DTI (10.1016/j.cose.2011.12.001_bib26) 2004 MacCrimmon (10.1016/j.cose.2011.12.001_bib58) 1990; 36 Erenberg (10.1016/j.cose.2011.12.001_bib29) 2005 Baskerville (10.1016/j.cose.2011.12.001_bib14) 1989 Mitnick (10.1016/j.cose.2011.12.001_bib64) 2002 Otten (10.1016/j.cose.2011.12.001_bib67) 1992; 80 Perloff (10.1016/j.cose.2011.12.001_bib70) 1986; 50 Wood (10.1016/j.cose.2011.12.001_bib90) 1989; 106 Festinger (10.1016/j.cose.2011.12.001_bib31) 1954; 7 Masters (10.1016/j.cose.2011.12.001_bib60) 1987 Brown (10.1016/j.cose.2011.12.001_bib17) 1986; 4 Becker (10.1016/j.cose.2011.12.001_bib15) 1987; 2 Klein (10.1016/j.cose.2011.12.001_bib48) 2002; 17 March (10.1016/j.cose.2011.12.001_bib59) 1987; 33 Mitnick (10.1016/j.cose.2011.12.001_bib63) 2003; 81 DeJoy (10.1016/j.cose.2011.12.001_bib24) 1989; 21 Wayment (10.1016/j.cose.2011.12.001_bib85) 1995; 63 Lohmoller (10.1016/j.cose.2011.12.001_bib56) 1989 Weinstein (10.1016/j.cose.2011.12.001_bib86) 1980; 39 Cooper (10.1016/j.cose.2011.12.001_bib23) 1988; 3 Applied Computer Research, Inc. (10.1016/j.cose.2011.12.001_bib7) 2004 Laplace (10.1016/j.cose.2011.12.001_bib51) 1951 Will (10.1016/j.cose.2011.12.001_bib89) 1981; 90 Flyvbjerg (10.1016/j.cose.2011.12.001_bib34) 2008; 16 Lovallo (10.1016/j.cose.2011.12.001_bib57) 2003; 81 CERT (10.1016/j.cose.2011.12.001_bib21) 2002 Straub (10.1016/j.cose.2011.12.001_bib80) 1990; 1 Baron (10.1016/j.cose.2011.12.001_bib13) 2000; 20 Schwarzer (10.1016/j.cose.2011.12.001_bib76) 1994; 9 |
References_xml | – volume: 20 start-page: 413 year: 2000 end-page: 427 ident: bib13 article-title: Determinants of priority for risk reduction: the role of worry publication-title: Risk Analysis – volume: 10 start-page: 481 year: 1987 end-page: 500 ident: bib87 article-title: Unrealistic optimism about susceptibility to health problems: conclusions from a community-wide sample publication-title: Journal of Behavioral Medicine – volume: vol. 12 start-page: 313 year: 1979 end-page: 327 ident: bib46 article-title: Intuitive prediction: biases and corrective procedures publication-title: Forecasting: TIMS studies in management Science – volume: 11 start-page: 109 year: 1997 end-page: 126 ident: bib11 article-title: Explaining bargaining impasse: the role of self-serving biases publication-title: The Journal of Economic Perspectives – year: 2004 ident: bib30 article-title: Global information security survey 2004 – year: 1998 ident: bib35 article-title: Information security management: learning from leading organizations – volume: 19 start-page: 337 year: 2000 ident: bib66 article-title: Implementing information security in the 21st century: do you have the balancing factors? publication-title: Computers and Security – volume: 84 start-page: 39 year: 1993 end-page: 50 ident: bib61 article-title: It won’t happen to me: unrealistic optimism or illusion of control? publication-title: British Journal of Psychology – volume: 34 start-page: 233 year: 1984 end-page: 240 ident: bib91 article-title: The influence of a perceived event’s controllability on its subjective occurrence probability publication-title: The Psychological Record – year: 2002 ident: bib21 article-title: Home computer security – volume: 16 start-page: 173 year: 1992 end-page: 186 ident: bib53 article-title: Threats to information systems: today’s reality, yesterday’s understanding publication-title: MIS Quarterly – volume: 22 start-page: 441 year: 1998 end-page: 469 ident: bib81 article-title: Coping with systems risk: security planning models for management decision making publication-title: MIS Quarterly – year: 2005 ident: bib29 article-title: What type of disputes are best suited for alternative dispute resolution—an analysis in the space of the odds of litigation publication-title: Proceedings of the Fourth Annual Meetings of Israeli Law & Economics Association (ILEA) – volume: 67 start-page: 366 year: 1994 end-page: 381 ident: bib19 article-title: Exploring the “planning fallacy”: why people underestimate their task completion time publication-title: Journal of Personality and Social Psychology – volume: 5 start-page: 74 year: 2001 end-page: 95 ident: bib41 article-title: Do moderators of the optimistic bias affect personal or target risk estimates? A review of the literature publication-title: Personality and Social Psychology Review – year: 1989 ident: bib56 article-title: Latent variable path modeling with partial least squares – volume: 68 start-page: 804 year: 1995 end-page: 825 ident: bib3 article-title: Personal contact, individuation, and the better-than-average effect publication-title: Journal of Personality and Social Psychology – year: 2002/2006 ident: bib4 article-title: Constructing a TpB questionnaire: conceptual and methodological considerations – year: 1999 ident: bib36 article-title: Information security risk assessment: practice of leading organizations – volume: 65 start-page: 781 year: 1993 end-page: 791 ident: bib69 article-title: What motivates children’s behavior and emotion? The joint effects of perceived control and autonomy in the academic domain publication-title: Journal of Personality and Social Psychology – volume: 26 start-page: 1213 year: 1996 end-page: 1236 ident: bib74 article-title: Absolute and relative biases in estimations of personal risk publication-title: Journal of Applied Social Psychology – volume: 17 start-page: 475 year: 1991 end-page: 482 ident: bib16 article-title: The social self: on being the same and different at the same time publication-title: Personality and Social Psychology Bulletin – volume: 11 start-page: 127 year: 2001 end-page: 153 ident: bib25 article-title: Current directions in IS security research: toward socio-organizational perspectives publication-title: Information Systems Journal – year: 2004 ident: bib33 article-title: Procedures for dealing with Optimism Bias in Transport Planning: Guidance Document – volume: 10 start-page: 385 year: 1984 end-page: 393 ident: bib52 article-title: Acquisition of relative performance information: the roles of intrapersonal and interpersonal comparison publication-title: Personality and Social Psychology Bulletin – volume: 23 start-page: 291 year: 1993 end-page: 302 ident: bib44 article-title: Social comparison of health risks: locus of control, the person-positivity bias, and unrealistic optimism publication-title: Journal of Applied Social Psychology – volume: 80 start-page: 325 year: 1992 end-page: 346 ident: bib67 article-title: Risk and behavior: the mediating role of risk appraisal publication-title: Acta Psychologica – volume: 43 start-page: 5 year: 1982 end-page: 21 ident: bib12 article-title: Microanalysis and fear arousal as a function of differential levels of perceived self-efficacy publication-title: Journal of Personality and Social Psychology – volume: 4 start-page: 353 year: 1986 end-page: 376 ident: bib17 article-title: Evaluations of self and others: self enhancement biases in social judgments publication-title: Social Cognition – volume: 51 start-page: 71 year: 1977 end-page: 86 ident: bib10 article-title: Estimating non-response bias in mail surveys publication-title: Journal of Marketing – volume: 63 start-page: 329 year: 1995 end-page: 357 ident: bib85 article-title: Self evaluation processes: motives, information use, and self-esteem publication-title: Journal of Personality – year: 1999 ident: bib1 article-title: Cars, cholera, and cows: the management of risk and uncertainty – year: 2005 ident: bib45 article-title: Information technology—security techniques—code of practice for information security management – volume: 15 start-page: 53 year: 1996 end-page: 67 ident: bib43 article-title: Self-favoring biases for positive and negative characteristics: independent phenomena? publication-title: Journal of Social and Clinical Psychology – volume: 82 start-page: 213 year: 1975 end-page: 225 ident: bib62 article-title: Self-serving biases in attribution of causality: fact or fiction? publication-title: Psychological Bulletin – volume: 14 start-page: 475 year: 1991 end-page: 500 ident: bib65 article-title: Information systems management issues for the 1990s publication-title: MIS Quarterly – year: 1995 ident: bib78 article-title: Perceived control, motivation, and coping – year: 2009 ident: bib73 article-title: NIST. Recommended security controls for federal information systems and organizations – volume: 84 start-page: 888 year: 1977 end-page: 918 ident: bib5 article-title: Attitude-behavior relations: a theoretical analysis and review of empirical research publication-title: Psychological Bulletin – volume: 19 start-page: 440 year: 1982 end-page: 452 ident: bib32 article-title: Two structural equation models: LISREL and PLS applied to consumer exit-voice theory publication-title: Journal of Marketing Research – volume: 33 start-page: 319 year: 1994 end-page: 386 ident: bib40 article-title: The illusion of control and optimism about health: on being less at risk but no more in control than others publication-title: British Journal of Social Psychology – year: 2004 ident: bib7 article-title: Directory of Top Computer Executives: Spring 2004 Eastern U.S. Edition – volume: 12 start-page: 35 year: 1996 end-page: 53 ident: bib47 article-title: An integrative study of information systems security effectiveness publication-title: International Journal of Information Systems – volume: 90 start-page: 245 year: 1981 end-page: 271 ident: bib89 article-title: Downward comparison principles in social psychology publication-title: Psychological Bulletin – year: 1998 ident: bib22 article-title: The partial least squares approach for structural equation modeling publication-title: Modern methods for business research – start-page: 11 year: 1987 end-page: 54 ident: bib60 article-title: Generic comparison processes in human judgment and behavior publication-title: Social comparison, social justice, and relative deprivation – year: 1998 ident: bib38 article-title: Multivariate data analysis – volume: 15 start-page: 1 year: 1996 end-page: 8 ident: bib88 article-title: Unrealistic optimism: present and future publication-title: Journal of Social and Clinical Psychology – volume: 11 start-page: 205 year: 1989 end-page: 210 ident: bib79 article-title: Computer security—threats, vulnerabilities and countermeasures publication-title: Information Age – volume: 58 start-page: 472 year: 1990 end-page: 486 ident: bib68 article-title: Mechanisms governing empowerment effects: a self-efficacy analysis publication-title: Journal of Personality and Social Psychology – volume: 21 start-page: 301 year: 1999 end-page: 316 ident: bib9 article-title: Different perceptions of control: applying an extended theory of planned behavior to legal and illegal drug use publication-title: Basic and Applied Social Psychology – volume: 21 start-page: 402 year: 2002 end-page: 409 ident: bib42 article-title: Information security policy: what do international security standards say? publication-title: Computers and Security – year: 2004 ident: bib6 article-title: AOL/NCSA online safety study – volume: 22 start-page: 135 year: 1993 end-page: 159 ident: bib54 article-title: Self-serving assessment of fairness and pretrial bargaining publication-title: The Journal of Legal Studies – volume: 21 start-page: 333 year: 1989 end-page: 340 ident: bib24 article-title: The optimistic bias and traffic accident perception publication-title: Accident Analysis and Prevention – volume: 20 start-page: 13 year: 1991 end-page: 27 ident: bib37 article-title: Security concerns of system users: a study of perceptions of the adequacy of security publication-title: Information & Management – year: 2004 ident: bib26 article-title: Information security survey 2004 – start-page: 241 year: 1989 end-page: 255 ident: bib14 article-title: Logical control specifications: an approach to information systems security publication-title: Systems Development for Human Progress – volume: 45 start-page: 425 year: 2000 end-page: 455 ident: bib2 article-title: Collaboration networks, structural holes, and innovation: a longitudinal study publication-title: Administrative Science Quarterly – volume: 15 start-page: 9 year: 1996 end-page: 52 ident: bib39 article-title: Sufficient grounds for optimism? The relationship between perceived controllability and optimistic bias publication-title: Journal of Social and Clinical Psychology – year: 1951 ident: bib51 article-title: A philosophical essay on probabilities – volume: 37 start-page: 36 year: 1983 end-page: 48 ident: bib28 article-title: A leisurely look at the bootstrap, the jackknife, and cross-validation publication-title: The American Statistician – volume: 36 start-page: 422 year: 1990 end-page: 435 ident: bib58 article-title: Characteristics of risk taking executives publication-title: Management Science – volume: 33 start-page: 1404 year: 1987 end-page: 1418 ident: bib59 article-title: Managerial perspectives on risk and risk taking publication-title: Management Science – volume: 50 start-page: 502 year: 1986 end-page: 510 ident: bib70 article-title: Self-other judgments and perceived vulnerability to victimization publication-title: Journal of Personality and Social Psychology – volume: 81 start-page: 18 year: 2003 end-page: 20 ident: bib63 article-title: Best practice: are you the weak link? publication-title: Harvard Business Review – year: 1986 ident: bib55 article-title: LVPLS 1.8: latent variables path analysis with partial least squares estimations. Program manual – volume: 8 start-page: 31 year: 2000 end-page: 41 ident: bib77 article-title: A conceptual foundation for organizational information security awareness publication-title: Information Management and Computer Security – volume: 7 start-page: 1 year: 2001 end-page: 18 ident: bib71 article-title: CSI/FBI computer crime and security survey publication-title: Computer Security Issues and Trends – year: 2002 ident: bib84 article-title: System reliability and free riding publication-title: Proceedings of the First Workshop on the Economics of Information Security – start-page: 7 year: 1986 end-page: 24 ident: bib83 article-title: The social identity theory of inter-group behavior publication-title: Psychology of inter-group relations – volume: 26 start-page: 231 year: 2003 end-page: 249 ident: bib49 article-title: Interdependent security publication-title: Journal of Risk and Uncertainty – year: 2004 ident: bib8 article-title: Directory of Top Computer Executives: Spring 2004 Western U.S. Edition – year: 2008 ident: bib75 article-title: Technical guide to information security testing and assessment – volume: 81 start-page: 56 year: 2003 end-page: 63 ident: bib57 article-title: Delusions of success: how optimism undermines executives’ decisions publication-title: Harvard Business Review – volume: 9 start-page: 161 year: 1994 end-page: 180 ident: bib76 article-title: Optimism, vulnerability, and self-beliefs as health-related cognitions: a systematic overview publication-title: Psychology and Health – volume: 39 start-page: 806 year: 1980 end-page: 820 ident: bib86 article-title: Unrealistic optimism about future life events publication-title: Journal of Personality and Social Psychology – volume: 2 start-page: 245 year: 1987 end-page: 249 ident: bib15 article-title: Comparing social learning theory and the health belief model publication-title: Advances in Health Education and Promotion – volume: 48 start-page: 710 year: 2005 end-page: 720 ident: bib82 article-title: Network effects revisited: the role of strong ties in technology adoption publication-title: Academy of Management Journal – volume: 7 start-page: 117 year: 1954 end-page: 140 ident: bib31 article-title: A theory of social comparison process publication-title: Human Relations – year: 2003 ident: bib27 article-title: The dynamics of organizational information security publication-title: Proceedings of the Twenty Fourth International Conference on Information System: 921–927 Seattle, WA – volume: 17 start-page: 437 year: 2002 end-page: 466 ident: bib48 article-title: Perceived controllability and the optimistic bias: a meta-analytic review publication-title: Psychology and Health – volume: 1 start-page: 255 year: 1990 end-page: 276 ident: bib80 article-title: Effective IS security: an empirical study publication-title: Information Systems Research – volume: 13 start-page: 1 year: 1984 end-page: 55 ident: bib72 article-title: The selection of disputes for litigation publication-title: The Journal of Legal Studies – volume: 16 start-page: 3 year: 2008 end-page: 21 ident: bib34 article-title: Curbing optimism bias and strategic misrepresentation in planning: reference class forecasting in practice publication-title: European Planning Studies – year: 2000 ident: bib20 article-title: Pricing security publication-title: Proceedings of the Third CERT Information Survivability Workshop: 31–39, Boston, MA – volume: 3 start-page: 97 year: 1988 end-page: 108 ident: bib23 article-title: Entrepreneurs’ perceived chances for success publication-title: Journal of Business Venturing – volume: 106 start-page: 231 year: 1989 end-page: 248 ident: bib90 article-title: Theory and research concerning social comparisons of personal attributes publication-title: Psychological Bulletin – volume: 32 start-page: 311 year: 1975 end-page: 328 ident: bib50 article-title: The illusion of control publication-title: Journal of Personality and Social Psychology – year: 2002 ident: bib64 article-title: The art of deception: controlling the human element of security – volume: 2 start-page: 245 year: 1987 ident: 10.1016/j.cose.2011.12.001_bib15 article-title: Comparing social learning theory and the health belief model publication-title: Advances in Health Education and Promotion – volume: 11 start-page: 127 year: 2001 ident: 10.1016/j.cose.2011.12.001_bib25 article-title: Current directions in IS security research: toward socio-organizational perspectives publication-title: Information Systems Journal doi: 10.1046/j.1365-2575.2001.00099.x – volume: 23 start-page: 291 year: 1993 ident: 10.1016/j.cose.2011.12.001_bib44 article-title: Social comparison of health risks: locus of control, the person-positivity bias, and unrealistic optimism publication-title: Journal of Applied Social Psychology doi: 10.1111/j.1559-1816.1993.tb01088.x – year: 2002 ident: 10.1016/j.cose.2011.12.001_bib84 article-title: System reliability and free riding – volume: 84 start-page: 888 year: 1977 ident: 10.1016/j.cose.2011.12.001_bib5 article-title: Attitude-behavior relations: a theoretical analysis and review of empirical research publication-title: Psychological Bulletin doi: 10.1037/0033-2909.84.5.888 – volume: 34 start-page: 233 year: 1984 ident: 10.1016/j.cose.2011.12.001_bib91 article-title: The influence of a perceived event’s controllability on its subjective occurrence probability publication-title: The Psychological Record doi: 10.1007/BF03394867 – year: 1989 ident: 10.1016/j.cose.2011.12.001_bib56 – volume: 16 start-page: 173 issue: 2 year: 1992 ident: 10.1016/j.cose.2011.12.001_bib53 article-title: Threats to information systems: today’s reality, yesterday’s understanding publication-title: MIS Quarterly doi: 10.2307/249574 – volume: 9 start-page: 161 year: 1994 ident: 10.1016/j.cose.2011.12.001_bib76 article-title: Optimism, vulnerability, and self-beliefs as health-related cognitions: a systematic overview publication-title: Psychology and Health doi: 10.1080/08870449408407475 – volume: 39 start-page: 806 year: 1980 ident: 10.1016/j.cose.2011.12.001_bib86 article-title: Unrealistic optimism about future life events publication-title: Journal of Personality and Social Psychology doi: 10.1037/0022-3514.39.5.806 – volume: 45 start-page: 425 year: 2000 ident: 10.1016/j.cose.2011.12.001_bib2 article-title: Collaboration networks, structural holes, and innovation: a longitudinal study publication-title: Administrative Science Quarterly doi: 10.2307/2667105 – volume: 8 start-page: 31 year: 2000 ident: 10.1016/j.cose.2011.12.001_bib77 article-title: A conceptual foundation for organizational information security awareness publication-title: Information Management and Computer Security doi: 10.1108/09685220010371394 – volume: 90 start-page: 245 year: 1981 ident: 10.1016/j.cose.2011.12.001_bib89 article-title: Downward comparison principles in social psychology publication-title: Psychological Bulletin doi: 10.1037/0033-2909.90.2.245 – year: 2002 ident: 10.1016/j.cose.2011.12.001_bib21 – volume: 15 start-page: 9 year: 1996 ident: 10.1016/j.cose.2011.12.001_bib39 article-title: Sufficient grounds for optimism? The relationship between perceived controllability and optimistic bias publication-title: Journal of Social and Clinical Psychology doi: 10.1521/jscp.1996.15.1.9 – volume: 81 start-page: 18 year: 2003 ident: 10.1016/j.cose.2011.12.001_bib63 article-title: Best practice: are you the weak link? publication-title: Harvard Business Review – year: 2002 ident: 10.1016/j.cose.2011.12.001_bib4 – year: 2004 ident: 10.1016/j.cose.2011.12.001_bib7 – year: 2004 ident: 10.1016/j.cose.2011.12.001_bib8 – volume: 21 start-page: 402 year: 2002 ident: 10.1016/j.cose.2011.12.001_bib42 article-title: Information security policy: what do international security standards say? publication-title: Computers and Security doi: 10.1016/S0167-4048(02)00504-7 – volume: 12 start-page: 35 issue: 4 year: 1996 ident: 10.1016/j.cose.2011.12.001_bib47 article-title: An integrative study of information systems security effectiveness publication-title: International Journal of Information Systems – volume: 10 start-page: 385 year: 1984 ident: 10.1016/j.cose.2011.12.001_bib52 article-title: Acquisition of relative performance information: the roles of intrapersonal and interpersonal comparison publication-title: Personality and Social Psychology Bulletin doi: 10.1177/0146167284103006 – volume: 11 start-page: 109 issue: 1 year: 1997 ident: 10.1016/j.cose.2011.12.001_bib11 article-title: Explaining bargaining impasse: the role of self-serving biases publication-title: The Journal of Economic Perspectives doi: 10.1257/jep.11.1.109 – volume: 43 start-page: 5 year: 1982 ident: 10.1016/j.cose.2011.12.001_bib12 article-title: Microanalysis and fear arousal as a function of differential levels of perceived self-efficacy publication-title: Journal of Personality and Social Psychology doi: 10.1037/0022-3514.43.1.5 – volume: 58 start-page: 472 year: 1990 ident: 10.1016/j.cose.2011.12.001_bib68 article-title: Mechanisms governing empowerment effects: a self-efficacy analysis publication-title: Journal of Personality and Social Psychology doi: 10.1037/0022-3514.58.3.472 – year: 1995 ident: 10.1016/j.cose.2011.12.001_bib78 – year: 2002 ident: 10.1016/j.cose.2011.12.001_bib64 – volume: 1 start-page: 255 issue: 3 year: 1990 ident: 10.1016/j.cose.2011.12.001_bib80 article-title: Effective IS security: an empirical study publication-title: Information Systems Research doi: 10.1287/isre.1.3.255 – volume: 20 start-page: 13 year: 1991 ident: 10.1016/j.cose.2011.12.001_bib37 article-title: Security concerns of system users: a study of perceptions of the adequacy of security publication-title: Information & Management doi: 10.1016/0378-7206(91)90024-V – volume: 22 start-page: 441 issue: 4 year: 1998 ident: 10.1016/j.cose.2011.12.001_bib81 article-title: Coping with systems risk: security planning models for management decision making publication-title: MIS Quarterly doi: 10.2307/249551 – volume: 65 start-page: 781 year: 1993 ident: 10.1016/j.cose.2011.12.001_bib69 article-title: What motivates children’s behavior and emotion? The joint effects of perceived control and autonomy in the academic domain publication-title: Journal of Personality and Social Psychology doi: 10.1037/0022-3514.65.4.781 – year: 1999 ident: 10.1016/j.cose.2011.12.001_bib1 – volume: 67 start-page: 366 year: 1994 ident: 10.1016/j.cose.2011.12.001_bib19 article-title: Exploring the “planning fallacy”: why people underestimate their task completion time publication-title: Journal of Personality and Social Psychology doi: 10.1037/0022-3514.67.3.366 – volume: 7 start-page: 117 year: 1954 ident: 10.1016/j.cose.2011.12.001_bib31 article-title: A theory of social comparison process publication-title: Human Relations doi: 10.1177/001872675400700202 – volume: 84 start-page: 39 year: 1993 ident: 10.1016/j.cose.2011.12.001_bib61 article-title: It won’t happen to me: unrealistic optimism or illusion of control? publication-title: British Journal of Psychology doi: 10.1111/j.2044-8295.1993.tb02461.x – volume: 16 start-page: 3 issue: 1 year: 2008 ident: 10.1016/j.cose.2011.12.001_bib34 article-title: Curbing optimism bias and strategic misrepresentation in planning: reference class forecasting in practice publication-title: European Planning Studies doi: 10.1080/09654310701747936 – volume: 68 start-page: 804 year: 1995 ident: 10.1016/j.cose.2011.12.001_bib3 article-title: Personal contact, individuation, and the better-than-average effect publication-title: Journal of Personality and Social Psychology doi: 10.1037/0022-3514.68.5.804 – volume: 19 start-page: 440 year: 1982 ident: 10.1016/j.cose.2011.12.001_bib32 article-title: Two structural equation models: LISREL and PLS applied to consumer exit-voice theory publication-title: Journal of Marketing Research doi: 10.2307/3151718 – volume: 36 start-page: 422 year: 1990 ident: 10.1016/j.cose.2011.12.001_bib58 article-title: Characteristics of risk taking executives publication-title: Management Science doi: 10.1287/mnsc.36.4.422 – volume: 50 start-page: 502 year: 1986 ident: 10.1016/j.cose.2011.12.001_bib70 article-title: Self-other judgments and perceived vulnerability to victimization publication-title: Journal of Personality and Social Psychology doi: 10.1037/0022-3514.50.3.502 – volume: 14 start-page: 475 issue: 4 year: 1991 ident: 10.1016/j.cose.2011.12.001_bib65 article-title: Information systems management issues for the 1990s publication-title: MIS Quarterly doi: 10.2307/249452 – volume: 21 start-page: 301 year: 1999 ident: 10.1016/j.cose.2011.12.001_bib9 article-title: Different perceptions of control: applying an extended theory of planned behavior to legal and illegal drug use publication-title: Basic and Applied Social Psychology doi: 10.1207/S15324834BASP2104_4 – volume: 3 start-page: 97 year: 1988 ident: 10.1016/j.cose.2011.12.001_bib23 article-title: Entrepreneurs’ perceived chances for success publication-title: Journal of Business Venturing doi: 10.1016/0883-9026(88)90020-1 – year: 2003 ident: 10.1016/j.cose.2011.12.001_bib27 article-title: The dynamics of organizational information security – year: 1998 ident: 10.1016/j.cose.2011.12.001_bib35 – volume: 15 start-page: 53 year: 1996 ident: 10.1016/j.cose.2011.12.001_bib43 article-title: Self-favoring biases for positive and negative characteristics: independent phenomena? publication-title: Journal of Social and Clinical Psychology doi: 10.1521/jscp.1996.15.1.53 – volume: 26 start-page: 1213 year: 1996 ident: 10.1016/j.cose.2011.12.001_bib74 article-title: Absolute and relative biases in estimations of personal risk publication-title: Journal of Applied Social Psychology doi: 10.1111/j.1559-1816.1996.tb01778.x – year: 1999 ident: 10.1016/j.cose.2011.12.001_bib36 – year: 2004 ident: 10.1016/j.cose.2011.12.001_bib6 – year: 2004 ident: 10.1016/j.cose.2011.12.001_bib33 – year: 2005 ident: 10.1016/j.cose.2011.12.001_bib45 – volume: 26 start-page: 231 year: 2003 ident: 10.1016/j.cose.2011.12.001_bib49 article-title: Interdependent security publication-title: Journal of Risk and Uncertainty doi: 10.1023/A:1024119208153 – volume: 7 start-page: 1 issue: 2 year: 2001 ident: 10.1016/j.cose.2011.12.001_bib71 article-title: CSI/FBI computer crime and security survey publication-title: Computer Security Issues and Trends – volume: 51 start-page: 71 year: 1977 ident: 10.1016/j.cose.2011.12.001_bib10 article-title: Estimating non-response bias in mail surveys publication-title: Journal of Marketing – year: 2009 ident: 10.1016/j.cose.2011.12.001_bib73 – volume: 22 start-page: 135 issue: 1 year: 1993 ident: 10.1016/j.cose.2011.12.001_bib54 article-title: Self-serving assessment of fairness and pretrial bargaining publication-title: The Journal of Legal Studies doi: 10.1086/468160 – volume: vol. 12 start-page: 313 year: 1979 ident: 10.1016/j.cose.2011.12.001_bib46 article-title: Intuitive prediction: biases and corrective procedures – year: 1998 ident: 10.1016/j.cose.2011.12.001_bib22 article-title: The partial least squares approach for structural equation modeling – volume: 13 start-page: 1 issue: 1 year: 1984 ident: 10.1016/j.cose.2011.12.001_bib72 article-title: The selection of disputes for litigation publication-title: The Journal of Legal Studies doi: 10.1086/467732 – volume: 11 start-page: 205 issue: 4 year: 1989 ident: 10.1016/j.cose.2011.12.001_bib79 article-title: Computer security—threats, vulnerabilities and countermeasures publication-title: Information Age – volume: 48 start-page: 710 issue: 4 year: 2005 ident: 10.1016/j.cose.2011.12.001_bib82 article-title: Network effects revisited: the role of strong ties in technology adoption publication-title: Academy of Management Journal doi: 10.5465/AMJ.2005.17843947 – volume: 82 start-page: 213 year: 1975 ident: 10.1016/j.cose.2011.12.001_bib62 article-title: Self-serving biases in attribution of causality: fact or fiction? publication-title: Psychological Bulletin doi: 10.1037/h0076486 – start-page: 11 year: 1987 ident: 10.1016/j.cose.2011.12.001_bib60 article-title: Generic comparison processes in human judgment and behavior – volume: 33 start-page: 1404 year: 1987 ident: 10.1016/j.cose.2011.12.001_bib59 article-title: Managerial perspectives on risk and risk taking publication-title: Management Science doi: 10.1287/mnsc.33.11.1404 – volume: 106 start-page: 231 year: 1989 ident: 10.1016/j.cose.2011.12.001_bib90 article-title: Theory and research concerning social comparisons of personal attributes publication-title: Psychological Bulletin doi: 10.1037/0033-2909.106.2.231 – start-page: 241 year: 1989 ident: 10.1016/j.cose.2011.12.001_bib14 article-title: Logical control specifications: an approach to information systems security – year: 1986 ident: 10.1016/j.cose.2011.12.001_bib55 – year: 2000 ident: 10.1016/j.cose.2011.12.001_bib20 article-title: Pricing security – volume: 21 start-page: 333 year: 1989 ident: 10.1016/j.cose.2011.12.001_bib24 article-title: The optimistic bias and traffic accident perception publication-title: Accident Analysis and Prevention doi: 10.1016/0001-4575(89)90024-9 – year: 2005 ident: 10.1016/j.cose.2011.12.001_bib29 article-title: What type of disputes are best suited for alternative dispute resolution—an analysis in the space of the odds of litigation – year: 2004 ident: 10.1016/j.cose.2011.12.001_bib30 – volume: 17 start-page: 475 year: 1991 ident: 10.1016/j.cose.2011.12.001_bib16 article-title: The social self: on being the same and different at the same time publication-title: Personality and Social Psychology Bulletin doi: 10.1177/0146167291175001 – volume: 32 start-page: 311 year: 1975 ident: 10.1016/j.cose.2011.12.001_bib50 article-title: The illusion of control publication-title: Journal of Personality and Social Psychology doi: 10.1037/0022-3514.32.2.311 – volume: 10 start-page: 481 year: 1987 ident: 10.1016/j.cose.2011.12.001_bib87 article-title: Unrealistic optimism about susceptibility to health problems: conclusions from a community-wide sample publication-title: Journal of Behavioral Medicine doi: 10.1007/BF00846146 – year: 2004 ident: 10.1016/j.cose.2011.12.001_bib26 – volume: 19 start-page: 337 year: 2000 ident: 10.1016/j.cose.2011.12.001_bib66 article-title: Implementing information security in the 21st century: do you have the balancing factors? publication-title: Computers and Security doi: 10.1016/S0167-4048(00)04021-9 – volume: 4 start-page: 353 year: 1986 ident: 10.1016/j.cose.2011.12.001_bib17 article-title: Evaluations of self and others: self enhancement biases in social judgments publication-title: Social Cognition doi: 10.1521/soco.1986.4.4.353 – volume: 17 start-page: 437 year: 2002 ident: 10.1016/j.cose.2011.12.001_bib48 article-title: Perceived controllability and the optimistic bias: a meta-analytic review publication-title: Psychology and Health doi: 10.1080/0887044022000004920 – volume: 63 start-page: 329 year: 1995 ident: 10.1016/j.cose.2011.12.001_bib85 article-title: Self evaluation processes: motives, information use, and self-esteem publication-title: Journal of Personality doi: 10.1111/j.1467-6494.1995.tb00315.x – year: 1998 ident: 10.1016/j.cose.2011.12.001_bib38 – volume: 15 start-page: 1 year: 1996 ident: 10.1016/j.cose.2011.12.001_bib88 article-title: Unrealistic optimism: present and future publication-title: Journal of Social and Clinical Psychology doi: 10.1521/jscp.1996.15.1.1 – start-page: 7 year: 1986 ident: 10.1016/j.cose.2011.12.001_bib83 article-title: The social identity theory of inter-group behavior – volume: 33 start-page: 319 year: 1994 ident: 10.1016/j.cose.2011.12.001_bib40 article-title: The illusion of control and optimism about health: on being less at risk but no more in control than others publication-title: British Journal of Social Psychology doi: 10.1111/j.2044-8309.1994.tb01035.x – volume: 20 start-page: 413 year: 2000 ident: 10.1016/j.cose.2011.12.001_bib13 article-title: Determinants of priority for risk reduction: the role of worry publication-title: Risk Analysis doi: 10.1111/0272-4332.204041 – volume: 5 start-page: 74 year: 2001 ident: 10.1016/j.cose.2011.12.001_bib41 article-title: Do moderators of the optimistic bias affect personal or target risk estimates? A review of the literature publication-title: Personality and Social Psychology Review doi: 10.1207/S15327957PSPR0501_5 – volume: 37 start-page: 36 year: 1983 ident: 10.1016/j.cose.2011.12.001_bib28 article-title: A leisurely look at the bootstrap, the jackknife, and cross-validation publication-title: The American Statistician doi: 10.2307/2685844 – year: 2008 ident: 10.1016/j.cose.2011.12.001_bib75 – year: 1951 ident: 10.1016/j.cose.2011.12.001_bib51 – volume: 81 start-page: 56 issue: 7 year: 2003 ident: 10.1016/j.cose.2011.12.001_bib57 article-title: Delusions of success: how optimism undermines executives’ decisions publication-title: Harvard Business Review – volume: 80 start-page: 325 year: 1992 ident: 10.1016/j.cose.2011.12.001_bib67 article-title: Risk and behavior: the mediating role of risk appraisal publication-title: Acta Psychologica doi: 10.1016/0001-6918(92)90054-H |
SSID | ssj0017688 |
Score | 2.3123503 |
Snippet | Information security is a critical issue that many firms face these days. While increasing incidents of information security breaches have generated extensive... |
SourceID | proquest crossref elsevier |
SourceType | Aggregation Database Enrichment Source Index Database Publisher |
StartPage | 221 |
SubjectTerms | Awareness Bias Commitments Computer information security Controllability Data integrity Emission Information security Low level Management information systems Optimistic bias Perceived controllability Perception Perceptions Posture Risk management Risk perception Security management Studies |
Title | Unrealistic optimism on information security management |
URI | https://dx.doi.org/10.1016/j.cose.2011.12.001 https://www.proquest.com/docview/923242208 https://www.proquest.com/docview/1019648450 |
Volume | 31 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV07T8MwED6VsrDwRpRHFSQ2FOokjhuPCFEVECxQic2ynVgC0bSi7cpv5y5xIoEQA1sedhLd2feIP38HcG6lQa2mJtQi5yGXxoUZeuUwcuhbEplbWRXte3gU4wm_e0lfOnDd7IUhWKW3_bVNr6y1vzLw0hzMX18HTxWAnuhOiEaI0-b19TiRIu3C-tXt_fixXUzAiDprKb6xg987U8O8CBZeM3nSX0FfG-YX__TDUlfuZ7QNmz5uDK7qT9uBTlHuwlZTkyHwU3QPhhMcD0RqiO2CGdoD1OM0mJWBZ0glPQQLX7QumLbgl32YjG6er8ehL44Q2kSwZSiZSyJtcpFah4faamu4iYZmiBkYE7lAX6850xzTToNpQyK50DnR_ZmMWcGSA-iWs7I4hKBwjoqoW5cZw4UwpmAUJsVSOIfmgPcgakSirGcOpwIW76qBiL0pEqMiMaooJpxcDy7aPvOaN-PP1mkjafVN-woN-5_9jhu1KD_3FkpWQWLMsh6ctXdR2LQSostitlrQ46TgGU_Z0T_ffAwbeBbXaLQT6C4_VsUphidL04e1y8-o7wfhF2Qw4o4 |
linkProvider | Elsevier |
linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV3PT4MwFG6WedCLv41z_sDEm8GVUQo9msVl6raLW7JbQwtNZhwsbrv6t_seFBKN2cEbgRbIe-33XuHr9wi500KBVwPlxjxhLhPKuBFEZdczEFt8kWhRFO0bjflgyl5mwaxBetVeGKRVWuwvMb1Aa3umY63ZWc7nnbeCQI9yJygjxHDz-g4L_BB5fQ9fNc_Dg3w6qgW-obndOVOSvJAUXup44jdBWxnmj-j0C6eL4NM_JPs2a3Qeyxc7Io00OyYHVUUGx07QExJOYTSgpCG0c3JAA_Diwskzx-qjoheclS1Z5yxq6sspmfafJr2Ba0sjuNrndO0KanwvVgkPtIHDWMdaMeWFKoT1F-UJh0gfMxozWHQqWDT4gvE4QbE_FVHNqX9GmlmepefESY3BEuraREoxzpVKKSZJXcGNATBgLeJVJpHa6oZj-YoPWRHE3iWaUaIZpddFllyL3Nd9lqVqxtbWQWVp-cP3EmB9a7925RZpZ95KiiJF7NKoRW7rq2Bs_A8SZ2m-WeHtBGcRC-jFP598Q3YHk9FQDp_Hr22yB1e6JS_tkjTXn5v0ChKVtbouBuI3SljjWQ |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Unrealistic+optimism+on+information+security+management&rft.jtitle=Computers+%26+security&rft.au=Rhee%2C+Hyeun-Suk&rft.au=Ryu%2C+Young+U&rft.au=Kim%2C+Cheong-Tag&rft.date=2012-03-01&rft.issn=0167-4048&rft.volume=31&rft.issue=2&rft.spage=221&rft.epage=232&rft_id=info:doi/10.1016%2Fj.cose.2011.12.001&rft.externalDBID=NO_FULL_TEXT |
thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=0167-4048&client=summon |
thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=0167-4048&client=summon |
thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=0167-4048&client=summon |