Home   >   CSC-OpenAccess Library   >    Manuscript Information
Full Text Available

This is an Open Access publication published under CSC-OpenAccess Policy.
An Exploratory Study of the Security Management Practices of Hispanic Students
Yi-Chia Wu, Francis Kofi Andoh-Baidoo, Robert Crossler, Jesus Tanguma
Pages - 13 - 21     |    Revised - 01-05-2011     |    Published - 31-05-2011
Volume - 5   Issue - 1    |    Publication Date - May / June 2011  Table of Contents
Non-Operating System Software, Users’ Security Management, Security Practices, Antivirus Software, software Update, Hispanic
The growing Internet and mobile technologies create opportunities for efficient communication and coordination among individuals and institutions. However, these technologies also pose security challenges. Although users’ understanding and behavior towards security solutions have been recognized as critical to ensuring effective security solutions, few research articles have examined user security management practices. The literature lacks empirical research that examines users’ everyday behavior and practices to managing security. In an effort to bridge the gap in user security management practices, this paper presents an exploratory study of how Hispanic college students manage the security of their computer systems. Specifically, we examine how ethnicity, gender, and age influence users’ behavior towards updating their operating systems, non-operating system software and antivirus definitions. The results reveal that gender influences the frequency of updating operating systems, antivirus definitions and non-operating system software, whereas ethnicity and age influence only frequency of update of operating systems but not the frequency of update of non-operating system software and antivirus definitions.
CITED BY (1)  
1 Muhammad, J. (2013). Exploring the automatic identi?cation and resolution of software vulnerabilities in grid-based environments (Doctoral dissertation, University of Glasgow).
1 Directory of Open Access Journals (DOAJ)
2 Google Scholar
3 CiteSeerX
4 refSeek
6 Scribd
7 slideshare
8 PdfSR
1 P. Dourish, R.E. Grinter, J.D.D.L Flor, and M. Joseph. Security in the wild: user strategies for managing security as an everyday, practical problem. Personal Ubiquitous Computing,vol. 8, pp. 391401, 2004.
2 B. Friedman, D. Hurley, D. Howe, E. Felten, and H. Nissenbaum. Users Conceptions of Web Security: A Comparative Study, Short paper presented at ACM Conf. Human Factors in Computing Systems CHI, Minneapolis, MN, USA, 2002.
3 J. Rimmer, I. Wakeman, L. Sheeran and M.A. Sasse. Examining users repertoire of internet applications, In Sasse and Johnson (eds), Human-Computer Interaction: Proc. of Interact99, 1999.
4 L. Sheeran, M.A. Sasse, J. Rimmer and I. Wakeman. (2002). "How Web browsers shape users understanding of networks." Electronic Library, The. [On-line]. 20(1), pp. 35-42.Available:http://www.emeraldinsight.com/journals.htm?articleid=861950 [Jan. 31, 2011].
5 D. Weirich and M.A. Sasse. Pretty good persuasion: a first step towards effective password security for the real world, In: Proc. of the ACM new security paradigms workshop (NSPW2001), Cloudcroft, New Mexico, ACM Press, New York, 2001, pp. 137143.
6 S. Fox and G. Livingston. Latinos Online: Hispanics with Lower Levels of Education and English Proficiency Remain Largely Disconnected from the Internet. Internet:http://www.eric.ed.gov/PDFS/ED495954.pdf, Mar. 14, 2007 [Jan. 22, 2011].
7 Home network security. United States Computer Emergency Readiness Team. Internet:http://www.us-cert.gov/reading_room/home-network-security/#IV-A-7, Dec. 5, 2001 [Jan.25, 2011].
8 J. Antman. Patch Management: An Overview. Internet:http://rutgerswork.jasonantman.com/antman-patchManagement.pdf, Dec. 10, 2008,[January 21, 2011]
9 Updating non-operating system software, Updating non-operating system software to prevent security compromises. Internet: UCSF ITS, University of California, San Francisco:http://security.ucsf.edu/EIS/BestPractices/Staff/StaffUpdatingSoftware.html, 2010 [Jan. 25,2011]
10 D. Brandl. (2008). DONA forget about security. Control Engineering. 55 (12), pp.14.
11 C. Higby and M. Bailey. Wireless security patch management system, in Proc. of the 5th conference on Information technology education, Salt Lake City, UT, USA: ACM, 2004.
12 S.M. Furnell, P. Bryant, and A.D. Phippen. (2007). Assessing the security perceptions of personal Internet users. Computers & Security. [On-line] 26 (5), pp. 410-417. Available:http://www.sciencedirect.com/science/article/B6V8G-4N6NJTT-1/2/492a40cf1c60d7fbf02f0bdc01c3f609 [Jan. 25, 2011].
13 M.L. Meuter, M.J. Bitner, A.L. Ostrom and S.W. Brown. Choosing among alternative service delivery modes: An investigation of customer trial of self-service technologies.Journal of Marketing, vol. 69(2), pp. 61-83, 2005.
14 S. Fox and G. Livingston.Latinos Online: 2006-2008: Narrowing the Gap. Internet:http://pewhispanic.org/reports/report.php?ReportID=119, Dec. 22, 2009 [Jan. 22, 2011].
15 K. Humes, N. A. Jones and R.R. Ramirez. Overview of Race and Hispanic Origin: 2010,2010 Census Briefs. Internet: http://www.census.gov/prod/cen2010/briefs/c2010br-02.pdf,Mar. 2011 [Jan. 22, 2011]
16 E.M. Grieco and R.C. Cassidy. United State Overview of Race and Hispanic Origin:Census 2000 Brief. Internet: http://www.census.gov/prod/2001pubs/cenbr01-1.pdf, Mar.,2001 [Jan. 22, 2011].
17 R. Crossler, M. A. Villarreal, and F. K. Andoh-Baidoo. A Preliminary Study Examining the Security Practices of Hispanic College Students. SouthWest Decision Science Institute,2011.
Dr. Yi-Chia Wu
- United States of America
Dr. Francis Kofi Andoh-Baidoo
- United States of America
Mr. Robert Crossler
- United States of America
Mr. Jesus Tanguma
- United States of America