Home   >   CSC-OpenAccess Library   >    Manuscript Information
An Exploratory Study of the Security Management Practices of Hispanic Students
Yi-Chia Wu, Francis Kofi Andoh-Baidoo, Robert Crossler, Jesus Tanguma
Pages - 13 - 21     |    Revised - 01-05-2011     |    Published - 31-05-2011
Volume - 5   Issue - 1    |    Publication Date - May / June 2011  Table of Contents
MORE INFORMATION
KEYWORDS
Non-Operating System Software, Users’ Security Management, Security Practices, Antivirus Software, software Update, Hispanic
ABSTRACT
The growing Internet and mobile technologies create opportunities for efficient communication and coordination among individuals and institutions. However, these technologies also pose security challenges. Although users’ understanding and behavior towards security solutions have been recognized as critical to ensuring effective security solutions, few research articles have examined user security management practices. The literature lacks empirical research that examines users’ everyday behavior and practices to managing security. In an effort to bridge the gap in user security management practices, this paper presents an exploratory study of how Hispanic college students manage the security of their computer systems. Specifically, we examine how ethnicity, gender, and age influence users’ behavior towards updating their operating systems, non-operating system software and antivirus definitions. The results reveal that gender influences the frequency of updating operating systems, antivirus definitions and non-operating system software, whereas ethnicity and age influence only frequency of update of operating systems but not the frequency of update of non-operating system software and antivirus definitions.
CITED BY (1)  
1 Muhammad, J. (2013). Exploring the automatic identi?cation and resolution of software vulnerabilities in grid-based environments (Doctoral dissertation, University of Glasgow).
1 Google Scholar 
2 CiteSeerX 
3 refSeek 
4 iSEEK 
5 Scribd 
6 SlideShare 
7 PdfSR 
“Home network security.” United States Computer Emergency Readiness Team. Internet:http://www.us-cert.gov/reading_room/home-network-security/#IV-A-7, Dec. 5, 2001 [Jan.25, 2011].
B. Friedman, D. Hurley, D. Howe, E. Felten, and H. Nissenbaum. “Users’ Conceptions of Web Security: A Comparative Study,” Short paper presented at ACM Conf. Human Factors in Computing Systems CHI, Minneapolis, MN, USA, 2002.
C. Higby and M. Bailey. “Wireless security patch management system,” in Proc. of the 5th conference on Information technology education, Salt Lake City, UT, USA: ACM, 2004.
D. Brandl. (2008). “‘DONA’ forget about security.” Control Engineering. 55 (12), pp.14.
D. Weirich and M.A. Sasse. “Pretty good persuasion: a first step towards effective password security for the real world,” In: Proc. of the ACM new security paradigms workshop (NSPW2001), Cloudcroft, New Mexico, ACM Press, New York, 2001, pp. 137–143.
E.M. Grieco and R.C. Cassidy. “United State Overview of Race and Hispanic Origin:Census 2000 Brief.” Internet: http://www.census.gov/prod/2001pubs/cenbr01-1.pdf, Mar.,2001 [Jan. 22, 2011].
J. Antman. “Patch Management: An Overview.” Internet:http://rutgerswork.jasonantman.com/antman-patchManagement.pdf, Dec. 10, 2008,[January 21, 2011]
J. Rimmer, I. Wakeman, L. Sheeran and M.A. Sasse. “Examining users’ repertoire of internet applications,” In Sasse and Johnson (eds), Human-Computer Interaction: Proc. of Interact’99, 1999.
K. Humes, N. A. Jones and R.R. Ramirez. “Overview of Race and Hispanic Origin: 2010,2010 Census Briefs.” Internet: http://www.census.gov/prod/cen2010/briefs/c2010br-02.pdf,Mar. 2011 [Jan. 22, 2011]
L. Sheeran, M.A. Sasse, J. Rimmer and I. Wakeman. (2002). "How Web browsers shape users’ understanding of networks." Electronic Library, The. [On-line]. 20(1), pp. 35-42.Available:http://www.emeraldinsight.com/journals.htm?articleid=861950 [Jan. 31, 2011].
M.L. Meuter, M.J. Bitner, A.L. Ostrom and S.W. Brown. “Choosing among alternative service delivery modes: An investigation of customer trial of self-service technologies.”Journal of Marketing, vol. 69(2), pp. 61-83, 2005.
P. Dourish, R.E. Grinter, J.D.D.L Flor, and M. Joseph. “Security in the wild: user strategies for managing security as an everyday, practical problem.” Personal Ubiquitous Computing,vol. 8, pp. 391–401, 2004.
R. Crossler, M. A. Villarreal, and F. K. Andoh-Baidoo. “A Preliminary Study Examining the Security Practices of Hispanic College Students.” SouthWest Decision Science Institute,2011.
S. Fox and G. Livingston. “Latinos Online: Hispanics with Lower Levels of Education and English Proficiency Remain Largely Disconnected from the Internet.” Internet:http://www.eric.ed.gov/PDFS/ED495954.pdf, Mar. 14, 2007 [Jan. 22, 2011].
S. Fox and G. Livingston.“Latinos Online: 2006-2008: Narrowing the Gap.” Internet:http://pewhispanic.org/reports/report.php?ReportID=119, Dec. 22, 2009 [Jan. 22, 2011].
S.M. Furnell, P. Bryant, and A.D. Phippen. (2007). “Assessing the security perceptions of personal Internet users.” Computers & Security. [On-line] 26 (5), pp. 410-417. Available:http://www.sciencedirect.com/science/article/B6V8G-4N6NJTT-1/2/492a40cf1c60d7fbf02f0bdc01c3f609 [Jan. 25, 2011].
Updating non-operating system software, “Updating non-operating system software to prevent security compromises.” Internet: UCSF ITS, University of California, San Francisco:http://security.ucsf.edu/EIS/BestPractices/Staff/StaffUpdatingSoftware.html, 2010 [Jan. 25,2011]
Dr. Yi-Chia Wu
- United States of America
Dr. Francis Kofi Andoh-Baidoo
- United States of America
Mr. Robert Crossler
- United States of America
Mr. Jesus Tanguma
- United States of America


CREATE AUTHOR ACCOUNT
 
LAUNCH YOUR SPECIAL ISSUE
View all special issues >>
 
PUBLICATION VIDEOS