EconPapers    
Economics at your fingertips  
 

User Acceptance of Speech-Enabled Technologies for Configuration of Computer and Network Security

Luse Andy, Mennecke Brian E. and Townsend Anthony M.

Journal of Information Privacy and Security, 2010, vol. 6, issue 4, 28-49

Abstract: Computer and network security administration has gained vital importance as online banking, corporate documents, and business to business transactions are now all carried out over computational networks. Designing security systems that satisfy the requirements of both network administrators and end-users brings with it the paradox of ease of use and absolute security. This research investigates the acceptance, by users, of speech recognition as a mechanism for alleviating computer and network security configuration. The study finds that, while the perceived usefulness of speech-enabled systems for security configuration leads to greater future intention to use the system, ease-of-use indirectly affects future use. This is a vital finding for developers of speech-enabled security configuration systems.

Date: 2010
References: Add references at CitEc
Citations:

Downloads: (external link)
http://hdl.handle.net/10.1080/15536548.2010.10855898 (text/html)
Access to full text is restricted to subscribers.

Related works:
This item may be available elsewhere in EconPapers: Search for items with the same title.

Export reference: BibTeX RIS (EndNote, ProCite, RefMan) HTML/Text

Persistent link: https://EconPapers.repec.org/RePEc:taf:uipsxx:v:6:y:2010:i:4:p:28-49

Ordering information: This journal article can be ordered from
http://www.tandfonline.com/pricing/journal/uips20

DOI: 10.1080/15536548.2010.10855898

Access Statistics for this article

Journal of Information Privacy and Security is currently edited by Chuleeporn Changchit

More articles in Journal of Information Privacy and Security from Taylor & Francis Journals
Bibliographic data for series maintained by Chris Longhurst ().

 
Page updated 2025-03-20
Handle: RePEc:taf:uipsxx:v:6:y:2010:i:4:p:28-49