Development of Chinese Version of Self-efficacy in Information Security Scale: Validity and Reliability Analyses

  • Wang Caihong ,
  • Xue Longyan
Expand
  • 1. Library of Zhejiang University of Science and Technology, Hangzhou 310023;
    2. Library of Lanzhou Jiaotong University, Lanzhou 730070

Received date: 2015-02-26

  Revised date: 2015-03-20

  Online published: 2015-04-05

Abstract

[Purpose/significance] Self-efficacy in information security(SEIS) is an important part of information literacy because they influence people's security awareness, emotions and actions. However, a self-efficacy measure which might appropriately reflect one's SEIS is still lacking in the domestic literature. To address this research gap, the current study developed a Chinese version of SEIS scale and tested its validity and reliability. [Method/process] The study was conducted in two phases. Phase I was the process of translation and revision of Rhee's version. Phase II was a cross-sectional study. The survey data was used to assess the validity and reliability of the Chinese version. [Result/conclusion] The Cronbach's alpha and the split-half reliability of the scale were 0.870 and 0.857, respectively. The construct validity, the single dimensional model was explained total variance was 44.16% by the exploratory factor analysis and the confirmatory factor analysis illustrated the single dimensional model was reasonable to be accepted. The research results show the reliability and validity of the Chinese version of SEIS scale which satisfy the need of the study and could be of practical application.

Cite this article

Wang Caihong , Xue Longyan . Development of Chinese Version of Self-efficacy in Information Security Scale: Validity and Reliability Analyses[J]. Library and Information Service, 2015 , 59(7) : 117 -122 . DOI: 10.13266/j.issn.0252-3116.2015.07.016

References

[1] Mackenzie K. Employees may be opening the door to criminals[EB/OL].[2015-01-11]. http://www.ft.com/intl/cms/s/2/458807fe-efec-11da-b80e-0000779e2340.html.
[2] Aytes K, Connolly T. Computer security and risky computing practices: A rational choice perspective[J]. Journal of Organizational and End User Computing,2004,16(3):22-40.
[3] Rhee H S, Kim C, Ryu Y U. Self-efficacy in information security: Its influence on end users' information security practice behavior[J].Computers & Security,2009,28(8):816-826.
[4] Bandura A. Self-efficacy mechanism in human agency[J]. American Psychologist,1982,37(2):122-147.
[5] Bandura A. Perceived self-efficacy in cognitive development and functioning[J]. Educational Psychologist,1993,28(2):117-148.
[6] Pajares F. Overview of social cognitive theory and self-efficacy[EB/OL].[2015-02-08]. http://www.uky.edu/~eushe2/Pajares/eff.html.
[7] Kurbanoglu S. Self-efficacy: A concept closely linked to information literacy and lifelong learning[J]. Journal of Documentation, 2003,59(6):635-646.
[8] Pajares F. Gender and perceived self-efficacy in self-regulated learning[J]. Theory into Practice,2002,41(2):116-125.
[9] Davis F D,Bagozzi R P, Warshaw P R. User acceptance of computer technology: A comparison of two theoretical models[J]. Management Science,1989,35(8):982-1003.
[10] Compeau D R, Higgins C A. Computer self-efficacy: Development of a measure and initial test[J]. MIS Quarterly,1995,19(2):189-211.
[11] Kuhlthau C C. A principle of uncertainty for information seeking[J]. Journal of Documentation,1993,49(4):339-355.
[12] Wilson T D. Models in information behaviour research[J]. Journal of Documentation,1999,55(3):249-270.
[13] Hinson J, DiStefano C, Daniel C. The Internet self-perception scale: Measuring elementary students' levels of self-efficacy regarding Internet use[J]. Journal of Educational Computing Research,2003,29(2):209-228.
[14] Kurbanoglu S, Akkoyunlu B, Umay A. Developing the information literacy self-efficacy scale[J]. Journal of Documentation, 2006, 62(6):730-743.
[15] 吴晓伟,娜日,李丹,等. 面向应用型本科大学生信息素养能力量表设计研究[J]. 现代情报, 2011,31(8):73-78.
[16] 于雅楠,顾萍,韩玺,等. 信息检索课与大学生信息查寻自我效能关系的实证研究[J]. 图书馆建设,2014(10):83-87.
[17] 王军,李鑫. 自我效能对网评信息查寻行为的影响研究[J].图书情报工作,2014,58(14):110-114.
[18] Harrison A W, Rainer J R. The influence of individual differences on skill in end-user computing[J]. Journal of Management Information Systems,1992,9(1):92-111.
[19] 李红梅,刘喜波.相关原理在量表信度评价中的应用[J]. 数学的实践与认识,2009,3(18):248-252.
[20] Woodru S,Cashman J. Task,domain,and general efficacy: A re-examination of the self-efficacy scale[J]. Psychological Reports, 1993,72(3):423-432.

Outlines

/