| Literature DB >> 28725870 |
Abstract
The present study explored the relationship between risky cybersecurity behaviours, attitudes towards cybersecurity in a business environment, Internet addiction, and impulsivity. 538 participants in part-time or full-time employment in the UK completed an online questionnaire, with responses from 515 being used in the data analysis. The survey included an attitude towards cybercrime and cybersecurity in business scale, a measure of impulsivity, Internet addiction and a 'risky' cybersecurity behaviours scale. The results demonstrated that Internet addiction was a significant predictor for risky cybersecurity behaviours. A positive attitude towards cybersecurity in business was negatively related to risky cybersecurity behaviours. Finally, the measure of impulsivity revealed that both attentional and motor impulsivity were both significant positive predictors of risky cybersecurity behaviours, with non-planning being a significant negative predictor. The results present a further step in understanding the individual differences that may govern good cybersecurity practices, highlighting the need to focus directly on more effective training and awareness mechanisms.Entities:
Keywords: Psychology
Year: 2017 PMID: 28725870 PMCID: PMC5501883 DOI: 10.1016/j.heliyon.2017.e00346
Source DB: PubMed Journal: Heliyon ISSN: 2405-8440
Scale Items for the Risky Cybersecurity Behaviours Scale (RScB).
| Item | |
|---|---|
| 1 | Sharing passwords with friends and colleagues. |
| 2 | Using or creating passwords that are not very complicated (e.g. family name and date of birth). |
| 3 | Using the same password for multiple websites. |
| 4 | Using online storage systems to exchange and keep personal or sensitive information. |
| 5 | Entering payment information on websites that have no clear security information/certification |
| 6 | Using free-to-access public Wi-Fi |
| 7 | Relying on a trusted friend or colleague to advise you on aspects of online-security. |
| 8 | Downloading free anti-virus software from an unknown source. |
| 9 | Disabling the anti-virus on my work computer so that I can download information from websites. |
| 10 | Bringing in my own USB to work in order to transfer data onto it. |
| 11 | Checking that software for your smartphone/tablet/laptop/PC is up-to-date. |
| 12 | Downloading digital media (music, films, games) from unlicensed sources |
| 13 | Sharing my current location on social media. |
| 14 | Accepting friend requests on social media because you recognise the photo. |
| 15 | Clicking on links contained in unsolicited emails from an unknown source. |
| 16 | Sending personal information to strangers over the Internet. |
| 17 | Clicking on links contained in an email from a trusted friend or work colleague. |
| 18 | Checking for updates to any anti-virus software you have installed. |
| 19 | Downloading data and material from websites on my work computer without checking its authenticity. |
| 20 | Storing company information on my personal electronic device (e.g. smartphone/tablet/laptop) |
Indicates reverse scored items.
Scale items for the Attitudes towards Cybersecurity and Cybercrime Questionnaire (ATC-IB).
| Item | |
|---|---|
| 1 | I think that management have the responsibility to ensure a company is protected from cybercrime |
| 2 | I am aware of my role in keeping the company protected from potential cybercriminals. |
| 3 | I believe everyone in the company has a role to play in protecting against threats from cybercriminals. |
| 4 | It is hard to know how I can help protect the organisation from cybercrime. |
| 5 | I don't have the right skills to be able to protect the organisation from cybercrime. |
| 6 | I do not feel that IT security is a priority within my organisation. |
| 7 | Computer systems provide all the protection a company needs. |
| 8 | I think that reporting cybercrime is a waste of time. |
| 9 | The Police lack the capacity to deal with cybercrime effectively. |
| 10 | I believe that cybercriminals are more advanced than the people who are supposed to be protecting us. |
| 11 | I think that information provided by the Government and Police on cybercrime is not relevant to businesses.^ |
| 12 | I feel that the Police are far too busy to deal with cybercrime.^ |
| 13 | I worry that if I report a cyberattack to the Police it might damage the reputation of the company |
| 14 | I think more could be done to communicate the risks from cybercrime to individuals in the organisation. |
| 15 | I am aware of the company's IT use policy and attempt to follow it. |
| 16 | I would not know how to report a cyberattack if one happened. |
| 17 | I don't think that reporting a cyberattack on the company is my responsibility. |
| 18 | I don’t pay attention to company material about the threats from cybercrime. |
| 19 | I am confident that I would be able to spot the signs of a cyberattack. |
| 20 | I think the biggest threat for IT systems comes from people within the company. |
| 21 | I feel that any individual within the company are at risk of manipulation from confidence tricksters. |
| 22 | I think that cybercriminals only target a company when there is a substantial financial gain. |
| 23 | I believe only large companies are targeted by hackers and cybercriminals. |
| 24 | I feel that only companies that take payments using online systems are at risk of being victims of cybercrime.^ |
| 25 | I don't think I know who is responsible for protecting the company from cybercrime. |
^Indicates items that were omitted from the final scale due to poor inter-item correlation.
Indicates items that were reversed scored.
Correlations, means and standard deviations for key variables.
| Mean | SD | Imp Attention | Imp Motor | Imp Non-Planning | ATC-IB | OCS | |
|---|---|---|---|---|---|---|---|
| Imp Attention | 2.07 | 0.52 | – | ||||
| Imp Motor | 2.03 | 0.58 | .36 | – | |||
| Imp Non-Planning | 2.33 | 0.61 | .60 | .14 | – | ||
| ATC-IB | 60.19 | 7.31 | -.24 | -.24 | -.11 | – | |
| OCS | 119.30 | 37.44 | .21 | .35 | .00 | -.40 | – |
| RScB | 27.72 | 14.81 | .15 | .30 | -.30 | -30 | .36 |
p < 0.01 Level (2-tailed).
p < 0.5 Level (2-tailed).
Linear model for OCS and ATC-IB as predictors of Risky Cybersecurity Behaviours.
| 6.572 | 2.034 | .001 | ||
| .144 | .016 | .363 | .000 | |
| 32.888 | 6.532 | .000 | ||
| .144 | .017 | .289 | .000 | |
| -.379 | .089 | -.187 | .000 |
Note. R = .0.132 for Step 1; R = .161 for Step 2.
Linear model for ABIS Subscales as predictors of Risky Cybersecurity Behaviours.
| 9.307 | 3.173 | .004 | ||
| 3.727 | 1.598 | .130 | .020 | |
| 6.642 | 1.154 | .261 | .000 | |
| -2.902 | 1.274 | -.120 | .023 |
Note. R = .0.096.