| Literature DB >> 30540758 |
Carl F Weems1, Irfan Ahmed2, Golden G Richard3, Justin D Russell4, Erin L Neill1.
Abstract
Interest in the individual differences underlying end user computer security behavior has led to the development of a multidisciplinary field of research known as behavioral information security. An important gap in knowledge and the motivation for this research is the development of ways to measure secure and insecure cyber behavior for research and eventually practice. Here we report a study designed to develop a technique for assessing secure and insecure cyber behavior for broad research use. The Susceptibility and Resilience to Cyber Threat (SRCT) is an immersive scenario decision program. The SRCT measures susceptibility to cyber threat and malicious behavior as well protective resilience actions via participant responses/decisions to emails, interactions with security dialogs, and computer actions in a real-world simulation. Data were collected from a sample of 190 adults (76.3% female), between the ages of 18-61 (mean age = 26.12). Personality, behavioral tendencies, and cognitive preferences were measured with standard previously validated protocols and self-report measures. Factor analysis suggested a 5 item secure actions scale and a 9 item insecure actions scale as viable to extract from the SRCT responses. Statistically analyzable distributions of secure and insecure cyber behaviors were obtained, and these subscales demonstrated acceptable internal consistency as hypothesized. Associations between SRCT scales and other indices of cyber behavior, as well as self-reported personality, were lower than predicted, suggesting that past research reporting links between self-reports of personality and self-reported cyber-behavior may be overestimating the links for actual cyber actions. However, our exploratory analyses suggest discrepancies between self-report and actions in the SRCT may be an interesting avenue to explore. Overall, results were consistent with theorizing and suggest the technique is viable as a construct measure in future research or as an outcome variable in experimental intervention designs.Entities:
Mesh:
Year: 2018 PMID: 30540758 PMCID: PMC6291068 DOI: 10.1371/journal.pone.0207408
Source DB: PubMed Journal: PLoS One ISSN: 1932-6203 Impact factor: 3.240
Summary of SRCT potential secure and insecure actions, items on final scale and percentages completed by the sample (N = 190).
| SRCT Item | SRCT Action | % |
|---|---|---|
| “Windows”–Windows update needed. Updated | 38.4 | |
| “Adobe”–Adobe flash player update needed. Updated | 26.3 | |
| “iPad”–pop-up asking participants to enter their email address for a free iPad. Provided email | 23.2 | |
| “Virus”–pop-up asking participants to run a virus detection assessment software. Healed | 49.5 | |
| “WindowsNew”–Windows update needed by restarting your computer. Restarted | 8.4 | |
| “Java”–pop-up indicating that a new version is available asking participants to update their current version. Updated | 97.4 | |
| “Phishing1”–Phishing email one looks like it comes from the company’s IT Department, telling participants there was a security breach detected and the user may no longer be able to send messages or files. There is a hyperlink for participants to reset their email password. Clicked hyperlink | 65.3 | |
| “Phishing1FORM”–Form that appears when participants click on the link in the Phishing email one. Submitted old and new passwords. | 48.4 | |
| “Hacking1”–Hacking email sent by coworker, Johnny. This email provides the participant with username and password and encourages the participant to use this information to hack into a restricted database. Clicked hyperlink | 38.9 | |
| “Hacking1Form”–If this link is clicked in hacking email one, the participant is able to use provided username and password. Hacked to get information | 35.8 | |
| “Phishing2”–Phishing email participant has won $20,000. A hyperlink in the email invites participants to click to receive their prize. Clicked hyperlink | 5.8 | |
| “Phishing2FORM”–Invites participants to enter their character’s personal information to receive the $20,000 prize. Submitted information | 4.7 | |
| “Defender”–Windows defender pop-up to scan for viruses. Completed Scan | 63.5 | |
| “Hacking2”–Hacking email sent by coworker, Joanne. This email again invites participants to click on a link in order to hack into a restricted database. If the link is clicked, there is no form to fill out, however, participants are given information missing from the accounting screen (math problems). Clicked hyperlink | 65.1 | |
| “Email1”–This phishing email informs participants that they can win an Xbox 3. Clicked hyperlink. | 4.3 | |
| “Email1FORM”–Participants who click on the Email1 hyperlink are taken to a form to enter their character’s personal information. Entered information | 3.7 | |
| “Hacking3”–Hacking email two again appears to be sent by another coworker, Joanne. This email again invites participants to click on a link in order to hack into a restricted database. If the link is clicked, there is no form to fill out, however, participants are given information missing from the accounting screen (math problems). | 74.3 | |
| “Email2”–is written in all capital letters and informs participants that system viruses are detected and they should click a hyperlink to reset their passwords. Clicked hyperlink. | 19.9 | |
| “Email2FORM”–Participants are taken to this form when they click on the hyperlink from Email2. Submitted their password in the form. | 10.8 | |
| “Phishing3”–This phishing email comes from “ | 53.8 | |
| “Phishing3FORM”–When a participant clicks on the hyperlink in the Phishing3 email, they are then asked to fill out a form with their personal information. Submitted information. | 44.6 | |
| “Music”–Phishing email to download a free music player. Clicked hyperlink. | 3.8 | |
| “MusicFORM”–Fill out this form in order to receive their free music player. Completed form. | 3.2 |
Table 1 Notes. NA = Not included after Factor Analysis, Actions with the same item number were combined
Salient positively loaded items from the factor analysis of 14 SRCT items.
| Factor | |||
|---|---|---|---|
| Insecure 1 | Insecure 2 | Secure | |
| Windows Update | .780 | ||
| Adobe Update | .718 | ||
| Virus Alert | .313 | ||
| Windows Update New | .442 | ||
| Windows Defender | .501 | ||
| Hacking Email 2 | .798 | ||
| Hacking Email 3 | .718 | ||
| COMphish1form | .547 | ||
| COMhack1form | .541 | ||
| COMphish2form | .759 | ||
| COMemail1form | .849 | ||
| COMemail2form | .381 | .337 | |
| COMphish3form | .622 | ||
| COMmusicform | .746 | ||
Table 2 Notes. Action items from Table 1: Item 5 = COMphish1form, Item 6 = COMhack1form, Item 7 = COMphish2form, Item 10 = COMemail1form, Item 12 = COMemail2form, Item 13 = COMphish3form, Item 14 = COMmusicform.
Fig 1Distribution of the secure and insecure scales of the SRCT.
Fig 2Scatter plots of iSECURE and SRCT scale scores with regression and mean score lines.
Means, standard deviations, and ranges for the self report variables.
| Mean (SD) | Obtained Score Range | |
|---|---|---|
| iSecure: Secure behavior | 17.19 (4.43) | 6–24 |
| iSecure: Insecure behavior | 22.48 (4.70) | 12–40 |
| Big Five: Openness | 35.96 (5.87) | 21–50 |
| Big Five: Conscientiousness | 34.12 (5.11) | 19–44 |
| Big Five: Extraversion | 26.25 (6.80) | 11–40 |
| Big Five: Agreeableness | 35.59 (4.96) | 23–45 |
| Big Five: Neuroticism | 23.97 (6.00) | 9–39 |
| Trait anxiety | 41.21 (10.07) | 21–73 |
| BSI: Somatization symptoms | 2.67 (3.34) | 0–19 |
| BSI: Anxiety symptoms | 3.99 (4.26) | 0–20 |
| BSI: Depression symptoms | 3.93 (4.26) | 0–20 |
| Cybersecurity concern | 33.05 (11.80) | 8–56 |
| Security behavior efficacy | 21.56 (7.25) | 5–35 |
Fig 3Association between iSECURE insecure scale scores and psychological symptoms as a function of SRCT insecure scores.