| Literature DB >> 35791319 |
Wilson Cheong Hin Hong1, ChunYang Chi2, Jia Liu3, YunFeng Zhang4, Vivian Ngan-Lin Lei5, XiaoShu Xu6.
Abstract
A multitude of studies have suggested potential factors that influence internet security awareness (ISA). Some, for example, used GDP and nationality to explain different ISA levels in other countries but yielded inconsistent results. This study proposed an extended knowledge-attitude-behaviour (KAB) model, which postulates an influence of the education level of society at large is a moderator to the relationship between knowledge and attitude. Using exposure to a full-time working environment as a proxy for the influence, it was hypothesized that significant differences would be found in the attitude and behaviour dimensions across groups with different conditions of exposure and that exposure to full-time work plays a moderating role in KAB. To test the hypotheses, a large-scale survey adopting the Human Aspects of Information Security Questionnaire (HAIS-Q) was conducted with three groups of participants, namely 852 Year 1-3 students, 325 final-year students (age = 18-25) and 475 full-time employees (age = 18-50) in two cities of China. MANOVA and subsequent PROCESS regression analyses found a significant negative moderating effect of work exposure, which confirmed the proposed model. However, the effect was more pervasive than expected and moderation was found in the interaction between work exposure and all three ISA dimensions. The social influence does not only reshape the cybersecurity attitude of the highly educated, but also knowledge and behaviour. Findings contribute theoretically, methodologically and practically, offering novel perspectives on ISA research and prompting new strategies to respond to human factors.Entities:
Keywords: HAIS-Q; Internet security; KAB model; National Education Level; Work exposure
Year: 2022 PMID: 35791319 PMCID: PMC9245513 DOI: 10.1007/s10639-022-11121-5
Source DB: PubMed Journal: Educ Inf Technol (Dordr) ISSN: 1360-2357
Fig. 1An extended KAB model
A cross-tabulation of participants’ demographic information
| Education / working status | ||||||
|---|---|---|---|---|---|---|
| Variable | Categories | Year 1 | Year 2–3 | Final year | Working graduate | Percentage |
| Age range | 18–25 | 480 | 372 | 325 | 151 | 80.4% |
| 26–35 | 0 | 0 | 0 | 192 | 11.6% | |
| 36–45 | 0 | 0 | 0 | 90 | 5.4% | |
| ≥ 46 | 0 | 0 | 0 | 42 | 2.5% | |
| Gender | Male | 184 | 119 | 123 | 207 | 38.3% |
| Female | 296 | 253 | 202 | 268 | 61.7% | |
| Place of residence | Macao | 65 | 48 | 108 | 59 | 16.9% |
| Wenzhou | 415 | 324 | 217 | 416 | 83.1% | |
Correlation analysis for variables
| Mean attitude | Mean behaviour | Work exposure | Age | Gender | Place of residence | |
|---|---|---|---|---|---|---|
| Mean knowledge | .805** | .803** | −.670** | −.485** | .076** | −.012 |
| Mean attitude | 1 | .857** | −.591** | −.443** | .135** | −.084** |
| Mean behaviour | 1 | −.572** | −.398** | .112** | −.021 | |
| Work exposure | 1 | .756** | −.076** | −.003 | ||
| Age | 1 | −.051* | .081** | |||
| Gender | 1 | −.097** |
**. Correlation is significant at the .01 level (2-tailed)
*. Correlation is significant at the .05 level (2-tailed)
Fig. 2Cumulative Means of knowledge, attitude and behaviour among non-final-year students, final-year students and working graduates
Moderation analysis of variable effects on attitude
| Variables | b | se | t | p | LLCI | ULCI |
|---|---|---|---|---|---|---|
| Knowledge | .940 | .032 | 29.652 | .000 | .878 | 1.002 |
| W1 | .098 | .226 | .434 | .665 | −.345 | .541 |
| W2 | 1.075 | .175 | 6.156 | .000 | .733 | 1.418 |
| Knowledge*W1 | −.008 | .060 | −.140 | .889 | −.127 | .110 |
| Knowledge*W2 | −.435 | .056 | −7.733 | .000 | −.545 | −.325 |
| Age | −.016 | .024 | −.663 | .507 | −.062 | .031 |
W1 = comparison between average and low work exposure
W2 = comparison between high and low work exposure
Fig. 3An interaction plot of the moderating effect of work exposure on attitude at different levels of knowledge
Mediation analysis of variable effects on behaviour
| Variables | b | se | t | p | LLCI | ULCI |
|---|---|---|---|---|---|---|
| Knowledge | .270 | .017 | 16.328 | .000 | .238 | .303 |
| Attitude | .422 | .014 | 30.150 | .000 | .394 | .449 |
| Age | .025 | .011 | 2.196 | .028 | .003 | .047 |
The indirect effect of the moderated mediation of knowledge on behaviour, mediated by attitude and moderated by work exposure
| Work exposure | Effect | BootSE | BootLLCI | BootULCI |
|---|---|---|---|---|
| Low | .396 | .021 | .356 | .439 |
| Medium | .393 | .029 | .338 | .449 |
| High | .213 | .012 | .189 | .237 |
Moderation analysis of variable effects on behaviour
| Variables | b | t | p | LLCI | ULCI | |
|---|---|---|---|---|---|---|
| Knowledge | .319 | .024 | 13.234 | .000 | .272 | .366 |
| Attitude | .422 | .017 | 24.858 | .000 | .389 | .455 |
| Work exposure1 | .902 | .125 | 7.198 | .000 | .656 | 1.148 |
| Knowledge*Work exposure | −.129 | .045 | −2.865 | .004 | −.217 | −.041 |
| Attitude*Work exposure | −.200 | .056 | −3.550 | .000 | −.311 | −.090 |
| Age | .034 | .013 | 2.535 | .011 | .008 | .060 |
1High VS low level work exposure
Fig. 4An interaction plot of the moderating effect of work exposure on behaviour at different levels of knowledge
Fig. 5An interaction plot of the moderating effect of work exposure on behaviour at different levels of attitude
Fig. 6Model analysis results and the final extended KAB model. *Significance at .01 level. **Significance at .001 level
Overall moderation effect on attitude (N = 124)
| R | R2 | MSE | F | df1 | df2 | p |
|---|---|---|---|---|---|---|
| .868 | .753 | .172 | 71.898 | 5.000 | 118.000 | .000 |
Moderation analysis of variable effects on attitude (N = 124)
| Variables | b | se | t | p | LLCI | ULCI |
|---|---|---|---|---|---|---|
| Knowledge | 1.033 | .100 | 10.358 | .000 | .835 | 1.230 |
| W1 | .083 | .649 | .128 | .899 | −1.203 | 1.369 |
| W2 | 1.831 | .607 | 3.014 | .003 | .628 | 3.033 |
| Knowledge*W1 | −.005 | .174 | −.030 | .976 | −.349 | .339 |
| Knowledge*W2 | −.694 | .205 | −3.377 | .001 | −1.100 | −.287 |
W1 = comparison between average and low work exposure
W2 = comparison between high and low work exposure
Moderation effect at different levels of work exposure (N = 124)
| Work exposure | b | se | t | p | LLCI | ULCI |
|---|---|---|---|---|---|---|
| Low | 1.033 | .100 | 10.358 | .000 | .835 | 1.230 |
| Medium | 1.028 | .142 | 7.226 | .000 | .746 | 1.309 |
| High | .339 | .180 | 1.889 | .061 | −.017 | .695 |
Overall mediation effect on behaviour (N = 124)
| R | R2 | MSE | F | df1 | df2 | p |
|---|---|---|---|---|---|---|
| .895 | .800 | .068 | 242.383 | 2.000 | 121.000 | .000 |
Mediation analysis of variable effects on behaviour (N = 124)
| Variables | b | se | t | p | LLCI | ULCI |
|---|---|---|---|---|---|---|
| Knowledge | .326 | .063 | 5.181 | .000 | .202 | .451 |
| Attitude | .374 | .054 | 6.876 | .000 | .266 | .481 |
The indirect effect of the moderated mediation of knowledge on behaviour, mediated by attitude and moderated by work exposure (N = 124)
| Work exposure | Effect | BootSE | BootLLCI | BootULCI |
|---|---|---|---|---|
| Low | .386 | .071 | .263 | .539 |
| Medium | .384 | .104 | .212 | .618 |
| High | .127 | .056 | −.009 | .221 |
Questions in the employee and student versions of HAIS-Q
| Ver. | Knowledge | Attitude | Behaviour |
|---|---|---|---|
| Focus area: Password management | |||
| Employees | It’s acceptable to use my social media passwords on my work accounts. | It’s safe to use the same password for social media and work accounts. | I use a different password for my social media and work accounts. |
| I am allowed to share my work passwords with colleagues. | It’s a bad idea to share my work passwords, even if a colleague asks for them. | I share my work passwords with colleagues. | |
| A mixture of letters, numbers and symbols is necessary for work passwords. | It’s safe to have a work password with just letters. | I use a combination of letters, numbers and symbols in my work passwords. | |
| Students | It’s acceptable to use my social media passwords on my study accounts. | It’s safe to use the same password for social media and study accounts. | I use a different password for my social media and study accounts. |
| I am allowed to share my study passwords with classmates. | It’s a bad idea to share my study passwords, even if a classmate asks for them. | I share my study passwords with classmates. | |
| A mixture of letters, numbers and symbols is necessary for study passwords. | It’s safe to have a study password with just letters. | I use a combination of letters, numbers and symbols in my study passwords. | |
| Focus area: Email use | |||
| Employees | I am allowed to click on any links in emails from people I know. | It’s always safe to click on links in emails from people I know. | I don’t always click on links in emails just because they come from someone I know. |
| I am not permitted to click on a link in an email from an unknown sender. | Nothing bad can happen if I click on a link in an email from an unknown sender. | If an email from an unknown sender looks interesting, I click on a link within it. | |
| I am allowed to open email attachments from unknown senders. | It’s risky to open an email attachment from an unknown sender. | I don’t open email attachments if the sender is unknown to me. | |
| Students | I am allowed to click on any links in emails from people I know. | It’s always safe to click on links in emails from people I know. | I don’t always click on links in emails just because they come from someone I know. |
| I am not permitted to click on a link in an email from an unknown sender. | Nothing bad can happen if I click on a link in an email from an unknown sender. | If an email from an unknown sender looks interesting, I click on a link within it. | |
| I am allowed to open email attachments from unknown senders. | It’s risky to open an email attachment from an unknown sender. | I don’t open email attachments if the sender is unknown to me. | |
| Focus area: Internet use | |||
| Employees | I am allowed to download any files onto my work computer if they help me to do my job. | It can be risky to download files on my work computer. | I download any files onto my work computer that will help me get the job done. |
| While I am at work, I shouldn’t access certain websites. | Just because I can access a website at work, doesn’t mean that it’s safe. | When accessing the Internet at work, I visit any website that I want to. | |
| I am allowed to enter any information on any website if it helps me do my job. | If it helps me to do my job, it doesn’t matter what information I put on a website. | I assess the safety of websites before entering information. | |
| Students | I am allowed to download any files onto my study computer if they help me to do my job. | It can be risky to download files on my study computer. | I download any files onto my study computer that will help me get the job done. |
| While I am at school, I shouldn’t access certain websites. | Just because I can access a website at school, doesn’t mean that it’s safe. | When accessing the Internet at school, I visit any website that I want to. | |
| I am allowed to enter any information on any website if it helps my study. | If it helps my study, it doesn’t matter what information I put on a website. | I assess the safety of websites before entering information. | |
| Focus area: Social media use | |||
| Employees | I must periodically review the privacy settings on my social media accounts. | It’s a good idea to regularly review my social media privacy settings. | I don’t regularly review my social media privacy settings. |
| I can’t be fired for something I post on social media. | It doesn’t matter if I post things on social media that I wouldn’ t normally say in public. | I don’t post anything on social media before considering any negative consequences. | |
| I can post what I want about work on social media. | It’s risky to post certain information about my work on social media. | I post whatever I want about my work on social media. | |
| Students | I must periodically review the privacy settings on my social media accounts. | It’s a good idea to regularly review my social media privacy settings. | I don’t regularly review my social media privacy settings. |
| I can’t be fired for something I post on social media. | It doesn’t matter if I post things on social media that I wouldn’ t normally say in public. | I don’t post anything on social media before considering any negative consequences. | |
| I can post what I want about study on social media. | It’s risky to post certain information about my study on social media. | I post whatever I want about my study on social media. | |
| Focus area: Mobile devices | |||
| Employees | When working in a public place, I have to keep my laptop with me at all times. | When working in a café, it’s safe to leave my laptop unattended for a minute. | When working in a public place, I leave my laptop unattended. |
| I am allowed to send sensitive work files via a public Wi-Fi network. | It’s risky to send sensitive work files using a public Wi-Fi network. | I send sensitive work files using a public Wi-Fi network. | |
| When working on a sensitive document. I must ensure that strangers can’ t see my laptop screen. | It’s risky to access sensitive work files on a laptop if strangers can see my screen. | I check that strangers can’t see my laptop screen if I’m working on a sensitive document. | |
| Students | When working in a public place, I have to keep my laptop with me at all times. | When working in a café, it’s safe to leave my laptop unattended for a minute. | When working in a public place, I leave my laptop unattended. |
| I am allowed to send sensitive study files via a public Wi-Fi network. | It’s risky to send sensitive study files using a public Wi-Fi network. | I send sensitive study files using a public Wi-Fi network. | |
| When working on a sensitive document. I must ensure that strangers can’ t see my laptop screen. | It’s risky to access sensitive work files on a laptop if strangers can see my screen. | I check that strangers can’t see my laptop screen if I’m working on a sensitive document. | |
| Focus area: Information handling | |||
| Employees | Sensitive print-outs can be disposed of in the same way as non-sensitive ones. | Disposing of sensitive print-outs by putting them in the rubbish bin is safe. | When sensitive print-outs need to be disposed of, I ensure that they are shredded or destroyed. |
| If I find a USB stick in a public place, I shouldn’t plug it into my work computer. | If I find a USB stick in a public place nothing bad can happen if I plug it into my work computer. | I wouldn’t plug a USB stick found in a public place into my work computer. | |
| I am allowed to leave print-outs containing sensitive information on my desk overnight. | It’s risky to leave print-outs that contain sensitive information on my desk overnight. | I leave print-outs that contain sensitive information on my desk when I’m not there. | |
| Students | Sensitive print-outs can be disposed of in the same way as non-sensitive ones. | Disposing of sensitive print-outs by putting them in the rubbish bin is safe. | When sensitive print-outs need to be disposed of, I ensure that they are shredded or destroyed. |
| If I find a USB stick in a public place, I shouldn’t plug it into my study computer. | If I find a USB stick in a public place nothing bad can happen if I plug it into my study computer. | I wouldn’t plug a USB stick found in a public place into my study computer. | |
| I am allowed to leave print-outs containing sensitive information on my desk in the dormitory overnight. | It’s risky to leave print-outs that contain sensitive information on my desk in the dormitory overnight. | I leave print-outs that contain sensitive information on my desk in the dormitory when I’m not there. | |
| Focus area: Incident reporting | |||
| Employees | If I see someone acting suspiciously in my workplace, I should report it. | If I ignore someone acting suspiciously in my workplace, nothing bad can happen. | If I saw someone acting suspiciously in my workplace, I would do something about it. |
| I must not ignore poor security behaviour by my colleagues. | Nothing bad can happen if I ignore poor security behaviour by a colleague. | If I noticed my colleague ignoring security rules, I wouldn’t take any action. | |
| It’s optional to report security incidents. | It’s risky to ignore security incidents, even if I think they’ re not significant. | If I noticed a security incident, I would report it. | |
| Students | If I see someone acting suspiciously in my school, I should report it. | If I ignore someone acting suspiciously in my school, nothing bad can happen. | If I saw someone acting suspiciously in my school, I would do something about it. |
| I must not ignore poor security behaviour by my classmates. | Nothing bad can happen if I ignore poor security behaviour by a classmate. | If I noticed my classmate ignoring security rules, I wouldn’t take any action. | |
| It’s optional to report security incidents. | It’s risky to ignore security incidents, even if I think they’re not significant. | If I noticed a security incident, I would report it. | |
Participants respond to each item on a five-point scale from”Strongly Disagree” to “Strongly Agree”