Skip to main content

2019 | OriginalPaper | Buchkapitel

Demographic Factors in Cyber Security: An Empirical Study

verfasst von : Shweta Mittal, P. Vigneswara Ilavarasan

Erschienen in: Digital Transformation for a Sustainable Society in the 21st Century

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Despite high quality information systems security in place, organizations are vulnerable to cyber-attacks due to lapses in the human behavior. The present paper explores the importance of human factors in cyber security using an online survey data. It uses the work of Parson, Calic, Pattenson, Butavicius, McCormac and Zwaans [23] in measuring the human aspects of cyber security (leaving printouts, links from known source, website access, information in website, password complexity, links from known source, plugging USB in public places) and their linkages with the demographic factors (age, work experience, academic discipline, qualification, and place). ANOVA was used on a sample size of 165. It was found that demographic profile of employees and students significantly differ in their perception towards the cyber security. The paper has suggestions for information security awareness training programmes to handle the inadequacies.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Abawajy, J.: User preference of cyber security awareness delivery methods. Behav. Inf. Technol. 33(3), 237–248 (2014)MathSciNetCrossRef Abawajy, J.: User preference of cyber security awareness delivery methods. Behav. Inf. Technol. 33(3), 237–248 (2014)MathSciNetCrossRef
2.
Zurück zum Zitat Agarwal, R., Prasad, J.: Are individual differences germane to the acceptance of new information technologies? Decis. Sci. 30(2), 361–391 (1999)CrossRef Agarwal, R., Prasad, J.: Are individual differences germane to the acceptance of new information technologies? Decis. Sci. 30(2), 361–391 (1999)CrossRef
3.
Zurück zum Zitat Arachchilage, N.A.G., Love, S.: Security awareness of computer users: a phishing threat avoidance perspective. Comput. Hum. Behav. 38, 304–312 (2014)CrossRef Arachchilage, N.A.G., Love, S.: Security awareness of computer users: a phishing threat avoidance perspective. Comput. Hum. Behav. 38, 304–312 (2014)CrossRef
4.
Zurück zum Zitat Albrechtsen, E., Hovden, J.: Improving information security awareness and behaviour through dialogue, participation and collective reflection. An intervention study. Comput. Secur. 29(4), 432–445 (2010)CrossRef Albrechtsen, E., Hovden, J.: Improving information security awareness and behaviour through dialogue, participation and collective reflection. An intervention study. Comput. Secur. 29(4), 432–445 (2010)CrossRef
5.
Zurück zum Zitat Brancheau, J.C., Janz, B.D., Wetherbe, J.C.: Key issues in information systems management: 1994-1995 SIM Delphi results. MIS Q. 20(2), 225–242 (1996)CrossRef Brancheau, J.C., Janz, B.D., Wetherbe, J.C.: Key issues in information systems management: 1994-1995 SIM Delphi results. MIS Q. 20(2), 225–242 (1996)CrossRef
6.
Zurück zum Zitat Carstensen, L.L., Issacowitz, D.M., Charles, S.T.: Taking time seriously: a theory of socioemotional selectivity. Am. Psychol. 54, 165–181 (1999)CrossRef Carstensen, L.L., Issacowitz, D.M., Charles, S.T.: Taking time seriously: a theory of socioemotional selectivity. Am. Psychol. 54, 165–181 (1999)CrossRef
7.
Zurück zum Zitat Cavusoglu, H., Cavusoglu, H., Raghunathan, S.: Economics of IT security management: four improvements to current security practices. Commun. Assoc. Inf. Syst. 14(1), 3 (2004) Cavusoglu, H., Cavusoglu, H., Raghunathan, S.: Economics of IT security management: four improvements to current security practices. Commun. Assoc. Inf. Syst. 14(1), 3 (2004)
8.
Zurück zum Zitat Chung, J.E., Park, N., Wang, H., Fulk, J., McLaughlin, M.: Age differences in perceptions of online community participation among non-users: an extension of the Technology Acceptance Model. Comput. Hum. Behav. 26(6), 1674–1684 (2010)CrossRef Chung, J.E., Park, N., Wang, H., Fulk, J., McLaughlin, M.: Age differences in perceptions of online community participation among non-users: an extension of the Technology Acceptance Model. Comput. Hum. Behav. 26(6), 1674–1684 (2010)CrossRef
9.
Zurück zum Zitat Darwish, A., El Zarka, A., Aloul, F.: Towards understanding phishing victims’ profile. In: 2012 International Conference on Computer Systems and Industrial Informatics, pp. 1–5. IEEE, December 2012 Darwish, A., El Zarka, A., Aloul, F.: Towards understanding phishing victims’ profile. In: 2012 International Conference on Computer Systems and Industrial Informatics, pp. 1–5. IEEE, December 2012
11.
Zurück zum Zitat Egelman, S., Peer, E.: Scaling the security wall: developing a security behavior intentions scale. In: Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems, pp. 2873–2882. ACM, April 2015 Egelman, S., Peer, E.: Scaling the security wall: developing a security behavior intentions scale. In: Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems, pp. 2873–2882. ACM, April 2015
12.
Zurück zum Zitat European Union Agency for Network and Information Security (ENISA). The new users’ guide: how to raise information security awareness (EN) (2010) European Union Agency for Network and Information Security (ENISA). The new users’ guide: how to raise information security awareness (EN) (2010)
13.
Zurück zum Zitat Furnell, S., Clarke, N.: Power to the people? The evolving recognition of human aspects of security. Comput. Secur. 31(8), 983–988 (2012)CrossRef Furnell, S., Clarke, N.: Power to the people? The evolving recognition of human aspects of security. Comput. Secur. 31(8), 983–988 (2012)CrossRef
14.
Zurück zum Zitat Furnell, S.M., Jusoh, A., Katsabas, D.: The challenges of understanding and using security: a survey of end-users. Comput. Secur. 25(1), 27–35 (2006)CrossRef Furnell, S.M., Jusoh, A., Katsabas, D.: The challenges of understanding and using security: a survey of end-users. Comput. Secur. 25(1), 27–35 (2006)CrossRef
15.
Zurück zum Zitat Herath, T., Rao, H.R.: Protection motivation and deterrence: a framework for security policy compliance in organisations. Eur. J. Inf. Syst. 18(2), 106–125 (2009)CrossRef Herath, T., Rao, H.R.: Protection motivation and deterrence: a framework for security policy compliance in organisations. Eur. J. Inf. Syst. 18(2), 106–125 (2009)CrossRef
16.
Zurück zum Zitat Ifinedo, P.: Understanding information systems security policy compliance: an integration of the theory of planned behavior and the protection motivation theory. Comput. Secur. 31(1), 83–95 (2012)CrossRef Ifinedo, P.: Understanding information systems security policy compliance: an integration of the theory of planned behavior and the protection motivation theory. Comput. Secur. 31(1), 83–95 (2012)CrossRef
17.
Zurück zum Zitat Igbaria, M., Parasuraman, S.: A path analytic study of individual characteristics, computer anxiety and attitudes toward microcomputers. J. Manag. 15(3), 373–388 (1989) Igbaria, M., Parasuraman, S.: A path analytic study of individual characteristics, computer anxiety and attitudes toward microcomputers. J. Manag. 15(3), 373–388 (1989)
18.
Zurück zum Zitat Igbaria, M., Zinatelli, N., Cragg, P., Cavaye, A.L.: Personal computing acceptance factors in small firms: a structural equation model. MIS Q. 21, 279–305 (1997)CrossRef Igbaria, M., Zinatelli, N., Cragg, P., Cavaye, A.L.: Personal computing acceptance factors in small firms: a structural equation model. MIS Q. 21, 279–305 (1997)CrossRef
19.
Zurück zum Zitat Lee, J., Lee, Y.: A holistic model of computer abuses within organizations. Inf. Manag. Comput. Secur. 10(2), 57–63 (2002)CrossRef Lee, J., Lee, Y.: A holistic model of computer abuses within organizations. Inf. Manag. Comput. Secur. 10(2), 57–63 (2002)CrossRef
20.
Zurück zum Zitat Lee, S.M., Lee, S.G., Yoo, S.: An integrative model of computer abuse based on social control and general deterrence theories. Inf. Manag. 41(6), 707–718 (2004)CrossRef Lee, S.M., Lee, S.G., Yoo, S.: An integrative model of computer abuse based on social control and general deterrence theories. Inf. Manag. 41(6), 707–718 (2004)CrossRef
21.
Zurück zum Zitat Lohmeyer, D.F., McCrory, J., Pogreb, S.: Managing information security. McKinsey Quart. Spec. Ed. 2, 12–16 (2002) Lohmeyer, D.F., McCrory, J., Pogreb, S.: Managing information security. McKinsey Quart. Spec. Ed. 2, 12–16 (2002)
22.
Zurück zum Zitat Mohebzada, J.G., El Zarka, A., Bhojani, A.H., Darwish, A.: Phishing in a university community: two large scale phishing experiments. In: 2012 International Conference on Innovations in Information Technology (IIT), pp. 249–254. IEEE, March 2012 Mohebzada, J.G., El Zarka, A., Bhojani, A.H., Darwish, A.: Phishing in a university community: two large scale phishing experiments. In: 2012 International Conference on Innovations in Information Technology (IIT), pp. 249–254. IEEE, March 2012
23.
Zurück zum Zitat Parsons, K., Calic, D., Pattinson, M., Butavicius, M., McCormac, A., Zwaans, T.: The human aspects of information security questionnaire (HAIS-Q): two further validation studies. Comput. Secur. 66, 40–51 (2017)CrossRef Parsons, K., Calic, D., Pattinson, M., Butavicius, M., McCormac, A., Zwaans, T.: The human aspects of information security questionnaire (HAIS-Q): two further validation studies. Comput. Secur. 66, 40–51 (2017)CrossRef
24.
Zurück zum Zitat Parsons, K.M., Young, E., Butavicius, M.A., McCormac, A., Pattinson, M.R., Jerram, C.: The influence of organizational information security culture on information security decision making. J. Cogn. Eng. Decis. Making 9(2), 117–129 (2015)CrossRef Parsons, K.M., Young, E., Butavicius, M.A., McCormac, A., Pattinson, M.R., Jerram, C.: The influence of organizational information security culture on information security decision making. J. Cogn. Eng. Decis. Making 9(2), 117–129 (2015)CrossRef
25.
Zurück zum Zitat Porter, C.E., Donthu, N.: Using the technology acceptance model to explain how attitudes determine Internet usage: the role of perceived access barriers and demographics. J. Bus. Res. 59(9), 999–1007 (2006)CrossRef Porter, C.E., Donthu, N.: Using the technology acceptance model to explain how attitudes determine Internet usage: the role of perceived access barriers and demographics. J. Bus. Res. 59(9), 999–1007 (2006)CrossRef
26.
Zurück zum Zitat PricewaterhouseCoopers (PWC). Security awareness: turning your people into your first line of defence (2010) PricewaterhouseCoopers (PWC). Security awareness: turning your people into your first line of defence (2010)
27.
Zurück zum Zitat Ransbotham, S., Mitra, S.: Choice and chance: a conceptual model of paths to information security compromise. Inf. Syst. Res. 20(1), 121–139 (2009)CrossRef Ransbotham, S., Mitra, S.: Choice and chance: a conceptual model of paths to information security compromise. Inf. Syst. Res. 20(1), 121–139 (2009)CrossRef
28.
Zurück zum Zitat Schultz, E.: From the Editor-in-Chief: the human factor in security. Comput. Secur. 24(6), 425–426 (2005)CrossRef Schultz, E.: From the Editor-in-Chief: the human factor in security. Comput. Secur. 24(6), 425–426 (2005)CrossRef
29.
Zurück zum Zitat Safa, N.S., Ismail, M.A.: A customer loyalty formation model in electronic commerce. Econ. Model. 35, 559–564 (2013)CrossRef Safa, N.S., Ismail, M.A.: A customer loyalty formation model in electronic commerce. Econ. Model. 35, 559–564 (2013)CrossRef
30.
Zurück zum Zitat Safa, N.S., Sookhak, M., Von Solms, R., Furnell, S., Ghani, N.A., Herawan, T.: Information security conscious care behaviour formation in organizations. Comput. Secur. 53, 65–78 (2015)CrossRef Safa, N.S., Sookhak, M., Von Solms, R., Furnell, S., Ghani, N.A., Herawan, T.: Information security conscious care behaviour formation in organizations. Comput. Secur. 53, 65–78 (2015)CrossRef
31.
Zurück zum Zitat Safa, N.S., Von Solms, R., Furnell, S.: Information security policy compliance model in organizations. Comput. Secur. 56, 70–82 (2016)CrossRef Safa, N.S., Von Solms, R., Furnell, S.: Information security policy compliance model in organizations. Comput. Secur. 56, 70–82 (2016)CrossRef
32.
Zurück zum Zitat Taylor, S., Todd, P.: Assessing IT usage: the role of prior experience. MIS Q. 19, 561–570 (1995)CrossRef Taylor, S., Todd, P.: Assessing IT usage: the role of prior experience. MIS Q. 19, 561–570 (1995)CrossRef
33.
Zurück zum Zitat Venkatesh, V., Morris, M.G.: Why don’t men ever stop to ask for directions? Gender, social influence, and their role in technology acceptance and usage behavior. MIS Q. 24, 115–139 (2000)CrossRef Venkatesh, V., Morris, M.G.: Why don’t men ever stop to ask for directions? Gender, social influence, and their role in technology acceptance and usage behavior. MIS Q. 24, 115–139 (2000)CrossRef
34.
Zurück zum Zitat Venkatesh, V., Morris, M.G., Davis, G.B., Davis, F.D.: User acceptance of information technology: toward a unified view. MIS Q. 27, 425–478 (2003)CrossRef Venkatesh, V., Morris, M.G., Davis, G.B., Davis, F.D.: User acceptance of information technology: toward a unified view. MIS Q. 27, 425–478 (2003)CrossRef
35.
Zurück zum Zitat Von Solms, R., Van Niekerk, J.: From information security to cyber security. Comput. Secur. 38, 97–102 (2013)CrossRef Von Solms, R., Van Niekerk, J.: From information security to cyber security. Comput. Secur. 38, 97–102 (2013)CrossRef
36.
Zurück zum Zitat Vroom, C., Von Solms, R.: Towards information security behavioural compliance. Comput. Secur. 23(3), 191–198 (2004)CrossRef Vroom, C., Von Solms, R.: Towards information security behavioural compliance. Comput. Secur. 23(3), 191–198 (2004)CrossRef
37.
Zurück zum Zitat Werlinger, R., Hawkey, K., Botta, D., Beznosov, K.: Security practitioners in context: their activities and interactions with other stakeholders within organizations. Int. J. Hum Comput Stud. 67(7), 584–606 (2009)CrossRef Werlinger, R., Hawkey, K., Botta, D., Beznosov, K.: Security practitioners in context: their activities and interactions with other stakeholders within organizations. Int. J. Hum Comput Stud. 67(7), 584–606 (2009)CrossRef
38.
Zurück zum Zitat Whitty, M., Doodson, J., Creese, S., Hodges, D.: Individual differences in cyber security behaviors: an examination of who is sharing passwords. Cyberpsychol. Behav. Soc. Netw. 18(1), 3–7 (2015)CrossRef Whitty, M., Doodson, J., Creese, S., Hodges, D.: Individual differences in cyber security behaviors: an examination of who is sharing passwords. Cyberpsychol. Behav. Soc. Netw. 18(1), 3–7 (2015)CrossRef
39.
Zurück zum Zitat Wood, C.C., Banks Jr., W.W.: Human error: an overlooked but significant information security problem. Comput. Secur. 12(1), 51–60 (1993)CrossRef Wood, C.C., Banks Jr., W.W.: Human error: an overlooked but significant information security problem. Comput. Secur. 12(1), 51–60 (1993)CrossRef
Metadaten
Titel
Demographic Factors in Cyber Security: An Empirical Study
verfasst von
Shweta Mittal
P. Vigneswara Ilavarasan
Copyright-Jahr
2019
DOI
https://doi.org/10.1007/978-3-030-29374-1_54

Premium Partner