Skip to main content
Top

2022 | OriginalPaper | Chapter

Online Security Attack Experience and Worries of Young Adults in the United Kingdom

Authors : Najla Aldaraani, Helen Petrie, Siamak F. Shahandashti

Published in: Human Aspects of Information Security and Assurance

Publisher: Springer International Publishing

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Online security issues continue to grow as a concern, amplified by the coronavirus pandemic. The current cohort of young people (aged 18–30, “Generation Z”) are the first to have grown up with digital technologies, but to what extent are they worried about online security attacks and what experience do they have of them? An online survey of 81 young UK participants investigated their experience with 12 scenarios presenting online security attacks, asked about their level of worry with 9 online security attacks and their knowledge of computer and online security, and their confidence in their ability to identity an attack. Experience with the online attacks ranged widely, from over 50% of participants experiencing spear phishing to attempt identity theft, to only 2.5% experiencing a spoofed website. A principal components analysis showed that worries clearly fell into two components: Theft Worry and Phishing Worry. Levels of worry on these two components could be predicted from the number of different online security attacks participants had experienced. These relationships may be useful for developing education and advice to encourage better online security behaviour.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Footnotes
1
Principal Components Analysis is a technique to reduce a number of variables to the set which describes the data in the smallest possible number of variables with the least loss of information. It is a non-parametric analysis method. A requirement is that at least 5 observations are needed for each variable in the analysis. With 9 statements (i.e. variables), observations from 81 participants comfortably met this requirement.
 
Literature
1.
go back to reference Beaman, C., Barkworth, A., Akande, T.D., Hakak, S., Khan, M.K.: Ransomware: recent advances, analysis, challenges and future research directions. Comput. Secur. 111, 102490 (2021)CrossRef Beaman, C., Barkworth, A., Akande, T.D., Hakak, S., Khan, M.K.: Ransomware: recent advances, analysis, challenges and future research directions. Comput. Secur. 111, 102490 (2021)CrossRef
2.
go back to reference Cain, A.A., Edwards, M.E., Still, J.D.: An exploratory study of cyber hygiene behaviours and knowledge. J. Inf. Secur. Appl. 42, 36–45 (2018) Cain, A.A., Edwards, M.E., Still, J.D.: An exploratory study of cyber hygiene behaviours and knowledge. J. Inf. Secur. Appl. 42, 36–45 (2018)
3.
go back to reference Collier, R.: NHS ransomware attack spreads worldwide. Can. Med. Assoc. J. 189(22), E786–E787 (2017)CrossRef Collier, R.: NHS ransomware attack spreads worldwide. Can. Med. Assoc. J. 189(22), E786–E787 (2017)CrossRef
4.
go back to reference Crossler, R.E., Johnston, A.C., Lowry, P.B., Hu, Q., Warkentin, M., Baskerville, R.: Future directions for behavioural information security research. Comput. Secur. 32, 90–101 (2013)CrossRef Crossler, R.E., Johnston, A.C., Lowry, P.B., Hu, Q., Warkentin, M., Baskerville, R.: Future directions for behavioural information security research. Comput. Secur. 32, 90–101 (2013)CrossRef
6.
go back to reference Fagan, M., Khan, M.M.H.: Why do they do what they do? In: Symposium on Usable Privacy and Security (SOUPS), USENIX Association (2016) Fagan, M., Khan, M.M.H.: Why do they do what they do? In: Symposium on Usable Privacy and Security (SOUPS), USENIX Association (2016)
7.
go back to reference Field, A., Hole, G.: How to Design and Report Experiments. Sage (2003) Field, A., Hole, G.: How to Design and Report Experiments. Sage (2003)
8.
go back to reference Furman, S., Theofanos, M.F., Choong, Y., Stanton, B.: Basing cybersecurity training on user perceptions. IEEE Secur. Priv. 10(2), 40–49 (2012)CrossRef Furman, S., Theofanos, M.F., Choong, Y., Stanton, B.: Basing cybersecurity training on user perceptions. IEEE Secur. Priv. 10(2), 40–49 (2012)CrossRef
9.
go back to reference Furnell, S., Bryant, P., Phippen, A.D.: Assessing the security perceptions of personal Internet users. Comput. Secur. 26(5), 410–417 (2007)CrossRef Furnell, S., Bryant, P., Phippen, A.D.: Assessing the security perceptions of personal Internet users. Comput. Secur. 26(5), 410–417 (2007)CrossRef
10.
go back to reference Furnell, S., Jusoh, A., Katsabas, D.: The challenges of understanding and using security: a survey of end-users. Comput. Secur. 25(1), 27–35 (2006)CrossRef Furnell, S., Jusoh, A., Katsabas, D.: The challenges of understanding and using security: a survey of end-users. Comput. Secur. 25(1), 27–35 (2006)CrossRef
11.
go back to reference Furnell, S., Tsaganidi, V., Phippen, A.: Security beliefs and barriers for novice Internet users. Comput. Secur. 27(7), 235–240 (2008)CrossRef Furnell, S., Tsaganidi, V., Phippen, A.: Security beliefs and barriers for novice Internet users. Comput. Secur. 27(7), 235–240 (2008)CrossRef
12.
go back to reference Howell, D.C.: Fundamental Statistics for the Behavioural Sciences (8th edn). Cengage (2013) Howell, D.C.: Fundamental Statistics for the Behavioural Sciences (8th edn). Cengage (2013)
13.
go back to reference Ion, I., Reeder, R., Consolvo, S.: “ … no one can hack my mind”: comparing expert and non-expert security practices. In: Symposium on Usable Privacy and Security (SOUPS), USENIX Association (2015) Ion, I., Reeder, R., Consolvo, S.: “ … no one can hack my mind”: comparing expert and non-expert security practices. In: Symposium on Usable Privacy and Security (SOUPS), USENIX Association (2015)
14.
go back to reference McCormac, A., Zwaans, T., Parsons, K., Calic, D., Butavicius, M., Pattinson, M.: Individual differences and information security awareness. Comput. Hum. Behav. 69, 151–156 (2017)CrossRef McCormac, A., Zwaans, T., Parsons, K., Calic, D., Butavicius, M., Pattinson, M.: Individual differences and information security awareness. Comput. Hum. Behav. 69, 151–156 (2017)CrossRef
15.
go back to reference McGill, T., Thompson, N.: Old risks, new challenges: exploring differences in security between home computer and mobile device use. Behav. Inf. Technol. 36(11), 1111–1124 (2017)CrossRef McGill, T., Thompson, N.: Old risks, new challenges: exploring differences in security between home computer and mobile device use. Behav. Inf. Technol. 36(11), 1111–1124 (2017)CrossRef
16.
go back to reference Merdenyan, B., Petrie, H.: Generational differences in password management behaviour. In: Proceedings of the 32nd International BCS Human Computer Interaction Conference (HCI 2018). British Computer Society (2018) Merdenyan, B., Petrie, H.: Generational differences in password management behaviour. In: Proceedings of the 32nd International BCS Human Computer Interaction Conference (HCI 2018). British Computer Society (2018)
19.
go back to reference Office of Communication (Ofcom): Adults’ media use and attitudes report 2020/21 (2021) Office of Communication (Ofcom): Adults’ media use and attitudes report 2020/21 (2021)
20.
go back to reference Safa, N.S., Maple, C.: Human errors in the information security realm–and how to fix them. Comput. Fraud Secur. 9, 17–20 (2016)CrossRef Safa, N.S., Maple, C.: Human errors in the information security realm–and how to fix them. Comput. Fraud Secur. 9, 17–20 (2016)CrossRef
21.
go back to reference Seemiller, C., Grace, M.: Generation Z goes to college. Jossey-Bass (2016) Seemiller, C., Grace, M.: Generation Z goes to college. Jossey-Bass (2016)
22.
23.
go back to reference Turner, A.: Generation Z: technology and social interest. J. Individ. Psychol. 71(2), 103–113 (2015)CrossRef Turner, A.: Generation Z: technology and social interest. J. Individ. Psychol. 71(2), 103–113 (2015)CrossRef
24.
go back to reference United States Senate, Committee on Commerce, Science, and Transportation.: A “Kill Chain” analysis of the 2013 Target data breach (2014) United States Senate, Committee on Commerce, Science, and Transportation.: A “Kill Chain” analysis of the 2013 Target data breach (2014)
25.
go back to reference Whitty, M., Doodson, J., Creese, S., Hodges, D.: Individual differences in cyber security behaviours: an examination of who is sharing passwords. Cyberpsychology Behav. Soc. Networks 18(1), 3–7 (2015)CrossRef Whitty, M., Doodson, J., Creese, S., Hodges, D.: Individual differences in cyber security behaviours: an examination of who is sharing passwords. Cyberpsychology Behav. Soc. Networks 18(1), 3–7 (2015)CrossRef
Metadata
Title
Online Security Attack Experience and Worries of Young Adults in the United Kingdom
Authors
Najla Aldaraani
Helen Petrie
Siamak F. Shahandashti
Copyright Year
2022
DOI
https://doi.org/10.1007/978-3-031-12172-2_24

Premium Partner