Skip to main content

2022 | OriginalPaper | Buchkapitel

Online Security Attack Experience and Worries of Young Adults in the United Kingdom

verfasst von : Najla Aldaraani, Helen Petrie, Siamak F. Shahandashti

Erschienen in: Human Aspects of Information Security and Assurance

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Online security issues continue to grow as a concern, amplified by the coronavirus pandemic. The current cohort of young people (aged 18–30, “Generation Z”) are the first to have grown up with digital technologies, but to what extent are they worried about online security attacks and what experience do they have of them? An online survey of 81 young UK participants investigated their experience with 12 scenarios presenting online security attacks, asked about their level of worry with 9 online security attacks and their knowledge of computer and online security, and their confidence in their ability to identity an attack. Experience with the online attacks ranged widely, from over 50% of participants experiencing spear phishing to attempt identity theft, to only 2.5% experiencing a spoofed website. A principal components analysis showed that worries clearly fell into two components: Theft Worry and Phishing Worry. Levels of worry on these two components could be predicted from the number of different online security attacks participants had experienced. These relationships may be useful for developing education and advice to encourage better online security behaviour.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Fußnoten
1
Principal Components Analysis is a technique to reduce a number of variables to the set which describes the data in the smallest possible number of variables with the least loss of information. It is a non-parametric analysis method. A requirement is that at least 5 observations are needed for each variable in the analysis. With 9 statements (i.e. variables), observations from 81 participants comfortably met this requirement.
 
Literatur
1.
Zurück zum Zitat Beaman, C., Barkworth, A., Akande, T.D., Hakak, S., Khan, M.K.: Ransomware: recent advances, analysis, challenges and future research directions. Comput. Secur. 111, 102490 (2021)CrossRef Beaman, C., Barkworth, A., Akande, T.D., Hakak, S., Khan, M.K.: Ransomware: recent advances, analysis, challenges and future research directions. Comput. Secur. 111, 102490 (2021)CrossRef
2.
Zurück zum Zitat Cain, A.A., Edwards, M.E., Still, J.D.: An exploratory study of cyber hygiene behaviours and knowledge. J. Inf. Secur. Appl. 42, 36–45 (2018) Cain, A.A., Edwards, M.E., Still, J.D.: An exploratory study of cyber hygiene behaviours and knowledge. J. Inf. Secur. Appl. 42, 36–45 (2018)
3.
Zurück zum Zitat Collier, R.: NHS ransomware attack spreads worldwide. Can. Med. Assoc. J. 189(22), E786–E787 (2017)CrossRef Collier, R.: NHS ransomware attack spreads worldwide. Can. Med. Assoc. J. 189(22), E786–E787 (2017)CrossRef
4.
Zurück zum Zitat Crossler, R.E., Johnston, A.C., Lowry, P.B., Hu, Q., Warkentin, M., Baskerville, R.: Future directions for behavioural information security research. Comput. Secur. 32, 90–101 (2013)CrossRef Crossler, R.E., Johnston, A.C., Lowry, P.B., Hu, Q., Warkentin, M., Baskerville, R.: Future directions for behavioural information security research. Comput. Secur. 32, 90–101 (2013)CrossRef
6.
Zurück zum Zitat Fagan, M., Khan, M.M.H.: Why do they do what they do? In: Symposium on Usable Privacy and Security (SOUPS), USENIX Association (2016) Fagan, M., Khan, M.M.H.: Why do they do what they do? In: Symposium on Usable Privacy and Security (SOUPS), USENIX Association (2016)
7.
Zurück zum Zitat Field, A., Hole, G.: How to Design and Report Experiments. Sage (2003) Field, A., Hole, G.: How to Design and Report Experiments. Sage (2003)
8.
Zurück zum Zitat Furman, S., Theofanos, M.F., Choong, Y., Stanton, B.: Basing cybersecurity training on user perceptions. IEEE Secur. Priv. 10(2), 40–49 (2012)CrossRef Furman, S., Theofanos, M.F., Choong, Y., Stanton, B.: Basing cybersecurity training on user perceptions. IEEE Secur. Priv. 10(2), 40–49 (2012)CrossRef
9.
Zurück zum Zitat Furnell, S., Bryant, P., Phippen, A.D.: Assessing the security perceptions of personal Internet users. Comput. Secur. 26(5), 410–417 (2007)CrossRef Furnell, S., Bryant, P., Phippen, A.D.: Assessing the security perceptions of personal Internet users. Comput. Secur. 26(5), 410–417 (2007)CrossRef
10.
Zurück zum Zitat Furnell, S., Jusoh, A., Katsabas, D.: The challenges of understanding and using security: a survey of end-users. Comput. Secur. 25(1), 27–35 (2006)CrossRef Furnell, S., Jusoh, A., Katsabas, D.: The challenges of understanding and using security: a survey of end-users. Comput. Secur. 25(1), 27–35 (2006)CrossRef
11.
Zurück zum Zitat Furnell, S., Tsaganidi, V., Phippen, A.: Security beliefs and barriers for novice Internet users. Comput. Secur. 27(7), 235–240 (2008)CrossRef Furnell, S., Tsaganidi, V., Phippen, A.: Security beliefs and barriers for novice Internet users. Comput. Secur. 27(7), 235–240 (2008)CrossRef
12.
Zurück zum Zitat Howell, D.C.: Fundamental Statistics for the Behavioural Sciences (8th edn). Cengage (2013) Howell, D.C.: Fundamental Statistics for the Behavioural Sciences (8th edn). Cengage (2013)
13.
Zurück zum Zitat Ion, I., Reeder, R., Consolvo, S.: “ … no one can hack my mind”: comparing expert and non-expert security practices. In: Symposium on Usable Privacy and Security (SOUPS), USENIX Association (2015) Ion, I., Reeder, R., Consolvo, S.: “ … no one can hack my mind”: comparing expert and non-expert security practices. In: Symposium on Usable Privacy and Security (SOUPS), USENIX Association (2015)
14.
Zurück zum Zitat McCormac, A., Zwaans, T., Parsons, K., Calic, D., Butavicius, M., Pattinson, M.: Individual differences and information security awareness. Comput. Hum. Behav. 69, 151–156 (2017)CrossRef McCormac, A., Zwaans, T., Parsons, K., Calic, D., Butavicius, M., Pattinson, M.: Individual differences and information security awareness. Comput. Hum. Behav. 69, 151–156 (2017)CrossRef
15.
Zurück zum Zitat McGill, T., Thompson, N.: Old risks, new challenges: exploring differences in security between home computer and mobile device use. Behav. Inf. Technol. 36(11), 1111–1124 (2017)CrossRef McGill, T., Thompson, N.: Old risks, new challenges: exploring differences in security between home computer and mobile device use. Behav. Inf. Technol. 36(11), 1111–1124 (2017)CrossRef
16.
Zurück zum Zitat Merdenyan, B., Petrie, H.: Generational differences in password management behaviour. In: Proceedings of the 32nd International BCS Human Computer Interaction Conference (HCI 2018). British Computer Society (2018) Merdenyan, B., Petrie, H.: Generational differences in password management behaviour. In: Proceedings of the 32nd International BCS Human Computer Interaction Conference (HCI 2018). British Computer Society (2018)
19.
Zurück zum Zitat Office of Communication (Ofcom): Adults’ media use and attitudes report 2020/21 (2021) Office of Communication (Ofcom): Adults’ media use and attitudes report 2020/21 (2021)
20.
Zurück zum Zitat Safa, N.S., Maple, C.: Human errors in the information security realm–and how to fix them. Comput. Fraud Secur. 9, 17–20 (2016)CrossRef Safa, N.S., Maple, C.: Human errors in the information security realm–and how to fix them. Comput. Fraud Secur. 9, 17–20 (2016)CrossRef
21.
Zurück zum Zitat Seemiller, C., Grace, M.: Generation Z goes to college. Jossey-Bass (2016) Seemiller, C., Grace, M.: Generation Z goes to college. Jossey-Bass (2016)
22.
Zurück zum Zitat Sharot, T.: The optimism bias. Curr. Biol. 21(23), R941–R945 (2011)CrossRef Sharot, T.: The optimism bias. Curr. Biol. 21(23), R941–R945 (2011)CrossRef
23.
Zurück zum Zitat Turner, A.: Generation Z: technology and social interest. J. Individ. Psychol. 71(2), 103–113 (2015)CrossRef Turner, A.: Generation Z: technology and social interest. J. Individ. Psychol. 71(2), 103–113 (2015)CrossRef
24.
Zurück zum Zitat United States Senate, Committee on Commerce, Science, and Transportation.: A “Kill Chain” analysis of the 2013 Target data breach (2014) United States Senate, Committee on Commerce, Science, and Transportation.: A “Kill Chain” analysis of the 2013 Target data breach (2014)
25.
Zurück zum Zitat Whitty, M., Doodson, J., Creese, S., Hodges, D.: Individual differences in cyber security behaviours: an examination of who is sharing passwords. Cyberpsychology Behav. Soc. Networks 18(1), 3–7 (2015)CrossRef Whitty, M., Doodson, J., Creese, S., Hodges, D.: Individual differences in cyber security behaviours: an examination of who is sharing passwords. Cyberpsychology Behav. Soc. Networks 18(1), 3–7 (2015)CrossRef
Metadaten
Titel
Online Security Attack Experience and Worries of Young Adults in the United Kingdom
verfasst von
Najla Aldaraani
Helen Petrie
Siamak F. Shahandashti
Copyright-Jahr
2022
DOI
https://doi.org/10.1007/978-3-031-12172-2_24

Premium Partner