Susceptibility and resilience to cyber threat: Findings from a scenario decision program to measure secure and insecure computing behavior

Interest in the individual differences underlying end user computer security behavior has led to the development of a multidisciplinary field of research known as behavioral information security. An important gap in knowledge and the motivation for this research is the development of ways to measure...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:PloS one 2018-12, Vol.13 (12), p.e0207408-e0207408
Hauptverfasser: Weems, Carl F, Ahmed, Irfan, Richard, 3rd, Golden G, Russell, Justin D, Neill, Erin L
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page e0207408
container_issue 12
container_start_page e0207408
container_title PloS one
container_volume 13
creator Weems, Carl F
Ahmed, Irfan
Richard, 3rd, Golden G
Russell, Justin D
Neill, Erin L
description Interest in the individual differences underlying end user computer security behavior has led to the development of a multidisciplinary field of research known as behavioral information security. An important gap in knowledge and the motivation for this research is the development of ways to measure secure and insecure cyber behavior for research and eventually practice. Here we report a study designed to develop a technique for assessing secure and insecure cyber behavior for broad research use. The Susceptibility and Resilience to Cyber Threat (SRCT) is an immersive scenario decision program. The SRCT measures susceptibility to cyber threat and malicious behavior as well protective resilience actions via participant responses/decisions to emails, interactions with security dialogs, and computer actions in a real-world simulation. Data were collected from a sample of 190 adults (76.3% female), between the ages of 18-61 (mean age = 26.12). Personality, behavioral tendencies, and cognitive preferences were measured with standard previously validated protocols and self-report measures. Factor analysis suggested a 5 item secure actions scale and a 9 item insecure actions scale as viable to extract from the SRCT responses. Statistically analyzable distributions of secure and insecure cyber behaviors were obtained, and these subscales demonstrated acceptable internal consistency as hypothesized. Associations between SRCT scales and other indices of cyber behavior, as well as self-reported personality, were lower than predicted, suggesting that past research reporting links between self-reports of personality and self-reported cyber-behavior may be overestimating the links for actual cyber actions. However, our exploratory analyses suggest discrepancies between self-report and actions in the SRCT may be an interesting avenue to explore. Overall, results were consistent with theorizing and suggest the technique is viable as a construct measure in future research or as an outcome variable in experimental intervention designs.
doi_str_mv 10.1371/journal.pone.0207408
format Article
fullrecord <record><control><sourceid>proquest_plos_</sourceid><recordid>TN_cdi_plos_journals_2155129591</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><doaj_id>oai_doaj_org_article_bb9d1380ab404ef795ebbc3b8422eef9</doaj_id><sourcerecordid>2155129591</sourcerecordid><originalsourceid>FETCH-LOGICAL-c526t-34c5b7204c7addd8c071294c5cb561b915d048f3584a61fbd1d3ac0f76296dde3</originalsourceid><addsrcrecordid>eNptkstuFDEQRVsIRELgDxBYYsNmBj_7wSISighEisQCWFt-VM846rYb2x1pfoGvxs10ogSxKrt873FVqarqNcFbwhry4SbM0athOwUPW0xxw3H7pDolHaObmmL29MH5pHqR0g3GgrV1_bw6YVhw3Ij2tPr9fU4Gpuy0G1w-IOUtipDKBbwBlAMyBw0R5X0ElT-iS-et87uE-hhGpFAxexVdQBaMSy54NMWwi2pcrCOoNEdACcwSFrbz68WEcZpzQSENe3XrQnxZPevVkODVGs-qn5eff1x83Vx_-3J18el6YwSt84ZxI3RDMTeNsta2BjeEdiVptKiJ7oiwmLc9Ey1XNem1JZYpg_umpl1tLbCz6u2ROw0hyXWMSVIiRAGJjhTF1VFhg7qRU3SjigcZlJN_EyHupIrZmQGk1p0lrMVKc8yhbzoBWhumW04pQN8V1vn626xHsGVcOarhEfTxi3d7uQu3spRLcN0WwPsVEMOvGVKWoytTHwblIczHutuu4WKRvvtH-v_u-FFlYkgpQn9fDMFyWa07l1xWS66rVWxvHjZyb7rbJfYHmfvQgA</addsrcrecordid><sourcetype>Open Website</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2155129591</pqid></control><display><type>article</type><title>Susceptibility and resilience to cyber threat: Findings from a scenario decision program to measure secure and insecure computing behavior</title><source>MEDLINE</source><source>DOAJ Directory of Open Access Journals</source><source>Elektronische Zeitschriftenbibliothek - Frei zugängliche E-Journals</source><source>PubMed Central</source><source>Free Full-Text Journals in Chemistry</source><source>Public Library of Science (PLoS)</source><creator>Weems, Carl F ; Ahmed, Irfan ; Richard, 3rd, Golden G ; Russell, Justin D ; Neill, Erin L</creator><creatorcontrib>Weems, Carl F ; Ahmed, Irfan ; Richard, 3rd, Golden G ; Russell, Justin D ; Neill, Erin L</creatorcontrib><description>Interest in the individual differences underlying end user computer security behavior has led to the development of a multidisciplinary field of research known as behavioral information security. An important gap in knowledge and the motivation for this research is the development of ways to measure secure and insecure cyber behavior for research and eventually practice. Here we report a study designed to develop a technique for assessing secure and insecure cyber behavior for broad research use. The Susceptibility and Resilience to Cyber Threat (SRCT) is an immersive scenario decision program. The SRCT measures susceptibility to cyber threat and malicious behavior as well protective resilience actions via participant responses/decisions to emails, interactions with security dialogs, and computer actions in a real-world simulation. Data were collected from a sample of 190 adults (76.3% female), between the ages of 18-61 (mean age = 26.12). Personality, behavioral tendencies, and cognitive preferences were measured with standard previously validated protocols and self-report measures. Factor analysis suggested a 5 item secure actions scale and a 9 item insecure actions scale as viable to extract from the SRCT responses. Statistically analyzable distributions of secure and insecure cyber behaviors were obtained, and these subscales demonstrated acceptable internal consistency as hypothesized. Associations between SRCT scales and other indices of cyber behavior, as well as self-reported personality, were lower than predicted, suggesting that past research reporting links between self-reports of personality and self-reported cyber-behavior may be overestimating the links for actual cyber actions. However, our exploratory analyses suggest discrepancies between self-report and actions in the SRCT may be an interesting avenue to explore. Overall, results were consistent with theorizing and suggest the technique is viable as a construct measure in future research or as an outcome variable in experimental intervention designs.</description><identifier>ISSN: 1932-6203</identifier><identifier>EISSN: 1932-6203</identifier><identifier>DOI: 10.1371/journal.pone.0207408</identifier><identifier>PMID: 30540758</identifier><language>eng</language><publisher>United States: Public Library of Science</publisher><subject>Adolescent ; Adult ; Adults ; Anxiety ; Behavior ; Behavioral sciences ; Biology and Life Sciences ; Cognitive ability ; Cognitive style ; Computer and Information Sciences ; Computer Communication Networks ; Computer science ; Computer Security ; Computer simulation ; Cybercrime ; Cybersecurity ; Electronic mail systems ; Emotional disorders ; Factor analysis ; Female ; Humans ; Internet ; Internet crime ; Male ; Management information systems ; Medicine and Health Sciences ; Middle Aged ; Motivation ; Personal computers ; Personality ; Personality traits ; Physical Sciences ; Protocol (computers) ; Research and Analysis Methods ; Researchers ; Resilience ; Risk Management ; Security ; Security systems ; Social Sciences ; Software ; Young Adult</subject><ispartof>PloS one, 2018-12, Vol.13 (12), p.e0207408-e0207408</ispartof><rights>2018 Weems et al. This is an open access article distributed under the terms of the Creative Commons Attribution License: http://creativecommons.org/licenses/by/4.0/ (the “License”), which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited. Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.</rights><rights>2018 Weems et al 2018 Weems et al</rights><lds50>peer_reviewed</lds50><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c526t-34c5b7204c7addd8c071294c5cb561b915d048f3584a61fbd1d3ac0f76296dde3</citedby><cites>FETCH-LOGICAL-c526t-34c5b7204c7addd8c071294c5cb561b915d048f3584a61fbd1d3ac0f76296dde3</cites><orcidid>0000-0001-9214-3401 ; 0000-0001-8981-4446</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktopdf>$$Uhttps://www.ncbi.nlm.nih.gov/pmc/articles/PMC6291068/pdf/$$EPDF$$P50$$Gpubmedcentral$$Hfree_for_read</linktopdf><linktohtml>$$Uhttps://www.ncbi.nlm.nih.gov/pmc/articles/PMC6291068/$$EHTML$$P50$$Gpubmedcentral$$Hfree_for_read</linktohtml><link.rule.ids>230,314,723,776,780,860,881,2096,2915,23845,27901,27902,53766,53768,79569,79570</link.rule.ids><backlink>$$Uhttps://www.ncbi.nlm.nih.gov/pubmed/30540758$$D View this record in MEDLINE/PubMed$$Hfree_for_read</backlink></links><search><creatorcontrib>Weems, Carl F</creatorcontrib><creatorcontrib>Ahmed, Irfan</creatorcontrib><creatorcontrib>Richard, 3rd, Golden G</creatorcontrib><creatorcontrib>Russell, Justin D</creatorcontrib><creatorcontrib>Neill, Erin L</creatorcontrib><title>Susceptibility and resilience to cyber threat: Findings from a scenario decision program to measure secure and insecure computing behavior</title><title>PloS one</title><addtitle>PLoS One</addtitle><description>Interest in the individual differences underlying end user computer security behavior has led to the development of a multidisciplinary field of research known as behavioral information security. An important gap in knowledge and the motivation for this research is the development of ways to measure secure and insecure cyber behavior for research and eventually practice. Here we report a study designed to develop a technique for assessing secure and insecure cyber behavior for broad research use. The Susceptibility and Resilience to Cyber Threat (SRCT) is an immersive scenario decision program. The SRCT measures susceptibility to cyber threat and malicious behavior as well protective resilience actions via participant responses/decisions to emails, interactions with security dialogs, and computer actions in a real-world simulation. Data were collected from a sample of 190 adults (76.3% female), between the ages of 18-61 (mean age = 26.12). Personality, behavioral tendencies, and cognitive preferences were measured with standard previously validated protocols and self-report measures. Factor analysis suggested a 5 item secure actions scale and a 9 item insecure actions scale as viable to extract from the SRCT responses. Statistically analyzable distributions of secure and insecure cyber behaviors were obtained, and these subscales demonstrated acceptable internal consistency as hypothesized. Associations between SRCT scales and other indices of cyber behavior, as well as self-reported personality, were lower than predicted, suggesting that past research reporting links between self-reports of personality and self-reported cyber-behavior may be overestimating the links for actual cyber actions. However, our exploratory analyses suggest discrepancies between self-report and actions in the SRCT may be an interesting avenue to explore. Overall, results were consistent with theorizing and suggest the technique is viable as a construct measure in future research or as an outcome variable in experimental intervention designs.</description><subject>Adolescent</subject><subject>Adult</subject><subject>Adults</subject><subject>Anxiety</subject><subject>Behavior</subject><subject>Behavioral sciences</subject><subject>Biology and Life Sciences</subject><subject>Cognitive ability</subject><subject>Cognitive style</subject><subject>Computer and Information Sciences</subject><subject>Computer Communication Networks</subject><subject>Computer science</subject><subject>Computer Security</subject><subject>Computer simulation</subject><subject>Cybercrime</subject><subject>Cybersecurity</subject><subject>Electronic mail systems</subject><subject>Emotional disorders</subject><subject>Factor analysis</subject><subject>Female</subject><subject>Humans</subject><subject>Internet</subject><subject>Internet crime</subject><subject>Male</subject><subject>Management information systems</subject><subject>Medicine and Health Sciences</subject><subject>Middle Aged</subject><subject>Motivation</subject><subject>Personal computers</subject><subject>Personality</subject><subject>Personality traits</subject><subject>Physical Sciences</subject><subject>Protocol (computers)</subject><subject>Research and Analysis Methods</subject><subject>Researchers</subject><subject>Resilience</subject><subject>Risk Management</subject><subject>Security</subject><subject>Security systems</subject><subject>Social Sciences</subject><subject>Software</subject><subject>Young Adult</subject><issn>1932-6203</issn><issn>1932-6203</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2018</creationdate><recordtype>article</recordtype><sourceid>EIF</sourceid><sourceid>BENPR</sourceid><sourceid>DOA</sourceid><recordid>eNptkstuFDEQRVsIRELgDxBYYsNmBj_7wSISighEisQCWFt-VM846rYb2x1pfoGvxs10ogSxKrt873FVqarqNcFbwhry4SbM0athOwUPW0xxw3H7pDolHaObmmL29MH5pHqR0g3GgrV1_bw6YVhw3Ij2tPr9fU4Gpuy0G1w-IOUtipDKBbwBlAMyBw0R5X0ElT-iS-et87uE-hhGpFAxexVdQBaMSy54NMWwi2pcrCOoNEdACcwSFrbz68WEcZpzQSENe3XrQnxZPevVkODVGs-qn5eff1x83Vx_-3J18el6YwSt84ZxI3RDMTeNsta2BjeEdiVptKiJ7oiwmLc9Ey1XNem1JZYpg_umpl1tLbCz6u2ROw0hyXWMSVIiRAGJjhTF1VFhg7qRU3SjigcZlJN_EyHupIrZmQGk1p0lrMVKc8yhbzoBWhumW04pQN8V1vn626xHsGVcOarhEfTxi3d7uQu3spRLcN0WwPsVEMOvGVKWoytTHwblIczHutuu4WKRvvtH-v_u-FFlYkgpQn9fDMFyWa07l1xWS66rVWxvHjZyb7rbJfYHmfvQgA</recordid><startdate>20181212</startdate><enddate>20181212</enddate><creator>Weems, Carl F</creator><creator>Ahmed, Irfan</creator><creator>Richard, 3rd, Golden G</creator><creator>Russell, Justin D</creator><creator>Neill, Erin L</creator><general>Public Library of Science</general><general>Public Library of Science (PLoS)</general><scope>CGR</scope><scope>CUY</scope><scope>CVF</scope><scope>ECM</scope><scope>EIF</scope><scope>NPM</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>3V.</scope><scope>7QG</scope><scope>7QL</scope><scope>7QO</scope><scope>7RV</scope><scope>7SN</scope><scope>7SS</scope><scope>7T5</scope><scope>7TG</scope><scope>7TM</scope><scope>7U9</scope><scope>7X2</scope><scope>7X7</scope><scope>7XB</scope><scope>88E</scope><scope>8AO</scope><scope>8C1</scope><scope>8FD</scope><scope>8FE</scope><scope>8FG</scope><scope>8FH</scope><scope>8FI</scope><scope>8FJ</scope><scope>8FK</scope><scope>ABJCF</scope><scope>ABUWG</scope><scope>AEUYN</scope><scope>AFKRA</scope><scope>ARAPS</scope><scope>ATCPS</scope><scope>AZQEC</scope><scope>BBNVY</scope><scope>BENPR</scope><scope>BGLVJ</scope><scope>BHPHI</scope><scope>C1K</scope><scope>CCPQU</scope><scope>D1I</scope><scope>DWQXO</scope><scope>FR3</scope><scope>FYUFA</scope><scope>GHDGH</scope><scope>GNUQQ</scope><scope>H94</scope><scope>HCIFZ</scope><scope>K9.</scope><scope>KB.</scope><scope>KB0</scope><scope>KL.</scope><scope>L6V</scope><scope>LK8</scope><scope>M0K</scope><scope>M0S</scope><scope>M1P</scope><scope>M7N</scope><scope>M7P</scope><scope>M7S</scope><scope>NAPCQ</scope><scope>P5Z</scope><scope>P62</scope><scope>P64</scope><scope>PATMY</scope><scope>PDBOC</scope><scope>PIMPY</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope><scope>PTHSS</scope><scope>PYCSY</scope><scope>RC3</scope><scope>7X8</scope><scope>5PM</scope><scope>DOA</scope><orcidid>https://orcid.org/0000-0001-9214-3401</orcidid><orcidid>https://orcid.org/0000-0001-8981-4446</orcidid></search><sort><creationdate>20181212</creationdate><title>Susceptibility and resilience to cyber threat: Findings from a scenario decision program to measure secure and insecure computing behavior</title><author>Weems, Carl F ; Ahmed, Irfan ; Richard, 3rd, Golden G ; Russell, Justin D ; Neill, Erin L</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c526t-34c5b7204c7addd8c071294c5cb561b915d048f3584a61fbd1d3ac0f76296dde3</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2018</creationdate><topic>Adolescent</topic><topic>Adult</topic><topic>Adults</topic><topic>Anxiety</topic><topic>Behavior</topic><topic>Behavioral sciences</topic><topic>Biology and Life Sciences</topic><topic>Cognitive ability</topic><topic>Cognitive style</topic><topic>Computer and Information Sciences</topic><topic>Computer Communication Networks</topic><topic>Computer science</topic><topic>Computer Security</topic><topic>Computer simulation</topic><topic>Cybercrime</topic><topic>Cybersecurity</topic><topic>Electronic mail systems</topic><topic>Emotional disorders</topic><topic>Factor analysis</topic><topic>Female</topic><topic>Humans</topic><topic>Internet</topic><topic>Internet crime</topic><topic>Male</topic><topic>Management information systems</topic><topic>Medicine and Health Sciences</topic><topic>Middle Aged</topic><topic>Motivation</topic><topic>Personal computers</topic><topic>Personality</topic><topic>Personality traits</topic><topic>Physical Sciences</topic><topic>Protocol (computers)</topic><topic>Research and Analysis Methods</topic><topic>Researchers</topic><topic>Resilience</topic><topic>Risk Management</topic><topic>Security</topic><topic>Security systems</topic><topic>Social Sciences</topic><topic>Software</topic><topic>Young Adult</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Weems, Carl F</creatorcontrib><creatorcontrib>Ahmed, Irfan</creatorcontrib><creatorcontrib>Richard, 3rd, Golden G</creatorcontrib><creatorcontrib>Russell, Justin D</creatorcontrib><creatorcontrib>Neill, Erin L</creatorcontrib><collection>Medline</collection><collection>MEDLINE</collection><collection>MEDLINE (Ovid)</collection><collection>MEDLINE</collection><collection>MEDLINE</collection><collection>PubMed</collection><collection>CrossRef</collection><collection>ProQuest Central (Corporate)</collection><collection>Animal Behavior Abstracts</collection><collection>Bacteriology Abstracts (Microbiology B)</collection><collection>Biotechnology Research Abstracts</collection><collection>Nursing &amp; Allied Health Database</collection><collection>Ecology Abstracts</collection><collection>Entomology Abstracts (Full archive)</collection><collection>Immunology Abstracts</collection><collection>Meteorological &amp; Geoastrophysical Abstracts</collection><collection>Nucleic Acids Abstracts</collection><collection>Virology and AIDS Abstracts</collection><collection>Agricultural Science Collection</collection><collection>Health &amp; Medical Collection</collection><collection>ProQuest Central (purchase pre-March 2016)</collection><collection>Medical Database (Alumni Edition)</collection><collection>ProQuest Pharma Collection</collection><collection>Public Health Database</collection><collection>Technology Research Database</collection><collection>ProQuest SciTech Collection</collection><collection>ProQuest Technology Collection</collection><collection>ProQuest Natural Science Collection</collection><collection>Hospital Premium Collection</collection><collection>Hospital Premium Collection (Alumni Edition)</collection><collection>ProQuest Central (Alumni) (purchase pre-March 2016)</collection><collection>Materials Science &amp; Engineering Collection</collection><collection>ProQuest Central (Alumni Edition)</collection><collection>ProQuest One Sustainability</collection><collection>ProQuest Central UK/Ireland</collection><collection>Advanced Technologies &amp; Aerospace Collection</collection><collection>Agricultural &amp; Environmental Science Collection</collection><collection>ProQuest Central Essentials</collection><collection>Biological Science Collection</collection><collection>ProQuest Central</collection><collection>Technology Collection</collection><collection>Natural Science Collection</collection><collection>Environmental Sciences and Pollution Management</collection><collection>ProQuest One Community College</collection><collection>ProQuest Materials Science Collection</collection><collection>ProQuest Central Korea</collection><collection>Engineering Research Database</collection><collection>Health Research Premium Collection</collection><collection>Health Research Premium Collection (Alumni)</collection><collection>ProQuest Central Student</collection><collection>AIDS and Cancer Research Abstracts</collection><collection>SciTech Premium Collection</collection><collection>ProQuest Health &amp; Medical Complete (Alumni)</collection><collection>Materials Science Database</collection><collection>Nursing &amp; Allied Health Database (Alumni Edition)</collection><collection>Meteorological &amp; Geoastrophysical Abstracts - Academic</collection><collection>ProQuest Engineering Collection</collection><collection>ProQuest Biological Science Collection</collection><collection>Agricultural Science Database</collection><collection>Health &amp; Medical Collection (Alumni Edition)</collection><collection>Medical Database</collection><collection>Algology Mycology and Protozoology Abstracts (Microbiology C)</collection><collection>Biological Science Database</collection><collection>Engineering Database</collection><collection>Nursing &amp; Allied Health Premium</collection><collection>Advanced Technologies &amp; Aerospace Database</collection><collection>ProQuest Advanced Technologies &amp; Aerospace Collection</collection><collection>Biotechnology and BioEngineering Abstracts</collection><collection>Environmental Science Database</collection><collection>Materials Science Collection</collection><collection>Publicly Available Content Database</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><collection>Engineering Collection</collection><collection>Environmental Science Collection</collection><collection>Genetics Abstracts</collection><collection>MEDLINE - Academic</collection><collection>PubMed Central (Full Participant titles)</collection><collection>DOAJ Directory of Open Access Journals</collection><jtitle>PloS one</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Weems, Carl F</au><au>Ahmed, Irfan</au><au>Richard, 3rd, Golden G</au><au>Russell, Justin D</au><au>Neill, Erin L</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Susceptibility and resilience to cyber threat: Findings from a scenario decision program to measure secure and insecure computing behavior</atitle><jtitle>PloS one</jtitle><addtitle>PLoS One</addtitle><date>2018-12-12</date><risdate>2018</risdate><volume>13</volume><issue>12</issue><spage>e0207408</spage><epage>e0207408</epage><pages>e0207408-e0207408</pages><issn>1932-6203</issn><eissn>1932-6203</eissn><abstract>Interest in the individual differences underlying end user computer security behavior has led to the development of a multidisciplinary field of research known as behavioral information security. An important gap in knowledge and the motivation for this research is the development of ways to measure secure and insecure cyber behavior for research and eventually practice. Here we report a study designed to develop a technique for assessing secure and insecure cyber behavior for broad research use. The Susceptibility and Resilience to Cyber Threat (SRCT) is an immersive scenario decision program. The SRCT measures susceptibility to cyber threat and malicious behavior as well protective resilience actions via participant responses/decisions to emails, interactions with security dialogs, and computer actions in a real-world simulation. Data were collected from a sample of 190 adults (76.3% female), between the ages of 18-61 (mean age = 26.12). Personality, behavioral tendencies, and cognitive preferences were measured with standard previously validated protocols and self-report measures. Factor analysis suggested a 5 item secure actions scale and a 9 item insecure actions scale as viable to extract from the SRCT responses. Statistically analyzable distributions of secure and insecure cyber behaviors were obtained, and these subscales demonstrated acceptable internal consistency as hypothesized. Associations between SRCT scales and other indices of cyber behavior, as well as self-reported personality, were lower than predicted, suggesting that past research reporting links between self-reports of personality and self-reported cyber-behavior may be overestimating the links for actual cyber actions. However, our exploratory analyses suggest discrepancies between self-report and actions in the SRCT may be an interesting avenue to explore. Overall, results were consistent with theorizing and suggest the technique is viable as a construct measure in future research or as an outcome variable in experimental intervention designs.</abstract><cop>United States</cop><pub>Public Library of Science</pub><pmid>30540758</pmid><doi>10.1371/journal.pone.0207408</doi><orcidid>https://orcid.org/0000-0001-9214-3401</orcidid><orcidid>https://orcid.org/0000-0001-8981-4446</orcidid><oa>free_for_read</oa></addata></record>
fulltext fulltext
identifier ISSN: 1932-6203
ispartof PloS one, 2018-12, Vol.13 (12), p.e0207408-e0207408
issn 1932-6203
1932-6203
language eng
recordid cdi_plos_journals_2155129591
source MEDLINE; DOAJ Directory of Open Access Journals; Elektronische Zeitschriftenbibliothek - Frei zugängliche E-Journals; PubMed Central; Free Full-Text Journals in Chemistry; Public Library of Science (PLoS)
subjects Adolescent
Adult
Adults
Anxiety
Behavior
Behavioral sciences
Biology and Life Sciences
Cognitive ability
Cognitive style
Computer and Information Sciences
Computer Communication Networks
Computer science
Computer Security
Computer simulation
Cybercrime
Cybersecurity
Electronic mail systems
Emotional disorders
Factor analysis
Female
Humans
Internet
Internet crime
Male
Management information systems
Medicine and Health Sciences
Middle Aged
Motivation
Personal computers
Personality
Personality traits
Physical Sciences
Protocol (computers)
Research and Analysis Methods
Researchers
Resilience
Risk Management
Security
Security systems
Social Sciences
Software
Young Adult
title Susceptibility and resilience to cyber threat: Findings from a scenario decision program to measure secure and insecure computing behavior
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-02-14T08%3A07%3A26IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_plos_&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Susceptibility%20and%20resilience%20to%20cyber%20threat:%20Findings%20from%20a%20scenario%20decision%20program%20to%20measure%20secure%20and%20insecure%20computing%20behavior&rft.jtitle=PloS%20one&rft.au=Weems,%20Carl%20F&rft.date=2018-12-12&rft.volume=13&rft.issue=12&rft.spage=e0207408&rft.epage=e0207408&rft.pages=e0207408-e0207408&rft.issn=1932-6203&rft.eissn=1932-6203&rft_id=info:doi/10.1371/journal.pone.0207408&rft_dat=%3Cproquest_plos_%3E2155129591%3C/proquest_plos_%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=2155129591&rft_id=info:pmid/30540758&rft_doaj_id=oai_doaj_org_article_bb9d1380ab404ef795ebbc3b8422eef9&rfr_iscdi=true