Susceptibility and resilience to cyber threat: Findings from a scenario decision program to measure secure and insecure computing behavior
Interest in the individual differences underlying end user computer security behavior has led to the development of a multidisciplinary field of research known as behavioral information security. An important gap in knowledge and the motivation for this research is the development of ways to measure...
Gespeichert in:
Veröffentlicht in: | PloS one 2018-12, Vol.13 (12), p.e0207408-e0207408 |
---|---|
Hauptverfasser: | , , , , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | e0207408 |
---|---|
container_issue | 12 |
container_start_page | e0207408 |
container_title | PloS one |
container_volume | 13 |
creator | Weems, Carl F Ahmed, Irfan Richard, 3rd, Golden G Russell, Justin D Neill, Erin L |
description | Interest in the individual differences underlying end user computer security behavior has led to the development of a multidisciplinary field of research known as behavioral information security. An important gap in knowledge and the motivation for this research is the development of ways to measure secure and insecure cyber behavior for research and eventually practice. Here we report a study designed to develop a technique for assessing secure and insecure cyber behavior for broad research use. The Susceptibility and Resilience to Cyber Threat (SRCT) is an immersive scenario decision program. The SRCT measures susceptibility to cyber threat and malicious behavior as well protective resilience actions via participant responses/decisions to emails, interactions with security dialogs, and computer actions in a real-world simulation. Data were collected from a sample of 190 adults (76.3% female), between the ages of 18-61 (mean age = 26.12). Personality, behavioral tendencies, and cognitive preferences were measured with standard previously validated protocols and self-report measures. Factor analysis suggested a 5 item secure actions scale and a 9 item insecure actions scale as viable to extract from the SRCT responses. Statistically analyzable distributions of secure and insecure cyber behaviors were obtained, and these subscales demonstrated acceptable internal consistency as hypothesized. Associations between SRCT scales and other indices of cyber behavior, as well as self-reported personality, were lower than predicted, suggesting that past research reporting links between self-reports of personality and self-reported cyber-behavior may be overestimating the links for actual cyber actions. However, our exploratory analyses suggest discrepancies between self-report and actions in the SRCT may be an interesting avenue to explore. Overall, results were consistent with theorizing and suggest the technique is viable as a construct measure in future research or as an outcome variable in experimental intervention designs. |
doi_str_mv | 10.1371/journal.pone.0207408 |
format | Article |
fullrecord | <record><control><sourceid>proquest_plos_</sourceid><recordid>TN_cdi_plos_journals_2155129591</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><doaj_id>oai_doaj_org_article_bb9d1380ab404ef795ebbc3b8422eef9</doaj_id><sourcerecordid>2155129591</sourcerecordid><originalsourceid>FETCH-LOGICAL-c526t-34c5b7204c7addd8c071294c5cb561b915d048f3584a61fbd1d3ac0f76296dde3</originalsourceid><addsrcrecordid>eNptkstuFDEQRVsIRELgDxBYYsNmBj_7wSISighEisQCWFt-VM846rYb2x1pfoGvxs10ogSxKrt873FVqarqNcFbwhry4SbM0athOwUPW0xxw3H7pDolHaObmmL29MH5pHqR0g3GgrV1_bw6YVhw3Ij2tPr9fU4Gpuy0G1w-IOUtipDKBbwBlAMyBw0R5X0ElT-iS-et87uE-hhGpFAxexVdQBaMSy54NMWwi2pcrCOoNEdACcwSFrbz68WEcZpzQSENe3XrQnxZPevVkODVGs-qn5eff1x83Vx_-3J18el6YwSt84ZxI3RDMTeNsta2BjeEdiVptKiJ7oiwmLc9Ey1XNem1JZYpg_umpl1tLbCz6u2ROw0hyXWMSVIiRAGJjhTF1VFhg7qRU3SjigcZlJN_EyHupIrZmQGk1p0lrMVKc8yhbzoBWhumW04pQN8V1vn626xHsGVcOarhEfTxi3d7uQu3spRLcN0WwPsVEMOvGVKWoytTHwblIczHutuu4WKRvvtH-v_u-FFlYkgpQn9fDMFyWa07l1xWS66rVWxvHjZyb7rbJfYHmfvQgA</addsrcrecordid><sourcetype>Open Website</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2155129591</pqid></control><display><type>article</type><title>Susceptibility and resilience to cyber threat: Findings from a scenario decision program to measure secure and insecure computing behavior</title><source>MEDLINE</source><source>DOAJ Directory of Open Access Journals</source><source>Elektronische Zeitschriftenbibliothek - Frei zugängliche E-Journals</source><source>PubMed Central</source><source>Free Full-Text Journals in Chemistry</source><source>Public Library of Science (PLoS)</source><creator>Weems, Carl F ; Ahmed, Irfan ; Richard, 3rd, Golden G ; Russell, Justin D ; Neill, Erin L</creator><creatorcontrib>Weems, Carl F ; Ahmed, Irfan ; Richard, 3rd, Golden G ; Russell, Justin D ; Neill, Erin L</creatorcontrib><description>Interest in the individual differences underlying end user computer security behavior has led to the development of a multidisciplinary field of research known as behavioral information security. An important gap in knowledge and the motivation for this research is the development of ways to measure secure and insecure cyber behavior for research and eventually practice. Here we report a study designed to develop a technique for assessing secure and insecure cyber behavior for broad research use. The Susceptibility and Resilience to Cyber Threat (SRCT) is an immersive scenario decision program. The SRCT measures susceptibility to cyber threat and malicious behavior as well protective resilience actions via participant responses/decisions to emails, interactions with security dialogs, and computer actions in a real-world simulation. Data were collected from a sample of 190 adults (76.3% female), between the ages of 18-61 (mean age = 26.12). Personality, behavioral tendencies, and cognitive preferences were measured with standard previously validated protocols and self-report measures. Factor analysis suggested a 5 item secure actions scale and a 9 item insecure actions scale as viable to extract from the SRCT responses. Statistically analyzable distributions of secure and insecure cyber behaviors were obtained, and these subscales demonstrated acceptable internal consistency as hypothesized. Associations between SRCT scales and other indices of cyber behavior, as well as self-reported personality, were lower than predicted, suggesting that past research reporting links between self-reports of personality and self-reported cyber-behavior may be overestimating the links for actual cyber actions. However, our exploratory analyses suggest discrepancies between self-report and actions in the SRCT may be an interesting avenue to explore. Overall, results were consistent with theorizing and suggest the technique is viable as a construct measure in future research or as an outcome variable in experimental intervention designs.</description><identifier>ISSN: 1932-6203</identifier><identifier>EISSN: 1932-6203</identifier><identifier>DOI: 10.1371/journal.pone.0207408</identifier><identifier>PMID: 30540758</identifier><language>eng</language><publisher>United States: Public Library of Science</publisher><subject>Adolescent ; Adult ; Adults ; Anxiety ; Behavior ; Behavioral sciences ; Biology and Life Sciences ; Cognitive ability ; Cognitive style ; Computer and Information Sciences ; Computer Communication Networks ; Computer science ; Computer Security ; Computer simulation ; Cybercrime ; Cybersecurity ; Electronic mail systems ; Emotional disorders ; Factor analysis ; Female ; Humans ; Internet ; Internet crime ; Male ; Management information systems ; Medicine and Health Sciences ; Middle Aged ; Motivation ; Personal computers ; Personality ; Personality traits ; Physical Sciences ; Protocol (computers) ; Research and Analysis Methods ; Researchers ; Resilience ; Risk Management ; Security ; Security systems ; Social Sciences ; Software ; Young Adult</subject><ispartof>PloS one, 2018-12, Vol.13 (12), p.e0207408-e0207408</ispartof><rights>2018 Weems et al. This is an open access article distributed under the terms of the Creative Commons Attribution License: http://creativecommons.org/licenses/by/4.0/ (the “License”), which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited. Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.</rights><rights>2018 Weems et al 2018 Weems et al</rights><lds50>peer_reviewed</lds50><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c526t-34c5b7204c7addd8c071294c5cb561b915d048f3584a61fbd1d3ac0f76296dde3</citedby><cites>FETCH-LOGICAL-c526t-34c5b7204c7addd8c071294c5cb561b915d048f3584a61fbd1d3ac0f76296dde3</cites><orcidid>0000-0001-9214-3401 ; 0000-0001-8981-4446</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktopdf>$$Uhttps://www.ncbi.nlm.nih.gov/pmc/articles/PMC6291068/pdf/$$EPDF$$P50$$Gpubmedcentral$$Hfree_for_read</linktopdf><linktohtml>$$Uhttps://www.ncbi.nlm.nih.gov/pmc/articles/PMC6291068/$$EHTML$$P50$$Gpubmedcentral$$Hfree_for_read</linktohtml><link.rule.ids>230,314,723,776,780,860,881,2096,2915,23845,27901,27902,53766,53768,79569,79570</link.rule.ids><backlink>$$Uhttps://www.ncbi.nlm.nih.gov/pubmed/30540758$$D View this record in MEDLINE/PubMed$$Hfree_for_read</backlink></links><search><creatorcontrib>Weems, Carl F</creatorcontrib><creatorcontrib>Ahmed, Irfan</creatorcontrib><creatorcontrib>Richard, 3rd, Golden G</creatorcontrib><creatorcontrib>Russell, Justin D</creatorcontrib><creatorcontrib>Neill, Erin L</creatorcontrib><title>Susceptibility and resilience to cyber threat: Findings from a scenario decision program to measure secure and insecure computing behavior</title><title>PloS one</title><addtitle>PLoS One</addtitle><description>Interest in the individual differences underlying end user computer security behavior has led to the development of a multidisciplinary field of research known as behavioral information security. An important gap in knowledge and the motivation for this research is the development of ways to measure secure and insecure cyber behavior for research and eventually practice. Here we report a study designed to develop a technique for assessing secure and insecure cyber behavior for broad research use. The Susceptibility and Resilience to Cyber Threat (SRCT) is an immersive scenario decision program. The SRCT measures susceptibility to cyber threat and malicious behavior as well protective resilience actions via participant responses/decisions to emails, interactions with security dialogs, and computer actions in a real-world simulation. Data were collected from a sample of 190 adults (76.3% female), between the ages of 18-61 (mean age = 26.12). Personality, behavioral tendencies, and cognitive preferences were measured with standard previously validated protocols and self-report measures. Factor analysis suggested a 5 item secure actions scale and a 9 item insecure actions scale as viable to extract from the SRCT responses. Statistically analyzable distributions of secure and insecure cyber behaviors were obtained, and these subscales demonstrated acceptable internal consistency as hypothesized. Associations between SRCT scales and other indices of cyber behavior, as well as self-reported personality, were lower than predicted, suggesting that past research reporting links between self-reports of personality and self-reported cyber-behavior may be overestimating the links for actual cyber actions. However, our exploratory analyses suggest discrepancies between self-report and actions in the SRCT may be an interesting avenue to explore. Overall, results were consistent with theorizing and suggest the technique is viable as a construct measure in future research or as an outcome variable in experimental intervention designs.</description><subject>Adolescent</subject><subject>Adult</subject><subject>Adults</subject><subject>Anxiety</subject><subject>Behavior</subject><subject>Behavioral sciences</subject><subject>Biology and Life Sciences</subject><subject>Cognitive ability</subject><subject>Cognitive style</subject><subject>Computer and Information Sciences</subject><subject>Computer Communication Networks</subject><subject>Computer science</subject><subject>Computer Security</subject><subject>Computer simulation</subject><subject>Cybercrime</subject><subject>Cybersecurity</subject><subject>Electronic mail systems</subject><subject>Emotional disorders</subject><subject>Factor analysis</subject><subject>Female</subject><subject>Humans</subject><subject>Internet</subject><subject>Internet crime</subject><subject>Male</subject><subject>Management information systems</subject><subject>Medicine and Health Sciences</subject><subject>Middle Aged</subject><subject>Motivation</subject><subject>Personal computers</subject><subject>Personality</subject><subject>Personality traits</subject><subject>Physical Sciences</subject><subject>Protocol (computers)</subject><subject>Research and Analysis Methods</subject><subject>Researchers</subject><subject>Resilience</subject><subject>Risk Management</subject><subject>Security</subject><subject>Security systems</subject><subject>Social Sciences</subject><subject>Software</subject><subject>Young Adult</subject><issn>1932-6203</issn><issn>1932-6203</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2018</creationdate><recordtype>article</recordtype><sourceid>EIF</sourceid><sourceid>BENPR</sourceid><sourceid>DOA</sourceid><recordid>eNptkstuFDEQRVsIRELgDxBYYsNmBj_7wSISighEisQCWFt-VM846rYb2x1pfoGvxs10ogSxKrt873FVqarqNcFbwhry4SbM0athOwUPW0xxw3H7pDolHaObmmL29MH5pHqR0g3GgrV1_bw6YVhw3Ij2tPr9fU4Gpuy0G1w-IOUtipDKBbwBlAMyBw0R5X0ElT-iS-et87uE-hhGpFAxexVdQBaMSy54NMWwi2pcrCOoNEdACcwSFrbz68WEcZpzQSENe3XrQnxZPevVkODVGs-qn5eff1x83Vx_-3J18el6YwSt84ZxI3RDMTeNsta2BjeEdiVptKiJ7oiwmLc9Ey1XNem1JZYpg_umpl1tLbCz6u2ROw0hyXWMSVIiRAGJjhTF1VFhg7qRU3SjigcZlJN_EyHupIrZmQGk1p0lrMVKc8yhbzoBWhumW04pQN8V1vn626xHsGVcOarhEfTxi3d7uQu3spRLcN0WwPsVEMOvGVKWoytTHwblIczHutuu4WKRvvtH-v_u-FFlYkgpQn9fDMFyWa07l1xWS66rVWxvHjZyb7rbJfYHmfvQgA</recordid><startdate>20181212</startdate><enddate>20181212</enddate><creator>Weems, Carl F</creator><creator>Ahmed, Irfan</creator><creator>Richard, 3rd, Golden G</creator><creator>Russell, Justin D</creator><creator>Neill, Erin L</creator><general>Public Library of Science</general><general>Public Library of Science (PLoS)</general><scope>CGR</scope><scope>CUY</scope><scope>CVF</scope><scope>ECM</scope><scope>EIF</scope><scope>NPM</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>3V.</scope><scope>7QG</scope><scope>7QL</scope><scope>7QO</scope><scope>7RV</scope><scope>7SN</scope><scope>7SS</scope><scope>7T5</scope><scope>7TG</scope><scope>7TM</scope><scope>7U9</scope><scope>7X2</scope><scope>7X7</scope><scope>7XB</scope><scope>88E</scope><scope>8AO</scope><scope>8C1</scope><scope>8FD</scope><scope>8FE</scope><scope>8FG</scope><scope>8FH</scope><scope>8FI</scope><scope>8FJ</scope><scope>8FK</scope><scope>ABJCF</scope><scope>ABUWG</scope><scope>AEUYN</scope><scope>AFKRA</scope><scope>ARAPS</scope><scope>ATCPS</scope><scope>AZQEC</scope><scope>BBNVY</scope><scope>BENPR</scope><scope>BGLVJ</scope><scope>BHPHI</scope><scope>C1K</scope><scope>CCPQU</scope><scope>D1I</scope><scope>DWQXO</scope><scope>FR3</scope><scope>FYUFA</scope><scope>GHDGH</scope><scope>GNUQQ</scope><scope>H94</scope><scope>HCIFZ</scope><scope>K9.</scope><scope>KB.</scope><scope>KB0</scope><scope>KL.</scope><scope>L6V</scope><scope>LK8</scope><scope>M0K</scope><scope>M0S</scope><scope>M1P</scope><scope>M7N</scope><scope>M7P</scope><scope>M7S</scope><scope>NAPCQ</scope><scope>P5Z</scope><scope>P62</scope><scope>P64</scope><scope>PATMY</scope><scope>PDBOC</scope><scope>PIMPY</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope><scope>PTHSS</scope><scope>PYCSY</scope><scope>RC3</scope><scope>7X8</scope><scope>5PM</scope><scope>DOA</scope><orcidid>https://orcid.org/0000-0001-9214-3401</orcidid><orcidid>https://orcid.org/0000-0001-8981-4446</orcidid></search><sort><creationdate>20181212</creationdate><title>Susceptibility and resilience to cyber threat: Findings from a scenario decision program to measure secure and insecure computing behavior</title><author>Weems, Carl F ; Ahmed, Irfan ; Richard, 3rd, Golden G ; Russell, Justin D ; Neill, Erin L</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c526t-34c5b7204c7addd8c071294c5cb561b915d048f3584a61fbd1d3ac0f76296dde3</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2018</creationdate><topic>Adolescent</topic><topic>Adult</topic><topic>Adults</topic><topic>Anxiety</topic><topic>Behavior</topic><topic>Behavioral sciences</topic><topic>Biology and Life Sciences</topic><topic>Cognitive ability</topic><topic>Cognitive style</topic><topic>Computer and Information Sciences</topic><topic>Computer Communication Networks</topic><topic>Computer science</topic><topic>Computer Security</topic><topic>Computer simulation</topic><topic>Cybercrime</topic><topic>Cybersecurity</topic><topic>Electronic mail systems</topic><topic>Emotional disorders</topic><topic>Factor analysis</topic><topic>Female</topic><topic>Humans</topic><topic>Internet</topic><topic>Internet crime</topic><topic>Male</topic><topic>Management information systems</topic><topic>Medicine and Health Sciences</topic><topic>Middle Aged</topic><topic>Motivation</topic><topic>Personal computers</topic><topic>Personality</topic><topic>Personality traits</topic><topic>Physical Sciences</topic><topic>Protocol (computers)</topic><topic>Research and Analysis Methods</topic><topic>Researchers</topic><topic>Resilience</topic><topic>Risk Management</topic><topic>Security</topic><topic>Security systems</topic><topic>Social Sciences</topic><topic>Software</topic><topic>Young Adult</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Weems, Carl F</creatorcontrib><creatorcontrib>Ahmed, Irfan</creatorcontrib><creatorcontrib>Richard, 3rd, Golden G</creatorcontrib><creatorcontrib>Russell, Justin D</creatorcontrib><creatorcontrib>Neill, Erin L</creatorcontrib><collection>Medline</collection><collection>MEDLINE</collection><collection>MEDLINE (Ovid)</collection><collection>MEDLINE</collection><collection>MEDLINE</collection><collection>PubMed</collection><collection>CrossRef</collection><collection>ProQuest Central (Corporate)</collection><collection>Animal Behavior Abstracts</collection><collection>Bacteriology Abstracts (Microbiology B)</collection><collection>Biotechnology Research Abstracts</collection><collection>Nursing & Allied Health Database</collection><collection>Ecology Abstracts</collection><collection>Entomology Abstracts (Full archive)</collection><collection>Immunology Abstracts</collection><collection>Meteorological & Geoastrophysical Abstracts</collection><collection>Nucleic Acids Abstracts</collection><collection>Virology and AIDS Abstracts</collection><collection>Agricultural Science Collection</collection><collection>Health & Medical Collection</collection><collection>ProQuest Central (purchase pre-March 2016)</collection><collection>Medical Database (Alumni Edition)</collection><collection>ProQuest Pharma Collection</collection><collection>Public Health Database</collection><collection>Technology Research Database</collection><collection>ProQuest SciTech Collection</collection><collection>ProQuest Technology Collection</collection><collection>ProQuest Natural Science Collection</collection><collection>Hospital Premium Collection</collection><collection>Hospital Premium Collection (Alumni Edition)</collection><collection>ProQuest Central (Alumni) (purchase pre-March 2016)</collection><collection>Materials Science & Engineering Collection</collection><collection>ProQuest Central (Alumni Edition)</collection><collection>ProQuest One Sustainability</collection><collection>ProQuest Central UK/Ireland</collection><collection>Advanced Technologies & Aerospace Collection</collection><collection>Agricultural & Environmental Science Collection</collection><collection>ProQuest Central Essentials</collection><collection>Biological Science Collection</collection><collection>ProQuest Central</collection><collection>Technology Collection</collection><collection>Natural Science Collection</collection><collection>Environmental Sciences and Pollution Management</collection><collection>ProQuest One Community College</collection><collection>ProQuest Materials Science Collection</collection><collection>ProQuest Central Korea</collection><collection>Engineering Research Database</collection><collection>Health Research Premium Collection</collection><collection>Health Research Premium Collection (Alumni)</collection><collection>ProQuest Central Student</collection><collection>AIDS and Cancer Research Abstracts</collection><collection>SciTech Premium Collection</collection><collection>ProQuest Health & Medical Complete (Alumni)</collection><collection>Materials Science Database</collection><collection>Nursing & Allied Health Database (Alumni Edition)</collection><collection>Meteorological & Geoastrophysical Abstracts - Academic</collection><collection>ProQuest Engineering Collection</collection><collection>ProQuest Biological Science Collection</collection><collection>Agricultural Science Database</collection><collection>Health & Medical Collection (Alumni Edition)</collection><collection>Medical Database</collection><collection>Algology Mycology and Protozoology Abstracts (Microbiology C)</collection><collection>Biological Science Database</collection><collection>Engineering Database</collection><collection>Nursing & Allied Health Premium</collection><collection>Advanced Technologies & Aerospace Database</collection><collection>ProQuest Advanced Technologies & Aerospace Collection</collection><collection>Biotechnology and BioEngineering Abstracts</collection><collection>Environmental Science Database</collection><collection>Materials Science Collection</collection><collection>Publicly Available Content Database</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><collection>Engineering Collection</collection><collection>Environmental Science Collection</collection><collection>Genetics Abstracts</collection><collection>MEDLINE - Academic</collection><collection>PubMed Central (Full Participant titles)</collection><collection>DOAJ Directory of Open Access Journals</collection><jtitle>PloS one</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Weems, Carl F</au><au>Ahmed, Irfan</au><au>Richard, 3rd, Golden G</au><au>Russell, Justin D</au><au>Neill, Erin L</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Susceptibility and resilience to cyber threat: Findings from a scenario decision program to measure secure and insecure computing behavior</atitle><jtitle>PloS one</jtitle><addtitle>PLoS One</addtitle><date>2018-12-12</date><risdate>2018</risdate><volume>13</volume><issue>12</issue><spage>e0207408</spage><epage>e0207408</epage><pages>e0207408-e0207408</pages><issn>1932-6203</issn><eissn>1932-6203</eissn><abstract>Interest in the individual differences underlying end user computer security behavior has led to the development of a multidisciplinary field of research known as behavioral information security. An important gap in knowledge and the motivation for this research is the development of ways to measure secure and insecure cyber behavior for research and eventually practice. Here we report a study designed to develop a technique for assessing secure and insecure cyber behavior for broad research use. The Susceptibility and Resilience to Cyber Threat (SRCT) is an immersive scenario decision program. The SRCT measures susceptibility to cyber threat and malicious behavior as well protective resilience actions via participant responses/decisions to emails, interactions with security dialogs, and computer actions in a real-world simulation. Data were collected from a sample of 190 adults (76.3% female), between the ages of 18-61 (mean age = 26.12). Personality, behavioral tendencies, and cognitive preferences were measured with standard previously validated protocols and self-report measures. Factor analysis suggested a 5 item secure actions scale and a 9 item insecure actions scale as viable to extract from the SRCT responses. Statistically analyzable distributions of secure and insecure cyber behaviors were obtained, and these subscales demonstrated acceptable internal consistency as hypothesized. Associations between SRCT scales and other indices of cyber behavior, as well as self-reported personality, were lower than predicted, suggesting that past research reporting links between self-reports of personality and self-reported cyber-behavior may be overestimating the links for actual cyber actions. However, our exploratory analyses suggest discrepancies between self-report and actions in the SRCT may be an interesting avenue to explore. Overall, results were consistent with theorizing and suggest the technique is viable as a construct measure in future research or as an outcome variable in experimental intervention designs.</abstract><cop>United States</cop><pub>Public Library of Science</pub><pmid>30540758</pmid><doi>10.1371/journal.pone.0207408</doi><orcidid>https://orcid.org/0000-0001-9214-3401</orcidid><orcidid>https://orcid.org/0000-0001-8981-4446</orcidid><oa>free_for_read</oa></addata></record> |
fulltext | fulltext |
identifier | ISSN: 1932-6203 |
ispartof | PloS one, 2018-12, Vol.13 (12), p.e0207408-e0207408 |
issn | 1932-6203 1932-6203 |
language | eng |
recordid | cdi_plos_journals_2155129591 |
source | MEDLINE; DOAJ Directory of Open Access Journals; Elektronische Zeitschriftenbibliothek - Frei zugängliche E-Journals; PubMed Central; Free Full-Text Journals in Chemistry; Public Library of Science (PLoS) |
subjects | Adolescent Adult Adults Anxiety Behavior Behavioral sciences Biology and Life Sciences Cognitive ability Cognitive style Computer and Information Sciences Computer Communication Networks Computer science Computer Security Computer simulation Cybercrime Cybersecurity Electronic mail systems Emotional disorders Factor analysis Female Humans Internet Internet crime Male Management information systems Medicine and Health Sciences Middle Aged Motivation Personal computers Personality Personality traits Physical Sciences Protocol (computers) Research and Analysis Methods Researchers Resilience Risk Management Security Security systems Social Sciences Software Young Adult |
title | Susceptibility and resilience to cyber threat: Findings from a scenario decision program to measure secure and insecure computing behavior |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-02-14T08%3A07%3A26IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_plos_&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Susceptibility%20and%20resilience%20to%20cyber%20threat:%20Findings%20from%20a%20scenario%20decision%20program%20to%20measure%20secure%20and%20insecure%20computing%20behavior&rft.jtitle=PloS%20one&rft.au=Weems,%20Carl%20F&rft.date=2018-12-12&rft.volume=13&rft.issue=12&rft.spage=e0207408&rft.epage=e0207408&rft.pages=e0207408-e0207408&rft.issn=1932-6203&rft.eissn=1932-6203&rft_id=info:doi/10.1371/journal.pone.0207408&rft_dat=%3Cproquest_plos_%3E2155129591%3C/proquest_plos_%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=2155129591&rft_id=info:pmid/30540758&rft_doaj_id=oai_doaj_org_article_bb9d1380ab404ef795ebbc3b8422eef9&rfr_iscdi=true |