What Drives Generation Z to Behave Security Compliant? An Extended Analysis Using the Theory of Planned Behaviour

被引:0
作者
Vollenweider, Fabrizia [1 ]
Jahankhani, Hamid [2 ]
机构
[1] Checkpoint, Spreitenbach, Switzerland
[2] Northumbria Univ, London, England
来源
CYBERSECURITY IN THE AGE OF SMART SOCIETIES, 2022 | 2023年
关键词
Cyber security; Generation Z; Theory of planned behaviour; Digital; Vulnerabilities; Attack patterns; AWARENESS;
D O I
10.1007/978-3-031-20160-8_17
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Cyber security remains a relevant topic for organisations. While companies invest in expensive security tools security awareness training often is neglected, even though human error still accounts for a large part of cyber incidents (Gartner, 2022). At the same time there is currently an important generational shift, as Generation Z (Gen Z) is starting to enter the workforce and is said to be soon overtaking millennials. However, Gen Z is said to experience a lot more security related issues compared to older generations. This paper aims to understand and analyse security behaviour for Gen Z by using the theory of planned behaviour to understand what influences the security behaviour of this generation. The theory of planned behaviour has been often utilised in previous research to understand how security behaviour is formed and how it can be influenced, however, it has not yet been researched in the context of Gen Z. The results conclude that Gen Z has a rather indifferent attitude towards security and generally values convenience much more than security. This can be led back to the lack of security awareness education as opposed to older generations that often experienced a training in the work environment. Gen Z is highly influenced by their environment; therefore, a company should strive to create a security culture. Lastly, Gen Z experiences a low perceived behavioural control, as they feel a lack of control regarding to the internet and lack education how to behave more secure. This gap could be closed by providing a suitable security awareness training.
引用
收藏
页码:315 / 341
页数:27
相关论文
共 62 条
[51]  
Stanford University, 2022, PHISH AW PROGR LEARN
[52]   Death by a thousand facts: Criticising the technocratic approach to information security awareness [J].
Stewart, Geordie ;
Lacey, David .
Information Management and Computer Security, 2012, 20 (01) :29-38
[53]   What influences employees to follow security policies? [J].
Tam, Carlos ;
Conceicao, Carolina de Matos ;
Oliveira, Tiago .
SAFETY SCIENCE, 2022, 147
[54]   Analyzing the role of cognitive and cultural biases in the internalization of information security policies: Recommendations for information security awareness programs [J].
Tsohou, Aggeliki ;
Karyda, Maria ;
Kokolakis, Spyros .
COMPUTERS & SECURITY, 2015, 52 :128-141
[55]  
Twenge JeanM., 2017, iGen: Why Today's Super Connected Kids Are Growing Up Less Rebellious, More Tolerant, Less Happy-and Completely Unprepared for Adulthood
[56]   Generation to generation: effects of intergenerational interactions on attitudes [J].
Wagner, Lisa S. ;
Luger, Tana M. .
EDUCATIONAL GERONTOLOGY, 2021, 47 (01) :1-12
[57]   Generation Z: Cyber-Attack Awareness Training Effectiveness [J].
White, Garry .
JOURNAL OF COMPUTER INFORMATION SYSTEMS, 2022, 62 (03) :560-571
[58]  
Williams A., 2015, Move Over Millennials, Here Comes Generation Z
[59]  
WPEngine& CGK, 2017, FUT DIG EXP GEN Z IS
[60]  
Wu L, 2021, BECYBERSMART CYB AW