Personality Traits and Cyber-Attack Victimisation: Multiple Mediation Analysis

被引:0
作者
Albladi, Samar Muslah [1 ]
Weir, George R. S. [1 ]
机构
[1] Univ Strathclyde, Dept Comp & Informat Sci, Glasgow, Lanark, Scotland
来源
2017 JOINT 13TH CTTE AND 10TH CMI CONFERENCE ON INTERNET OF THINGS - BUSINESS MODELS, USERS, AND NETWORKS | 2017年
关键词
Cyber-attack; Motivation; Personality Traits; Trust; User Competence; User Vulnerability; COMMUNITIES; KNOWLEDGE; BEHAVIOR; FACEBOOK;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The current research aims to gain insight on the role of the five personality traits (conscientiousness, neuroticism, extraversion, agreeableness, and openness to experience) in users' susceptibility to cyber-attack victimisation in the context of online social networks and investigates how different factors such as users' competence to deal with online threats, users' trust in other members in social network as well as trusting the network's service provider, users' motivation to engage in the network, and users' experience with cyber-crimes mediate and control this relationship. The effect of personality traits on user's online risky behaviour is still a controversial topic in cyber security research. Therefore, the present study proposes a mediation model that includes the five personality traits and the four mediators that together affect the user's likelihood of falling victim to cyber-attacks. The study conducted a scenario-based experiment with 316 participants to test the study model and the hypotheses' significance. Empirical results indicate that all five personality traits, except openness, have significant indirect effect on users' susceptibility to cyber-attack victimisation.
引用
收藏
页数:6
相关论文
共 40 条
[1]  
Albladi SM, 2017, INT CARN CONF SECU
[2]   What Is the Influence of Users' Characteristics on Their Ability to Detect Phishing Emails? [J].
Alseadoon, Ibrahim ;
Othman, F. I. ;
Chan, Taizan .
ADVANCED COMPUTER AND COMMUNICATION ENGINEERING TECHNOLOGY, 2015, 315
[3]  
[Anonymous], 2013, ARXIV13017643
[4]  
Bohme R, 2012, 2012 ECRIME RES SUMM, P1, DOI [10.1109/eCrime.2012.6489519, DOI 10.1109/ECRIME.2012.6489519]
[5]  
Brandtzæg PB, 2009, LECT NOTES COMPUT SC, V5621, P143, DOI 10.1007/978-3-642-02774-1_16
[6]  
CALIENDO M., 2011, Personality Characteristics and the Decision to Become and Stay Self-Employed
[7]   How do victims react to cyberbullying on social networking sites? The influence of previous cyberbullying victimization experiences [J].
Cao, Bolin ;
Lin, Wan-Ying .
COMPUTERS IN HUMAN BEHAVIOR, 2015, 52 :458-465
[8]   Visiting theories that predict college students' self-disclosure on Facebook [J].
Chang, Chen-Wei ;
Heo, Jun .
COMPUTERS IN HUMAN BEHAVIOR, 2014, 30 :79-86
[9]   Understanding knowledge sharing in virtual communities: An integration of social capital and social cognitive theories [J].
Chiu, Chao-Min ;
Hsu, Meng-Hsiang ;
Wang, Eric T. G. .
DECISION SUPPORT SYSTEMS, 2006, 42 (03) :1872-1888
[10]  
Cho JH, 2016, 2016 IEEE INTERNATIONAL MULTI-DISCIPLINARY CONFERENCE ON COGNITIVE METHODS IN SITUATION AWARENESS AND DECISION SUPPORT (COGSIMA), P7, DOI 10.1109/COGSIMA.2016.7497779