Personality as a Predictor of Cybersecurity Behavior

被引:30
作者
Shappie, Alexander T. [1 ]
Dawson, Charlotte A. [1 ]
Debb, Scott M. [1 ,2 ]
机构
[1] Virginia Consortium Program Clin Psychol, Norfolk, VA USA
[2] Norfolk State Univ, Dept Psychol, Brown Hall,Suite 216, Norfolk, VA 23504 USA
关键词
information security; cybersecurity; Big Five personality; self-efficacy; perceived barriers; INFORMATION-SYSTEMS SECURITY; PLANNED BEHAVIOR; INTENTIONS; TRAITS;
D O I
10.1037/ppm0000247
中图分类号
G2 [信息与知识传播];
学科分类号
05 ; 0503 ;
摘要
Personality may better predict cybersecurity behavior relative to an individual's stated intentions; however, people often behave in ways that are discordant with what they intend. Assuming most people have the intention of complying with safe practices, it is still no surprise that people violate policies and put sensitive data at risk regularly. Previous research has investigated all of the "Big Five" personality factors in relation to cybersecurity behavior, although there is no consensus regarding which factors are most important. In this study, data were collected from 676 undergraduate students who were administered the Employees' Online Security Behavior and Beliefs questionnaire and the Big Five Inventory-44. Significant correlations were observed between self-reported cybersecurity behaviors and some, but not all, personality constructs. Linear regression was used to examine whether the 5 personality factors were significantly associated with cybersecurity behaviors, and a hierarchical regression examined the personality factors that explained additional variance over-and-above cybersecurity behaviors, specifically perceived barriers, response efficacy, and security self-efficacy. Conscientiousness, agreeableness, and openness were significantly associated with self-reported cybersecurity behaviors. Results suggest that personality plays an important role in understanding cybersecurity behaviors, which is consistent with a growing body of literature highlighting conscientiousness as a strong predictor of cybersecurity behaviors. The present study's findings suggest that personality structure is associated with cybersecurity behaviors and that conscientiousness and openness may be particularly salient to this relationship.
引用
收藏
页码:475 / 480
页数:6
相关论文
共 31 条
  • [1] Explaining the discrepancy between intentions and actions: The case of hypothetical bias in contingent valuation
    Ajzen, I
    Brown, TC
    Carvajal, F
    [J]. PERSONALITY AND SOCIAL PSYCHOLOGY BULLETIN, 2004, 30 (09) : 1108 - 1121
  • [2] Gender difference and employees' cybersecurity behaviors
    Anwar, Mohd
    He, Wu
    Ash, Ivan
    Yuan, Xiaohong
    Li, Ling
    Xu, Li
    [J]. COMPUTERS IN HUMAN BEHAVIOR, 2017, 69 : 437 - 443
  • [3] Bansal G., 2011, SECURITY CONCERNS NO
  • [4] If someone is watching, I'll do what I'm asked: mandatoriness, control, and information security
    Boss, Scott R.
    Kirsch, Laurie J.
    Angermeier, Ingo
    Shingler, Raymond A.
    Boss, R. Wayne
    [J]. EUROPEAN JOURNAL OF INFORMATION SYSTEMS, 2009, 18 (02) : 151 - 164
  • [5] Conscientiousness and the theory of planned behavior: Toward a more complete model of the antecedents of intentions and behavior
    Conner, M
    Abraham, C
    [J]. PERSONALITY AND SOCIAL PSYCHOLOGY BULLETIN, 2001, 27 (11) : 1547 - 1561
  • [6] Future directions for behavioral information security research
    Crossler, Robert E.
    Johnston, Allen C.
    Lowry, Paul Benjamin
    Hu, Qing
    Warkentin, Merrill
    Baskerville, Richard
    [J]. COMPUTERS & SECURITY, 2013, 32 : 90 - 101
  • [7] Goldberg L. R., 1992, Psychological Assessment, P26, DOI [DOI 10.1037/1040-3590.4.1.26, 10.1037/1040- 3590.4.1.26, DOI 10.1037/10403590.4.1.26]
  • [8] Correlating human traits and cyber security behavior intentions
    Gratian, Margaret
    Bandi, Sruthi
    Cukier, Michel
    Dykstra, Josiah
    Ginther, Amy
    [J]. COMPUTERS & SECURITY, 2018, 73 : 345 - 358
  • [9] Understanding Nonmalicious Security Violations in the Workplace: A Composite Behavior Model
    Guo, Ken H.
    Yuan, Yufei
    Archer, Norman P.
    Connelly, Catherine E.
    [J]. JOURNAL OF MANAGEMENT INFORMATION SYSTEMS, 2011, 28 (02) : 203 - 236
  • [10] Hadlington L., 2018, Psychological and behavioral examinations in cyber security, P46, DOI 10.4018/978-1-7998-7705-9.ch087