Proceedings of the 18th International Conference on Information Integration and Web-Based Applications and Services 2016
DOI: 10.1145/3011141.3011165
|View full text |Cite
|
Sign up to set email alerts
|

Cultural and psychological factors in cyber-security

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

9
29
0
1

Year Published

2019
2019
2024
2024

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 44 publications
(39 citation statements)
references
References 12 publications
9
29
0
1
Order By: Relevance
“…In addition, openness to experience had the highest level of relationship, whereas the extroversion had the lowest one. In the light of these findings about personality traits along with the supportive evidences from the literature, it can be deduced that individuals who are open to experience (McBride, Carter & Warkentin, 2012;McCormac et al, 2017), conscientious (Gratian et al, 2018;Halevi et al, 2016;McCormac et al, 2017), emotionally stable (McCormac et al, 2017), agreeable (McCormac et al, 2017 and extrovert (Gratian et al, 2018) perform cyber security behaviors in their daily lives in the more desired and acceptable level.…”
Section: Discussionmentioning
confidence: 91%
“…In addition, openness to experience had the highest level of relationship, whereas the extroversion had the lowest one. In the light of these findings about personality traits along with the supportive evidences from the literature, it can be deduced that individuals who are open to experience (McBride, Carter & Warkentin, 2012;McCormac et al, 2017), conscientious (Gratian et al, 2018;Halevi et al, 2016;McCormac et al, 2017), emotionally stable (McCormac et al, 2017), agreeable (McCormac et al, 2017 and extrovert (Gratian et al, 2018) perform cyber security behaviors in their daily lives in the more desired and acceptable level.…”
Section: Discussionmentioning
confidence: 91%
“…Halevi et al ( 2013 ) find that high neuroticism increases responses to prize phishing messages and that individuals with a high openness have low security setting on social media account, increasing their exposures to privacy attacks. Halevi et al ( 2016 ) find that personality traits affect security attitudes and behaviors as follows: high conscientiousness is associated to highly secure behaviors but does not affect self-efficacy (i.e., one's ability in independently resolving computer security issues); high openness is associated to high self-efficacy; high neuroticism is associated to low self-efficacy; and high emotional stability (inverse of neuroticism) is associated to high self-efficacy. Cho et al ( 2016 ) contradict some of the findings presented in Halevi et al ( 2013 ), by finding that high neuroticism decreases trust and increases risk perception, which makes one more likely to misclassify benign emails as phishing ones.…”
Section: Victim Cognition Through the Lens Of Social Engineering Cmentioning
confidence: 99%
“…Wright and Marett ( 2010 ) find (i) a combination of knowledge and training is effective against phishing attacks; (ii) individuals with a lower self-efficacy (i.e., one's ability to manage unexpected events) and web experience are more likely to fall victims to social engineering cyberattacks; and (iii) individuals with high self-efficacy are less likely to comply with information requests presented in phishing attacks. Halevi et al ( 2016 ) find that a high self-efficacy correlates a better capability to respond to security incidents. Arachchilage and Love ( 2014 ) find that self-efficacy, when combined with knowledge about phishing attacks, can lead to effective strategies for coping with phishing attacks.…”
Section: Victim Cognition Through the Lens Of Social Engineering Cmentioning
confidence: 99%
See 1 more Smart Citation
“…Despite this, the information security community does not have a thorough understanding of what constitutes a human error and often resorts to general basic awareness or training on information security following an incident rather than dealing with the causal factors (Mahfuth et al, 2017). Current practices fall regularly short of identifying the actual root cause of human error related information security incidents even though people are recognized as being the weakest link in information security controls (Metalidou et al, 2014;Halevi et al, 2017;Mahfuth et al, 2017;Parsons et al, 2017;Furnell et al, 2018). There are also no established human error information security frameworks in practice to enable not only effective resolution of human error related information security incidents but also the prevention of these events.…”
Section: Introductionmentioning
confidence: 99%