2017
DOI: 10.1016/j.chb.2016.12.040
|View full text |Cite
|
Sign up to set email alerts
|

Gender difference and employees' cybersecurity behaviors

Abstract: Security breaches are prevalent in organizations and many of the breaches are attributed to human errors. As a result, the organizations need to increase their employees' security awareness and their capabilities to engage in safe cybersecurity behaviors. Many different psychological and social factors affect employees' cybersecurity behaviors. An important research question to explore is to what extent gender plays a role in mediating the factors that affect cybersecurity beliefs and behaviors of employees. I… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

10
154
7
4

Year Published

2017
2017
2024
2024

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 225 publications
(175 citation statements)
references
References 26 publications
10
154
7
4
Order By: Relevance
“…In the same report, one of the key concerns raised was the growing threat from individuals within the organization, or the so called 'insider threat'. This latter point is mirrored by an apparent realization by researchers within the information security community that, for the most part, the weakest element in the cybersecurity chain is that of the human (Anwar et al, 2016;Nurse, Creese, Goldsmith, & Lamberts, 2011;Sasse, Brostoff, & Weirich, 2001;Sasse & Flechais, 2005).…”
Section: Introductionmentioning
confidence: 99%
“…In the same report, one of the key concerns raised was the growing threat from individuals within the organization, or the so called 'insider threat'. This latter point is mirrored by an apparent realization by researchers within the information security community that, for the most part, the weakest element in the cybersecurity chain is that of the human (Anwar et al, 2016;Nurse, Creese, Goldsmith, & Lamberts, 2011;Sasse, Brostoff, & Weirich, 2001;Sasse & Flechais, 2005).…”
Section: Introductionmentioning
confidence: 99%
“…The current study utilizes the OSBBQ, a self-report, Likert-scaled questionnaire consisting of 75 items assessing multiple domains of information security and associated behaviors. 10,11,14 Participants completed the questionnaire by responding to all 75 items, and the researchers score the questionnaire, with each question being scored within its individual construct to create subscale scores for each of the 13 distinct constructs ( Table 1). Initially developed for use in a corporate or workplace setting, minor changes in wording were implemented (i.e., changing ''organization'' to ''university'') to facilitate relevance to typical college students who are unlikely to have experience in corporate or workplace environments.…”
Section: Methodsmentioning
confidence: 99%
“…The OSBBQ is based on two theoretical frameworks: (a) the Health Belief Model and (b) the Protection Motivation Theory. 11 According to the previous research, the OSBBQ can be separated into multiple factors, each of which assess different manifest constructs within the latent constructs of online security behaviors and online security beliefs. 10,11,14 As a result, the OSBBQ is able to provide more information than other assessments, and allows its users to assess various aspects, of online security beliefs and behaviors.…”
Section: Methodsmentioning
confidence: 99%
See 1 more Smart Citation
“…According to the latest reports; total number, type and sophistication cyber security threats level to information systems are boosting. Motivations of these attacks are varied, but attackers deploy malicious activities even if they do not think the information held on the target systems is valuable [7], [8].…”
Section: Introductionmentioning
confidence: 99%