2021
DOI: 10.5539/cis.v14n1p44
|View full text |Cite
|
Sign up to set email alerts
|

Personality and Employees’ Information Security Behavior among Generational Cohorts

Abstract: The Big Five Factors Model (FFM) of personality traits theory was tested for its ability to explain employee information security behavior (EISB), when age, measured by generational cohort (GCOHORT), moderated the relationship between the independent variables (IVs) extraversion, agreeableness, conscientiousness, emotional stability, intellect (EACESI) and the dependent variable (DV), employees’ information security behavior (EISB) which is measured by file protection behavior (FPB). Three age groups… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
9
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
2
2
1

Relationship

0
5

Authors

Journals

citations
Cited by 6 publications
(11 citation statements)
references
References 63 publications
(121 reference statements)
0
9
0
Order By: Relevance
“…A line of research has investigated individual differences in cyber-security related behaviour in terms of demographic factors, specifically, gender, age, educational qualification, computational skills and experience (Alzubaidi, 2021; Anwar et al , 2017; Ifinedo, 2012; Whitty et al , 2015; Wiley et al , 2020; Yan et al , 2018). Simultaneously, a parallel line of research has shed light on cognitive and psychological antecedents of behaviour such as attitudes, knowledge, internet addiction, impulsivity (Hadlington, 2017; Hadlington and Parsons, 2017; Nunes et al , 2021; Palanisamy and Wu, 2021), personality traits (Aharony et al , 2020; Shropshire et al , 2015; Warrington et al , 2021), perceived cyber-security threats and online self-disclosure behaviour (Bouhnik et al , 2021), moral disengagement (Hadlington et al , 2021), moral intensity (Lankton et al , 2019), work identity and locus of control (Hadlington et al , 2019), self-efficacy and perceived behavioural control (Hu et al , 2012), vicarious mastery experiences and personal responsibility (Shillair et al , 2015).…”
Section: Resultsmentioning
confidence: 99%
“…A line of research has investigated individual differences in cyber-security related behaviour in terms of demographic factors, specifically, gender, age, educational qualification, computational skills and experience (Alzubaidi, 2021; Anwar et al , 2017; Ifinedo, 2012; Whitty et al , 2015; Wiley et al , 2020; Yan et al , 2018). Simultaneously, a parallel line of research has shed light on cognitive and psychological antecedents of behaviour such as attitudes, knowledge, internet addiction, impulsivity (Hadlington, 2017; Hadlington and Parsons, 2017; Nunes et al , 2021; Palanisamy and Wu, 2021), personality traits (Aharony et al , 2020; Shropshire et al , 2015; Warrington et al , 2021), perceived cyber-security threats and online self-disclosure behaviour (Bouhnik et al , 2021), moral disengagement (Hadlington et al , 2021), moral intensity (Lankton et al , 2019), work identity and locus of control (Hadlington et al , 2019), self-efficacy and perceived behavioural control (Hu et al , 2012), vicarious mastery experiences and personal responsibility (Shillair et al , 2015).…”
Section: Resultsmentioning
confidence: 99%
“…Cybersecurity behaviors are shaped by various factors beyond gender and age, including technical expertise, training, and social attributes such as personality traits and cultural background. Research utilizing the Big Five personality model demonstrates that personality impacts security practices consistently across different age groups, indicating that traits like openness, conscientiousness, agreeableness, extraversion, and neuroticism in uence individuals similarly, regardless of age [23]. In addition, technical knowledge and training are signi cant factors that mediate gender differences in cybersecurity, particularly in phishing susceptibility.…”
Section: Cybersecurity Behaviors: Gender and Age Differencesmentioning
confidence: 99%
“…This field is pivotal for maintaining the confidentiality, integrity, and availability of information, which is essential for the smooth operation of any organization. The literature often uses the terms "information security" and "cybersecurity" interchangeably, a practice we will continue in this study [5,18]. Wilner [19] argues that "information security" more accurately describes the protection of data, a stance supported by the current academic discourse.…”
Section: Literature Review a Information Securitymentioning
confidence: 99%
“…Studies indicate that noncompliance with security measures, ranging from casual neglect to intentional sabotage, is a significant contributor to security breaches [21,22]. The evolving research on technology acceptance and behavior science theories, such as the Big Five Inventory (BFI), underscores the importance of understanding and predicting security behaviors among employees [18,23].…”
Section: B Information Security and Human Behaviormentioning
confidence: 99%