Risk perceptions of cyber-security and precautionary behaviour

被引:73
|
作者
van Schaik, Paul [1 ]
Jeske, Debora [2 ]
Onibokun, Joseph [3 ]
Coventry, Lynne [4 ]
Jansen, Jurjen [5 ]
Kusev, Petko [6 ]
机构
[1] Teesside Univ, Sch Social Sci Business & Law, Middlesbrough, Cleveland, England
[2] Univ Coll Cork, Sch Appl Psychol, Cork, Ireland
[3] Union Advertising Agcy, Union Digital, Edinburgh, Midlothian, Scotland
[4] Univ Northumbria Newcastle, Psychol & Commun Technol Lab, Newcastle Upon Tyne, Tyne & Wear, England
[5] Univ Appl Sci, Lectoraat Cybersafety, Leeuwarden, Netherlands
[6] Univ Huddersfield, Huddersfield Business Sch, Dept Management, Huddersfield, W Yorkshire, England
关键词
Risk perception; Precautionary behaviour; Information security; Cyber-security; Non-aggregate data analysis; INFORMATION SECURITY; PSYCHOMETRIC PARADIGM; PERSONAL-EXPERIENCE; EXPLANATORY POWER; CLIMATE-CHANGE; FEAR APPEALS; SAFETY; THREATS; AWARENESS; PERSPECTIVE;
D O I
10.1016/j.chb.2017.05.038
中图分类号
B84 [心理学];
学科分类号
04 ; 0402 ;
摘要
A quantitative empirical online study examined a set of 16 security hazards on the Internet and two comparisons in 436 UK- and US students, measuring perceptions of risk and other risk dimensions. First, perceived risk was highest for identity theft, keylogger, cyber-bullying and social engineering. Second, consistent with existing theory, significant predictors of perceived risk were voluntariness, immediacy, catastrophic potential, dread, severity of consequences and control, as well as Internet experience and frequency of Internet use. Moreover, control was a significant predictor of precautionary behaviour. Methodological implications emphasise the need for non-aggregated analysis and practical implications emphasise risk communication to Internet users. (C) 2017 Elsevier Ltd. All rights reserved.
引用
收藏
页码:547 / 559
页数:13
相关论文
共 50 条
  • [1] Security and privacy in online social networking: Risk perceptions and precautionary behaviour
    van Schaik, Paul
    Jansen, Jurjen
    Onibokun, Joseph
    Camp, Jean
    Kusev, Petko
    [J]. COMPUTERS IN HUMAN BEHAVIOR, 2018, 78 : 283 - 297
  • [2] Critical Infrastructure Cyber-Security Risk Management
    Spyridopoulos, Theodoros
    Maraslis, Konstantinos
    Tryfonas, Theo
    Oikonomou, George
    [J]. TERRORISTS' USE OF THE INTERNET: ASSESSMENT AND RESPONSE, 2017, 136 : 59 - 76
  • [3] Beyond the Castle Model of cyber-risk and cyber-security
    Leuprecht, Christian
    Skillicorn, David B.
    Tait, Victoria E.
    [J]. GOVERNMENT INFORMATION QUARTERLY, 2016, 33 (02) : 250 - 257
  • [4] A Reputation Game on Cyber-Security and Cyber-Risk Calibration
    Han, Kookyoung
    Choi, Jin Hyuk
    [J]. APPLIED MATHEMATICS AND OPTIMIZATION, 2022, 85 (02):
  • [5] A Reputation Game on Cyber-Security and Cyber-Risk Calibration
    Kookyoung Han
    Jin Hyuk Choi
    [J]. Applied Mathematics & Optimization, 2022, 85
  • [6] Social Cyber-Security
    Carley, Kathleen M.
    Cervone, Guido
    Agarwal, Nitin
    Liu, Huan
    [J]. SOCIAL, CULTURAL, AND BEHAVIORAL MODELING, SBP-BRIMS 2018, 2018, 10899 : 389 - 394
  • [7] REGULATING CYBER-SECURITY
    Sales, Nathan Alexander
    [J]. NORTHWESTERN UNIVERSITY LAW REVIEW, 2013, 107 (04) : 1503 - 1568
  • [8] Cyber-security threat
    Klebba, Jesse
    [J]. CHEMISTRY & INDUSTRY, 2017, 81 (10) : 9 - 9
  • [9] Cyber-Security and Privacy
    Lopez, Javier
    Martinelli, Fabio
    Samarati, Pierangela
    [J]. ERCIM NEWS, 2015, (100): : 10 - 11
  • [10] Cyber-Security Risk Assessment Framework for Critical Infrastructures
    Baig, Zubair
    Zeadally, Sherali
    [J]. INTELLIGENT AUTOMATION AND SOFT COMPUTING, 2019, 25 (01): : 121 - 129