Risk perceptions of cyber-security and precautionary behaviour

被引:73
|
作者
van Schaik, Paul [1 ]
Jeske, Debora [2 ]
Onibokun, Joseph [3 ]
Coventry, Lynne [4 ]
Jansen, Jurjen [5 ]
Kusev, Petko [6 ]
机构
[1] Teesside Univ, Sch Social Sci Business & Law, Middlesbrough, Cleveland, England
[2] Univ Coll Cork, Sch Appl Psychol, Cork, Ireland
[3] Union Advertising Agcy, Union Digital, Edinburgh, Midlothian, Scotland
[4] Univ Northumbria Newcastle, Psychol & Commun Technol Lab, Newcastle Upon Tyne, Tyne & Wear, England
[5] Univ Appl Sci, Lectoraat Cybersafety, Leeuwarden, Netherlands
[6] Univ Huddersfield, Huddersfield Business Sch, Dept Management, Huddersfield, W Yorkshire, England
关键词
Risk perception; Precautionary behaviour; Information security; Cyber-security; Non-aggregate data analysis; INFORMATION SECURITY; PSYCHOMETRIC PARADIGM; PERSONAL-EXPERIENCE; EXPLANATORY POWER; CLIMATE-CHANGE; FEAR APPEALS; SAFETY; THREATS; AWARENESS; PERSPECTIVE;
D O I
10.1016/j.chb.2017.05.038
中图分类号
B84 [心理学];
学科分类号
04 ; 0402 ;
摘要
A quantitative empirical online study examined a set of 16 security hazards on the Internet and two comparisons in 436 UK- and US students, measuring perceptions of risk and other risk dimensions. First, perceived risk was highest for identity theft, keylogger, cyber-bullying and social engineering. Second, consistent with existing theory, significant predictors of perceived risk were voluntariness, immediacy, catastrophic potential, dread, severity of consequences and control, as well as Internet experience and frequency of Internet use. Moreover, control was a significant predictor of precautionary behaviour. Methodological implications emphasise the need for non-aggregated analysis and practical implications emphasise risk communication to Internet users. (C) 2017 Elsevier Ltd. All rights reserved.
引用
收藏
页码:547 / 559
页数:13
相关论文
共 50 条
  • [31] Cyber-Security Threats Origins and their Analysis
    Cerget, Maros
    Hudec, Jan
    [J]. ACTA POLYTECHNICA HUNGARICA, 2023, 20 (09) : 23 - 41
  • [32] Cyber-security in substation automation systems
    Moreira, Naiara
    Molina, Elias
    Lazaro, Jesus
    Jacob, Eduardo
    Astarloa, Armando
    [J]. RENEWABLE & SUSTAINABLE ENERGY REVIEWS, 2016, 54 : 1552 - 1562
  • [33] Self-Healing for Cyber-Security
    Gijsen, Bart
    Montalto, Ruggero
    Panneman, Jeffrey
    Falconieri, Federico
    Wiper, Paul
    Zuraniewski, Piotr
    [J]. 2021 SIXTH INTERNATIONAL CONFERENCE ON FOG AND MOBILE EDGE COMPUTING (FMEC), 2021, : 84 - 90
  • [34] Physical Cyber-Security of SCADA Systems
    Bichmou, Ahmed
    Chiocca, Joseph
    Hernandez, Leonarndo
    Hoffmann, R. Wade
    Horsham, Brandon
    Huy Lam
    McKinsey, Vince
    Bibyk, Steven
    [J]. PROCEEDINGS OF THE 2019 IEEE NATIONAL AEROSPACE AND ELECTRONICS CONFERENCE (NAECON), 2019, : 243 - 248
  • [35] Pennsylvania starts cyber-security initiative
    不详
    [J]. COMPUTERS & SECURITY, 2001, 20 (08) : 650 - 650
  • [36] The cyber-security challenge at the connected industry
    Garcia-Bringas, Pablo
    Angulo, Ignacio
    Goti-Elordi, Aitor
    Pastor, Iker
    [J]. DYNA, 2019, 94 (03): : 258 - 261
  • [37] Strategic Communication for Supporting Cyber-Security
    Kuusisto, Tuija
    Kuusisto, Rauno
    [J]. INTERNATIONAL JOURNAL OF CYBER WARFARE AND TERRORISM, 2013, 3 (03) : 72 - 79
  • [38] Cyber-Security Training Evaluation Metrics
    Koutsouris, Nikolaos
    Vassilakis, Costas
    Kolokotronis, Nicholas
    [J]. PROCEEDINGS OF THE 2021 IEEE INTERNATIONAL CONFERENCE ON CYBER SECURITY AND RESILIENCE (IEEE CSR), 2021, : 192 - 197
  • [39] Special Issue on Cyber-Security for Development
    Osei-Bryson, Kweku-Muata
    Vogel, Doug
    [J]. INFORMATION TECHNOLOGY FOR DEVELOPMENT, 2014, 20 (02) : 93 - 95
  • [40] Cultural and psychological factors in cyber-security
    Halevi, Tzipora
    Memon, Nasir
    Lewis, James
    Kumaraguru, Ponnurangam
    Arora, Sumit
    Dagar, Nikita
    Aloul, Fadi
    Chen, Jay
    [J]. Journal of Mobile Multimedia, 2017, 13 (1-2): : 43 - 56