Cargando…

Susceptibility and resilience to cyber threat: Findings from a scenario decision program to measure secure and insecure computing behavior

Interest in the individual differences underlying end user computer security behavior has led to the development of a multidisciplinary field of research known as behavioral information security. An important gap in knowledge and the motivation for this research is the development of ways to measure...

Descripción completa

Detalles Bibliográficos
Autores principales: Weems, Carl F., Ahmed, Irfan, Richard, Golden G., Russell, Justin D., Neill, Erin L.
Formato: Online Artículo Texto
Lenguaje:English
Publicado: Public Library of Science 2018
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC6291068/
https://www.ncbi.nlm.nih.gov/pubmed/30540758
http://dx.doi.org/10.1371/journal.pone.0207408
_version_ 1783380195002023936
author Weems, Carl F.
Ahmed, Irfan
Richard, Golden G.
Russell, Justin D.
Neill, Erin L.
author_facet Weems, Carl F.
Ahmed, Irfan
Richard, Golden G.
Russell, Justin D.
Neill, Erin L.
author_sort Weems, Carl F.
collection PubMed
description Interest in the individual differences underlying end user computer security behavior has led to the development of a multidisciplinary field of research known as behavioral information security. An important gap in knowledge and the motivation for this research is the development of ways to measure secure and insecure cyber behavior for research and eventually practice. Here we report a study designed to develop a technique for assessing secure and insecure cyber behavior for broad research use. The Susceptibility and Resilience to Cyber Threat (SRCT) is an immersive scenario decision program. The SRCT measures susceptibility to cyber threat and malicious behavior as well protective resilience actions via participant responses/decisions to emails, interactions with security dialogs, and computer actions in a real-world simulation. Data were collected from a sample of 190 adults (76.3% female), between the ages of 18–61 (mean age = 26.12). Personality, behavioral tendencies, and cognitive preferences were measured with standard previously validated protocols and self-report measures. Factor analysis suggested a 5 item secure actions scale and a 9 item insecure actions scale as viable to extract from the SRCT responses. Statistically analyzable distributions of secure and insecure cyber behaviors were obtained, and these subscales demonstrated acceptable internal consistency as hypothesized. Associations between SRCT scales and other indices of cyber behavior, as well as self-reported personality, were lower than predicted, suggesting that past research reporting links between self-reports of personality and self-reported cyber-behavior may be overestimating the links for actual cyber actions. However, our exploratory analyses suggest discrepancies between self-report and actions in the SRCT may be an interesting avenue to explore. Overall, results were consistent with theorizing and suggest the technique is viable as a construct measure in future research or as an outcome variable in experimental intervention designs.
format Online
Article
Text
id pubmed-6291068
institution National Center for Biotechnology Information
language English
publishDate 2018
publisher Public Library of Science
record_format MEDLINE/PubMed
spelling pubmed-62910682018-12-28 Susceptibility and resilience to cyber threat: Findings from a scenario decision program to measure secure and insecure computing behavior Weems, Carl F. Ahmed, Irfan Richard, Golden G. Russell, Justin D. Neill, Erin L. PLoS One Research Article Interest in the individual differences underlying end user computer security behavior has led to the development of a multidisciplinary field of research known as behavioral information security. An important gap in knowledge and the motivation for this research is the development of ways to measure secure and insecure cyber behavior for research and eventually practice. Here we report a study designed to develop a technique for assessing secure and insecure cyber behavior for broad research use. The Susceptibility and Resilience to Cyber Threat (SRCT) is an immersive scenario decision program. The SRCT measures susceptibility to cyber threat and malicious behavior as well protective resilience actions via participant responses/decisions to emails, interactions with security dialogs, and computer actions in a real-world simulation. Data were collected from a sample of 190 adults (76.3% female), between the ages of 18–61 (mean age = 26.12). Personality, behavioral tendencies, and cognitive preferences were measured with standard previously validated protocols and self-report measures. Factor analysis suggested a 5 item secure actions scale and a 9 item insecure actions scale as viable to extract from the SRCT responses. Statistically analyzable distributions of secure and insecure cyber behaviors were obtained, and these subscales demonstrated acceptable internal consistency as hypothesized. Associations between SRCT scales and other indices of cyber behavior, as well as self-reported personality, were lower than predicted, suggesting that past research reporting links between self-reports of personality and self-reported cyber-behavior may be overestimating the links for actual cyber actions. However, our exploratory analyses suggest discrepancies between self-report and actions in the SRCT may be an interesting avenue to explore. Overall, results were consistent with theorizing and suggest the technique is viable as a construct measure in future research or as an outcome variable in experimental intervention designs. Public Library of Science 2018-12-12 /pmc/articles/PMC6291068/ /pubmed/30540758 http://dx.doi.org/10.1371/journal.pone.0207408 Text en © 2018 Weems et al http://creativecommons.org/licenses/by/4.0/ This is an open access article distributed under the terms of the Creative Commons Attribution License (http://creativecommons.org/licenses/by/4.0/) , which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited.
spellingShingle Research Article
Weems, Carl F.
Ahmed, Irfan
Richard, Golden G.
Russell, Justin D.
Neill, Erin L.
Susceptibility and resilience to cyber threat: Findings from a scenario decision program to measure secure and insecure computing behavior
title Susceptibility and resilience to cyber threat: Findings from a scenario decision program to measure secure and insecure computing behavior
title_full Susceptibility and resilience to cyber threat: Findings from a scenario decision program to measure secure and insecure computing behavior
title_fullStr Susceptibility and resilience to cyber threat: Findings from a scenario decision program to measure secure and insecure computing behavior
title_full_unstemmed Susceptibility and resilience to cyber threat: Findings from a scenario decision program to measure secure and insecure computing behavior
title_short Susceptibility and resilience to cyber threat: Findings from a scenario decision program to measure secure and insecure computing behavior
title_sort susceptibility and resilience to cyber threat: findings from a scenario decision program to measure secure and insecure computing behavior
topic Research Article
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC6291068/
https://www.ncbi.nlm.nih.gov/pubmed/30540758
http://dx.doi.org/10.1371/journal.pone.0207408
work_keys_str_mv AT weemscarlf susceptibilityandresiliencetocyberthreatfindingsfromascenariodecisionprogramtomeasuresecureandinsecurecomputingbehavior
AT ahmedirfan susceptibilityandresiliencetocyberthreatfindingsfromascenariodecisionprogramtomeasuresecureandinsecurecomputingbehavior
AT richardgoldeng susceptibilityandresiliencetocyberthreatfindingsfromascenariodecisionprogramtomeasuresecureandinsecurecomputingbehavior
AT russelljustind susceptibilityandresiliencetocyberthreatfindingsfromascenariodecisionprogramtomeasuresecureandinsecurecomputingbehavior
AT neillerinl susceptibilityandresiliencetocyberthreatfindingsfromascenariodecisionprogramtomeasuresecureandinsecurecomputingbehavior