2018
DOI: 10.1016/j.cose.2017.11.015
|View full text |Cite
|
Sign up to set email alerts
|

Correlating human traits and cyber security behavior intentions

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

12
147
4
4

Year Published

2018
2018
2020
2020

Publication Types

Select...
6
1
1

Relationship

0
8

Authors

Journals

citations
Cited by 192 publications
(187 citation statements)
references
References 7 publications
12
147
4
4
Order By: Relevance
“…Security education, training, and awareness initiatives can help inform users' appraisals of security threats and provide guidance on how to effectively respond to these threats (Puhakainen and Siponen 2010). There has, however, been limited research on how demographic differences influence information security behaviour (Gratian et al 2018), yet understanding this could be important in identifying users who may be more likely to have poor information security behaviour (McCormac et al 2017). Understanding these differences can be used to tailor initiatives to increase their effectiveness.…”
Section: Introductionmentioning
confidence: 99%
See 2 more Smart Citations
“…Security education, training, and awareness initiatives can help inform users' appraisals of security threats and provide guidance on how to effectively respond to these threats (Puhakainen and Siponen 2010). There has, however, been limited research on how demographic differences influence information security behaviour (Gratian et al 2018), yet understanding this could be important in identifying users who may be more likely to have poor information security behaviour (McCormac et al 2017). Understanding these differences can be used to tailor initiatives to increase their effectiveness.…”
Section: Introductionmentioning
confidence: 99%
“…Women are also more influenced by ease of use in their e-learning adoption decisions (Ong and Lai 2006) and have less information technology experience, knowledge and computer self-efficacy (He and Freeman 2009). The gender differences in security behaviour that have been found in the information security domain include females having a greater susceptibility to phishing attacks (Jagatic et al 2007;Sheng et al 2010), poorer password behaviour (Gratian et al 2018), and lower likelihood of adopting privacy protecting behaviours (Milne et al 2009). Females have, however, been reported to have higher levels of security concerns (Hoy and Milne 2010;Laric et al 2009;Mohamed and Ahmad 2012).…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…The experience of children participating in situations that implement social tests forms a definite attitude towards social phenomena in which they develop a sense of social responsibility. The boundaries of individual personality differences and the environmental impact regarding information security aspects are discussed in the work of M. Gratian, S. Bandi, M. Cukier, J. Dykstra, A. Ginther [7].…”
Section: Research Methodsologymentioning
confidence: 99%
“…These system components can be practically placed on the side of the road, directly in the vehicles (Schramm et al, 2018), at the transportation center or somewhere in the cloud (Rizviet et al, 2017). Summing up, C-ITS involves the cooperating components of the transportation processes including the users (Gratian et al, 2018), the vehicles, the infrastructure and the operator. (European Transport Safety Council, 2017) The difference between ITS and C-ITS is that the interaction among the components (e.g.…”
Section: Introductionmentioning
confidence: 99%