2015
DOI: 10.1089/cyber.2014.0179
|View full text |Cite|
|
Sign up to set email alerts
|

Individual Differences in Cyber Security Behaviors: An Examination of Who Is Sharing Passwords

Abstract: In spite of the number of public advice campaigns, researchers have found that individuals still engage in risky password practices. There is a dearth of research available on individual differences in cyber security behaviors. This study focused on the risky practice of sharing passwords. As predicted, we found that individuals who scored high on a lack of perseverance were more likely to share passwords. Contrary to our hypotheses, we found younger [corrected] people and individuals who score high on self-mo… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

5
49
0

Year Published

2016
2016
2023
2023

Publication Types

Select...
5
4
1

Relationship

1
9

Authors

Journals

citations
Cited by 102 publications
(59 citation statements)
references
References 17 publications
5
49
0
Order By: Relevance
“…This security tradeoff creates a problem for IT professionals. Users are usually aware of what a good password is, but despite this understanding, they are still inclined to take risks and are optimistically biased; they believe a negative event is unlikely to happen to them [29]. In a study of 20,907 people, researchers found that around 76% of the repondents know that they should protect their information online yet they engage in sharing their passwords and other risky behaviors [3].…”
Section: Psychology and Social Aspectsmentioning
confidence: 99%
“…This security tradeoff creates a problem for IT professionals. Users are usually aware of what a good password is, but despite this understanding, they are still inclined to take risks and are optimistically biased; they believe a negative event is unlikely to happen to them [29]. In a study of 20,907 people, researchers found that around 76% of the repondents know that they should protect their information online yet they engage in sharing their passwords and other risky behaviors [3].…”
Section: Psychology and Social Aspectsmentioning
confidence: 99%
“…There have been many studies on password behaviour conducted with university students, faculty members, and staff (Boothroyd & Chiasson, 2013;Brown et al 2004;Bryant & Campbell, 2006;Gaw & Felten, 2006;Grawemayer & Johnson, 2011;Riley, 2006;Shay et al, 2010;Stobert & Biddle, 2014;Ur et al, 2015), employees from various organizations (Adams & Sasse, 1999;Inglesant & Sasse, 2010;Zviran & Haga, 1999), children (Meter & Bauman, 2015), married couples (Singh et al, 2007), and the general public (Florencio & Herley, 2007;Kaye, 2011). But to the best of our knowledge, there are only three studies that have reported differences between younger and older people in their password behaviour: Bryant and Campbell (2006), Kaye (2011), and Whitty et al (2015). Table 1 summarises a range of studies which have collected information about people"s password management behaviour, including the participant demographics and findings.…”
Section: Introductionmentioning
confidence: 99%
“…Digital identity is a mixed, abstract term that can be encountered as and linked with digital signature, digital trace, digital footprint, shared digital data, digital self-representation, to name a few, depending on the context and the field that refers to it. Scholars from different disciplines are seeking to understand digital identity as it can be perceived either as a technical term related to computer science and information security and management (for example see Windley, 2005;Whitty et al, 2015) or as a term with a broader social significance, referring to a person"s online existence, practices and behaviour (Turkle, 2011;Fehér, 2015).…”
Section: Introductionmentioning
confidence: 99%