Self-reported secure and insecure cyber behaviour: factor structure and associations with personality factors

نویسندگان

  • Justin D Russell
  • Carl F Weems
  • Irfan Ahmed
  • Richard
چکیده

The present study provides initial data on self-reported secure and insecure cyber behaviour using the iSECURE. A theoretical model for item pool development, distributions and convergent associations is presented. Data on the distribution of self-report of secure and insecure cyber behaviour is presented as well as data on factor structure of scores collected from a sample of 210 college-age adults (56.7% female). Exploratory factor analysis indicated a two-factor solution, with items loading onto subscales of secure or unsecure cyber behaviour. Comparison with an existing measure of attitudes about cyber security suggested good convergent validity. Additional analyses examined correlations between the iSECURE and Big Five personality traits as well as other personality and behavioural characteristics. The distribution of responses suggests that self-report may be useful in research studies that attempt to build towards predicting actual behaviour. The implications of findings for future research are discussed in terms of the need to develop additional techniques such as the use of real-world scenarios. ARTICLE HISTORY Received 8 February 2017 Accepted 19 June 2017

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

رابطه سبک‌های دلبستگی و حرمت خود با ریخت شخصیتی D در دانشجویان

The purpose of this study was the relationship between attachment styles and self-esteem with type D personality. 245 students (66 males & 179 females) have been selected using a cluster random sampling to fill out the adult attachment style, Rosenberg self- esteem, and type D personality questionnaires. The results show that there is a significant positive correlation between secure attachment...

متن کامل

The role of attachment styles and personality characteristics in adolescent’s self-esteem

Introduction: Adolescence is one of the most sensitive and most critical stages of human life. An entry in this period, most people are faced with numerous problems including low self-esteem stems. This study aimed to determine the role of attachment styles and personality characteristics in adolescents' self-esteem in Gonabad in 2017. Method: This study is analytical and cross-sectional and co...

متن کامل

Avoiding Cyber-attacks to DMZ and Capturing Forensics from Intruders Using Honeypots

Nowadays, honeypots are widely used to divert attackers from the original target and keep them busy within a decoy environment. DeMilitarized Zone (DMZ) is an important zone for network administrators, because many of the services to the public network is provided at this zone. Many of the security tools such as firewalls, intrusion detection systems and several other secu...

متن کامل

The Relationship between Attachment Styles, Marital Satisfaction and Sex Guilt with Sexual Desire in Iranian Women

Objective: Among a representative sample of married women in the capital of Iran, Tehran, we aimed to determine the association of self-reported sexual desire with (1) Self-reported attachment styles (2) Self-reported marital satisfaction (3) Self-reported sex guilt. Methods: The data were obtained from a total of 192 married Iranian women who were selected via multi-cluster sampling method ...

متن کامل

Avoiding Cyber-attacks to DMZ and Capturing Forensics from Intruders Using Honeypots

Nowadays, honeypots are widely used to divert attackers from the original target and keep them busy within a decoy environment. DeMilitarized Zone (DMZ) is an important zone for network administrators, because many of the services to the public network is provided at this zone. Many of the security tools such as firewalls, intrusion detection systems and several other secu...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2017