[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1145/3349266.3351419acmconferencesArticle/Chapter ViewAbstractPublication PagesiteConference Proceedingsconference-collections
research-article

The Use and Non-Use of Cybersecurity Tools Among Consumers: Do They Want Help?

Published: 26 September 2019 Publication History

Abstract

Cybersecurity behavior changes over time, as do the recommendations for how one may best protect themselves from cybersecurity threats. This paper examines current trends in what protective measures people take, such as using a password manager, virtual private network (VPN), or anti-malware software. The reasons why people employ these protective measures is explored, including why some choose not to and whether or not they are willing to pay for cybersecurity protective services, including on-call expert access. The evidence indicates that there is an important place for security education, training, and awareness (SETA) programs to help those that do not use such measures, as well as concerted efforts to improve the self-efficacy of individuals, especially females and adults 35 and over. About one in three individuals are willing to pay for cybersecurity services that include on-call access to cybersecurity experts. However, establishing a proper price point for such services remains critical.

References

[1]
Bander Ali Saleh Al-rimy, Mohd Aizaini Maarof, and Syed Zainudeen Mohd Shaid. 2018. Ransomware threat success factors, taxonomy, and countermeasures: A survey and research directions. Computers & Security 74 (2018), 144--166.
[2]
Razvan Beuran, Dat Tang, Cuong Pham, Ken-ichi Chinen, Yasuo Tan, and Yoichi Shinoda. 2018. Integrated framework for hands-on cybersecurity training: CyTrONE. Computers & Security 78 (2018), 43--59.
[3]
John D'Arcy, Anat Hovav, and Dennis Galletta. 2009. User awareness of security countermeasures and its impact on information systems misuse: a deterrence approach. Information Systems Research 20, 1 (2009), 79--98.
[4]
Robert F. DeVellis. 2012. Scale development: theory and applications (3rd ed ed.). SAGE.
[5]
Marc Dupuis and Robert Crossler. 2019. The Compromise of One's Personal Information: Trait Affect as an Antecedent in Explaining the Behavior of Individuals. In Proceedings of the 52nd Hawaii International Conference on System Sciences. IEEE, 4841--4850. https://doi.org/10.24251/HICSS.2019.584
[6]
Marc Dupuis, Robert Crossler, and Barbara Endicott-Popovsky. 2016. Measuring the Human Factor in Information Security and Privacy. In The 49th Hawaii International Conference on System Sciences (HICSS). IEEE.
[7]
Marc Dupuis, Barbara Endicott-Popovsky, and Robert Crossler. 2013. An Analysis of the Use of Amazon's Mechanical Turk for Survey Research in the Cloud. In International Conference on Cloud Security Management.
[8]
Marc Dupuis, Samreen Khadeer, and Joyce Huang. 2017. "I Got the Job!": An Exploratory Study Examining the Psychological Factors Related to Status Updates on Facebook. Computers in Human Behavior 73 (2017), 132--140. https://doi.org/ 10.1016/j.chb.2017.03.020
[9]
Marc Dupuis and Faisal Khan. 2018. Effects of peer feedback on password strength. In 2018 APWG Symposium on Electronic Crime Research (eCrime). IEEE, 1--9. https://doi.org/10.1109/ECRIME.2018.8376210
[10]
Donna L. Floyd, Steven Prentice-Dunn, and Ronald W. Rogers. 2000. A Meta- Analysis of Research on Protection Motivation Theory. Journal of Applied Social Psychology 30, 2 (2000), 407.
[11]
Ge Jin, Manghui Tu, Tae-Hoon Kim, Justin Heffron, and Jonathan White. 2018. Game based cybersecurity training for high school students. In Proceedings of the 49th ACM Technical Symposium on Computer Science Education. ACM, 68--73.
[12]
Fanny Lalonde LÃvesque, Josà M. Fernandez, and Dennis Batchelder. 2017. Age and gender as independent risk factors for malware victimisation. In Proceedings of the 31st British Computer Society Human Computer Interaction Conference. BCS Learning & Development Ltd., 46.
[13]
Sarah Milne, Paschal Sheeran, and Sheina Orbell. 2000. Prediction and Intervention in Health-Related Behavior: A Meta-Analytic Review of Protection Motivation Theory. Journal of Applied Social Psychology 30, 1 (2000).
[14]
Antonin Pavlicek and Frantisek Sudzina. 2018. Internet Security and Privacy in VPN. In International Conference on Digital Information ManagementInternational Conference on Digital Information Management, Vol. 9. 133--139.
[15]
Philip M. Podsakoff, Scott B. MacKenzie, Jeong-Yeon Lee, and Nathan P. Podsakoff. 2003. Common method biases in behavioral research: a critical review of the literature and recommended remedies. Journal of applied psychology 88, 5 (2003), 879.
[16]
Clay Posey, Tom L. Roberts, and Paul Benjamin Lowry. 2015. The Impact of Organizational Commitment on Insiders' Motivation to Protect Organizational Information Assets. Journal of Management Information Systems 32, 4 (Oct 2015), 179--214. https://doi.org/10.1080/07421222.2015.1138374
[17]
David O. Sears. 1986. College sophomores in the laboratory: Influences of a narrow data base on social psychology's view of human nature. Journal of Personality and Social Psychology 51, 3 (1986), 515.
[18]
Zachary R. Steelman, Bryan I. Hammer, and Moez Limayem. 2014. Data Collection in the Digital Age: Innovative Alternatives to Student Samples. MIS Quarterly 38, 2 (2014), 355--378.

Cited By

View all
  • (2024)Identification and Operationalization of Key Risks and Mitigations for the Cybersecurity Risk Management of Home Users2024 Cyber Awareness and Research Symposium (CARS)10.1109/CARS61786.2024.10778868(1-9)Online publication date: 28-Oct-2024
  • (2023)A comprehensive survey of phishing: mediums, intended targets, attack and defence techniques and a novel taxonomyInternational Journal of Information Security10.1007/s10207-023-00768-x23:2(819-848)Online publication date: 19-Oct-2023
  • (2022)A Dangerous Infodemic: An Examination of the Impact Social Media Misinformation has on COVID-19 Vaccination StatusProceedings of the 23rd Annual Conference on Information Technology Education10.1145/3537674.3554754(37-43)Online publication date: 21-Sep-2022
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Conferences
SIGITE '19: Proceedings of the 20th Annual SIG Conference on Information Technology Education
September 2019
206 pages
ISBN:9781450369213
DOI:10.1145/3349266
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 26 September 2019

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. awareness
  2. behavior
  3. cybersecurity
  4. education
  5. privacy
  6. protective measures
  7. threats
  8. training

Qualifiers

  • Research-article

Funding Sources

  • Rubica Inc.

Conference

SIGITE '19
Sponsor:

Acceptance Rates

SIGITE '19 Paper Acceptance Rate 23 of 57 submissions, 40%;
Overall Acceptance Rate 176 of 429 submissions, 41%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)86
  • Downloads (Last 6 weeks)2
Reflects downloads up to 27 Jan 2025

Other Metrics

Citations

Cited By

View all
  • (2024)Identification and Operationalization of Key Risks and Mitigations for the Cybersecurity Risk Management of Home Users2024 Cyber Awareness and Research Symposium (CARS)10.1109/CARS61786.2024.10778868(1-9)Online publication date: 28-Oct-2024
  • (2023)A comprehensive survey of phishing: mediums, intended targets, attack and defence techniques and a novel taxonomyInternational Journal of Information Security10.1007/s10207-023-00768-x23:2(819-848)Online publication date: 19-Oct-2023
  • (2022)A Dangerous Infodemic: An Examination of the Impact Social Media Misinformation has on COVID-19 Vaccination StatusProceedings of the 23rd Annual Conference on Information Technology Education10.1145/3537674.3554754(37-43)Online publication date: 21-Sep-2022
  • (2022)Citizens’ Cybersecurity Behavior: Some Major ChallengesIEEE Security & Privacy10.1109/MSEC.2021.311737120:1(54-61)Online publication date: Jan-2022
  • (2022)A Mathematical Framework for Evaluation of SOAR Tools with Limited Survey DataComputer Security. ESORICS 2021 International Workshops10.1007/978-3-030-95484-0_32(557-575)Online publication date: 8-Feb-2022
  • (2021)Misinformation and Disinformation in the Era of COVID-19Proceedings of the 22nd Annual Conference on Information Technology Education10.1145/3450329.3476866(105-110)Online publication date: 6-Oct-2021
  • (2021)Scaring People is Not EnoughProceedings of the 22nd Annual Conference on Information Technology Education10.1145/3450329.3476862(35-40)Online publication date: 6-Oct-2021
  • (2021)Characterising Proxy Usage in the Bitcoin Peer-to-Peer NetworkProceedings of the 22nd International Conference on Distributed Computing and Networking10.1145/3427796.3427840(176-185)Online publication date: 5-Jan-2021
  • (2021)When Googling It Doesn’t Work: The Challenge of Finding Security Advice for Smart Home DevicesHuman Aspects of Information Security and Assurance10.1007/978-3-030-81111-2_10(115-126)Online publication date: 8-Jul-2021
  • (2020)Phishing Attacks Survey: Types, Vectors, and Technical ApproachesFuture Internet10.3390/fi1210016812:10(168)Online publication date: 30-Sep-2020
  • Show More Cited By

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media