Holistic cyber hygiene education: Accounting for the human factors
•This study examined cyber hygiene in a sample of university students.•Information handling and incident reporting predicted engagement in cyber hygiene behaviors.•Email usage and Internet usage predicted engagement in cyber hygiene behaviors.•Trust in technology predicted men's cyber hygiene b...
Saved in:
Published in | Computers & security Vol. 92; pp. 101731 - 6 |
---|---|
Main Authors | , , , , |
Format | Journal Article |
Language | English |
Published |
Amsterdam
Elsevier Ltd
01.05.2020
Elsevier Sequoia S.A |
Subjects | |
Online Access | Get full text |
ISSN | 0167-4048 1872-6208 |
DOI | 10.1016/j.cose.2020.101731 |
Cover
Abstract | •This study examined cyber hygiene in a sample of university students.•Information handling and incident reporting predicted engagement in cyber hygiene behaviors.•Email usage and Internet usage predicted engagement in cyber hygiene behaviors.•Trust in technology predicted men's cyber hygiene behaviors.•Intrinsic motivation predicted women's cyber hygiene behaviors.
Cybersecurity is paramount in modern cyberdefense. One important factor linked to reducing human-instigated breaches of cybersecurity includes cyber hygiene. Cyber hygiene is the adaptive knowledge and behavior to mitigate risky online activities that put an individual's social, financial, and personal information at risk – a danger that is significantly compounded when discussing the risk to entire countries as opposed to a single individual. Interestingly, even though the human is the greatest risk to cybersecurity, very little research has examined the latent individual differences associated with developing cyber hygiene-related knowledge, attitudes, and behaviors. Thus, the goal of the present study was to address this gap in cyber hygiene research. The results from 173 university participants demonstrated that several factors, such as information handling, incident reporting, and password management were associated with better cyber hygiene. Individual differences such as trust in technology and intrinsic motivation were predictive of improved cyber hygiene – but were subject to significant sex differences. Differences across academic majors, such as science and technology majors, also emerged. Finally, we discuss the importance of understanding the role of human factors in modern cybersecurity and the potential practical implications associated with refining current course curricula in computer and information sciences. |
---|---|
AbstractList | Cybersecurity is paramount in modern cyberdefense. One important factor linked to reducing human-instigated breaches of cybersecurity includes cyber hygiene. Cyber hygiene is the adaptive knowledge and behavior to mitigate risky online activities that put an individual's social, financial, and personal information at risk – a danger that is significantly compounded when discussing the risk to entire countries as opposed to a single individual. Interestingly, even though the human is the greatest risk to cybersecurity, very little research has examined the latent individual differences associated with developing cyber hygiene-related knowledge, attitudes, and behaviors. Thus, the goal of the present study was to address this gap in cyber hygiene research. The results from 173 university participants demonstrated that several factors, such as information handling, incident reporting, and password management were associated with better cyber hygiene. Individual differences such as trust in technology and intrinsic motivation were predictive of improved cyber hygiene – but were subject to significant sex differences. Differences across academic majors, such as science and technology majors, also emerged. Finally, we discuss the importance of understanding the role of human factors in modern cybersecurity and the potential practical implications associated with refining current course curricula in computer and information sciences. •This study examined cyber hygiene in a sample of university students.•Information handling and incident reporting predicted engagement in cyber hygiene behaviors.•Email usage and Internet usage predicted engagement in cyber hygiene behaviors.•Trust in technology predicted men's cyber hygiene behaviors.•Intrinsic motivation predicted women's cyber hygiene behaviors. Cybersecurity is paramount in modern cyberdefense. One important factor linked to reducing human-instigated breaches of cybersecurity includes cyber hygiene. Cyber hygiene is the adaptive knowledge and behavior to mitigate risky online activities that put an individual's social, financial, and personal information at risk – a danger that is significantly compounded when discussing the risk to entire countries as opposed to a single individual. Interestingly, even though the human is the greatest risk to cybersecurity, very little research has examined the latent individual differences associated with developing cyber hygiene-related knowledge, attitudes, and behaviors. Thus, the goal of the present study was to address this gap in cyber hygiene research. The results from 173 university participants demonstrated that several factors, such as information handling, incident reporting, and password management were associated with better cyber hygiene. Individual differences such as trust in technology and intrinsic motivation were predictive of improved cyber hygiene – but were subject to significant sex differences. Differences across academic majors, such as science and technology majors, also emerged. Finally, we discuss the importance of understanding the role of human factors in modern cybersecurity and the potential practical implications associated with refining current course curricula in computer and information sciences. |
ArticleNumber | 101731 |
Author | Acharya, Subrata Waldfogle, Grace E. Hancock, Gabriella M. Neigel, Alexis R. Claypoole, Victoria L. |
Author_xml | – sequence: 1 givenname: Alexis R. orcidid: 0000-0003-2230-3515 surname: Neigel fullname: Neigel, Alexis R. email: alexis.neigel@gmail.com organization: University of Central Florida, Department of Psychology, College of Sciences, Orlando, FL, United States – sequence: 2 givenname: Victoria L. surname: Claypoole fullname: Claypoole, Victoria L. organization: University of Central Florida, Department of Psychology, College of Sciences, Orlando, FL, United States – sequence: 3 givenname: Grace E. surname: Waldfogle fullname: Waldfogle, Grace E. organization: University of Central Florida, Department of Psychology, College of Sciences, Orlando, FL, United States – sequence: 4 givenname: Subrata orcidid: 0000-0003-4008-9495 surname: Acharya fullname: Acharya, Subrata organization: Towson University, Department of Computer and Information Sciences, Towson, MD, United States – sequence: 5 givenname: Gabriella M. surname: Hancock fullname: Hancock, Gabriella M. organization: California State University – Long Beach, Long Beach, Department of Psychology, CA, United States |
BookMark | eNp9kM1KAzEURoNUsK2-gKuA66n5nyhualErFNx0HzKZTJuhTWqSEfr2TjuuXHR14fKde_nOBIx88BaAe4xmGGHx2M5MSHZGEDkvSoqvwBjLkhSCIDkC4z5UFgwxeQMmKbWozwgpx-B1GXYuZWegOVY2wu1x46y30Nad0dkF_wznxoTOZ-c3sAkR5q2F226vPWy0ySGmW3Dd6F2yd39zCtbvb-vFslh9fXwu5qvCUCJzUaKaU4kwZ0-acMyE5pSWUhiCS00pF7qRtTYVI1jiUiLOMalQhauaVrhmdAoehrOHGL47m7JqQxd9_1ERRhkSQlDep-SQMjGkFG2jjMvnIjlqt1MYqZMw1aqTMHUSpgZhPUr-oYfo9joeL0MvA2T75j_ORpVML9DY2kVrsqqDu4T_Ag4KhFY |
CitedBy_id | crossref_primary_10_1007_s10207_024_00824_0 crossref_primary_10_1080_0144929X_2021_1973106 crossref_primary_10_22139_jobs_1623655 crossref_primary_10_3390_en17081876 crossref_primary_10_3390_app13063410 crossref_primary_10_1016_j_cose_2021_102313 crossref_primary_10_1109_EMR_2024_3361023 crossref_primary_10_1177_1071181322661330 crossref_primary_10_1080_10572317_2024_2315630 crossref_primary_10_1109_TTS_2022_3192767 crossref_primary_10_1016_j_cose_2023_103467 crossref_primary_10_1080_19393555_2022_2088428 crossref_primary_10_3390_info14070388 crossref_primary_10_1108_ICS_11_2023_0215 crossref_primary_10_1177_21582440241228920 crossref_primary_10_1108_OCJ_01_2022_0001 crossref_primary_10_1002_pra2_765 crossref_primary_10_52080_rvgluz_26_e6_2 crossref_primary_10_1080_10447318_2023_2247577 crossref_primary_10_1016_j_cose_2024_104306 crossref_primary_10_1080_08874417_2023_2251452 crossref_primary_10_1080_15564886_2024_2329765 crossref_primary_10_1177_00111287231180093 crossref_primary_10_1177_10711813241275926 crossref_primary_10_1108_LHT_10_2023_0480 crossref_primary_10_1109_MC_2024_3395523 crossref_primary_10_1109_ACCESS_2021_3130013 crossref_primary_10_1093_cybsec_tyab011 crossref_primary_10_1109_ACCESS_2021_3097144 crossref_primary_10_1080_19393555_2022_2077265 |
Cites_doi | 10.1177/0018720811417254 10.1177/0018720818761256 10.1145/2184319.2184330 10.1089/cyber.2013.1537 10.1016/j.dss.2010.01.010 10.1016/j.promfg.2015.07.186 10.1109/SP.2016.26 10.1177/0018720818780472 10.1016/j.cose.2006.10.005 10.1080/14639220903106387 10.1037/0022-3514.66.5.950 10.1109/TEM.2008.927825 10.4102/sajbm.v45i4.138 10.1016/j.cose.2013.12.003 10.3389/fpsyg.2019.00995 10.1016/j.cose.2017.01.004 10.1145/3048379 10.1145/543812.543837 10.1089/cyber.2014.0179 10.1016/j.intcom.2009.06.005 10.1016/j.cose.2016.12.016 10.1177/0018720816634228 |
ContentType | Journal Article |
Copyright | 2020 Elsevier Ltd Copyright Elsevier Sequoia S.A. May 2020 |
Copyright_xml | – notice: 2020 Elsevier Ltd – notice: Copyright Elsevier Sequoia S.A. May 2020 |
DBID | AAYXX CITATION 7SC 8FD JQ2 K7. L7M L~C L~D |
DOI | 10.1016/j.cose.2020.101731 |
DatabaseName | CrossRef Computer and Information Systems Abstracts Technology Research Database ProQuest Computer Science Collection ProQuest Criminal Justice (Alumni) Advanced Technologies Database with Aerospace Computer and Information Systems Abstracts Academic Computer and Information Systems Abstracts Professional |
DatabaseTitle | CrossRef ProQuest Criminal Justice (Alumni) Technology Research Database Computer and Information Systems Abstracts – Academic ProQuest Computer Science Collection Computer and Information Systems Abstracts Advanced Technologies Database with Aerospace Computer and Information Systems Abstracts Professional |
DatabaseTitleList | ProQuest Criminal Justice (Alumni) |
DeliveryMethod | fulltext_linktorsrc |
Discipline | Computer Science |
EISSN | 1872-6208 |
EndPage | 6 |
ExternalDocumentID | 10_1016_j_cose_2020_101731 S0167404820300183 |
GroupedDBID | --K --M -~X .DC .~1 0R~ 1B1 1RT 1~. 1~5 29F 4.4 457 4G. 5GY 5VS 7-5 71M 8P~ 9JN AACTN AAEDT AAEDW AAIAV AAIKJ AAKOC AALRI AAOAW AAQFI AAQXK AAXUO AAYFN ABBOA ABFSI ABMAC ABXDB ABYKQ ACDAQ ACGFO ACGFS ACNNM ACRLP ACZNC ADBBV ADEZE ADHUB ADJOM ADMUD AEBSH AEKER AENEX AFFNX AFKWA AFTJW AGHFR AGUBO AGYEJ AHHHB AHZHX AIALX AIEXJ AIKHN AITUG AJBFU AJOXV ALMA_UNASSIGNED_HOLDINGS AMFUW AMRAJ AOUOD ASPBG AVWKF AXJTR AZFZN BKOJK BKOMP BLXMC CS3 DU5 E.L EBS EFJIC EFLBG EJD EO8 EO9 EP2 EP3 FDB FEDTE FGOYB FIRID FNPLU FYGXN G-2 G-Q GBLVA GBOLZ HLX HLZ HVGLF HZ~ IHE J1W KOM LG8 LG9 M41 MO0 MS~ N9A O-L O9- OAUVE OZT P-8 P-9 P2P PC. PQQKQ Q38 R2- RIG RNS ROL RPZ RXW SBC SBM SDF SDG SDP SES SEW SPC SPCBC SSV SSZ T5K TAE TN5 TWZ WH7 WUQ XJE XPP XSW YK3 ZMT ~G- AATTM AAXKI AAYWO AAYXX ABJNI ABWVN ACRPL ACVFH ADCNI ADNMO AEIPS AEUPX AFJKZ AFPUW AFXIZ AGCQF AGQPQ AGRNS AIGII AIIUN AKBMS AKRWK AKYEP ANKPU APXCP BNPGV CITATION SSH 7SC 8FD EFKBS JQ2 K7. L7M L~C L~D |
ID | FETCH-LOGICAL-c328t-70d53801549a25146a533786c217a3356af8dacb421817805512b0b1bd3b1d43 |
IEDL.DBID | .~1 |
ISSN | 0167-4048 |
IngestDate | Mon Jul 14 10:29:36 EDT 2025 Tue Jul 01 03:48:17 EDT 2025 Thu Apr 24 23:02:10 EDT 2025 Fri Feb 23 02:47:08 EST 2024 |
IsPeerReviewed | true |
IsScholarly | true |
Keywords | Computer education Cyber education Cyber hygiene Human factors |
Language | English |
LinkModel | DirectLink |
MergedId | FETCHMERGED-LOGICAL-c328t-70d53801549a25146a533786c217a3356af8dacb421817805512b0b1bd3b1d43 |
Notes | ObjectType-Article-1 SourceType-Scholarly Journals-1 ObjectType-Feature-2 content type line 14 |
ORCID | 0000-0003-4008-9495 0000-0003-2230-3515 |
PQID | 2434066635 |
PQPubID | 46289 |
PageCount | 6 |
ParticipantIDs | proquest_journals_2434066635 crossref_citationtrail_10_1016_j_cose_2020_101731 crossref_primary_10_1016_j_cose_2020_101731 elsevier_sciencedirect_doi_10_1016_j_cose_2020_101731 |
ProviderPackageCode | CITATION AAYXX |
PublicationCentury | 2000 |
PublicationDate | May 2020 2020-05-00 20200501 |
PublicationDateYYYYMMDD | 2020-05-01 |
PublicationDate_xml | – month: 05 year: 2020 text: May 2020 |
PublicationDecade | 2020 |
PublicationPlace | Amsterdam |
PublicationPlace_xml | – name: Amsterdam |
PublicationTitle | Computers & security |
PublicationYear | 2020 |
Publisher | Elsevier Ltd Elsevier Sequoia S.A |
Publisher_xml | – name: Elsevier Ltd – name: Elsevier Sequoia S.A |
References | Parsons, McCormac, Butavicius, Pattinson, Jerram (bib0017) 2014; 42 Sawyer, Hancock (bib0019) 2018; 60 Hancock, Billings, Schaefer, Chen, de Visser, Parasuraman (bib0011) 2011; 53 Whitty, Doodson, Creese, Hodges (bib0026) 2015; 18 Balfe, Sharples, Wilson (bib0003) 2018; 60 Cone, Irvine, Thompson, Nguyen (bib0007) 2007; 26 Thatcher, Zimmer, Gundlach, McKnight (bib0023) 2008; 55 Dupuis (bib0008) 2017; 2017 Bansal, Zahedi, Genfen (bib0004) 2010; 49 Butler (bib0005) 2014; 45 Han, Kim, Kim (bib0010) 2017; 66 Parsons, Calic, Pattinson, Butavicius, McCormac, Zwaans (bib0016) 2017; 66 Roberts, Kassianidou, Irani (bib0018) 2002; 34 Tischer, Durumeric, Foster, Duan, Mori, Bursztein, Bailey (bib0028) 2016 Wiederhold (bib0027) 2014; 17 Amabile, Hill, Hennessey, Tighe (bib0001) 1994; 66 Schaefer, Chen, Szalma, Hancock (bib0020) 2016; 58 Hancock, Hancock, Warm (bib0012) 2009; 10 Symantec. (2012). Internet Security Threat Report: 2011 Trends. Symantec Corporation. Garfinkel (bib0009) 2012; 55 Linkov, Zámečník, Havlíčková, Pai (bib0015) 2019 van Duersen, van Dijk (bib0025) 2009; 21 Henshel, Cains, Hoffman, Kelley (bib0013) 2015; 3 Cain, Edwards, Still (bib0006) 2018; 42 Arquilla (bib0002) 2016; 60 Sobiesk, Blair, Conti, Lanham, Taylor (bib0021) 2015 McKnight, Carter, Thatcher, Clay (bib0014) 2011; 2 Han (10.1016/j.cose.2020.101731_bib0010) 2017; 66 Sawyer (10.1016/j.cose.2020.101731_bib0019) 2018; 60 Hancock (10.1016/j.cose.2020.101731_bib0011) 2011; 53 Amabile (10.1016/j.cose.2020.101731_bib0001) 1994; 66 Sobiesk (10.1016/j.cose.2020.101731_bib0021) 2015 Roberts (10.1016/j.cose.2020.101731_bib0018) 2002; 34 Hancock (10.1016/j.cose.2020.101731_bib0012) 2009; 10 Schaefer (10.1016/j.cose.2020.101731_bib0020) 2016; 58 Thatcher (10.1016/j.cose.2020.101731_bib0023) 2008; 55 van Duersen (10.1016/j.cose.2020.101731_bib0025) 2009; 21 Butler (10.1016/j.cose.2020.101731_bib0005) 2014; 45 Wiederhold (10.1016/j.cose.2020.101731_bib0027) 2014; 17 Dupuis (10.1016/j.cose.2020.101731_bib0008) 2017; 2017 Balfe (10.1016/j.cose.2020.101731_bib0003) 2018; 60 Henshel (10.1016/j.cose.2020.101731_bib0013) 2015; 3 Parsons (10.1016/j.cose.2020.101731_bib0016) 2017; 66 Bansal (10.1016/j.cose.2020.101731_bib0004) 2010; 49 Whitty (10.1016/j.cose.2020.101731_bib0026) 2015; 18 Garfinkel (10.1016/j.cose.2020.101731_bib0009) 2012; 55 Parsons (10.1016/j.cose.2020.101731_bib0017) 2014; 42 Tischer (10.1016/j.cose.2020.101731_bib0028) 2016 McKnight (10.1016/j.cose.2020.101731_bib0014) 2011; 2 Cone (10.1016/j.cose.2020.101731_bib0007) 2007; 26 Linkov (10.1016/j.cose.2020.101731_bib0015) 2019 Cain (10.1016/j.cose.2020.101731_bib0006) 2018; 42 Arquilla (10.1016/j.cose.2020.101731_bib0002) 2016; 60 10.1016/j.cose.2020.101731_bib0022 |
References_xml | – volume: 66 start-page: 52 year: 2017 end-page: 65 ident: bib0010 article-title: An integrative model of information security policy compliance with psychological contract: examining a bilateral perspective publication-title: Comp. Secur. – start-page: 306 year: 2016 end-page: 319 ident: bib0028 article-title: Users Really Do Plug in USB Drives They Find publication-title: 2016 IEEE Symp. Secur. Priv. – volume: 2017 start-page: 1 year: 2017 end-page: 17 ident: bib0008 article-title: Cyber security for everyone: an introductory course for non technical majors publication-title: J. Cybersecur. Edu. Res. Practice – volume: 58 start-page: 377 year: 2016 end-page: 400 ident: bib0020 article-title: A meta-analysis of factors influencing the development of trust in automation: implications for understanding autonomy in future systems publication-title: Hum. Factors – volume: 53 start-page: 517 year: 2011 end-page: 527 ident: bib0011 publication-title: Hum. Factors – year: 2019 ident: bib0015 article-title: Human factors in the cybersecurity of autonomous vehicles: trends in current research publication-title: Front. Psychol. – volume: 34 start-page: 84 year: 2002 end-page: 88 ident: bib0018 article-title: Encouraging women in computer science publication-title: ACM SIGCSE Bull. – volume: 66 start-page: 40 year: 2017 end-page: 51 ident: bib0016 article-title: The human aspects of information security questionnaire (HAIS-Q): two further validation studies publication-title: Comp. Secur. – reference: Symantec. (2012). Internet Security Threat Report: 2011 Trends. Symantec Corporation. – volume: 17 start-page: 1 year: 2014 end-page: 2 ident: bib0027 article-title: The role of psychology in enhancing cybersecurity publication-title: Cyberpsychol. Behav. Soc. Netw. – volume: 26 start-page: 63 year: 2007 end-page: 72 ident: bib0007 article-title: A video game for cyber security training and awareness publication-title: Comp. Secur. – volume: 42 start-page: 165 year: 2014 end-page: 176 ident: bib0017 article-title: Determining employee awareness using the human aspects of information security questionnaire (HAIS-Q) publication-title: Comp. Secur. – volume: 3 start-page: 1117 year: 2015 end-page: 1124 ident: bib0013 article-title: Trust as a human factor in holistic cyber security risk assessment publication-title: Procedia Manufact. – volume: 60 start-page: 477 year: 2018 end-page: 495 ident: bib0003 article-title: Understanding is key: an analysis of factors pertaining to trust in a real-world automation system publication-title: Hum. Factors – volume: 18 start-page: 3 year: 2015 end-page: 7 ident: bib0026 article-title: Individual differences in cyber security behaviors: an examination of who is sharing passwords publication-title: Cyberpsychol. Behav. Soc. Netw. – volume: 42 start-page: 36 year: 2018 end-page: 45 ident: bib0006 article-title: An exploratory study of cyber hygiene behaviors and knowledge publication-title: J. Inform. Secur. Appl. – start-page: 43 year: 2015 end-page: 47 ident: bib0021 article-title: Cyber education: a multi-level, multi-discipline approach publication-title: Proceedings of the 16th Annual Conference on Information Technology Education – volume: 60 start-page: 10 year: 2016 end-page: 11 ident: bib0002 article-title: Crafting a national cyberdefense, and preparing to support computational literacy publication-title: Commun. ACM – volume: 2 year: 2011 ident: bib0014 article-title: Trust in a specific technology: an investigation of its components and measures publication-title: Trans. Manage. Inform. Syst. (TMIS) – volume: 10 start-page: 481 year: 2009 end-page: 488 ident: bib0012 article-title: Individuation: the N=1 revolution publication-title: Theoret. Issues Ergonom. Sci. – volume: 21 start-page: 393 year: 2009 end-page: 402 ident: bib0025 article-title: Using the internet: skill related problems in users’ online behavior publication-title: Interact. Comput. – volume: 66 start-page: 950 year: 1994 end-page: 967 ident: bib0001 article-title: The work preference inventory: assessing intrinsic and extrinsic motivational orientations publication-title: J. Pers. Soc. Psychol. – volume: 55 start-page: 628 year: 2008 end-page: 644 ident: bib0023 article-title: Internal and external dimensions of computer self-efficacy: an empirical examination publication-title: IEEE Trans. Eng. Manage. – volume: 45 start-page: 21 year: 2014 end-page: 32 ident: bib0005 article-title: Towards online security: key drivers of poor user behaviour and recommendations for appropriate interventions publication-title: South African J. Busi. Manage. – volume: 55 start-page: 29 year: 2012 end-page: 32 ident: bib0009 article-title: Inside risks: the cybersecurity risk publication-title: Commun. ACM – volume: 49 start-page: 138 year: 2010 end-page: 150 ident: bib0004 article-title: The impact of personal dispositions on information sensitivity, privacy concern and trust in disclosing health information online publication-title: Decis. Support Syst. – volume: 60 start-page: 597 year: 2018 end-page: 609 ident: bib0019 article-title: Hacking the human: the prevalence paradox in cybersecurity publication-title: Hum. Factors – volume: 53 start-page: 517 issue: 5 year: 2011 ident: 10.1016/j.cose.2020.101731_bib0011 publication-title: Hum. Factors doi: 10.1177/0018720811417254 – volume: 2 issue: 2 year: 2011 ident: 10.1016/j.cose.2020.101731_bib0014 article-title: Trust in a specific technology: an investigation of its components and measures publication-title: Trans. Manage. Inform. Syst. (TMIS) – volume: 60 start-page: 477 issue: 4 year: 2018 ident: 10.1016/j.cose.2020.101731_bib0003 article-title: Understanding is key: an analysis of factors pertaining to trust in a real-world automation system publication-title: Hum. Factors doi: 10.1177/0018720818761256 – volume: 55 start-page: 29 issue: 6 year: 2012 ident: 10.1016/j.cose.2020.101731_bib0009 article-title: Inside risks: the cybersecurity risk publication-title: Commun. ACM doi: 10.1145/2184319.2184330 – volume: 17 start-page: 1 issue: 2 year: 2014 ident: 10.1016/j.cose.2020.101731_bib0027 article-title: The role of psychology in enhancing cybersecurity publication-title: Cyberpsychol. Behav. Soc. Netw. doi: 10.1089/cyber.2013.1537 – volume: 49 start-page: 138 issue: 2 year: 2010 ident: 10.1016/j.cose.2020.101731_bib0004 article-title: The impact of personal dispositions on information sensitivity, privacy concern and trust in disclosing health information online publication-title: Decis. Support Syst. doi: 10.1016/j.dss.2010.01.010 – volume: 3 start-page: 1117 year: 2015 ident: 10.1016/j.cose.2020.101731_bib0013 article-title: Trust as a human factor in holistic cyber security risk assessment publication-title: Procedia Manufact. doi: 10.1016/j.promfg.2015.07.186 – start-page: 306 year: 2016 ident: 10.1016/j.cose.2020.101731_bib0028 article-title: Users Really Do Plug in USB Drives They Find publication-title: 2016 IEEE Symp. Secur. Priv. doi: 10.1109/SP.2016.26 – ident: 10.1016/j.cose.2020.101731_bib0022 – volume: 60 start-page: 597 issue: 5 year: 2018 ident: 10.1016/j.cose.2020.101731_bib0019 article-title: Hacking the human: the prevalence paradox in cybersecurity publication-title: Hum. Factors doi: 10.1177/0018720818780472 – volume: 26 start-page: 63 issue: 1 year: 2007 ident: 10.1016/j.cose.2020.101731_bib0007 article-title: A video game for cyber security training and awareness publication-title: Comp. Secur. doi: 10.1016/j.cose.2006.10.005 – volume: 10 start-page: 481 issue: 5 year: 2009 ident: 10.1016/j.cose.2020.101731_bib0012 article-title: Individuation: the N=1 revolution publication-title: Theoret. Issues Ergonom. Sci. doi: 10.1080/14639220903106387 – volume: 66 start-page: 950 issue: 5 year: 1994 ident: 10.1016/j.cose.2020.101731_bib0001 article-title: The work preference inventory: assessing intrinsic and extrinsic motivational orientations publication-title: J. Pers. Soc. Psychol. doi: 10.1037/0022-3514.66.5.950 – volume: 2017 start-page: 1 issue: 1 year: 2017 ident: 10.1016/j.cose.2020.101731_bib0008 article-title: Cyber security for everyone: an introductory course for non technical majors publication-title: J. Cybersecur. Edu. Res. Practice – volume: 55 start-page: 628 issue: 4 year: 2008 ident: 10.1016/j.cose.2020.101731_bib0023 article-title: Internal and external dimensions of computer self-efficacy: an empirical examination publication-title: IEEE Trans. Eng. Manage. doi: 10.1109/TEM.2008.927825 – volume: 45 start-page: 21 issue: 4 year: 2014 ident: 10.1016/j.cose.2020.101731_bib0005 article-title: Towards online security: key drivers of poor user behaviour and recommendations for appropriate interventions publication-title: South African J. Busi. Manage. doi: 10.4102/sajbm.v45i4.138 – volume: 42 start-page: 165 year: 2014 ident: 10.1016/j.cose.2020.101731_bib0017 article-title: Determining employee awareness using the human aspects of information security questionnaire (HAIS-Q) publication-title: Comp. Secur. doi: 10.1016/j.cose.2013.12.003 – year: 2019 ident: 10.1016/j.cose.2020.101731_bib0015 article-title: Human factors in the cybersecurity of autonomous vehicles: trends in current research publication-title: Front. Psychol. doi: 10.3389/fpsyg.2019.00995 – volume: 66 start-page: 40 year: 2017 ident: 10.1016/j.cose.2020.101731_bib0016 article-title: The human aspects of information security questionnaire (HAIS-Q): two further validation studies publication-title: Comp. Secur. doi: 10.1016/j.cose.2017.01.004 – volume: 42 start-page: 36 year: 2018 ident: 10.1016/j.cose.2020.101731_bib0006 article-title: An exploratory study of cyber hygiene behaviors and knowledge publication-title: J. Inform. Secur. Appl. – volume: 60 start-page: 10 issue: 4 year: 2016 ident: 10.1016/j.cose.2020.101731_bib0002 article-title: Crafting a national cyberdefense, and preparing to support computational literacy publication-title: Commun. ACM doi: 10.1145/3048379 – start-page: 43 year: 2015 ident: 10.1016/j.cose.2020.101731_bib0021 article-title: Cyber education: a multi-level, multi-discipline approach – volume: 34 start-page: 84 issue: 2 year: 2002 ident: 10.1016/j.cose.2020.101731_bib0018 article-title: Encouraging women in computer science publication-title: ACM SIGCSE Bull. doi: 10.1145/543812.543837 – volume: 18 start-page: 3 issue: 1 year: 2015 ident: 10.1016/j.cose.2020.101731_bib0026 article-title: Individual differences in cyber security behaviors: an examination of who is sharing passwords publication-title: Cyberpsychol. Behav. Soc. Netw. doi: 10.1089/cyber.2014.0179 – volume: 21 start-page: 393 issue: 5–6 year: 2009 ident: 10.1016/j.cose.2020.101731_bib0025 article-title: Using the internet: skill related problems in users’ online behavior publication-title: Interact. Comput. doi: 10.1016/j.intcom.2009.06.005 – volume: 66 start-page: 52 year: 2017 ident: 10.1016/j.cose.2020.101731_bib0010 article-title: An integrative model of information security policy compliance with psychological contract: examining a bilateral perspective publication-title: Comp. Secur. doi: 10.1016/j.cose.2016.12.016 – volume: 58 start-page: 377 issue: 3 year: 2016 ident: 10.1016/j.cose.2020.101731_bib0020 article-title: A meta-analysis of factors influencing the development of trust in automation: implications for understanding autonomy in future systems publication-title: Hum. Factors doi: 10.1177/0018720816634228 |
SSID | ssj0017688 |
Score | 2.4543085 |
Snippet | •This study examined cyber hygiene in a sample of university students.•Information handling and incident reporting predicted engagement in cyber hygiene... Cybersecurity is paramount in modern cyberdefense. One important factor linked to reducing human-instigated breaches of cybersecurity includes cyber hygiene.... |
SourceID | proquest crossref elsevier |
SourceType | Aggregation Database Enrichment Source Index Database Publisher |
StartPage | 101731 |
SubjectTerms | Accounting Colleges & universities Computer education Curricula Cyber education Cyber hygiene Cybersecurity Gender aspects Human factors Hygiene Motivation Risk |
Title | Holistic cyber hygiene education: Accounting for the human factors |
URI | https://dx.doi.org/10.1016/j.cose.2020.101731 https://www.proquest.com/docview/2434066635 |
Volume | 92 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
journalDatabaseRights | – providerCode: PRVESC databaseName: Baden-Württemberg Complete Freedom Collection (Elsevier) customDbUrl: eissn: 1872-6208 dateEnd: 99991231 omitProxy: true ssIdentifier: ssj0017688 issn: 0167-4048 databaseCode: GBLVA dateStart: 20110101 isFulltext: true titleUrlDefault: https://www.sciencedirect.com providerName: Elsevier – providerCode: PRVESC databaseName: Elsevier SD Freedom Collection Journals [SCFCJ] customDbUrl: eissn: 1872-6208 dateEnd: 99991231 omitProxy: true ssIdentifier: ssj0017688 issn: 0167-4048 databaseCode: AIKHN dateStart: 19950101 isFulltext: true titleUrlDefault: https://www.sciencedirect.com providerName: Elsevier – providerCode: PRVESC databaseName: ScienceDirect Freedom Collection 2013 customDbUrl: eissn: 1872-6208 dateEnd: 99991231 omitProxy: true ssIdentifier: ssj0017688 issn: 0167-4048 databaseCode: .~1 dateStart: 19950101 isFulltext: true titleUrlDefault: https://www.sciencedirect.com providerName: Elsevier – providerCode: PRVESC databaseName: ScienceDirect Freedom Collection Journals customDbUrl: eissn: 1872-6208 dateEnd: 99991231 omitProxy: true ssIdentifier: ssj0017688 issn: 0167-4048 databaseCode: ACRLP dateStart: 19950101 isFulltext: true titleUrlDefault: https://www.sciencedirect.com providerName: Elsevier – providerCode: PRVLSH databaseName: Elsevier Journals customDbUrl: mediaType: online eissn: 1872-6208 dateEnd: 99991231 omitProxy: true ssIdentifier: ssj0017688 issn: 0167-4048 databaseCode: AKRWK dateStart: 19820101 isFulltext: true providerName: Library Specific Holdings |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV09T8MwED1VZWHhG1EolQc2FFrHThzYSkUVQHShSN0sO4mhqGorKEMXfjtnxykCiQ6Mie0outzHc_R8D-CsMEpokbOAxywPuNYmwCKsA6pMZCgVGXPd-R8GcfrE70bRqAa96iyMpVX63F_mdJet_Z22t2Z7Ph63Hx2BHh0wRD_toGfaE-w8trS-i88VzYMinE5W_b1xtj84U3K8LCcc94hh2W6I0b-K06807WpPfwe2PGgk3fK9dqFWTPdguxJkID4-9-E6nU1c42WSLTUOvCyfcaQgRcXiuCLf6hAE4SpB-EecTB_xwjsHMOzfDHtp4EUSgoyFySIQnRxzluu0phCr8FghgBNJnOFeQzEWxcokuco0t7XcChhghdcdTXXONM05O4T6dDYtjoBY5Sos54Jl6hLDmiv7e1SEeWIMoj5tGkAr48jMNxC3OhYTWTHFXqU1qLQGlaVBG3C-WjMv22esnR1VNpc_nEBifl-7rll9IOlD8F2GnHG7OWPR8T8fewKb9qqkNzahvnj7KE4Rgix0y_lYCza6t_fp4AsXS9fB |
linkProvider | Elsevier |
linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV09T8MwED2VdoCFb0ShgAc2ZLWJnQ_YSkWV0o-FInWz7CSGoqqtIAz995wTpwgkOrDGcRRdznfPyct7ANeploEKEka5zxLKldIUm7CijtSedpwgZrk6_3DkR8_8ceJNKtAp_4UxtEpb-4uanldre6Rpo9lcTqfNp5xAjwnoYp62MDO3oMY9rMlVqLV7_Wi0_piAiDpcS3zjBPvvTEHzMrRw3Ca6heIQc_7qT78qdd5-uvuwa3EjaRe3dgCVdH4Ie6UnA7FL9Ajuo8Us114m8UrhwOvqBUdSkpZEjjvybRBBELESRIAkd-oj1nvnGMbdh3EnotYngcbMDTMatBIsW7nYmkS4wn2JGC4I_Ri3G5Ixz5c6TGSsuGnnxsMAm7xqKUclTDkJZydQnS_m6SkQY16FHT1gsbzFlc2leUMauEmoNQI_pevglMERsdUQN1YWM1GSxd6ECagwARVFQOtws56zLBQ0Np7tlTEXP_JAYInfOK9RPiBhV-GHcDnjZn_GvLN_XvYKtqPxcCAGvVH_HHbMSMF2bEA1e_9MLxCRZOrSZtwXg47abA |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Holistic+cyber+hygiene+education%3A+Accounting+for+the+human+factors&rft.jtitle=Computers+%26+security&rft.au=Neigel%2C+Alexis+R.&rft.au=Claypoole%2C+Victoria+L.&rft.au=Waldfogle%2C+Grace+E.&rft.au=Acharya%2C+Subrata&rft.date=2020-05-01&rft.issn=0167-4048&rft.volume=92&rft.spage=101731&rft_id=info:doi/10.1016%2Fj.cose.2020.101731&rft.externalDBID=n%2Fa&rft.externalDocID=10_1016_j_cose_2020_101731 |
thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=0167-4048&client=summon |
thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=0167-4048&client=summon |
thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=0167-4048&client=summon |