Holistic cyber hygiene education: Accounting for the human factors

•This study examined cyber hygiene in a sample of university students.•Information handling and incident reporting predicted engagement in cyber hygiene behaviors.•Email usage and Internet usage predicted engagement in cyber hygiene behaviors.•Trust in technology predicted men's cyber hygiene b...

Full description

Saved in:
Bibliographic Details
Published inComputers & security Vol. 92; pp. 101731 - 6
Main Authors Neigel, Alexis R., Claypoole, Victoria L., Waldfogle, Grace E., Acharya, Subrata, Hancock, Gabriella M.
Format Journal Article
LanguageEnglish
Published Amsterdam Elsevier Ltd 01.05.2020
Elsevier Sequoia S.A
Subjects
Online AccessGet full text
ISSN0167-4048
1872-6208
DOI10.1016/j.cose.2020.101731

Cover

Abstract •This study examined cyber hygiene in a sample of university students.•Information handling and incident reporting predicted engagement in cyber hygiene behaviors.•Email usage and Internet usage predicted engagement in cyber hygiene behaviors.•Trust in technology predicted men's cyber hygiene behaviors.•Intrinsic motivation predicted women's cyber hygiene behaviors. Cybersecurity is paramount in modern cyberdefense. One important factor linked to reducing human-instigated breaches of cybersecurity includes cyber hygiene. Cyber hygiene is the adaptive knowledge and behavior to mitigate risky online activities that put an individual's social, financial, and personal information at risk – a danger that is significantly compounded when discussing the risk to entire countries as opposed to a single individual. Interestingly, even though the human is the greatest risk to cybersecurity, very little research has examined the latent individual differences associated with developing cyber hygiene-related knowledge, attitudes, and behaviors. Thus, the goal of the present study was to address this gap in cyber hygiene research. The results from 173 university participants demonstrated that several factors, such as information handling, incident reporting, and password management were associated with better cyber hygiene. Individual differences such as trust in technology and intrinsic motivation were predictive of improved cyber hygiene – but were subject to significant sex differences. Differences across academic majors, such as science and technology majors, also emerged. Finally, we discuss the importance of understanding the role of human factors in modern cybersecurity and the potential practical implications associated with refining current course curricula in computer and information sciences.
AbstractList Cybersecurity is paramount in modern cyberdefense. One important factor linked to reducing human-instigated breaches of cybersecurity includes cyber hygiene. Cyber hygiene is the adaptive knowledge and behavior to mitigate risky online activities that put an individual's social, financial, and personal information at risk – a danger that is significantly compounded when discussing the risk to entire countries as opposed to a single individual. Interestingly, even though the human is the greatest risk to cybersecurity, very little research has examined the latent individual differences associated with developing cyber hygiene-related knowledge, attitudes, and behaviors. Thus, the goal of the present study was to address this gap in cyber hygiene research. The results from 173 university participants demonstrated that several factors, such as information handling, incident reporting, and password management were associated with better cyber hygiene. Individual differences such as trust in technology and intrinsic motivation were predictive of improved cyber hygiene – but were subject to significant sex differences. Differences across academic majors, such as science and technology majors, also emerged. Finally, we discuss the importance of understanding the role of human factors in modern cybersecurity and the potential practical implications associated with refining current course curricula in computer and information sciences.
•This study examined cyber hygiene in a sample of university students.•Information handling and incident reporting predicted engagement in cyber hygiene behaviors.•Email usage and Internet usage predicted engagement in cyber hygiene behaviors.•Trust in technology predicted men's cyber hygiene behaviors.•Intrinsic motivation predicted women's cyber hygiene behaviors. Cybersecurity is paramount in modern cyberdefense. One important factor linked to reducing human-instigated breaches of cybersecurity includes cyber hygiene. Cyber hygiene is the adaptive knowledge and behavior to mitigate risky online activities that put an individual's social, financial, and personal information at risk – a danger that is significantly compounded when discussing the risk to entire countries as opposed to a single individual. Interestingly, even though the human is the greatest risk to cybersecurity, very little research has examined the latent individual differences associated with developing cyber hygiene-related knowledge, attitudes, and behaviors. Thus, the goal of the present study was to address this gap in cyber hygiene research. The results from 173 university participants demonstrated that several factors, such as information handling, incident reporting, and password management were associated with better cyber hygiene. Individual differences such as trust in technology and intrinsic motivation were predictive of improved cyber hygiene – but were subject to significant sex differences. Differences across academic majors, such as science and technology majors, also emerged. Finally, we discuss the importance of understanding the role of human factors in modern cybersecurity and the potential practical implications associated with refining current course curricula in computer and information sciences.
ArticleNumber 101731
Author Acharya, Subrata
Waldfogle, Grace E.
Hancock, Gabriella M.
Neigel, Alexis R.
Claypoole, Victoria L.
Author_xml – sequence: 1
  givenname: Alexis R.
  orcidid: 0000-0003-2230-3515
  surname: Neigel
  fullname: Neigel, Alexis R.
  email: alexis.neigel@gmail.com
  organization: University of Central Florida, Department of Psychology, College of Sciences, Orlando, FL, United States
– sequence: 2
  givenname: Victoria L.
  surname: Claypoole
  fullname: Claypoole, Victoria L.
  organization: University of Central Florida, Department of Psychology, College of Sciences, Orlando, FL, United States
– sequence: 3
  givenname: Grace E.
  surname: Waldfogle
  fullname: Waldfogle, Grace E.
  organization: University of Central Florida, Department of Psychology, College of Sciences, Orlando, FL, United States
– sequence: 4
  givenname: Subrata
  orcidid: 0000-0003-4008-9495
  surname: Acharya
  fullname: Acharya, Subrata
  organization: Towson University, Department of Computer and Information Sciences, Towson, MD, United States
– sequence: 5
  givenname: Gabriella M.
  surname: Hancock
  fullname: Hancock, Gabriella M.
  organization: California State University – Long Beach, Long Beach, Department of Psychology, CA, United States
BookMark eNp9kM1KAzEURoNUsK2-gKuA66n5nyhualErFNx0HzKZTJuhTWqSEfr2TjuuXHR14fKde_nOBIx88BaAe4xmGGHx2M5MSHZGEDkvSoqvwBjLkhSCIDkC4z5UFgwxeQMmKbWozwgpx-B1GXYuZWegOVY2wu1x46y30Nad0dkF_wznxoTOZ-c3sAkR5q2F226vPWy0ySGmW3Dd6F2yd39zCtbvb-vFslh9fXwu5qvCUCJzUaKaU4kwZ0-acMyE5pSWUhiCS00pF7qRtTYVI1jiUiLOMalQhauaVrhmdAoehrOHGL47m7JqQxd9_1ERRhkSQlDep-SQMjGkFG2jjMvnIjlqt1MYqZMw1aqTMHUSpgZhPUr-oYfo9joeL0MvA2T75j_ORpVML9DY2kVrsqqDu4T_Ag4KhFY
CitedBy_id crossref_primary_10_1007_s10207_024_00824_0
crossref_primary_10_1080_0144929X_2021_1973106
crossref_primary_10_22139_jobs_1623655
crossref_primary_10_3390_en17081876
crossref_primary_10_3390_app13063410
crossref_primary_10_1016_j_cose_2021_102313
crossref_primary_10_1109_EMR_2024_3361023
crossref_primary_10_1177_1071181322661330
crossref_primary_10_1080_10572317_2024_2315630
crossref_primary_10_1109_TTS_2022_3192767
crossref_primary_10_1016_j_cose_2023_103467
crossref_primary_10_1080_19393555_2022_2088428
crossref_primary_10_3390_info14070388
crossref_primary_10_1108_ICS_11_2023_0215
crossref_primary_10_1177_21582440241228920
crossref_primary_10_1108_OCJ_01_2022_0001
crossref_primary_10_1002_pra2_765
crossref_primary_10_52080_rvgluz_26_e6_2
crossref_primary_10_1080_10447318_2023_2247577
crossref_primary_10_1016_j_cose_2024_104306
crossref_primary_10_1080_08874417_2023_2251452
crossref_primary_10_1080_15564886_2024_2329765
crossref_primary_10_1177_00111287231180093
crossref_primary_10_1177_10711813241275926
crossref_primary_10_1108_LHT_10_2023_0480
crossref_primary_10_1109_MC_2024_3395523
crossref_primary_10_1109_ACCESS_2021_3130013
crossref_primary_10_1093_cybsec_tyab011
crossref_primary_10_1109_ACCESS_2021_3097144
crossref_primary_10_1080_19393555_2022_2077265
Cites_doi 10.1177/0018720811417254
10.1177/0018720818761256
10.1145/2184319.2184330
10.1089/cyber.2013.1537
10.1016/j.dss.2010.01.010
10.1016/j.promfg.2015.07.186
10.1109/SP.2016.26
10.1177/0018720818780472
10.1016/j.cose.2006.10.005
10.1080/14639220903106387
10.1037/0022-3514.66.5.950
10.1109/TEM.2008.927825
10.4102/sajbm.v45i4.138
10.1016/j.cose.2013.12.003
10.3389/fpsyg.2019.00995
10.1016/j.cose.2017.01.004
10.1145/3048379
10.1145/543812.543837
10.1089/cyber.2014.0179
10.1016/j.intcom.2009.06.005
10.1016/j.cose.2016.12.016
10.1177/0018720816634228
ContentType Journal Article
Copyright 2020 Elsevier Ltd
Copyright Elsevier Sequoia S.A. May 2020
Copyright_xml – notice: 2020 Elsevier Ltd
– notice: Copyright Elsevier Sequoia S.A. May 2020
DBID AAYXX
CITATION
7SC
8FD
JQ2
K7.
L7M
L~C
L~D
DOI 10.1016/j.cose.2020.101731
DatabaseName CrossRef
Computer and Information Systems Abstracts
Technology Research Database
ProQuest Computer Science Collection
ProQuest Criminal Justice (Alumni)
Advanced Technologies Database with Aerospace
Computer and Information Systems Abstracts – Academic
Computer and Information Systems Abstracts Professional
DatabaseTitle CrossRef
ProQuest Criminal Justice (Alumni)
Technology Research Database
Computer and Information Systems Abstracts – Academic
ProQuest Computer Science Collection
Computer and Information Systems Abstracts
Advanced Technologies Database with Aerospace
Computer and Information Systems Abstracts Professional
DatabaseTitleList ProQuest Criminal Justice (Alumni)

DeliveryMethod fulltext_linktorsrc
Discipline Computer Science
EISSN 1872-6208
EndPage 6
ExternalDocumentID 10_1016_j_cose_2020_101731
S0167404820300183
GroupedDBID --K
--M
-~X
.DC
.~1
0R~
1B1
1RT
1~.
1~5
29F
4.4
457
4G.
5GY
5VS
7-5
71M
8P~
9JN
AACTN
AAEDT
AAEDW
AAIAV
AAIKJ
AAKOC
AALRI
AAOAW
AAQFI
AAQXK
AAXUO
AAYFN
ABBOA
ABFSI
ABMAC
ABXDB
ABYKQ
ACDAQ
ACGFO
ACGFS
ACNNM
ACRLP
ACZNC
ADBBV
ADEZE
ADHUB
ADJOM
ADMUD
AEBSH
AEKER
AENEX
AFFNX
AFKWA
AFTJW
AGHFR
AGUBO
AGYEJ
AHHHB
AHZHX
AIALX
AIEXJ
AIKHN
AITUG
AJBFU
AJOXV
ALMA_UNASSIGNED_HOLDINGS
AMFUW
AMRAJ
AOUOD
ASPBG
AVWKF
AXJTR
AZFZN
BKOJK
BKOMP
BLXMC
CS3
DU5
E.L
EBS
EFJIC
EFLBG
EJD
EO8
EO9
EP2
EP3
FDB
FEDTE
FGOYB
FIRID
FNPLU
FYGXN
G-2
G-Q
GBLVA
GBOLZ
HLX
HLZ
HVGLF
HZ~
IHE
J1W
KOM
LG8
LG9
M41
MO0
MS~
N9A
O-L
O9-
OAUVE
OZT
P-8
P-9
P2P
PC.
PQQKQ
Q38
R2-
RIG
RNS
ROL
RPZ
RXW
SBC
SBM
SDF
SDG
SDP
SES
SEW
SPC
SPCBC
SSV
SSZ
T5K
TAE
TN5
TWZ
WH7
WUQ
XJE
XPP
XSW
YK3
ZMT
~G-
AATTM
AAXKI
AAYWO
AAYXX
ABJNI
ABWVN
ACRPL
ACVFH
ADCNI
ADNMO
AEIPS
AEUPX
AFJKZ
AFPUW
AFXIZ
AGCQF
AGQPQ
AGRNS
AIGII
AIIUN
AKBMS
AKRWK
AKYEP
ANKPU
APXCP
BNPGV
CITATION
SSH
7SC
8FD
EFKBS
JQ2
K7.
L7M
L~C
L~D
ID FETCH-LOGICAL-c328t-70d53801549a25146a533786c217a3356af8dacb421817805512b0b1bd3b1d43
IEDL.DBID .~1
ISSN 0167-4048
IngestDate Mon Jul 14 10:29:36 EDT 2025
Tue Jul 01 03:48:17 EDT 2025
Thu Apr 24 23:02:10 EDT 2025
Fri Feb 23 02:47:08 EST 2024
IsPeerReviewed true
IsScholarly true
Keywords Computer education
Cyber education
Cyber hygiene
Human factors
Language English
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c328t-70d53801549a25146a533786c217a3356af8dacb421817805512b0b1bd3b1d43
Notes ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 14
ORCID 0000-0003-4008-9495
0000-0003-2230-3515
PQID 2434066635
PQPubID 46289
PageCount 6
ParticipantIDs proquest_journals_2434066635
crossref_citationtrail_10_1016_j_cose_2020_101731
crossref_primary_10_1016_j_cose_2020_101731
elsevier_sciencedirect_doi_10_1016_j_cose_2020_101731
ProviderPackageCode CITATION
AAYXX
PublicationCentury 2000
PublicationDate May 2020
2020-05-00
20200501
PublicationDateYYYYMMDD 2020-05-01
PublicationDate_xml – month: 05
  year: 2020
  text: May 2020
PublicationDecade 2020
PublicationPlace Amsterdam
PublicationPlace_xml – name: Amsterdam
PublicationTitle Computers & security
PublicationYear 2020
Publisher Elsevier Ltd
Elsevier Sequoia S.A
Publisher_xml – name: Elsevier Ltd
– name: Elsevier Sequoia S.A
References Parsons, McCormac, Butavicius, Pattinson, Jerram (bib0017) 2014; 42
Sawyer, Hancock (bib0019) 2018; 60
Hancock, Billings, Schaefer, Chen, de Visser, Parasuraman (bib0011) 2011; 53
Whitty, Doodson, Creese, Hodges (bib0026) 2015; 18
Balfe, Sharples, Wilson (bib0003) 2018; 60
Cone, Irvine, Thompson, Nguyen (bib0007) 2007; 26
Thatcher, Zimmer, Gundlach, McKnight (bib0023) 2008; 55
Dupuis (bib0008) 2017; 2017
Bansal, Zahedi, Genfen (bib0004) 2010; 49
Butler (bib0005) 2014; 45
Han, Kim, Kim (bib0010) 2017; 66
Parsons, Calic, Pattinson, Butavicius, McCormac, Zwaans (bib0016) 2017; 66
Roberts, Kassianidou, Irani (bib0018) 2002; 34
Tischer, Durumeric, Foster, Duan, Mori, Bursztein, Bailey (bib0028) 2016
Wiederhold (bib0027) 2014; 17
Amabile, Hill, Hennessey, Tighe (bib0001) 1994; 66
Schaefer, Chen, Szalma, Hancock (bib0020) 2016; 58
Hancock, Hancock, Warm (bib0012) 2009; 10
Symantec. (2012). Internet Security Threat Report: 2011 Trends. Symantec Corporation.
Garfinkel (bib0009) 2012; 55
Linkov, Zámečník, Havlíčková, Pai (bib0015) 2019
van Duersen, van Dijk (bib0025) 2009; 21
Henshel, Cains, Hoffman, Kelley (bib0013) 2015; 3
Cain, Edwards, Still (bib0006) 2018; 42
Arquilla (bib0002) 2016; 60
Sobiesk, Blair, Conti, Lanham, Taylor (bib0021) 2015
McKnight, Carter, Thatcher, Clay (bib0014) 2011; 2
Han (10.1016/j.cose.2020.101731_bib0010) 2017; 66
Sawyer (10.1016/j.cose.2020.101731_bib0019) 2018; 60
Hancock (10.1016/j.cose.2020.101731_bib0011) 2011; 53
Amabile (10.1016/j.cose.2020.101731_bib0001) 1994; 66
Sobiesk (10.1016/j.cose.2020.101731_bib0021) 2015
Roberts (10.1016/j.cose.2020.101731_bib0018) 2002; 34
Hancock (10.1016/j.cose.2020.101731_bib0012) 2009; 10
Schaefer (10.1016/j.cose.2020.101731_bib0020) 2016; 58
Thatcher (10.1016/j.cose.2020.101731_bib0023) 2008; 55
van Duersen (10.1016/j.cose.2020.101731_bib0025) 2009; 21
Butler (10.1016/j.cose.2020.101731_bib0005) 2014; 45
Wiederhold (10.1016/j.cose.2020.101731_bib0027) 2014; 17
Dupuis (10.1016/j.cose.2020.101731_bib0008) 2017; 2017
Balfe (10.1016/j.cose.2020.101731_bib0003) 2018; 60
Henshel (10.1016/j.cose.2020.101731_bib0013) 2015; 3
Parsons (10.1016/j.cose.2020.101731_bib0016) 2017; 66
Bansal (10.1016/j.cose.2020.101731_bib0004) 2010; 49
Whitty (10.1016/j.cose.2020.101731_bib0026) 2015; 18
Garfinkel (10.1016/j.cose.2020.101731_bib0009) 2012; 55
Parsons (10.1016/j.cose.2020.101731_bib0017) 2014; 42
Tischer (10.1016/j.cose.2020.101731_bib0028) 2016
McKnight (10.1016/j.cose.2020.101731_bib0014) 2011; 2
Cone (10.1016/j.cose.2020.101731_bib0007) 2007; 26
Linkov (10.1016/j.cose.2020.101731_bib0015) 2019
Cain (10.1016/j.cose.2020.101731_bib0006) 2018; 42
Arquilla (10.1016/j.cose.2020.101731_bib0002) 2016; 60
10.1016/j.cose.2020.101731_bib0022
References_xml – volume: 66
  start-page: 52
  year: 2017
  end-page: 65
  ident: bib0010
  article-title: An integrative model of information security policy compliance with psychological contract: examining a bilateral perspective
  publication-title: Comp. Secur.
– start-page: 306
  year: 2016
  end-page: 319
  ident: bib0028
  article-title: Users Really Do Plug in USB Drives They Find
  publication-title: 2016 IEEE Symp. Secur. Priv.
– volume: 2017
  start-page: 1
  year: 2017
  end-page: 17
  ident: bib0008
  article-title: Cyber security for everyone: an introductory course for non technical majors
  publication-title: J. Cybersecur. Edu. Res. Practice
– volume: 58
  start-page: 377
  year: 2016
  end-page: 400
  ident: bib0020
  article-title: A meta-analysis of factors influencing the development of trust in automation: implications for understanding autonomy in future systems
  publication-title: Hum. Factors
– volume: 53
  start-page: 517
  year: 2011
  end-page: 527
  ident: bib0011
  publication-title: Hum. Factors
– year: 2019
  ident: bib0015
  article-title: Human factors in the cybersecurity of autonomous vehicles: trends in current research
  publication-title: Front. Psychol.
– volume: 34
  start-page: 84
  year: 2002
  end-page: 88
  ident: bib0018
  article-title: Encouraging women in computer science
  publication-title: ACM SIGCSE Bull.
– volume: 66
  start-page: 40
  year: 2017
  end-page: 51
  ident: bib0016
  article-title: The human aspects of information security questionnaire (HAIS-Q): two further validation studies
  publication-title: Comp. Secur.
– reference: Symantec. (2012). Internet Security Threat Report: 2011 Trends. Symantec Corporation.
– volume: 17
  start-page: 1
  year: 2014
  end-page: 2
  ident: bib0027
  article-title: The role of psychology in enhancing cybersecurity
  publication-title: Cyberpsychol. Behav. Soc. Netw.
– volume: 26
  start-page: 63
  year: 2007
  end-page: 72
  ident: bib0007
  article-title: A video game for cyber security training and awareness
  publication-title: Comp. Secur.
– volume: 42
  start-page: 165
  year: 2014
  end-page: 176
  ident: bib0017
  article-title: Determining employee awareness using the human aspects of information security questionnaire (HAIS-Q)
  publication-title: Comp. Secur.
– volume: 3
  start-page: 1117
  year: 2015
  end-page: 1124
  ident: bib0013
  article-title: Trust as a human factor in holistic cyber security risk assessment
  publication-title: Procedia Manufact.
– volume: 60
  start-page: 477
  year: 2018
  end-page: 495
  ident: bib0003
  article-title: Understanding is key: an analysis of factors pertaining to trust in a real-world automation system
  publication-title: Hum. Factors
– volume: 18
  start-page: 3
  year: 2015
  end-page: 7
  ident: bib0026
  article-title: Individual differences in cyber security behaviors: an examination of who is sharing passwords
  publication-title: Cyberpsychol. Behav. Soc. Netw.
– volume: 42
  start-page: 36
  year: 2018
  end-page: 45
  ident: bib0006
  article-title: An exploratory study of cyber hygiene behaviors and knowledge
  publication-title: J. Inform. Secur. Appl.
– start-page: 43
  year: 2015
  end-page: 47
  ident: bib0021
  article-title: Cyber education: a multi-level, multi-discipline approach
  publication-title: Proceedings of the 16th Annual Conference on Information Technology Education
– volume: 60
  start-page: 10
  year: 2016
  end-page: 11
  ident: bib0002
  article-title: Crafting a national cyberdefense, and preparing to support computational literacy
  publication-title: Commun. ACM
– volume: 2
  year: 2011
  ident: bib0014
  article-title: Trust in a specific technology: an investigation of its components and measures
  publication-title: Trans. Manage. Inform. Syst. (TMIS)
– volume: 10
  start-page: 481
  year: 2009
  end-page: 488
  ident: bib0012
  article-title: Individuation: the N=1 revolution
  publication-title: Theoret. Issues Ergonom. Sci.
– volume: 21
  start-page: 393
  year: 2009
  end-page: 402
  ident: bib0025
  article-title: Using the internet: skill related problems in users’ online behavior
  publication-title: Interact. Comput.
– volume: 66
  start-page: 950
  year: 1994
  end-page: 967
  ident: bib0001
  article-title: The work preference inventory: assessing intrinsic and extrinsic motivational orientations
  publication-title: J. Pers. Soc. Psychol.
– volume: 55
  start-page: 628
  year: 2008
  end-page: 644
  ident: bib0023
  article-title: Internal and external dimensions of computer self-efficacy: an empirical examination
  publication-title: IEEE Trans. Eng. Manage.
– volume: 45
  start-page: 21
  year: 2014
  end-page: 32
  ident: bib0005
  article-title: Towards online security: key drivers of poor user behaviour and recommendations for appropriate interventions
  publication-title: South African J. Busi. Manage.
– volume: 55
  start-page: 29
  year: 2012
  end-page: 32
  ident: bib0009
  article-title: Inside risks: the cybersecurity risk
  publication-title: Commun. ACM
– volume: 49
  start-page: 138
  year: 2010
  end-page: 150
  ident: bib0004
  article-title: The impact of personal dispositions on information sensitivity, privacy concern and trust in disclosing health information online
  publication-title: Decis. Support Syst.
– volume: 60
  start-page: 597
  year: 2018
  end-page: 609
  ident: bib0019
  article-title: Hacking the human: the prevalence paradox in cybersecurity
  publication-title: Hum. Factors
– volume: 53
  start-page: 517
  issue: 5
  year: 2011
  ident: 10.1016/j.cose.2020.101731_bib0011
  publication-title: Hum. Factors
  doi: 10.1177/0018720811417254
– volume: 2
  issue: 2
  year: 2011
  ident: 10.1016/j.cose.2020.101731_bib0014
  article-title: Trust in a specific technology: an investigation of its components and measures
  publication-title: Trans. Manage. Inform. Syst. (TMIS)
– volume: 60
  start-page: 477
  issue: 4
  year: 2018
  ident: 10.1016/j.cose.2020.101731_bib0003
  article-title: Understanding is key: an analysis of factors pertaining to trust in a real-world automation system
  publication-title: Hum. Factors
  doi: 10.1177/0018720818761256
– volume: 55
  start-page: 29
  issue: 6
  year: 2012
  ident: 10.1016/j.cose.2020.101731_bib0009
  article-title: Inside risks: the cybersecurity risk
  publication-title: Commun. ACM
  doi: 10.1145/2184319.2184330
– volume: 17
  start-page: 1
  issue: 2
  year: 2014
  ident: 10.1016/j.cose.2020.101731_bib0027
  article-title: The role of psychology in enhancing cybersecurity
  publication-title: Cyberpsychol. Behav. Soc. Netw.
  doi: 10.1089/cyber.2013.1537
– volume: 49
  start-page: 138
  issue: 2
  year: 2010
  ident: 10.1016/j.cose.2020.101731_bib0004
  article-title: The impact of personal dispositions on information sensitivity, privacy concern and trust in disclosing health information online
  publication-title: Decis. Support Syst.
  doi: 10.1016/j.dss.2010.01.010
– volume: 3
  start-page: 1117
  year: 2015
  ident: 10.1016/j.cose.2020.101731_bib0013
  article-title: Trust as a human factor in holistic cyber security risk assessment
  publication-title: Procedia Manufact.
  doi: 10.1016/j.promfg.2015.07.186
– start-page: 306
  year: 2016
  ident: 10.1016/j.cose.2020.101731_bib0028
  article-title: Users Really Do Plug in USB Drives They Find
  publication-title: 2016 IEEE Symp. Secur. Priv.
  doi: 10.1109/SP.2016.26
– ident: 10.1016/j.cose.2020.101731_bib0022
– volume: 60
  start-page: 597
  issue: 5
  year: 2018
  ident: 10.1016/j.cose.2020.101731_bib0019
  article-title: Hacking the human: the prevalence paradox in cybersecurity
  publication-title: Hum. Factors
  doi: 10.1177/0018720818780472
– volume: 26
  start-page: 63
  issue: 1
  year: 2007
  ident: 10.1016/j.cose.2020.101731_bib0007
  article-title: A video game for cyber security training and awareness
  publication-title: Comp. Secur.
  doi: 10.1016/j.cose.2006.10.005
– volume: 10
  start-page: 481
  issue: 5
  year: 2009
  ident: 10.1016/j.cose.2020.101731_bib0012
  article-title: Individuation: the N=1 revolution
  publication-title: Theoret. Issues Ergonom. Sci.
  doi: 10.1080/14639220903106387
– volume: 66
  start-page: 950
  issue: 5
  year: 1994
  ident: 10.1016/j.cose.2020.101731_bib0001
  article-title: The work preference inventory: assessing intrinsic and extrinsic motivational orientations
  publication-title: J. Pers. Soc. Psychol.
  doi: 10.1037/0022-3514.66.5.950
– volume: 2017
  start-page: 1
  issue: 1
  year: 2017
  ident: 10.1016/j.cose.2020.101731_bib0008
  article-title: Cyber security for everyone: an introductory course for non technical majors
  publication-title: J. Cybersecur. Edu. Res. Practice
– volume: 55
  start-page: 628
  issue: 4
  year: 2008
  ident: 10.1016/j.cose.2020.101731_bib0023
  article-title: Internal and external dimensions of computer self-efficacy: an empirical examination
  publication-title: IEEE Trans. Eng. Manage.
  doi: 10.1109/TEM.2008.927825
– volume: 45
  start-page: 21
  issue: 4
  year: 2014
  ident: 10.1016/j.cose.2020.101731_bib0005
  article-title: Towards online security: key drivers of poor user behaviour and recommendations for appropriate interventions
  publication-title: South African J. Busi. Manage.
  doi: 10.4102/sajbm.v45i4.138
– volume: 42
  start-page: 165
  year: 2014
  ident: 10.1016/j.cose.2020.101731_bib0017
  article-title: Determining employee awareness using the human aspects of information security questionnaire (HAIS-Q)
  publication-title: Comp. Secur.
  doi: 10.1016/j.cose.2013.12.003
– year: 2019
  ident: 10.1016/j.cose.2020.101731_bib0015
  article-title: Human factors in the cybersecurity of autonomous vehicles: trends in current research
  publication-title: Front. Psychol.
  doi: 10.3389/fpsyg.2019.00995
– volume: 66
  start-page: 40
  year: 2017
  ident: 10.1016/j.cose.2020.101731_bib0016
  article-title: The human aspects of information security questionnaire (HAIS-Q): two further validation studies
  publication-title: Comp. Secur.
  doi: 10.1016/j.cose.2017.01.004
– volume: 42
  start-page: 36
  year: 2018
  ident: 10.1016/j.cose.2020.101731_bib0006
  article-title: An exploratory study of cyber hygiene behaviors and knowledge
  publication-title: J. Inform. Secur. Appl.
– volume: 60
  start-page: 10
  issue: 4
  year: 2016
  ident: 10.1016/j.cose.2020.101731_bib0002
  article-title: Crafting a national cyberdefense, and preparing to support computational literacy
  publication-title: Commun. ACM
  doi: 10.1145/3048379
– start-page: 43
  year: 2015
  ident: 10.1016/j.cose.2020.101731_bib0021
  article-title: Cyber education: a multi-level, multi-discipline approach
– volume: 34
  start-page: 84
  issue: 2
  year: 2002
  ident: 10.1016/j.cose.2020.101731_bib0018
  article-title: Encouraging women in computer science
  publication-title: ACM SIGCSE Bull.
  doi: 10.1145/543812.543837
– volume: 18
  start-page: 3
  issue: 1
  year: 2015
  ident: 10.1016/j.cose.2020.101731_bib0026
  article-title: Individual differences in cyber security behaviors: an examination of who is sharing passwords
  publication-title: Cyberpsychol. Behav. Soc. Netw.
  doi: 10.1089/cyber.2014.0179
– volume: 21
  start-page: 393
  issue: 5–6
  year: 2009
  ident: 10.1016/j.cose.2020.101731_bib0025
  article-title: Using the internet: skill related problems in users’ online behavior
  publication-title: Interact. Comput.
  doi: 10.1016/j.intcom.2009.06.005
– volume: 66
  start-page: 52
  year: 2017
  ident: 10.1016/j.cose.2020.101731_bib0010
  article-title: An integrative model of information security policy compliance with psychological contract: examining a bilateral perspective
  publication-title: Comp. Secur.
  doi: 10.1016/j.cose.2016.12.016
– volume: 58
  start-page: 377
  issue: 3
  year: 2016
  ident: 10.1016/j.cose.2020.101731_bib0020
  article-title: A meta-analysis of factors influencing the development of trust in automation: implications for understanding autonomy in future systems
  publication-title: Hum. Factors
  doi: 10.1177/0018720816634228
SSID ssj0017688
Score 2.4543085
Snippet •This study examined cyber hygiene in a sample of university students.•Information handling and incident reporting predicted engagement in cyber hygiene...
Cybersecurity is paramount in modern cyberdefense. One important factor linked to reducing human-instigated breaches of cybersecurity includes cyber hygiene....
SourceID proquest
crossref
elsevier
SourceType Aggregation Database
Enrichment Source
Index Database
Publisher
StartPage 101731
SubjectTerms Accounting
Colleges & universities
Computer education
Curricula
Cyber education
Cyber hygiene
Cybersecurity
Gender aspects
Human factors
Hygiene
Motivation
Risk
Title Holistic cyber hygiene education: Accounting for the human factors
URI https://dx.doi.org/10.1016/j.cose.2020.101731
https://www.proquest.com/docview/2434066635
Volume 92
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
journalDatabaseRights – providerCode: PRVESC
  databaseName: Baden-Württemberg Complete Freedom Collection (Elsevier)
  customDbUrl:
  eissn: 1872-6208
  dateEnd: 99991231
  omitProxy: true
  ssIdentifier: ssj0017688
  issn: 0167-4048
  databaseCode: GBLVA
  dateStart: 20110101
  isFulltext: true
  titleUrlDefault: https://www.sciencedirect.com
  providerName: Elsevier
– providerCode: PRVESC
  databaseName: Elsevier SD Freedom Collection Journals [SCFCJ]
  customDbUrl:
  eissn: 1872-6208
  dateEnd: 99991231
  omitProxy: true
  ssIdentifier: ssj0017688
  issn: 0167-4048
  databaseCode: AIKHN
  dateStart: 19950101
  isFulltext: true
  titleUrlDefault: https://www.sciencedirect.com
  providerName: Elsevier
– providerCode: PRVESC
  databaseName: ScienceDirect Freedom Collection 2013
  customDbUrl:
  eissn: 1872-6208
  dateEnd: 99991231
  omitProxy: true
  ssIdentifier: ssj0017688
  issn: 0167-4048
  databaseCode: .~1
  dateStart: 19950101
  isFulltext: true
  titleUrlDefault: https://www.sciencedirect.com
  providerName: Elsevier
– providerCode: PRVESC
  databaseName: ScienceDirect Freedom Collection Journals
  customDbUrl:
  eissn: 1872-6208
  dateEnd: 99991231
  omitProxy: true
  ssIdentifier: ssj0017688
  issn: 0167-4048
  databaseCode: ACRLP
  dateStart: 19950101
  isFulltext: true
  titleUrlDefault: https://www.sciencedirect.com
  providerName: Elsevier
– providerCode: PRVLSH
  databaseName: Elsevier Journals
  customDbUrl:
  mediaType: online
  eissn: 1872-6208
  dateEnd: 99991231
  omitProxy: true
  ssIdentifier: ssj0017688
  issn: 0167-4048
  databaseCode: AKRWK
  dateStart: 19820101
  isFulltext: true
  providerName: Library Specific Holdings
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV09T8MwED1VZWHhG1EolQc2FFrHThzYSkUVQHShSN0sO4mhqGorKEMXfjtnxykCiQ6Mie0outzHc_R8D-CsMEpokbOAxywPuNYmwCKsA6pMZCgVGXPd-R8GcfrE70bRqAa96iyMpVX63F_mdJet_Z22t2Z7Ph63Hx2BHh0wRD_toGfaE-w8trS-i88VzYMinE5W_b1xtj84U3K8LCcc94hh2W6I0b-K06807WpPfwe2PGgk3fK9dqFWTPdguxJkID4-9-E6nU1c42WSLTUOvCyfcaQgRcXiuCLf6hAE4SpB-EecTB_xwjsHMOzfDHtp4EUSgoyFySIQnRxzluu0phCr8FghgBNJnOFeQzEWxcokuco0t7XcChhghdcdTXXONM05O4T6dDYtjoBY5Sos54Jl6hLDmiv7e1SEeWIMoj5tGkAr48jMNxC3OhYTWTHFXqU1qLQGlaVBG3C-WjMv22esnR1VNpc_nEBifl-7rll9IOlD8F2GnHG7OWPR8T8fewKb9qqkNzahvnj7KE4Rgix0y_lYCza6t_fp4AsXS9fB
linkProvider Elsevier
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV09T8MwED2VdoCFb0ShgAc2ZLWJnQ_YSkWV0o-FInWz7CSGoqqtIAz995wTpwgkOrDGcRRdznfPyct7ANeploEKEka5zxLKldIUm7CijtSedpwgZrk6_3DkR8_8ceJNKtAp_4UxtEpb-4uanldre6Rpo9lcTqfNp5xAjwnoYp62MDO3oMY9rMlVqLV7_Wi0_piAiDpcS3zjBPvvTEHzMrRw3Ca6heIQc_7qT78qdd5-uvuwa3EjaRe3dgCVdH4Ie6UnA7FL9Ajuo8Us114m8UrhwOvqBUdSkpZEjjvybRBBELESRIAkd-oj1nvnGMbdh3EnotYngcbMDTMatBIsW7nYmkS4wn2JGC4I_Ri3G5Ixz5c6TGSsuGnnxsMAm7xqKUclTDkJZydQnS_m6SkQY16FHT1gsbzFlc2leUMauEmoNQI_pevglMERsdUQN1YWM1GSxd6ECagwARVFQOtws56zLBQ0Np7tlTEXP_JAYInfOK9RPiBhV-GHcDnjZn_GvLN_XvYKtqPxcCAGvVH_HHbMSMF2bEA1e_9MLxCRZOrSZtwXg47abA
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Holistic+cyber+hygiene+education%3A+Accounting+for+the+human+factors&rft.jtitle=Computers+%26+security&rft.au=Neigel%2C+Alexis+R.&rft.au=Claypoole%2C+Victoria+L.&rft.au=Waldfogle%2C+Grace+E.&rft.au=Acharya%2C+Subrata&rft.date=2020-05-01&rft.issn=0167-4048&rft.volume=92&rft.spage=101731&rft_id=info:doi/10.1016%2Fj.cose.2020.101731&rft.externalDBID=n%2Fa&rft.externalDocID=10_1016_j_cose_2020_101731
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=0167-4048&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=0167-4048&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=0167-4048&client=summon