Skip to main content

ORIGINAL RESEARCH article

Front. Psychol., 04 November 2020
Sec. Cognition
This article is part of the Research Topic Cognition, Behavior and Cybersecurity View all 16 articles

Taking Risks With Cybersecurity: Using Knowledge and Personal Characteristics to Predict Self-Reported Cybersecurity Behaviors

  • 1Department of Psychology, Oklahoma State University, Stillwater, OK, United States
  • 2Department of Computer Science, Loyola University Chicago, Chicago, IL, United States

Individuals’ use of insecure cybersecurity behaviors, including the use of weak passwords, is a leading contributor to cybersecurity breaches. While training individuals on best practices in cybersecurity continues to be implemented, prior research has found that training people in the use of secure passwords has not proven to be effective. Developing profiles of individual who are likely to become victims of password hacking, phishing scams, and other types of breaches would be useful, as they could be used to identify individuals with the highest likelihood of engaging in insecure cybersecurity behaviors. The present research tested the hypothesis that in addition to self-reported cybersecurity knowledge, personal characteristics, such as personality traits and general risk-taking behavior not related to technology use, can predict individual differences in cybersecurity behaviors, as measured by self-report. Our hypothesis was confirmed in a large study involving 325 undergraduates. Participants provided information about their self-reported risky cybersecurity behaviors (e.g., using non-secure Wi-Fi, not logging out of accounts on shared computers, etc.), self-reported knowledge about strong/weak passwords, Big Five personality traits (i.e., extraversion, conscientiousness, agreeableness, openness, and mood instability), sensation-seeking personality traits, and general risk-taking unrelated to using technology. The results of a hierarchical regression indicated that 34% of risky cybersecurity behavior was significantly predicted by the combination of self-reported knowledge about strong/weak passwords, personality traits, and risk-taking in daily life. The results suggest that victim profiles should take into account individual differences in personality and general risk-taking in domains unrelated to cybersecurity in addition to cybersecurity knowledge.

Introduction

The average American has little awareness of cybersecurity issues, despite the fact that the majority have been affected by some type of security breach (Pew Research Center, 2017). Research has documented that using weak passwords and re-using passwords for multiple accounts is common (Gaw and Felten, 2006; Florencio and Herley, 2007; Grawemeyer and Johnson, 2011). Recent research has explored strategies for reducing computer users’ vulnerabilities by educating them about the dangers of risky cybersecurity behaviors, such as choosing weak passwords (Farcasin and Chan-Tin, 2015) and re-using passwords (Stobert and Biddle, 2014). Research has shown that educating people on security best practices through trainings may not be effective (Riley, 2006; Lorenz et al., 2013). Studies have shown that those with knowledge about password security will, nonetheless, use weak passwords and/or re-use passwords in their daily lives (Riley, 2006; Notoatmodjo and Thomborson, 2009). Nevertheless, continued efforts to develop and to test the effectiveness of training curriculum are warranted (Bryant and Campbell, 2006; Taylor-Jackson et al., 2020). Few studies have investigated whether personality traits predict knowledge and cybersecurity behaviors (e.g., Whitty et al., 2015). The focus of the present research was to determine whether risky cybersecurity behavior could be predicted from a combination of password security knowledge and personal characteristics, such as personality traits and general risk-taking in daily life.

Case studies of cybersecurity breaches have shown that humans, rather than technology, are the weakest link, responsible for risky cybersecurity behaviors that provide access points for cybersecurity attacks (Mitnick, 2003; Pew Research Center, 2017; cf. Adams and Sasse, 1999). Numerous security breaches have involved the use of weak passwords. Some examples include the credit report company Equifax (Wang and Johnson, 2018), the retailer Target (Plachkinova and Maurer, 2019), and an American university (Ayyagari and Tyks, 2012). An increasing number of platforms are implementing requirements for users to use stronger passwords (i.e., with a combination of numbers, lowercase and uppercase letters, and other symbols or a passphrase); however, security vulnerability remains when users use the same password for multiple accounts (Thomas et al., 2017).

Numerous studies have explored the effectiveness of cybersecurity training to increase users’ knowledge about best cybersecurity practices and to decrease the use of risky cybersecurity behaviors in daily life (Ferguson, 2005; McCrohan et al., 2010; Peker et al., 2016; see for review, Proctor, 2016). A prevalent view is that institutions should not rely solely on cybersecurity training, because in the past, it has not been shown to be effective (Ferguson, 2005; Bada et al., 2019). There is also the recognition that regardless of how much training an institution carries out, a security breach can occur from a small number of individuals’ risky cybersecurity behaviors. In a large sample of student participants, Riley (2006) showed that individuals may use weak passwords despite reporting that they knew that such passwords were not the most secure. Nevertheless, several recent studies have demonstrated some positive benefits of training (McCrohan et al., 2010; Peker et al., 2016). The trainings that have shown benefits have focused on providing individuals with knowledge about cybersecurity threats and best cybersecurity practices. Adams and Sasse (1999) suggested that users’ lack of knowledge about cybersecurity and their perceptions of insecure practices as low-risk may be due to inadequate communication to users from the relevant institutional entities.

The present research examined the possibility that it may be possible to predict individual differences in risky cybersecurity behaviors using personal characteristics, such as knowledge about password security, personality traits, and personality-related behaviors. Prior research has found that men report higher levels of knowledge about cybersecurity than women (Cain et al., 2018) and also higher levels of risky cybersecurity behavior (Anwar et al., 2017). Numerous studies have examined the relationships among Big Five personality traits (i.e., extraversion, agreeableness, openness, conscientiousness, and mood instability) and cybersecurity behavior (McBride et al., 2012; Tamrakar et al., 2016; McCormac et al., 2017; Russell et al., 2017; Alohali et al., 2018; Shappie et al., 2019). These studies have looked at the relationship between personality traits and cybersecurity behavior. Big five personality traits have been described as universal (Yamagata et al., 2006; cf. Gurven et al., 2013) and stable across the lifespan (Conley, 1985). Tamrakar et al. (2016) created a simulation tool to measure the relationship between personality traits and cyber behaviors. Russell et al. (2017) studied how people engaged in secure cybersecurity behaviors are more positive. They also found that secure cybersecurity behaviors are linked to emptiness and meaningless while greater use of insecure cybersecurity behaviors are related to lower conscientiousness and higher levels of aggressive behavior.

Some studies are slightly contradicting. Shappie et al. (2019) showed that conscientiousness, agreeableness, and openness were significantly associated with cybersecurity behaviors. In contrast, Alohali et al. (2018) showed that conscientiousness is negatively correlated with cybersecurity behaviors. The Human Aspects of Information Security Questionnaire (HAIS-Q) was utilized in McCormac et al. (2017); they have shown that conscientiousness, agreeableness, emotional stability, and risk-taking propensity significantly explained the variance in individuals’ score, while age and gender did not. While most papers recruited participants from schools (McBride et al., 2012), recruited IT practitioners and looked at how likely these practitioners are to violate cybersecurity protocols based on their Big Five personality traits. In a recent study by Maraj et al. (2019), there was no relationship found between password strength and personality traits.

In addition to examining the relationships among the Big Five traits and risky cybersecurity behaviors, we also examined sensation-seeking personality traits and the extent to which individuals take risks in daily life that were unrelated to the use of technology. Sensation-seeking personality traits were first identified by Zuckerman et al.(1964,1978; Horvath and Zuckerman, 1993; Zuckerman, 1994) and defined as the propensity to seek out new experiences with a preference toward intense experiences. Numerous studies have shown that individuals higher in sensation-seeking traits take more risks in daily life, including participating in sports (Zuckerman, 1983a), smoking, drinking and using other drugs (Zuckerman, 1983b, 1987; Zuckerman et al., 1990; Popham et al., 2011; Kennison and Messer, 2017, 2019), engaging in risky sexual behaviors (Zuckerman et al., 1976), and risky behaviors occurring during gambling (Anderson and Brown, 1984). Numerous studies suggest that sensation-seeking traits stem from individual differences in biology (see for review Roberti, 2004).

We reasoned that individuals with higher levels of sensation-seeking personality traits would engage in higher levels of risky cybersecurity behaviors and those who engage in higher levels of general risk-taking in daily life would engage in higher levels of risky cybersecurity behavior. To measure general risk-taking in daily life, we used the Domain-Specific Risk Taking (DOSPERT) scale (Blais and Weber, 2001, 2006; Weber et al., 2002; Figner and Weber, 2011), which assesses risk-taking in five domains: (a) health/safety, (b) recreational, (c) social, (d) financial, and (e) ethical. Multiple studies in which the scale was used have shown that there are significant correlations for risk-taking for the five domains, suggesting that high risk-taking in one domain predicts high risk-taking in the other domains (Kennison et al., 2016; Shou and Olney, 2020). Shou and Olney (2020) carried out a large meta-analysis using 104 samples with more than 30,000 observations and found that the five domains were intercorrelated. The health/safety domain was strongly correlated with recreational and ethical domains. The social domain was more weakly correlated with the other domains. Prior research has also observed differences in the perception of risk for men and women, with women perceiving more risk generally than men and being more risk-adverse (Gustafsod, 1998; Weber et al., 2002). Men also report engaging in risk-taking in daily life more than women (Kennison et al., 2016; see Panno et al., 2018 for review). Men also report higher levels of sensation-seeking traits than women (Kennison et al., 2016).

In this paper, we report a study that was carried out online in which we investigated how well self-reported opinion about knowledge about secure passwords, personality traits, and general risk-taking in daily life predict self-reported risky cybersecurity behaviors. Increasingly, researchers are carrying out research via the Internet (Buchanan and Smith, 1999; Gosling et al., 2004; Weigold et al., 2013; Dodou and de Winter, 2014), which leads to lower costs as staff are not needed for data entry after study completion. Internet research has been positively impacted by the increasing availability of Internet access and inexpensive survey building tools. Confidence in online research has grown due to studies that have compared data collected via the Internet and in face-to-face settings in which questionnaires were completed using pencil/paper methods and have concluded that the two data collection methods yield similar results (Gosling et al., 2004; Weigold et al., 2013). Differences in response rates, amount of missing data, and factor structure of some variables have been observed (see Weigold et al., 2013 for review). Some have suggested that participants in studies carried out via the Internet may differ in their tendency to provide socially desirable responses than participants in studies carried out in face-to-face settings (see Dodou and de Winter, 2014 for review). Dodou and de Winter (2014) carried out a meta-analysis of 51 prior research studies in which social desirability responding was compared for online and face-to-face studies. In the meta-analysis, they found that social desirability responding was similar for the two methodologies. Others have suggested that in some cases, participants may be willing to be more truthful in responding in online surveys versus studies conducted in face-to-face settings (Bailey et al., 2000).

In our study, we tested the following hypotheses: (a) higher levels of self-reported password security knowledge would be related to engaging in lower levels of risky cybersecurity behaviors (see Ferguson, 2005; McCrohan et al., 2010; Peker et al., 2016), (b) higher levels of conscientiousness will be related to lower levels of risky cybersecurity behaviors (see McCormac et al., 2017; Russell et al., 2017; Alohali et al., 2018; Shappie et al., 2019), (c) higher levels of mood instability will be related to higher levels of self-reported risky cybersecurity behavior (see McCormac et al., 2017), (d) higher levels of sensation-seeking will be related to higher levels of self-reported risky cybersecurity behaviors (cf. Whitty et al., 2015), (e) higher levels of general risk-taking behaviors will be related to higher levels of risky cybersecurity behaviors, and (f) men would engage in higher levels of risk-taking (i.e., general risk-taking and risky cybersecurity behavior) than women. We did not expect to observe significant relationships between personality traits and knowledge, as prior research has not provided evidence for these relationships and also because gaining knowledge able password security would not be expected to depend on personality traits. Knowledge is gained through communications schools or workplaces, which are experienced by people regardless of their personality traits.

Materials and Methods

Participants

There were 325 participants (207 women, 117 men, and 1 other) who were taking classes in psychology or speech communications a large public university in the Midwestern region of the United States. All participants received credit that could be used for course requirements or extra credit. Participants were on average 19.46 years old (SD = 2.34).

Procedure and Materials

This study was carried out in accordance with the recommendations of Oklahoma State University’s Institutional Review Board (IRB), which approved the protocol. After obtaining IRB approval for the study, we recruited volunteers from a research participant SONA pool in a psychology department. In the SONA recruitment description for the study, participants were told that the purpose of the study was “The purpose of this research is to investigate the relationship between password security beliefs and behaviors with personality and demographic variables.” All participants gave informed consent in accordance with the Declaration of Helsinki. As recommended for all surveys conducted via the Internet (Kraut et al., 2004), the first page of our survey provided participants with information about the study and an opportunity to volunteer for the study. The research was conducted with a waiver of documentation of consent, which is common with surveys conducted over the Internet. Participants completed an online survey created using a Professional license of Surveymonkey.com. On the first page of the survey, participants viewed information about the study and instructions on how to volunteer or to decline to volunteer. All participants completed a survey in the same order. The following order was used: Big Five personality traits, sensation-seeking personality, general risk-taking in daily life, cybersecurity behavior, knowledge, and demographics. On average, participants took 37 min to complete the survey.

We assessed participants’ use of risky cybersecurity practices using six items created for the present research. We considered some of the most common risk cybersecurity behaviors that would be relevant to young adults in a college setting relying on direction from prior research (Peker et al., 2016; Ramlo and Nicholas, 2020). We generated six items focused on a situation that would likely be familiar to most students on our campus. Each item addressed one cybersecurity behavior. The prior literature identified more than six problem behaviors. We chose the six problem behaviors that we believed would likely be familiar to most student on our campus and carried out a focus group of undergraduates who did not participate in the study. We confirmed from the group that the behavior would likely be familiar to most of their peers. In the survey, each item was paired with a 7-point scale (1 = not at all likely and 7 = extremely likely). The scale numbers in-between were not labeled. Each item described a practice that should be avoided. The items were: (a) using weak passwords (e.g., pass1234), (b) failing to log out of a shared computer, such as in a campus computer lab, (c) clicking on an unfamiliar URL link that you receive in an email, (d) using public unsecured Wi-Fi, (e) using the same password for multiple devices/applications, and (f) telling your password to someone at your workplace. Items were presented in random order for each participant. We computed the mean rating for the six items with higher means reflecting higher levels of secure self-reported behavior. We observed good internal consistency for the four items (Cronbach α = 0.77, see Taber, 2018 for discussion of importance of internal consistency in psychometric measures). Nunnally (1978) suggests values above 0.70 reflect good internal consistency. Below 0.70 is viewed as questionable (George and Mallery, 2003).

We assessed participants’ rating of their opinion of their own knowledge of password security using four items created for this study. Each item was paired with a 7-point scale (1 = Strongly Disagree and 7 = Strongly Agree). The scale number in-between were also labeled (i.e., 2 = Moderately Disagree, 3 = Somewhat Disagree, 4 = Neither Disagree nor Agree, 5 = Somewhat Agree, and 6 = Moderately Agree). The questions were: (a) My knowledge of password security is high, (b) Password security practices are not something that I have learned very much about, (c) I know a lot about password security practices, and (d) My level of knowledge about real world cases where sensitive data have been stolen by hackers is fairly high. Items were presented in random order. After reverse scoring the second item in the above sequence, a mean score for the four items was calculated. We observed good internal consistency for the four items (Cronbach α = 0.74; see Taber, 2018). The items contain some overlap. We examined correlations with subsets of the items and found similar results as when all items were used. We are reporting the results for all the items for this reason.

Sensation-seeking personality traits were assessed using Zuckerman et al. (1978) 40-item SSS-V Scale. The SSS-V is composed of four factors: (a) thrill and adventure seeking (TAS, i.e., affinity for participating in activities characterized as dangerous), (b) experience seeking (ES, i.e., interest in seeking out new experiences including unusual lifestyle practices), (c) disinhibition (DIS, i.e., affinity for out-of-control experiences, such as those that occur experiences with drugs, parties, or sexual interactions), and (d) boredom susceptibility (BS, i.e., dislike of feeling bored, including being around people who are boring). For each of the 40 items, participants viewed two statements and were asked to choose the one that best described them [e.g., (a) I like “wild” uninhibited parties. vs. (b) I prefer quiet parties with good conversation]. Prior research has demonstrated the validity of the scale (Zuckerman and Link, 1968). Prior research has shown that these factors have good internal consistency; the Cronbach alphas for the four factors: TAS (α = 0.78), DIS (α = 0.76), ES (α = 0.72), and BS (α = 0.74) (Kennison et al., 2016). In the present research, we also observed good internal consistency for the four factors with Cronbach values ranging from α = 0.72 to α = 0.78 (see Nunnally, 1978; George and Mallery, 2003; Taber, 2018).

We assessed risk-taking in daily life using Blais and Weber’s (2006) 30-item DOSPERT. The scale is composed of five types of risk-taking: health (i.e., risk-taking in the form of careless as well as abuse of drugs), recreational (i.e., risk-taking when doing sports and other recreational activities), social (taking risks with social interactions, such as risky behaviors with superiors), financial (i.e., risk-taking with money), and ethical (i.e., engaging in criminal behavior as well as lying and cheating). The 30-items are specific behaviors, and participants rate on a 7-point rating scale ranging from 1 (Extremely Unlikely) to 7 (Extremely Likely) how likely they are to engage in the behaviors. The scale number in-between were also labeled (i.e., 2 = moderately unlikely, 3 = somewhat unlikely, 4 = neither unlikely nor likely, 5 = somewhat likely, and 6 = moderately likely). Prior research has demonstrated the validity of the scale (Frey et al., 2017) and has shown that the five domains have good internal consistency: (a) health (α = 0.76), (b) recreational (α = 0.84), (c) social (α = 0.71), (d) financial (α = 0.84), and ethical (α = 0.83) (Kennison et al., 2016). In the present research, we also observed good internal consistency for the five domains with Cronbach alphas ranging from α = 0.71 to α = 0.84 (see Nunnally, 1978; George and Mallery, 2003; Taber, 2018).

We asked participants about their Big 5 personality traits (i.e., extraversion, agreeableness, conscientiousness, openness, and mood instability) using Saucier’s (1994) Mini-Marker measure, which contains 40 adjectives (i.e., 8 for each trait). Participants are asked how accurate each adjective is in describing them using a 9-point scale (1 = extremely inaccurate and 9 = extremely accurate). The scale number in-between were also labeled (i.e., 2 = very inaccurate, 3 = moderately inaccurate, 4 = slightly inaccurate, 5 = neither accurate nor inaccurate, 6 = slightly accurate, 7 = moderately accurate, and 8 = very accurate). After reverse scoring when appropriate, we calculated the average rating for the eight adjectives for each trait. The validity of the measure has been demonstrated in prior research (Dwight et al., 1998). The measure is associated with high internal consistency (Cronbach alphas between from 0.76 to 0.86, Mooradian and Nezlek, 1996). We also observed high internal consistency in the present study (Cronbach alphas between α = 0.69 and α = 0.82; see Nunnally, 1978; George and Mallery, 2003; Taber, 2018).

One question was included as an attention check, assessing participants’ attention to the survey with a 5-point response scale (1 = strongly disagree, 2 = slightly disagree, 3 = neither disagree nor agree, 4 = slightly agree, and 5 = strongly agree). Each option was listed on a separate line in multiple choice format. The question text was as follows: Sometimes researchers include a question to determine if the participant is paying adequate attention while completing the survey. In order to show us that you are paying attention please select the third option as the response to this question.

Results

The dataset including participants’ responses was screened to detect any participants who incorrectly responded to the attention check question. Thirty-three participants were removed from the dataset. The resulting dataset contained data from 292 participants (186 women, 105 men, and 1 who selected other for gender). Table 1 displays means, standard deviations, and Pearson’s r product-moment correlations for the variables that we measured in the study. Prior to conducting the correlations, we examined ranges for all variables and found no indication that there was restriction of range. The results indicated support or partial support for the four hypotheses: (a) higher levels of self-reported password security knowledge were related to lower levels of self-reported risky cybersecurity behaviors, (b) higher levels of sensation-seeking were related to higher levels of self-reported risky cybersecurity behaviors for women, but not men, (c) higher levels of mood instability were related to higher levels of self-reported risky cybersecurity behaviors, (d) higher levels of general risk-taking behaviors were related to higher levels of self-reported risky cybersecurity behaviors, (e) higher levels of conscientiousness were related to lower levels of risky cybersecurity behaviors for women, but not men, and (f) men reported engaging in higher levels of general risk-taking than women, t(286) = −5.54, p < 0.001, and η2 = 0.41l, but there was no significant difference in self-reported risky cybersecurity behavior for men and women. Contrary to expectations, we found that for both men and women, higher levels of mood instability predicted higher levels of self-reported risky cyber security behavior. For the remaining three of the five personality traits, none were related to self-reported cybersecurity knowledge or self-reported risky cybersecurity behaviors. In addition, we found that compared to women, men reported having higher levels of knowledge of secure passwords, t(287) = −2.02, p = 0.04, and η2 = 0.09; lower levels of conscientiousness, t(288) = 3.20, p = 0.002, and η2 = 0.22; lower levels of extraversion, t(288) = 2.02, p = 0.04, and η2 = 0.22; lower levels of agreeableness, t(288) = 3.33, p = 0.001, and η2 = 0.20; and higher levels of sensation-seeking personality, t(289) = −5.08, p < 0.001, and η2 = 0.17.

TABLE 1
www.frontiersin.org

Table 1. Summary of descriptive statistics and correlations for men (lower half of matrix) and women (upper half of matrix).

To investigate further how self-reported knowledge about strong/weak passwords, personality traits, general risk-taking, and predict risky cybersecurity behaviors, we carried out a hierarchical multiple regression using risky cybersecurity behaviors as the dependent variable and four blocks of variables. Variables were examined to confirm that assumptions of normality, linearity, and homoscedasticity were met (Hair et al., 1998). We ordered the variables with a developmental trajectory of the individual in mind with personal characteristics entered in early blocks and self-reported knowledge and self-reported cybersecurity-related behaviors, in later blocks. This enabled us to examine the results for knowledge and cybersecurity behavior while controlling for personal characteristics and to examine cybersecurity behavior, while controlling for knowledge (Keith, 2014). In block one, sex was entered to control for sex differences. Subsequent blocks involved personality variables before knowledge, as both Big Five personality traits and sensation-seeking personality are generally believed to develop early in life and have a basis in biology (Fulker et al., 1980; Jang et al., 1996, respectively) and knowledge about technology acquired later. In block two, Big Five personality traits were added. In block three, sensation-seeking personality traits and general risk-taking were added, and in block four, knowledge of password security was added. We found that variables did not involve excessive collinearity (as evidenced by the Tolerance and VIF values). Excessive collinearity would weaken the statistical power of the analysis (Coakes, 2005). Table 2 displays the summary of these results.

TABLE 2
www.frontiersin.org

Table 2. Summary of hierarchical regression analysis for variables predicting lax cybersecurity behaviors.

In Block 1, participant sex did not significantly contribute to the variance in risky cybersecurity behaviors, F(1, 287) = 0.01 and p = 0.91. In Block 2, Big Five personality traits contributed significantly to variance in risky cybersecurity behaviors, accounting for 6% of the variance, F(6, 287) = 3.11 and p = 0.006 and the change in R2 was significant, F(5, 287) = 3.73 and p = 0.006. Two of the five traits were significant predictors: (a) conscientiousness (β = −0.19 and p = 0.03) and (b) mood instability (β = 0.16 and p = 0.02). In Block 3, sensation-seeking personality traits and general risk-taking accounted for an additional 28% of variance in risky cybersecurity behaviors, F(8, 287) = 13.70 and p < 0.001, and the change in R2 was significant, F(2, 287) = 47.30 and p < 0.001. Both variables were significant predictors: (a) sensation-seeking personality traits (β = −0.14 and p = 0.02) and (b) general risk-taking (β = 0.59 and p < 0.001). In Block 4, knowledge about secure passwords accounted for an additional 6% of variance in risky cybersecurity behaviors, F(9, 287) = 17.48 and p < 0.001, and the change in R2 was significant, F(1, 287) = 26.86 and p < 0.001. Knowledge about security passwords was a significant predictor (β = −0.25 and p < 0.001). The total amount of variance accounted was 34%.

Discussion

The present research investigated how well self-reported risky cybersecurity behavior could be predicted by a combination of self-reported knowledge about secure passwords and personal characteristics, such as personality traits and general risk-taking in daily life. The majority of hypotheses tested were supported, including that (a) higher levels of self-reported password security knowledge was related to lower levels of self-reported risky cybersecurity behaviors, (b) higher levels of conscientiousness was related to lower levels of self-reported risky cybersecurity behaviors, (c) higher levels of mood instability was related to higher levels of self-reported risky cybersecurity behavior, (d) higher levels of sensation-seeking was related to higher levels of self-reported risky cybersecurity behaviors, (e) higher levels of general risk-taking behaviors was related to higher levels of risky cybersecurity behaviors, and (f) men reported engaging in more risk-taking in daily life than women, but the level of self-reported risky cybersecurity behavior did not differ for men and women. There were significant results that were not predicted. These include that for both men and women, higher levels of mood instability predicted higher levels of self-reported risky cyber security behavior; men reported having higher levels of password security knowledge than women.

The results showed that higher levels of self-reported password security knowledge was related to lower levels of self-reported risky cybersecurity behaviors, as has also been observed in prior research (Ferguson, 2005; McCrohan et al., 2010; Peker et al., 2016). Second, we found that women’s higher levels of sensation-seeking, but not men’s, were related to higher levels of self-reported risky cybersecurity behaviors for women. In prior research, sensation-seeking was not found to be related to cybersecurity behaviors (Whitty et al., 2015). Third, we found that higher levels of general risk-taking behaviors were related to higher levels of self-reported risky cybersecurity behaviors. Fourth, we found that conscientiousness predicted self-reported risky cybersecurity behaviors for women, but not men (cf. McCormac et al., 2017; Russell et al., 2017; Alohali et al., 2018; Shappie et al., 2019). The results also showed that higher levels of mood instability predicted higher levels of self-report risky cyber security behaviors, as has been observed in prior research (McCormac et al., 2017). We did not observe significant relationships between other three Big Five factors and risky cybersecurity behaviors. Our results showing that higher levels of sensation-seeking personality traits and general risk-taking in daily life predict greater use of risky cybersecurity behaviors are novel. These variables together contributed approximately 28% of the variance in cybersecurity behaviors, respectively. Overall, in our study in which 325 participants self-reported information about their password security knowledge, personality, risk-taking in daily life, and risky cybersecurity behavior, we found that personality variables and knowledge together predicted 34% of the variance in risky cybersecurity behaviors which exceeds the variance accounted for in prior research, which ranged between 3 and 5%.

The research has multiple strengths. It is the first to show that there is advantage to using personality traits in combination with other personal characteristics in predicting self-reported cybersecurity behavior. The statistical analysis provides estimates for the contributions of each. In addition, the present study is the first to show that general risk-taking in daily life predicts self-reported cybersecurity behavior. These results have implications for approaches in cybersecurity that involve training of individuals. These results suggest that creating profiles of potential victims of cybersecurity breaches should include personality variables, such as the Big Five and sensation-seeking, general risk-taking in daily life that is unrelated to using technology, in addition to knowledge about best practices in cybersecurity. The present results are the first to document that those who engage in higher levels of general risk-taking in daily life are also more likely to engage in risky cybersecurity behaviors. Our results suggest that accurate victim profiles could be useful in identifying individuals who are likely to be engaging in the highest levels of insecure cybersecurity behaviors. Institutions could use victim profiles to target such individuals with cybersecurity training that is in addition to what is typically taken. Other support from the institution could be targeted to those individuals. This approach is consistent with the view of Adams and Sasse (1999) who found that lack of cybersecurity knowledge and perceptions of risky behaviors as low risk could be viewed as the result of inadequate communication from institutional representatives to the users that they oversee. Institutions with high numbers of users with such victim profiles are encouraged to examine their communications to determine if improvements in communication can result in a reduction in numbers of users who fit victim profiles. Future research is needed to determine whether efforts to target individuals at high risk of being a cybersecurity victim with training or other support is effective in reducing their risk.

The present study also yielded some differences between men and women. As in prior research, men reported higher levels of sensation-seeking than women (Kennison et al., 2016) and higher levels of general risk-taking in daily life (Kennison et al., 2016). Nevertheless, we did not find that the level of self-reported risky cybersecurity behavior differed significantly. One prior study found that women engaged in risky cybersecurity behavior significantly less often than men (Anwar et al., 2017). Men reported significantly higher levels of password security knowledge. Prior research in which participants were drawn from employment settings have not observed differences in security knowledge, attitude, and behavior (McCormac et al., 2017). Prior research carried out on the online platform Amazon’s Mechanical Turk (MTurk) also found that men reported significantly higher levels of knowledge than women (Cain et al., 2018).

There are multiple weaknesses of the research, including the characteristics of our sample. Our sample was majority female (i.e., 63.9%), relatively young (19.46 years on average), and drawn from university students enrolled in psychology and speech communication courses, which typically enroll more women than men. Our participants may be less aware of cybersecurity issues than others who are older or who are drawn from other settings. For this reason, the results may not generalize to other populations. A second limitation is that our assessments of risky cybersecurity behaviors and secure password knowledge were created for this study, and although the items for each construct demonstrated high internal consistency, they may fail to capture all aspects of risky cybersecurity behavior and/or secure password knowledge. The questions that we used to assess knowledge may have tapped into overlapping topics and may have reflected participants’ opinion about their knowledge rather than actual knowledge. A third limitation is that we measured self-reported knowledge and cybersecurity behavior from participants. We may have observed different results had we been able to assess participants’ knowledge and behavior using different methods. Future research is needed to determine whether our results are replicated in other samples and/or other populations. A fourth limitation may be the fact that the research was carried out in an online survey. It is possible that different results may be obtained when face-to-face survey methodologies are used.

Future research on this topic may improve on the present research in a number of ways. In the present study, we developed six-item questionnaire to assess behavior in situations familiar to college students and four-item questionnaire to assess participants’ opinion about their cybersecurity knowledge. Future research could improve on the present research by assessing cybersecurity knowledge and behavior using objective measures instead of or in addition to self-report measures. Participants’ responses to our questions about knowledge and behavior may not accurately measure either construct, but reflect a mixture of each construct and opinion, which may have led to participants responding in ways that they perceived to be socially more desirable. Future research could include measures to assess social desirability responding (e.g., Crowne and Marlowe, 1960). Future research could also include a wider variety of question types, such as open-ended questions that enable the researcher to assess participants’ prior experiences (i.e., good or bad) with cybersecurity as well as other topics. The present research did not include open-ended questions about participants’ past cybersecurity experiences.

In summary, the research showed that taking into consideration sensation-seeking personality traits and general risk-taking in daily life, in addition to participant sex, Big Five personality traits, and knowledge about security passwords accounts for about 34% of variance in risky cyber security behaviors. From previous work, this is one of the highest amounts of variance accounted for in cyber security behaviors. This greatly reinforces that more research is needed on the relationship between personality traits (or other traits) and cyber security behaviors. Institutions who rely on training to increase awareness about cybersecurity issues as a means to reduce risky cybersecurity behaviors may find that using personal characteristics to target training to individuals who are the most likely to engage in risky behaviors may lead to better return on investment. Some individuals are more likely to engage in risky cybersecurity behaviors than others. Better personalized cybersecurity training is needed from organizations to improve the cybersecurity compliance and cybersecurity behaviors of individuals.

Data Availability Statement

The raw data supporting the conclusions of this article will be made available by the authors, without undue reservation.

Ethics Statement

The studies involving human participants were reviewed and approved by Oklahoma State University Institutional Review Board (IRB). Written informed consent for participation was not required for this study in accordance with the national legislation and the institutional requirements.

Author Contributions

SK and EC-T formulated the idea for the study, constructed items for the survey, and contributed to the writing of the manuscript. SK conducted the statistical analyses. Both authors contributed to the article and approved the submitted version.

Funding

This research was partially funded by a research grant to both authors from the National Science Foundation (DGE 1918591 and DGE 1919004).

Conflict of Interest

The authors declare that the research was conducted in the absence of any commercial or financial relationships that could be construed as a potential conflict of interest.

References

Adams, A., and Sasse, M. A. (1999). Users are not the enemy. Commun. ACM 42, 40–46. doi: 10.1145/322796.322806

CrossRef Full Text | Google Scholar

Alohali, M., Clarke, N., Li, F., and Furnell, S. (2018). Identifying and predicting the factors affecting end-users’ risk-taking behavior. Inform. Comput. Secur. 26, 306–326. doi: 10.1108/ICS-03-2018-0037

CrossRef Full Text | Google Scholar

Anderson, G., and Brown, R. I. (1984). Real and laboratory gambling, sensation seeking and arousal. Br. J. Psychol. 75, 401–410. doi: 10.1111/j.2044-8295.1984.tb01910.x

PubMed Abstract | CrossRef Full Text | Google Scholar

Anwar, M., He, W., Ash, I., Yuan, X., Li, L., and Xu, L. (2017). Gender difference and employees’ cybersecurity behaviors. Comput. Hum. Behav. 69, 437–443. doi: 10.1016/j.chb.2016.12.040

CrossRef Full Text | Google Scholar

Ayyagari, R., and Tyks, J. (2012). Disaster at a university: a case study in information security. J. Inform. Technol. Educ. 11, 85–96. doi: 10.28945/1569

CrossRef Full Text | Google Scholar

Bada, M., Sasse, A. M., and Nurse, J. R. (2019). Cyber Security Awareness Campaigns: Why Do They Fail to Change Behaviour? arXiv [Preprint]. Available online at: https://arxiv.org/abs/1901.02672 (accessed October 11, 2020).

Google Scholar

Bailey, R. D., Foote, W. E., and Throckmorton, B. (2000). “Human sexual behavior: a comparison of college and Internet surveys,” in Psychological Experiments on the Internet, ed. M. H. Birnbaum’s (Cambridge, MA: Academic Press), 141–168.

Google Scholar

Blais, A., and Weber, E. U. (2006). A domain-specific risk-taking (DOSPERT) scale for adult populations. Judgm. Dec. Mak. 1, 33–47. doi: 10.13072/midss.657

CrossRef Full Text | Google Scholar

Blais, A. R., and Weber, E. U. (2001). Domain specificity and gender differences in decision making. Risk Dec. Policy 6, 47–69. doi: 10.1017/S1357530901000254

CrossRef Full Text | Google Scholar

Bryant, K., and Campbell, J. (2006). User behaviours associated with password security and management. Austr. J. Inform. Syst. 14. Available online at: https://journal.acs.org.au/index.php/ajis/article/view/9

Google Scholar

Buchanan, T., and Smith, J. L. (1999). Using the Internet for psychological research: personality testing on the World Wide Web. Br. J. Psychol. 90, 125–144. doi: 10.1348/000712699161189

PubMed Abstract | CrossRef Full Text | Google Scholar

Cain, A. A., Edwards, M. E., and Still, J. D. (2018). An exploratory study of cyber hygiene behaviors and knowledge. J. Inform. Secur. Appl. 42, 36–45. doi: 10.1016/j.jisa.2018.08.002

CrossRef Full Text | Google Scholar

Coakes, S. J. (2005). SPSS: Analysis Without Anguish, 12 Edn, Hoboken, NJ: John Wiley & Sons.

Google Scholar

Conley, J. J. (1985). Longitudinal stability of personality traits: a multi-trait-multimethod-multi-occasion analysis. J. Person. Soc. Psychol. 49, 1266–1282. doi: 10.1037/0022-3514.49.5.1266

PubMed Abstract | CrossRef Full Text | Google Scholar

Crowne, D. P., and Marlowe, D. (1960). A new scale of social desirability independent of psychopathology. J. Consult. Psychol. 24, 349–354. doi: 10.1037/h0047358

PubMed Abstract | CrossRef Full Text | Google Scholar

Dodou, D., and de Winter, J. C. (2014). Social desirability is the same in offline, online, and paper surveys: a meta-analysis. Comput. Hum. Behav. 36, 487–495. doi: 10.1016/j.chb.2014.04.005

CrossRef Full Text | Google Scholar

Dwight, S. A., Cummings, K. M., and Glenar, J. L. (1998). Comparison of criterion-related validity coefficients for the Mini-Markers and Goldberg’s markers of the big five Personality Factors. J. Pers. Assess. 70, 541–550. doi: 10.1207/s15327752jpa7003_11

CrossRef Full Text | Google Scholar

Farcasin, M., and Chan-Tin, E. (2015). Why we hate IT: two surveys on pre-generated and expiring passwords in an academic setting. Wiley Secur. Commun. Netw. 8, 2361–2373. doi: 10.1002/sec.1184

CrossRef Full Text | Google Scholar

Ferguson, A. J. (2005). Fostering e-mail security awareness: the west point carronade. Educ. Q. 28, 54–57.

Google Scholar

Figner, B., and Weber, E. U. (2011). Who takes risks when and why? Determinants of risk taking. Curr. Direct. Psychol. Sci. 20, 211–216. doi: 10.1177/0963721411415790

CrossRef Full Text | Google Scholar

Florencio, D., and Herley, C. (2007). “A large-scale study of web password habits,” in Proceedings of the 16th international conference on World Wide Web, New York, NY.

Google Scholar

Frey, R., Pedroni, A., Mata, R., Rieskamp, J., and Hertwig, R. (2017). Risk preference shares the psychometric structure of major psychological traits. Sci. Adv. 3:e1701381. doi: 10.1126/sciadv.1701381

PubMed Abstract | CrossRef Full Text | Google Scholar

Fulker, D. W., Eysenck, S. B., and Zuckerman, M. (1980). A genetic and environmental analysis of sensation seeking. J. Res. Pers. 14, 261–281. doi: 10.1016/0092-6566(80)90033-1

CrossRef Full Text | Google Scholar

Gaw, S., and Felten, E. W. (2006). “Password management strategies for online accounts,” in Proceedings of the Second Symposium on Usable Privacy and Security, New York, NY.

Google Scholar

George, D., and Mallery, P. (2003). SPSS for Windows Step by Step: A Simple Guide and Reference. 11.0 Update, 4th Edn, Boston, MA: Allyn & Bacon.

Google Scholar

Gosling, S., Vazire, S., Srivastava, S., and John, O. (2004). Should we trust web-based studies? A comparative analysis of six preconceptions about internet questionnaires. Am. Psychol. 59, 93–104. doi: 10.1037/0003-066x.59.2.93

PubMed Abstract | CrossRef Full Text | Google Scholar

Grawemeyer, B., and Johnson, H. (2011). Using and managing multiple passwords: a week to a view. Interact. Comput. 23, 256–267. doi: 10.1016/j.intcom.2011.03.007

CrossRef Full Text | Google Scholar

Gurven, M., Von Rueden, C., Massenkoff, M., Kaplan, H., and Lero Vie, M. (2013). How universal is the Big Five? Testing the five-factor model of personality variation among forager-farmers in the Bolivian Amazon. J. Pers. Soc. Psychol. 104:354. doi: 10.1037/a0030841

PubMed Abstract | CrossRef Full Text | Google Scholar

Gustafsod, P. E. (1998). Gender Differences in risk perception: theoretical and methodological perspectives. Risk Analys. 18, 805–811. doi: 10.1023/b:rian.0000005926.03250.c0

CrossRef Full Text | Google Scholar

Hair, J. F., Anderson, R. E., Tatham, R. L., and Black, W. C. (1998). Multivariate Data Analysis, 5th Edn, Upper Saddle River, NJ: Prentice Hall.

Google Scholar

Horvath, P., and Zuckerman, M. (1993). Sensation seeking, risk appraisal, and risky behavior. Pers. Individ. Differ. 14, 41–52. doi: 10.1016/0191-8869(93)90173-Z

CrossRef Full Text | Google Scholar

Jang, K. L., Livesley, W. J., and Vemon, P. A. (1996). Heritability of the big five personality dimensions and their facets: a twin study. J. Pers. 64, 577–592. doi: 10.1111/j.1467-6494.1996.tb00522.x

PubMed Abstract | CrossRef Full Text | Google Scholar

Keith, T. Z. (2014). Multiple Regression and Beyond: An Introduction to Multiple Regression and structUral Equation Modeling. Abingdon: Routledge.

Google Scholar

Kennison, S. M., and Messer, R. H. (2017). Cursing as a form of risk-taking. Curr. Psychol. 36, 119–126. doi: 10.1007/s12144-015-9391-1

CrossRef Full Text | Google Scholar

Kennison, S. M., and Messer, R. H. (2019). Humor as social risk-taking: the relationships among humor styles, sensation-seeking, and use of curse words. Humor 32, 1–21. doi: 10.1515/humor-2017-0032

CrossRef Full Text | Google Scholar

Kennison, S. M., Wood, E. E., Byrd-Craven, J., and Downing, M. L. (2016). Financial and ethical risk-taking by young adults: a role for family dynamics during childhood. Cogent Econ. Finan. 4:1232225. doi: 10.1080/23322039.2016.1232225

CrossRef Full Text | Google Scholar

Kraut, R., Olson, J., Banaji, M., Bruckman, A., Cohen, J., and Couper, M. (2004). Psychological research online: report of board of scientific affairs’ advisory group on the conduct of research on the internet. Am. Psychol. 59, 105–117. doi: 10.1037/0003-066X.59.2.105

PubMed Abstract | CrossRef Full Text | Google Scholar

Lorenz, B., Kikkas, K., and Klooster, A. (2013). “The four most-used passwords are love, sex, secret, and god: Password security and training in different user groups,” in Proceedings of the International Conference on Human Aspects of Information Security, Privacy, and Trust, Cham.

Google Scholar

Maraj, A., Martin, M. V., Shane, M., and Mannan, M. (2019). “On the null relationship between personality types and passwords,” in Proceedings of the 7th International Conference on Privacy, Security and Trust (PST), Fredericton, NB.

Google Scholar

McBride, M., Carter, L., and Warkinten, M. (2012). Exploring the Role of INDIVIDUAL employee Characteristics and Personality on Employee Compliance with Cyber Security Policies. Triangle Park, CA: RTI International-Institute for Homeland Security Solutions.

Google Scholar

McCormac, A., Zwaans, T., Parsons, K., Calic, D., Butavicius, M., and Pattinson, M. (2017). Individual differences and information security awareness. Comput. Hum. Behav. 69, 151–156. doi: 10.1016/j.chb.2016.11.065

CrossRef Full Text | Google Scholar

McCrohan, K. F., Engel, K., and Harvey, J. W. (2010). Influence of awareness and training on cyber security. J. Internet Commer. 9, 23–41. doi: 10.1080/15332861.2010.487415

CrossRef Full Text | Google Scholar

Mitnick, K. D. (2003). Are you the weak link? Harvard Bus. Rev. 81, 18–20.

Google Scholar

Mooradian, T. A., and Nezlek, J. B. (1996). Comparing the NEO-FFI and Saucier’s Mini-Markers as measures of the Big Five. Pers. Individ. Differ. 21, 213–215. doi: 10.1016/0191-8869(96)00057-8

CrossRef Full Text | Google Scholar

Notoatmodjo, G., and Thomborson, C. (2009). “Passwords and perceptions,” in Proceedings of the Seventh Australasian Conference on Information Security, Wellington.

Google Scholar

Nunnally, J. C. (1978). Psychometric Theory, 2nd Edn, New York, NJ: McGraw-Hill.

Google Scholar

Panno, A., Donati, M. A., Milioni, M., Chiesi, F., and Primi, C. (2018). Why women take fewer risk than men do: the mediating role of state anxiety. Sex Roles 78, 286–294. doi: 10.1007/s11199-017-0781-8

CrossRef Full Text | Google Scholar

Peker, Y. K., Ray, L., Da Silva, S., Gibson, N., and Lamberson, C. (2016). Raising cybersecurity awareness among college students. J. Colloq. Inform. Syst. Secur. Educ. 4, 1–17. doi: 10.1201/9780429031908-1

CrossRef Full Text | Google Scholar

Pew Research Center (2017). Americans and Cybersecurity. Available online at: https://www.pewresearch.org/internet/2017/01/26/americans-and-cyber security/ (accessed October 11, 2020).

Google Scholar

Plachkinova, M., and Maurer, C. (2019). Security breach at target. J. Inform. Syst. Educ. 29:7.

Google Scholar

Popham, L., Kennison, S. M., and Bradley, K. I. (2011). Ageism, sensation-seeking, and risk-taking in young adults. Curr. Psychol. 30, 184–193. doi: 10.1007/s12144-001-9107-0

CrossRef Full Text | Google Scholar

Proctor, W. R. (2016). Investigating the Efficacy of Cybersecurity Awareness Training Programs. Doctoral thesis, Utica College, Utica, NY.

Google Scholar

Ramlo, S. E., and Nicholas, J. B. (2020). Divergent student views of cybersecurity. J. Cybersecur. Educ. Res. Pract. 2019:6.

Google Scholar

Riley, S. (2006). Password security: what users know and what they actually do. Usabil. News 8, 2833–2836.

Google Scholar

Roberti, J. W. (2004). A review of behavioral and biological correlates of sensation seeking. J. Res. Pers. 38, 256–279. doi: 10.1016/S0092-6566(03)00067-9

CrossRef Full Text | Google Scholar

Russell, J. D., Weems, C. F., Ahmed, I., and Richard, G. G. III (2017). Self-reported secure and insecure cyber behaviour: factor structure and associations with personality factors. J. Cyber Secur. Technol. 1, 163–174. doi: 10.1080/23742917.2017.1345271

CrossRef Full Text | Google Scholar

Saucier, G. (1994). Mini-Markers: a brief version of Goldberg’s unipolar big-five markers. J. Pers. Assess. 63, 506–516. doi: 10.1207/s15327752jpa6303_8

CrossRef Full Text | Google Scholar

Shappie, A. T., Dawson, C. A., and Debb, S. M. (2019). Personality as a predictor of cybersecurity behavior. Psychol. Pop. Med. Cult. 9, 475–480. doi: 10.1037/ppm0000247

CrossRef Full Text | Google Scholar

Shou, Y., and Olney, J. (2020). Assessing a domain-specific risk-taking construct: a meta-analysis of reliability of the DOSPERT scale. Judg. Dec. Mak. 15:112.

Google Scholar

Stobert, E., and Biddle, R. (2014). “The password life cycle: user behaviour in managing passwords,” in Proceedings of the 10th Symposium on Usable Privacy and Security (SOUPS 2014), Cham.

Google Scholar

Taber, K. S. (2018). The use of cronbach’s alpha when developing and reporting research instruments in science education. Res. Sci. Educ. 48, 1273–1296. doi: 10.1007/s11165-016-9602-2

CrossRef Full Text | Google Scholar

Tamrakar, A., Russell, J. D., Ahmed, I., Richard, G. G. III, and Weems, C. F. (2016). “SPICE: A software tool for bridging the gap between end-user’s insecure cyber behavior and personality traits,” in Proceedings of the Sixth ACM Conference on Data and Application Security and Privacy, New York, NY.

Google Scholar

Taylor-Jackson, J., McAlaney, J., Foster, J., Bello, A., Maurushat, A., and Dale, J. (2020). “Incorporating psychology into cyber security education: a pedagogical approach,” in Proceedings of Asia USEC’20, Financial Cryptography and Data Security, Sabah.

Google Scholar

Thomas, K., Li, F., Zand, A., Barrett, J., Ranieri, J., Invernizzi, L., et al. (2017). “Data breaches, phishing, or malware? Understanding the risks of stolen credentials,” in Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, Hoboken, NJ.

Google Scholar

Wang, P., and Johnson, C. (2018). Cybersecurity incident handling: a case study of the Equifax data breach. Issues Inform. Syst. 19, 150–159.

Google Scholar

Weber, E. U., Blais, A.-R., and Betz, E. (2002). A domain specific risk-attitude scale: measuring risk perceptions and risk behaviors. J. Behav. Dec. Mak. 15, 263–290. doi: 10.1002/bdm.414

CrossRef Full Text | Google Scholar

Weigold, A., Weigold, I. K., and Russell, E. J. (2013). Examination of the equivalence of self-report survey-based paper-and-pencil and internet data collection methods. Psychol. Methods 18, 53–70. doi: 10.1037/a0031607

PubMed Abstract | CrossRef Full Text | Google Scholar

Whitty, M., Doodson, J., Creese, S., and Hodges, D. (2015). Individual differences in cyber security behaviors: an examination of who is sharing passwords. Cyberpsychol. Behav. Soc. Netw. 18, 3–7. doi: 10.1089/cyber.2014.0179

PubMed Abstract | CrossRef Full Text | Google Scholar

Yamagata, S., Suzuki, A., Ando, J., Ono, Y., Kijima, N., Yoshimura, K., et al. (2006). Is the genetic structure of human personality universal? A cross-cultural twin study from North America, Europe, and Asia. J. Pers. Soc. Psychol. 90, 987–998. doi: 10.1037/0022-3514.90.6.987

PubMed Abstract | CrossRef Full Text | Google Scholar

Zuckerman, M. (1983a). Sensation seeking and sports. Pers. Individ. Differ. 4, 285–292. doi: 10.1016/0191-8869(83)90150-2

CrossRef Full Text | Google Scholar

Zuckerman, M. (1983b). “Sensation seeking: the initial motive for drug abuse,” in Etiological Aspects of Alcohol and Drug Abuse, eds E. Gotheil, K. A. Druley, T. E. Skoloda, and H. M. Waxman (New York, NY: Thomas), 202–220.

Google Scholar

Zuckerman, M. (1987). “Is sensation seeking a predisposing trait for alcoholism?,” in Stress and Addiction, eds E. Gottheil, K. A. Druley, S. Pashkey, and S. P. Weinstein (Levittown, PA: Mazel), 283–301.

Google Scholar

Zuckerman, M. (1994). Behavioural Expressions and Biosocial Bases of Sensation-Seeking. Cambridge: Cambridge University Press.

Google Scholar

Zuckerman, M., Ball, S., and Black, J. (1990). Influences of sensation seeking, gender, risk appraisal, and situational motivation on smoking. Add. Behav. 15, 209–220. doi: 10.1016/0306-4603(90)90064-5

CrossRef Full Text | Google Scholar

Zuckerman, M., Eysenck, S., and Eysenck, H. J. (1978). Sensation seeking in England and America: cross-cultural, age, and sex comparisons. J. Consult. Clin. Psychol. 46, 139–149. doi: 10.1037/0022-006x.46.1.139

PubMed Abstract | CrossRef Full Text | Google Scholar

Zuckerman, M., Kolin, E. A., Price, L., and Zoob, I. (1964). Development of a sensation-seeking scale. J. Consult. Psychol. 28, 477–482. doi: 10.1037/h0040995

PubMed Abstract | CrossRef Full Text | Google Scholar

Zuckerman, M., and Link, K. (1968). Construct validity for the sensation-seeking scale. J. Consult. Clin. Psychol. 32:420. doi: 10.1037/h0026047

PubMed Abstract | CrossRef Full Text | Google Scholar

Zuckerman, M., Tushup, R., and Finner, S. (1976). Sexual attitudes and experience: attitude and personality correlations and changes produced by a course in sexuality. J. Consult. Clin. Psychol. 44, 7–19. doi: 10.1037/0022-006X.44.1.7

PubMed Abstract | CrossRef Full Text | Google Scholar

Keywords: risk-taking, cybersecurity, passwords, personality, DOSPERT

Citation: Kennison SM and Chan-Tin E (2020) Taking Risks With Cybersecurity: Using Knowledge and Personal Characteristics to Predict Self-Reported Cybersecurity Behaviors. Front. Psychol. 11:546546. doi: 10.3389/fpsyg.2020.546546

Received: 28 March 2020; Accepted: 13 October 2020;
Published: 04 November 2020.

Edited by:

Richard Keith Wortley, University College London, United Kingdom

Reviewed by:

Stuart McKelvie, Bishop’s University, Canada
Burak Merdenyan, University of York, United Kingdom

Copyright © 2020 Kennison and Chan-Tin. This is an open-access article distributed under the terms of the Creative Commons Attribution License (CC BY). The use, distribution or reproduction in other forums is permitted, provided the original author(s) and the copyright owner(s) are credited and that the original publication in this journal is cited, in accordance with accepted academic practice. No use, distribution or reproduction is permitted which does not comply with these terms.

*Correspondence: Shelia M. Kennison, shelia.kennison@okstate.edu

Disclaimer: All claims expressed in this article are solely those of the authors and do not necessarily represent those of their affiliated organizations, or those of the publisher, the editors and the reviewers. Any product that may be evaluated in this article or claim that may be made by its manufacturer is not guaranteed or endorsed by the publisher.