Conference PaperPDF Available

Securing Mobile Devices: Evaluating the Relationship between Risk Perception, Organisational Commitment and Information Security Awareness

Authors:

Abstract

This study examined the relationship between perception of risk, organisational commitment, and Information Security Awareness (ISA). An online survey was completed by 269 working Australians. Perceptions of the Internet of Things (IoT) risk as it pertains to physically securing mobile devices was assessed. Organisational commitment and perception of personal risk significantly predicted ISA, as did two of the psychometric paradigm items. Demographic variables (age and gender) also significantly predicted variance in ISA, as did frequency of workplace information security training, albeit negatively. By identifying organisational commitment and perception of personal risk as significant predictors of ISA, this research has the potential to inform the development of information security training, aiming to enhance employee ISA.
Proceedings of the Eleventh International Symposium on
Human Aspects of Information Security & Assurance (HAISA 2017)
145
Securing Mobile Devices: Evaluating the Relationship
between Risk Perception, Organisational Commitment
and Information Security Awareness
A. Reeves1, K. Parsons2, and D. Calic2
1School of Psychology, University of Adelaide, South Australia
2Defence Science and Technology Group, Edinburgh, South Australia
e-mail: andrew.reeves@student.adelaide.edu.au; { dragana.calic; kathryn.parsons }
@dst.defence.gov.au
Abstract
This study examined the relationship between perception of risk, organisational commitment,
and Information Security Awareness (ISA). An online survey was completed by 269 working
Australians. Perceptions of the Internet of Things (IoT) risk as it pertains to physically
securing mobile devices was assessed. Organisational commitment and perception of personal
risk significantly predicted ISA, as did two of the psychometric paradigm items. Demographic
variables (age and gender) also significantly predicted variance in ISA, as did frequency of
workplace information security training, albeit negatively. By identifying organisational
commitment and perception of personal risk as significant predictors of ISA, this research has
the potential to inform the development of information security training, aiming to enhance
employee ISA.
Keywords
Risk perception; organisational commitment; Information security awareness (ISA);
mobile devices; Internet of Things.
1. Introduction
Stable information security systems are critical for organisations to run effectively.
Cyberthreats and their associated risks pose a significant threat to this stability.
Employees have been found to be the most prevalent cause of information security
breaches (PricewaterhouseCoopers 2015), with human error being implicated in 95%
of security incidents (IBM Global Technology Services 2014). As a result,
businesses are investing more resources into training programs designed to teach
their staff how to identify and avoid these threats. For these training programs to be
effective, it is crucial to understand the factors that influence an employee’s
behaviour in an information security context. Specifically, research needs to consider
how businesses can encourage their employees to comply with the best-practice
behaviours that are often outlined in the business’s information security policy (ISP)
(Arachchilage & Love 2014). The focus of this study is to examine the effect of risk
perceptions and organisational commitment on Information Security Awareness
(ISA). The following sections will introduce the main constructs considered in this
Proceedings of the Eleventh International Symposium on
Human Aspects of Information Security & Assurance (HAISA 2017)
146
study, namely, ISA, the psychometric paradigm of risk perception, perception of
personal risk, and organisational commitment.
1.1. Information security awareness and the HAIS-Q
ISA is understood as the combination of a person’s knowledge of, and attitude
towards, best-practice information security behaviours, as well as their compliance
with these behaviours (Parsons et al. 2014). To date, the most comprehensive,
reliable and valid measure of ISA is the Human Aspects of Information Security
Questionnaire (HAIS-Q) (McCormac et al. 2017; Parsons et al. 2013). The HAIS-Q
examines seven focus areas, namely, password management, email use, internet use,
social media use, mobile devices, information handling, and incident reporting.
While the HAIS-Q has been extensively tested for reliability and validity
(McCormac et al. 2017; Parsons et al. 2014; Pattinson et al. 2016), gaps in the
literature still remain. There is a need to further assess the individual and
organisational factors that may affect ISA (McCormac et al. 2017). For example, the
relationship between ISA and other variables such as organisational commitment and
risk perception have yet to be examined. Furthermore, the HAIS-Q has yet to be
administered in relation to newly evolving threats (McCormac et al. 2017). The
Internet of Things (IoT) has become a more recent focus of information security
research, with the majority of cybersecurity professionals reporting concern
regarding the risks of the IoT (ISACA 2016). IoT risks are unique, as IoT devices are
often located outside of physically restricted areas (e.g., a restricted work building),
but remain connected to the work network (Cisco 2015). Additionally, technical
design of these devices is often lacking, resulting in inadequate security measures.
Therefore, IoT devices are a potential entry point for an attacker. No study to date
has assessed employees’ perceptions of these risks in relation to ISA.
1.2. Perceptions of risk and the psychometric paradigm
There is a body of well-established research relating to people’s perceptions of risk
events (Sjöberg 2000; Sjöberg, et al. 2004; Slovic, et al. 1980a; Slovic et al. 1980b).
Risk is defined as the probability of adverse effects and the magnitude of the
consequences (Rayner & Cantor 1987). Slovic, et al. (1980b) identified eighteen risk
perception constructs and demonstrated that these could be explained by two factors:
dread and novelty. Dread refers to the extent to which someone is frightened,
troubled, or generally retracts away from the risk, at the level of a gut reaction
(Slovic, et al. 1980b). Novelty (also described as familiarity) refers to the extent to
which someone feels they have knowledge and understanding of the risk, and how
much control they have over it and its consequences. These two factors have
explained the majority of variation in risk perception across 90 hazards. Since then,
these results have been replicated in a variety of contexts (Bronfman, et al. 2008;
Siegrist, et al. 2005; Sjöberg 2000). This framework is known as the psychometric
paradigm.
Proceedings of the Eleventh International Symposium on
Human Aspects of Information Security & Assurance (HAISA 2017)
147
The psychometric paradigm has only once been applied to information security risks.
Huang, et al. (2010) found support for many of the same risk perception constructs
identified by Slovic, et al. (1980b). However, they did not find support for the two
factor structure, dread and novelty. This was likely due to methodological
limitations. For example, the 602 participants responded to only one of the twenty-
one threats examined in the study. This meant that each threat was only examined by
a small number of people (as few as 23). In addition, the two factor structure
developed by Slovic, et al. (1980b) has been extensively validated, improved and
replicated (Sjöberg 2000; Sjöberg, et al. 2004; Slovic, et al. 1980a; Slovic et al.
1980b), whereas there is no additional support for the structure found by Huang, et
al. (2010). These limitations indicate that further research is required into the
application of the psychometric paradigm to information security.
1.3. Perception of personal risk
To capture information security risk perceptions at a more concrete level, Pattinson
and Jerram (2013) investigated the risk perceptions of employees from a government
organisation. Using the Repertory Grid Technique, the authors elicited 110
constructs relating to information security risk perceptions. These constructs were
categorised into five themes: Risk perceptions relating to my organisation; risk
perceptions relating to me; risk perceptions relating to others; why I think it’s a risk;
and, miscellaneous. Of interest here is the ‘risk perceptions relating to me’ theme, as
it contains 11 personal risks perceived by the employee, such as fear of reprimand
and loss of personal data. Intuitively, employees who perceived business risks as
personal should actively avoid the behaviours that lead to those events, and thereby
have greater ISA. However, this has yet to be examined empirically.
1.4. Organisational commitment
Organisational commitment relates to how attached an employee is to their place of
work. An employee who is greatly attached and committed to their workplace should
work harder, strive to make fewer mistakes, and follow organisational policy
diligently (Mowday, et al. 1979). Therefore, more committed employees should have
better ISA. Meyer and Allen (1991) purport that organisational commitment is a
combination of the affective, normative, and continuance factors that influence an
employee’s decision to remain in their organisation. The affective factor refers to the
emotional aspects of commitment. The normative component refers to the extent to
which an employee feels that remaining at one organisation is expected by society, or
is morally right. The continuance component refers to the more pragmatic reasons an
employee might wish to remain with an organisation, such as the difficulty of finding
new work and the cost of moving organisations. Organisational commitment has
been found to be a small, significant predictor of job performance (Riketta 2002).
Although previous research has considered the relationship between organisational
commitment and ISA, it lacked a validated measure of ISA (e.g., Stanton et al.
2003).
Proceedings of the Eleventh International Symposium on
Human Aspects of Information Security & Assurance (HAISA 2017)
148
1.5. Study aims and hypotheses
This study aims to investigate the extent to which an individual’s commitment to
their organisation and perception of information security risks relate to their ISA.
Organisational commitment, perceived personal risk, the psychometric paradigm of
risk perception, and ISA were measured as they pertain to the risk of mobile
computing. It is hypothesised that people who have a greater perception of risk and
more commitment to their organisation will have greater ISA. As age, gender, and
other individual difference variables have been shown to be significant predictors of
ISA (McCormac et al. 2017), their effect on ISA will also be examined.
2. Methodology
Data collection consisted of an online survey, administered through Qualtrics. The
Human Research Ethics Subcommittee of the University of Adelaide, School of
Psychology, granted ethics approval. The data collected for this paper formed part of
a larger project. For this paper, data analysis will focus on responses obtained from
the demographic questions (e.g., age, gender), the results from the HAIS-Q: Mobile
Devices, and perception of personal risk scales, as well as responses to the
organisational commitment and psychometric paradigm questionnaires.
2.1. Participants
A total of 269 participants responded to the online questionnaire (144 male, 125
female). Participants were recruited through researchers’ Facebook pages, and a
closed invitation-only panel recruitment method via Qualtrics. Participants were
required to be employed in Australia, and be over the age of 18. Participants were
well distributed in terms of age, with the largest group being between 30 and 39
years of age (37%). Approximately 22% of participants were between 18 and 29
years of age, 20% were 40 to 49 years of age, leaving 14% in the 50 to 59 age
category, and 7% in the 60 and above age category. Participants were employed in a
range of industry sectors including trade, finance, education, and manufacturing, and
included managers (42%), team leaders (13%), and regular staff (45%).
2.2. Materials
The survey consisted of following measures, each scored on a 5-point Likert scale
(1 = strongly disagree to 5 = strongly agree).
2.2.1. HAIS-Q: Mobile Devices
This sub-scale measures information security awareness relating to mobile devices
(Parsons et al., 2017). The measure consists of 9 items. Cronbach’s alpha was .81
which is consistent with previous research (Parsons et al., 2017).
Proceedings of the Eleventh International Symposium on
Human Aspects of Information Security & Assurance (HAISA 2017)
149
2.2.2. Organisational Commitment Questionnaire
This scale measures the affective, normative, and continuance components of
commitment to an organisation (Meyer & Allen 1991). The scale contains 24 items.
Cronbach’s alpha was .82 which is consistent with previous literature (Meyer &
Allen, 1991).
2.2.3. Perception of Personal Risk (PPR) Scale
This scale, developed for this study, measures how personally at-risk individuals feel
in relation to the threat to information security posed by mobile computing.
Participants were provided with a description of the mobile computing threat posed
by the theft of a laptop as an IoT-related risk (See Appendix A). This was followed
by 11 items relating to personal risk (adapted from Pattinson and Jerram (2013)).
Participants were required to rate the perceived likelihood and severity of
consequences for each of the 11 items. Cronbach’s alpha score for this scale was .95.
2.2.4. Psychometric Paradigm Risk-Perception Items
The psychometric paradigm can be used to measure participants’ perception of risk
in relation to two factors: dread and novelty (Slovic, et al. 1980b). In this study,
dread was measured using the items ‘dreaded’ and ‘control of consequences’ and
novelty was measured using the items ‘immediacy of consequences’ and ‘well
known’. Participants responded in relation to the threat posed by the theft of a laptop
for each item.
3. Results
Pearson bivariate correlations were examined between ISA, gender, age, education,
information security training frequency, knowledge of computers, organisational
commitment, perceived personal risk, and the psychometric paradigm items. As
shown in Appendix B, the correlations between ISA and knowledge of computers, as
well as two of the psychometric paradigm items (i.e., dreaded and immediacy of
consequences), were not significant, and are not considered in the following
regression. To ensure multicollinearity had not occurred, Variance Inflation Factor
(VIF) values were calculated, and all were below 2.
As shown in Table 1, a hierarchical multiple regression was conducted to test the
extent to which demographic variables, perceived personal risk, organisational
commitment, and the psychometric paradigm items predicted ISA. As age and
gender are well established predictors of ISA (McCormac et al. 2017), they were
entered in step one to control for their effects. Both age and gender were significant,
together explaining approximately 18% of the variance in ISA (F(2, 266) = 29.6,
p < .001). Added in step two were perceived personal risk, organisational
commitment, the two psychometric paradigm items (i.e., ‘Well-known’ and ‘Control
of Consequences’), and the two remaining demographics (i.e., education and
information security training frequency). The model at step two explained
Proceedings of the Eleventh International Symposium on
Human Aspects of Information Security & Assurance (HAISA 2017)
150
approximately 32% of the variance (F(8, 260) = 15.1, p < .001). All but two
predictors were significant: the psychometric paradigm item: ‘Control of
Consequences’ (p = .801); and, education (p = .064). The most important predictors
were, in order from greatest to least: age, gender, information security training
frequency, perceived personal risk, the ‘well-known’ psychometric paradigm item,
and organisational commitment.
Table 1: Summary of hierarchical multiple regression of independent variables
predicting ISA (N = 269)
4. Discussion
While there is ample research investigating organisational commitment in relation to
job performance (Cohen 1993; Porter et al. 1974; Riketta 2002), there is limited
research looking at its influence on ISA. Likewise, there exists a body of research
regarding risk perceptions (Sjöberg 2000, 2003; Slovic, et al. 1980a; Slovic et al.
1980b); however, its application to information security contexts is lacking. Finally,
personal risk perceptions have been identified as important in this context (Pattinson
& Jerram 2013), but have not been considered in relation to ISA. In addition, newly
evolving risks in relation to IoT have not been considered previously. Therefore, the
present study examines these relationships, by applying measures of these constructs
to a single cohort in the context of an IoT risk. Employees who were more
committed to their organisation had higher ISA scores. Likewise, participants who
perceived the risk as more well-known or more personal had higher ISA. Lastly,
participants’ age, gender, and frequency of information security training all predicted
ISA.
Proceedings of the Eleventh International Symposium on
Human Aspects of Information Security & Assurance (HAISA 2017)
151
In line with previous findings (e.g., McCormac et al. (2017)), age and gender were
significant predictors of ISA in this study. ISA improved with age and females had
higher scores than males. This has important implications for information security
training programs. Interestingly, while it did correlate with ISA, education did not
predict significant variance. As the result was close to significance, the lack of
significance may be due to the relatively small sample size. Studies with larger
cohorts may be able to detect the effect of education on ISA. That said, the size of
the effect is small, indicating the influence of education on ISA may not be
important. While it may seem intuitive for information security training programs to
be targeted at less educated employees, this finding would question that assumption.
Employees who reported more frequent information security training at work had
lower ISA. This is somewhat in keeping with previous research, which has found
that employees who have undertaken formal information security training have lower
ISA, perhaps due to overconfidence and complacency (Parsons et al. 2013; Pattinson
et al. 2015; Pattinson et al. 2016). However, in previous research this only applied to
external training. Training conducted within an organisation was found to lead to
higher ISA (Pattinson et al. 2016). The findings of the current study contradict this,
as greater internal training frequency was associated with poorer ISA. This finding
highlights the importance of organisations gearing information security training in
such a way as to avoid instilling overconfidence or complacency in their staff.
Furthermore, it is critical for businesses to measure the ISA of their staff, using a
measure such as the HAIS-Q, before and after the training program, to ensure the
intervention was successful.
A similarly counter-intuitive result was found regarding familiarity with computers,
which had no significant relationship with ISA. This conflicts with previous
research, which has found, also counter-intuitively, that people less familiar with
computers may have greater ISA (Pattinson et al. 2015). This inconsistency may
point to the relative unimportance of familiarity with technology in information
security contexts. That said, participants who reported being more familiar with the
information security risk itself had higher ISA scores. Businesses should focus on
effective training to increase employee familiarity with information security risks, as
having staff who are highly experienced with technology in general is not sufficient
to ensure cybersecurity.
Greater organisational commitment was also associated with greater ISA scores,
despite it being the smallest significant predictor. This supports the results of
previous studies which have looked at the relationship between organisational
commitment and ISA, but lacked a validated ISA measure (Stanton et al. 2003).
As expected, participants who perceived the information security risk as personal had
greater ISA. This indicates that, in the case of mobile computing/IoT risks,
employees who feel personally at risk (e.g., of reprimand, reduced productivity,
personal data loss) are more likely to avoid behaviours that may lead to the risk event
occurring, resulting in greater ISA. Training programs that focus on informing staff
Proceedings of the Eleventh International Symposium on
Human Aspects of Information Security & Assurance (HAISA 2017)
152
of the risks of mobile computing/IoT should highlight where the employee may be
at-risk should the event occur, in order to encourage better ISA.
4.1. Limitations and future directions
The data reported in this paper focused on only one information security risk: mobile
computing/IoT. The relationships discovered may differ in regard to other
information security risks, and this should be examined in future research. A future
paper will report on two other information security threats, phishing and malware. In
addition, the measure used to assess perception of personal risk was developed for
this study. While the items used have been found to be important in understanding
employee cybersecurity risk perceptions (Pattinson & Jerram 2013), its use as a
measure has not yet been empirically validated. That said, the findings of this study
provide preliminary support for its use. Lastly, there is an opportunity for further
analysis to be performed on the data, such as hierarchical clustering or principle
component analysis. While this is outside of the scope of the present paper, a future
paper may present this analysis.
4.2. Conclusion
This study examined the relationship between organisational commitment,
perception of personal risk, and ISA. More highly committed people had better ISA,
as did people who more greatly perceived the risk as personal. This finding has
important implications for information security training programs, which in the case
of mobile computing and IoT risks should focus on where the employee is
potentially at-risk. Businesses should also look to cultivate organisational
commitment in their staff, in order to encourage better ISA.
5. References
Arachchilage, N & Love, S 2014, 'Security awareness of computer users: A phishing threat
avoidance perspective', Computers in Human Behavior, vol. 38, pp. 304-312.
Bronfman, NC, Cifuentes, LA & Gutiérrez, VV 2008, 'Participantfocused analysis:
explanatory power of the classic psychometric paradigm in risk perception', Journal of Risk
Research, vol. 11, no. 6, pp. 735-753.
Cisco 2015, The Internet of Things: Reduce Security Risks with Automated Policies,
https://www.cisco.com/c/dam/en_us/solutions/trends/iot/docs/security-risks.pdf, (Accessed 8
August 2017)
Cohen, A 1993, 'Organizational Commitment and Turnover: A Meta-Analysis', The Academy
of Management Journal, vol. 36, no. 5, pp. 1140-1157.
Huang, D-L, Rau, P-LP & Salvendy, G 2010, 'Perception of information security', Behaviour
& Information Technology, vol. 29, no. 3, pp. 221-232.
Proceedings of the Eleventh International Symposium on
Human Aspects of Information Security & Assurance (HAISA 2017)
153
IBM Global Technology Services 2014, IBM security services 2014 cyber security intelligence
index. https://www.ibm.com/developerworks/library/se-cyberindex2014/index.html,
(Accessed 1 August 2017).
ISACA 2016, State of cybersecurity: implications for 2016. An ISACA and RSA conference
survey. http://www.isaca.org/cyber/Documents/state-of-cybersecurity_res_eng_0316.pdf,
(Accessed 10 August 2017)
McCormac, A, Zwaans, T, Parsons, K, Calic, D, Butavicius, M & Pattinson, M 2017,
'Individual differences and Information Security Awareness', Computers in Human Behavior,
vol. 69, pp. 151-156.
Meyer, JP & Allen, NJ 1991, 'A three-component conceptualization of organizational
commitment', Human Resource Management Review, vol. 1, no. 1, pp. 61-89.
Mowday, RT, Steers, RM & Porter, LW 1979, 'The measurement of organizational
commitment', Journal of Vocational Behavior, vol. 14, no. 2, pp. 224-247.
Parsons, K, McCormac, A, Butavicius, M, Pattinson, M & Jerram, C 2014, 'Determining
employee awareness using the Human Aspects of Information Security Questionnaire (HAIS-
Q)', Computers & Security, vol. 42, pp. 165-176.
Parsons, K, McCormac, A, Pattinson, M, Butavicius, M & Jerram, C 2013, 'Phishing for the
Truth: A Scenario-Based Experiment of Users’ Behavioural Response to Emails', in Security
and Privacy Protection in Information Processing Systems (SEC), Aukland, New Zealand.
Pattinson, M, Butavicius, M, Parsons, K, McCormac, A & Calic, D 2015, 'Factors that
Influence Information Security Behavior: An Australian Web-Based Study', in T Tryfonas & I
Askoxylakis (eds), Human Aspects of Information Security, Privacy, and Trust: Third
International Conference, HAS 2015, Held as Part of HCI International 2015, Los Angeles,
CA, USA, August 2-7, 2015. Proceedings, Springer International Publishing, Cham, pp. 231-
241.
Pattinson, M, Butavicius, M, Parsons, K, McCormac, A, Calic, D & Jerram, C 2016, 'The
Information Security Awareness of Bank Employees', in Human Aspects of Information
Security & Assurance (HAISA 2016), Melbourne, Australia.
Pattinson, M & Jerram, C 2013, 'A study of Information Security Risk Perceptions at a Local
Government Organisation', in Australasian Conference on Information Systems, Melbourne,
Australia.
Porter, LW, Steers, RM, Mowday, RT & Boulian, PV 1974, 'Organizational commitment, job
satisfaction, and turnover among psychiatric technicians', Journal of Applied Psychology, vol.
59, no. 5, pp. 603-609.
PricewaterhouseCoopers 2015, Key findings from the global state of information security
survey 2016. Turnaround and transformation in cyber security.
Rayner, S & Cantor, R 1987, 'How Fair Is Safe Enough? The Cultural Approach to Societal
Technology Choice1', Risk Analysis, vol. 7, no. 1, pp. 3-9.
Riketta, M 2002, 'Attitudinal organizational commitment and job performance: a meta-
analysis', Journal of Organizational Behavior, vol. 23, no. 3, pp. 257-266.
Proceedings of the Eleventh International Symposium on
Human Aspects of Information Security & Assurance (HAISA 2017)
154
Siegrist, M, Keller, C & Kiers, HAL 2005, 'A New Look at the Psychometric Paradigm of
Perception of Hazards', Risk Analysis, vol. 25, no. 1, pp. 211-222.
Sjöberg, L 2000, 'Factors in Risk Perception', Risk Analysis, vol. 20, no. 1, pp. 1-12.
Sjöberg, L 2003, 'The Different Dynamics of Personal and General Risk', Risk Management,
vol. 5, no. 3, pp. 19-34.
Sjöberg, L, Moen, B-E & Rundmo, T 2004, Explaining risk perception. An evaluation of the
psychometric paradigm in risk perception research, Trondheim, Norway.
Slovic, P, Fischhoff, B & Lichtenstein, S 1980a, 'Facts and Fears: Societal Perception of Risk',
Advances in Consumer Research, vol. 8, p. 497.
Slovic, P, Fischhoff, B & Lichtenstein, S 1980b, 'Facts and Fears: Understanding Perceived
Risk', in RC Schwing & WA Albers (eds), Societal Risk Assessment: How Safe is Safe
Enough?, Springer US, Boston, MA, pp. 181-216.
Stanton, JM, Stam, KR, Guzman, I & Caledra, C 2003, 'Examining the linkage between
organizational commitment and information security', in IEEE International Conference on
Systems, Man and Cybernetics, 2003., vol. 3, pp. 2501-2506 vol.2503.
Appendix A: Measure for Perception of Personal Risk
Definition: The 'Internet of Things' (IoT) refers to a network of internet-connected devices, including
laptops, smartphones, and smart-appliances. In organisations, IoT devices are often located outside of
physically restricted areas, but remain connected to the organisation's central network. Each IoT device
therefore becomes a potential point of entry for an attacker, allowing them access to sensitive information
on the organisation's network.
Instructions: You leave a work-connected device (e.g., Laptop, tablet, smart phone) unattended in a public
place, and it is stolen. Please rate the likelihood & severity of the following (5-pt Likert):
I am reprimanded I am demoted
I am fired My personal information is
damaged/destroyed/leaked
I can’t do my job properly It is an inconvenience/time-consuming/nuisance
My professionalism/quality of my work is tarnished It causes me stress
I am required to take action and fix the problem My workload will increase
I lose confidence in the information or systems required for me to do my job
Proceedings of the Eleventh International Symposium on
Human Aspects of Information Security & Assurance (HAISA 2017)
155
Appendix B: Correlations, means and standard deviations (N = 269)
... The current study also includes the use of another measure that explores the role of an individual's work identity and its impact on ISA. Work identity is a different construct to that of organisational commitment, a concept that has been previously explored in relation to ISA ( Reeves, Parsons, & Calic, 2017 ). Organisational commitment refers to the level of attachment an employee has with their workplace, with more committed employees exhibiting better ISA ( Reeves et al., 2017 ). ...
... Work identity is a different construct to that of organisational commitment, a concept that has been previously explored in relation to ISA ( Reeves, Parsons, & Calic, 2017 ). Organisational commitment refers to the level of attachment an employee has with their workplace, with more committed employees exhibiting better ISA ( Reeves et al., 2017 ). In contrast, work identity measures the strength of an individual's identification with their work, and not directly their workplace or organisation. ...
... It is proposed that there could be a potential link between both WIC and WIRC, where those individuals who are more secure and committed to their work identity are more likely to engage in efficient ISA, whereas those who are less committed and who are also reconsidering their current workplace identity may not see the value in engaging in ISA. This suggestion does have some precedence in previous literature that explored organisational commitment and ISA ( Reeves et al., 2017 ). This research noted that individuals who had stronger organisational commitment have better ISA, but the study was limited to exploring information security in the context of mobile device securement. ...
Article
A growing body of research evidence has been focused on exploring aspects of individual differences in the context of human factors and adherence to organisational information security. The present study aimed to extend this research by exploring three individual variables related directly to the individual’s perceived control within the workplace, their commitment to current work identity, and the extent to which they are reconsidering commitment to work. A total 1003 participants aged between 18-65 (Mean = 40.29; SD = 12.28), who were in full or part-time employment took part in the study. The results demonstrated that work locus of control acted as a significant predictor for total scores on a measure of information security awareness. Those individuals who demonstrated more externality had weaker engagement in accepted information security within the workplace. The findings from the current study are discussed in the context of potential links to counterproductive work behaviours, as well as presenting possible practical routes for intervention strategies to help mitigate poor engagement in information security awareness.
... Findings have generally been inconsistent, and a lack of consensus exists concerning what factors are responsible for the equivocal results. For example, Reeves et al. (2017) found a negative relationship between the frequency of cybersecurity training at work and employee information security awareness, which the authors attributed to a potential complacency or fatiguing effect as a result of overly frequent workplace training regimes. ...
... The extent to which SETA programs succeed in producing positive outcomes remains unclear; and this is borne out in generally equivocal research findings. Reeves, Parsons, and Calic (2017) for example, found that more frequent SETA programs at work were associated with poorer employee security awareness in the context of mobile-device use. A further study found a similar result in relation to email-use and information-handling behaviours (Reeves, Parsons, & Calic, 2020). ...
Article
Organisations and security professionals design Security Education, Training, and Awareness (SETA) programs to improve cybersecurity behaviour, but they are often poorly received by employees. To understand employee negative perceptions of SETA programs, we conducted in-depth interviews with 20 Australian employees regarding their experiences with both SETA programs and non-cybersecurity related workplace training. As expected, employees had a generally poor view of SETA programs. They reported that the same factors that are important for effective non-cybersecurity training are also important for SETA programs, such as management role modelling and well-designed workplace systems. However, the level of importance of these factors differed across the two contexts. For example, employees indicated that the misbehaviour of their colleagues is a more important factor for their appraisal of a SETA program than it is for a non-cybersecurity workplace training program. Our results suggest that employee perceptions of SETA programs relate to their previously held beliefs about cybersecurity threats, the content and delivery of the training program, the behaviour of others around them, and features of their organisation. From an applied perspective, these findings can explain why employees often do not engage with cybersecurity training material, and how their current beliefs can influence their receptivity for future training.
Chapter
Humans are and have been the weakest link in the cybersecurity chain (e.g., [1, 2, 3]). Not all systems are adequately protected and even for those that are, individuals can still fall prey to cyber-attack attempts (e.g., phishing, malware, ransomware) that occasionally break through, and/or engage in other cyber risky behaviors (e.g., not adequately securing devices) that put even the most secure systems at risk. Such susceptibility can be due to one or a number of factors, including individual differences, environmental factors, maladaptive behaviors, and influence techniques. This is particularly concerning at an organizational level where the costs of a successful cyber-attack can be colossal (e.g., financial, safety, reputational). Cyber criminals’ intent on infiltrating organization accounts/networks to inflict damage, steal data, and/or make financial gains will continue to try and exploit these human vulnerabilities unless we are able to act fast and do something about them. Is there any hope for human resistance? We argue that technological solutions alone rooted in software and hardware will not win this battle. The ‘human’ element of any digital system is as important to its enduring security posture. More research is needed to better understand human cybersecurity vulnerabilities within organizations. This will inform the development of methods (including those rooted in HCI) to decrease cyber risky and enhance cyber safe decisions and behaviors: to fight back, showing how humans, with the right support, can be the best line of cybersecurity defense.
Conference Paper
Full-text available
Using a role play scenario experiment, 117 participants were asked to manage 50 emails. To test whether the knowledge that participants are undertaking a phishing study impacts on their decisions, only half of the participants were informed that the study was assessing the ability to identify phishing emails. Results indicated that the participants who were informed that they were undertaking a phishing study were significantly better at correctly managing phishing emails and took longer to make decisions. This was not caused by a bias towards judging an email as a phishing attack, but instead, an increase in the ability to discriminate between phishing and real emails. Interestingly, participants who had formal training in information systems performed more poorly overall. Our results have implications for the interpretation of previous phishing studies, the design of future studies and for training and education campaigns, as it suggests that when people are primed about phishing risks, they adopt a more diligent screening approach to emails. © IFIP International Federation for Information Processing 2013.
Article
Full-text available
It is increasingly acknowledged that many threats to an organisation’s computer systems can be attributed to the behaviour of computer users. To quantify these human-based information security vulnerabilities, we are developing the Human Aspects of Information Security Questionnaire (HAIS-Q). The aim of this paper was twofold. The first aim was to outline the conceptual development of the HAIS-Q, including validity and reliability testing. The second aim was to examine the relationship between knowledge of policy and procedures, attitude towards policy and procedures and behaviour when using a work computer. Results from 500 Australian employees indicate that knowledge of policy and procedures had a stronger influence on attitude towards policy and procedure than self-reported behaviour. This finding suggests that training and education will be more effective if it outlines not only what is expected (knowledge) but also provides an understanding of why this is important (attitude). Plans for future research to further develop and test the HAIS-Q are outlined.
Article
The main purpose of this study was to examine the relationship between individuals' Information Security Awareness (ISA) and individual difference variables, namely age, gender, personality and risk-taking propensity. Within this study, ISA was defined as individuals' knowledge of what policies and procedures they should follow, their understanding of why they should adhere to them (their attitude) and what they actually do (their behaviour). This was measured using the Human Aspects of Information Security Questionnaire (HAIS-Q). Individual difference variables were examined via a survey of 505 working Australians. It was found that conscientiousness, agreeableness, emotional stability and risk-taking propensity significantly explained variance in individuals’ ISA, while age and gender did not. Knowledge of, and attitude towards information security (InfoSec) policies and procedures, explained the most variance in self-reported InfoSec behaviour. Findings highlighted the need for future research to examine individual differences and their impact on ISA. Results of the study can be applied by industry to develop tailored InfoSec training programs.
Article
Studied changes across time in measures of organizational commitment and job satisfaction as each related to subsequent turnover among 60 recently employed psychiatric technician trainees. A longitudinal study across a 101/2-mo period was conducted, with attitude measures (Organizational Commitment Questionnaire and Job Descriptive Index) collected at 4 points in time. Results of a discriminant analysis indicate that significant relationships existed between certain attitudes held by employees and turnover. Relationships between attitudes and turnover were found in the last 2 time periods only, suggesting that such relationships are strongest at points in time closest to when an individual leaves the organization. Organizational commitment discriminated better between stayers and leavers than did the various components of job satisfaction. (36 ref) (PsycINFO Database Record (c) 2012 APA, all rights reserved)
Article
This paper consists of an argument and a pilot study. First is a general, perhaps philosophical, argument against the National Academy's viewpoint(1) that dealing with risk is a two-stage process consisting of (a) assessment of facts, and (b) evaluation of facts in sociopolitical context. We argue that societal risk intrinsically revolves around social relations as much as around evaluations of probability. Second, we outline one particular approach to analyzing societal risk management styles. We call this the fairness hypothesis. Rather than focusing on probabilities and magnitudes of undesired events, this approach emphasizes societal preferences for principles of achieving consent to a technology, distributing liabilities, and investing trust in institutions. Conflict rather than probability is the chief focus of this approach to societal risk management. This view is illustrated by a recent empirical pilot study that explored the fairness hypothesis in the context of new nuclear technologies.