Cyber Security Awareness Knowledgeand Behavior AComparative Study

You might also like

Download as pdf or txt
Download as pdf or txt
You are on page 1of 18

See discussions, stats, and author profiles for this publication at: https://www.researchgate.

net/publication/339273589

Cyber Security Awareness, Knowledge and Behavior: A Comparative Study

Article in Journal of Computer Information Systems · January 2022


DOI: 10.1080/08874417.2020.1712269

CITATIONS READS

196 30,339

6 authors, including:

Moti Zwilling Dusan Lesjak


Ariel University University of Primorska
45 PUBLICATIONS 705 CITATIONS 72 PUBLICATIONS 622 CITATIONS

SEE PROFILE SEE PROFILE

Łukasz Wiechetek Fatih Çetin


Maria Curie-Sklodowska University in Lublin Baskent University
72 PUBLICATIONS 321 CITATIONS 106 PUBLICATIONS 1,819 CITATIONS

SEE PROFILE SEE PROFILE

All content following this page was uploaded by Fatih Çetin on 14 February 2020.

The user has requested enhancement of the downloaded file.


Journal of Computer Information Systems

ISSN: 0887-4417 (Print) 2380-2057 (Online) Journal homepage: https://www.tandfonline.com/loi/ucis20

Cyber Security Awareness, Knowledge and


Behavior: A Comparative Study

Moti Zwilling, Galit Klien, Dušan Lesjak, Łukasz Wiechetek, Fatih Cetin &
Hamdullah Nejat Basim

To cite this article: Moti Zwilling, Galit Klien, Dušan Lesjak, Łukasz Wiechetek, Fatih
Cetin & Hamdullah Nejat Basim (2020): Cyber Security Awareness, Knowledge and
Behavior: A Comparative Study, Journal of Computer Information Systems, DOI:
10.1080/08874417.2020.1712269

To link to this article: https://doi.org/10.1080/08874417.2020.1712269

Published online: 14 Feb 2020.

Submit your article to this journal

View related articles

View Crossmark data

Full Terms & Conditions of access and use can be found at


https://www.tandfonline.com/action/journalInformation?journalCode=ucis20
JOURNAL OF COMPUTER INFORMATION SYSTEMS
https://doi.org/10.1080/08874417.2020.1712269

Cyber Security Awareness, Knowledge and Behavior: A Comparative Study


Moti Zwillinga, Galit Kliena, Dušan Lesjakb, Łukasz Wiechetekc, Fatih Cetind, and Hamdullah Nejat Basime
a
Department of Economics and Management, Ariel Cyber Innovation Center, Ariel University, Ariel, Israel; bInternational School for Social and
Business Studies, Celje, Slovenia; cMaria Curie-Sklodowska University, Lublin, Poland; dNiğde Ömer Halisdemir University, Niğde, Turkey; eBaşkent
University, Turkey

ABSTRACT KEYWORDS
Cyber-attacks represent a potential threat to information security. As rates of data usage and internet Cyber security; cyber threats;
consumption continue to increase, cyber awareness turned to be increasingly urgent. This study focuses cyber awareness; cyber
on the relationships between cyber security awareness, knowledge and behavior with protection tools knowledge; cyber behavior
among individuals in general and across four countries: Israel, Slovenia, Poland and Turkey in particular.
Results show that internet users possess adequate cyber threat awareness but apply only minimal
protective measures usually relatively common and simple ones. The study findings also show that
higher cyber knowledge is connected to the level of cyber awareness, beyond the differences in
respondent country or gender. In addition, awareness is also connected to protection tools, but not
to information they were willing to disclose. Lastly, findings exhibit differences between the explored
countries that affect the interaction between awareness, knowledge, and behaviors. Results, implica-
tions, and recommendations for effective based cyber security training programs are presented and
discussed.

1. Introduction intention is to engage in cyber-crime in any of its various


forms, ranging from violation of individual privacy to iden-
Information Technology has dramatically increased in the
tity theft and credit card fraud. Cyber-criminals use mal-
past decade, with massive global rates of internet consump-
icious software and hacking tools to sabotage computers,
tion by individuals and organizations ranging from acade-
mobile devices, and communication network infrastructure,
mia and government to industrial sectors (Aloul1; Jalali
including cyber security protection tool disruption
et al.2; Lee et al.3). During the last decade, information
(Abawajy5). While protective tools are generally installed
technology such as mobile devices and digital applications
on computers and in infrastructure, studies show that
have transformed daily life, facilitating diverse lifestyles in
they do not completely mitigate cyber security breaches
many areas. The ease of technology usage as well as the
(Furnell et al.6; Parsons et al.7; Schultz.8) This is because
increased demand for online connectivity (in education,
the weakest link in the cyber security chain remains human
retail, tourism, and even autonomous vehicles) has
error (Anwar et al.9; Herath and Rao10; Schneier.11)
expanded opportunities for internet usage on a global
Organizations have come to recognize that behaviors deriv-
scale. Indeed, some of these uses include reading digital
ing from the human factor are responsible for cyber secur-
newspapers, surfing the web, utilizing search engines to
ity flaws and may pose a liability for information security
find desired content, assisting recommender systems in
(Sasse and Flechais.12)
the form of decision support tools, and using social media
The behavioral contribution to unintentional cyber
to name only a few. Nevertheless, while internet consump-
breaches was highlighted by IBM’s Global Technology
tion buttressed by information technology improvements
Services as one of the most critical issues to be addressed
increases dramatically (Maurseth4), many netizens (i.e.,
by security controls and best practices guidelines. In fact,
people who use the internet) still lack sufficient awareness
there has been an increased recent focus on the role of
of various internet threats (also defined as “cyber hazards”).
individual behavior in cyber hazard mitigation. However,
In fact, they often fail to possess the minimum required
the understanding of how individuals differ in their aware-
knowledge to protect their computing devices. In worst-
ness, knowledge, and cyber security behavior when con-
case scenarios, individuals suffer from a total lack cyber
fronted with versatile cyber hazards is still quite limited.
hazard awareness. Hence, their readiness to utilize protec-
Moreover, to the best of our knowledge, no research has yet
tive cyber security measures is non-existent.
to compare and evaluate these three components across
When not carried out by governments, cyber hazards are
countries. Therefore, the aim of this study is to evaluate
the work of “bad hackers” (otherwise known as “black
differences in cyber hazard awareness, knowledge and cyber
hats”), who act on their own or within an organized crim-
hazard protection behaviors between four countries:
inal group to commit cyber crime. In both cases, their

CONTACT Moti Zwilling motiz@ariel.ac.il Department of Economics and Management, Ariel Cyber Innovation Center, Ariel University, Ariel, Israel
© 2020 International Association for Computer Information Systems
2 ZWILLING ET AL.

Slovenia, Turkey, Poland and Israel. As such, the compara- $2.5 million per year (Coppers20) As noted, this loss can be
tive study was carried out in these four countries character- only partly mitigated by protective tools since their function-
ized by varying GDP and GDP per capita: two economically ality in most cases is controlled by individuals (Furnell et al.6;
more developed (Israel and Slovenia) and two economically McCormac et al.21; Parsons et al.22; Schultz8)
less developed (Poland and Turkey) countries, since there are Individual cyber engagement, in general, and with cyber
many authors claiming that economic development and protection tools in particular, has motivated both academic
cybersecurity and therefore cyber awareness are mutually scholars and practitioners to focus on individual attitudes and
dependent (Kshetri13, Vasiu and Vasiu14). GDP and GDP behaviors concerning cyber threats (Schneier23; Shropshire
per capita are among the most common indicators used to et al.24). An instructive example was given by Sasse and
track the health of a nation’s economy. According to the Flechais12 who emphasized the existing gap between facto
Worldbank,15 in 2018 Israel was ranked 22nd in GDP per and ex post facto mitigation activities conducted by employees
capita (41,614 USD), with Slovenia in 32nd place (26,234 in cases of cyber security breach due to lack of sufficient
USD). The GDP per capita of Poland is lower (15,424 USD engagement with cyber security protection tools. Other stu-
and GDP per capita ranking of 52), while Turkey is lower still dies evaluated level of individual resilience with cyber security
(9,311 USD and GDP per capita ranking of 67). As far as we awareness as a cause of job stress (McCormac et al.25). In
know, no study comparative has focused on the relative cyber addition, the relationship between individual personality and
security awareness, knowledge and behavior differences level of cyber security risk propensity has been researched
between these four countries. (McCormac et al.26). Yet the relationships between individual
Our research objectives are divided into two categories: cyber security awareness, knowledge and behavior have never
First, building a theoretical framework to be used in con- been studied in cross-country comparison. In fact, the com-
structing cyber security training programs. This framework parative approach is considered by important stakeholders to
is based on the factors that impact the level of cyber security be crucial for the creation of intervention programs
awareness, knowledge, and behavior, which were evaluated (McCormac et al.26).
according to the following research questions (from general
to specific):
2.2. Cyber security hazard awareness
(1) What is the level of cyber security awareness among The internet has revolutionized managing life tasks, enabling
netizens? connections with new people through social networks and
(2) Which types of behavior do netizens adopt to prevent opening new economic horizons for transactions via mobile
cyber hazards? devices both for individuals and organizations, including radi-
(3) Is there any difference in cyber security awareness and cal change in the higher education system and teaching meth-
behavior among netizens of different countries that ods (Aloul1; Lee et al.3; Saadatdoost et al.27). Even so, many
diverge in their GDP values? people still face information security risks from a vast array of
threats. These threats range from simple to catastrophic
The second objective of this study is to provide practical attacks. The first may consist of primitive spam e-mails,
recommendations on how to improve the quality of cyber while the second may involve organized cyber-crime groups
training programs based on the theoretical framework that use malicious software to steal, corrupt, and destroy data
findings. on a significant scale (Letho28). A major factor in information
The rest of this paper is organized as follows: In Section 2, security risk is level of individual cyber security awareness,
we present the literature review, while in Section 3 we outline which can be usefully described as low, medium, or high. Low
the study methodology. Section 4 details the results, followed awareness behaviors include not paying attention or neglect-
by a discussion of implications and recommendations in ing security alerts, provided in most cases automatically by
Section 5. Finally, in Section 6, conclusions and suggestions applications, such as when accessing free open networks (such
for future work are offered. as Wi-Fi) with mobile devices and laptops. A medium aware-
ness level may be characterized by negligence expressed in
improper technology operation. Finally, high awareness
2. Theoretical background involves knowledge of cyber threats and capable actions
taken in their prevention.
2.1. The impact of internet and cyber on society
The term cyber security awareness was already defined by
The internet has revolutionized how people access data and Shaw et al.29(p. 93) as follows: “[The] degree of understanding
utilize various applications for modern day-to-day tasks. Reid of users about the importance of information security and
and Van Niekerk16(p. 178) noted the huge impact of the internet their responsibilities and acts to exercise sufficient levels of
on daily life: “In our technology and information-infused information security control to protect the organization’s data
world, cyberspace is an integral part of the modern-day society. and networks”. They noted widespread lack of awareness of
In both personal and professional contexts, cyberspace is cyber risks, extending to app usage and information delivery
a highly effective tool in, and enabler of, most people’s daily on social networks and internet web pages. Importantly, they
digitally transposed activities.17,18,19” However, Coppers20 pointed out that hackers (individual or collective) tend to seek
noted the rising impact of information security breaches on out the most vulnerable users, i.e. those deficient in informa-
the economy, resulting in information loss estimated at ~ tion and network security awareness. Hackers are proficient at
JOURNAL OF COMPUTER INFORMATION SYSTEMS 3

exploiting both software bugs and security gaps unintention- e-mails often contain malicious software (“malware”) result-
ally created by users themselves. ing in illicit data leakage (Abawajy and Kim35; Abawajy5). The
Since the human factor has already been shown to main simulator is also suitable for trainers, exposing them to prac-
cause of cyber breaches, ever more cyber awareness training tical protection tools to mitigate phishing e-mails and internet
programs are offered by academic institutions and private links and guiding them in how to attain optimal levels of
companies, with the aim of increasing individual cyber- protection against cyber security threats.
crime awareness (Dodge30; Kumaraguru et al.31; Shaw et al.29). In a study conducted by Reid16, the influence of a cyber
However, increasing levels of awareness can only transpire if security awareness campaign for school youth, along with
cyber awareness itself is fully understood, a thesis already their existing knowledge related to cyber security hazards,
made in 2015 by Letho: “[While] the world grows more was measured. He found that campaigns have a positive
connected through the cyber world, the most efficient plan impact on improving cyber hazard awareness and knowledge.
to increase cyber security awareness is the improvement of the A later study, conducted by Cain et al.36, explored “Cyber
know-how of the citizens and actors of the economic life and Hygiene” (i.e. level of cyber knowledge) in 268 computer and
public administration. This improvement could be effective if device users ranging in age from 18 to 55+. The survey
the reasons for the lack of cyber security awareness could be focused on how they maintain system health and online
understood (Letho28(p. 180)). However, in the last five years, security tools such as firewalls and anti-virus software, and
a growing body of research has focused on individual cyber was carried out using Amazon Mechanical Turk (MTurk)
security awareness. For example, McCormac et al.26 pointed (https://www.mturk.com), a crowdsourcing marketplace.
out a linear relationship between age and information security MTurk allows businesses (i.e. “requesters”) to allocate tasks
awareness, one that improves with increase in age. Another to remote “crowdworkers”, a potentially rich source of data
study by McCormac et al.25 among 1,048 Australian employ- collection. They found that self-identified experts had less
ees showed a relationship between resilience, job stress and cyber hygiene knowledge than self-identified non-experts.
information security awareness (ISA), finding that when This surprising finding could be attributed to the latter
employees can cope or adapt to job stress, their awareness being more dependent and relying on external guidelines,
to cyber security hazards increases, and hence the organiza- hence investing greater efforts in acquiring the necessary
tion’s resilience is improved. Research by Hadlington32 found cyber security knowledge for their tasks.
that employed people in large organizations tend to develop
higher awareness of cyber risks, which may be explained by
2.4. Cyber security protection behaviors
improved budgetary resources and organizational enforce-
ment policies. As with Hadlington32, Pendley33 also focused Recognizing the severe cost of cyber hazards, research has
on improving cyber security awareness among managerial or increasingly focused on the measures taken and behaviors
administrative staff, emphasizing adhering to cyber regula- exhibited by netizens to protect their devices (e.g. Safa et al.37).
tions and guidelines as well as establishing security policies. However, most recent studies related to cyber protection
Nevertheless, lack of cyber awareness is still a serious global behavior look at very narrow aspects of cyber security beha-
problem. Organizations and educational institutions must vior. For example, Safa et al.37 surveyed level of compliance
develop adequate training programs, with the first step with security polices among 416 employees in 4 Malaysian
a comparative evaluation of level of awareness across different companies. They found that employee attachment to the firm
countries. does not have a significant influence on their attitude to adopt
a desired cyber security compliance behavior. McCormac et -
al.26 looked at whether employee information behavior is
2.3. Cyber security knowledge
correlated with personality traits such as conscientiousness,
Increasingly, individuals are in actuality dependent on inter- agreeableness, emotional stability, and risk taking. They
net technologies for their day-to-day tasks. Ease of use has showed that a small significant gender difference exists
facilitated participation in cyber-related activities on a mass related to phishing e-mails, such that women were found to
scale. However, knowledge of existing tools needed for pro- be more susceptible than men. Another study by McCormac
tection against cyber threats is correspondingly lagging et al.25,38 aimed at exploring the relationship between
(Furnell et al.34; Abawajy and Kim35; Abawajy5). As Abawajy employee resilience and job stress and cyber. They used
(Abawajy and Kim35, Abawajy5) noted, even basic level cyber a sample of 1,048 working Australians, reporting that higher
security awareness may not translate into sufficient or appro- levels of cyber threat resilience translated into significantly
priate cyber security protection knowledge to mitigate cyber better ability, knowledge, attitude, and behavior in cyber
risks and hazards. As such, he suggested increasing cyber mitigation processes. Similarly, participants who reported
security knowledge through cyber security training programs lower levels of job stress also were found to exhibit sign-
using theoretical lectures and simulators to provide exposure ificantly better attitude, knowledge, and behavior in mitiga-
to cyber security protection tools. These would focus on tion of cyber hazards. Hadlington32 focused on the
operational, usage, and process aspects of improving user relationship between risky employee cyber security behavior
knowledge translating into effective cyber security mitigation and individual (such as age and attitude) and organizational
behavior. For example, the “Phishing Simulator” is a popular factors in protective cyber security activities. Risky behaviors
training resource, designed as an effective training process to included sharing personal passwords, downloading illegal
increase awareness of suspicious e-mails sent by hackers. Such content, infringing copyright, and ignoring recommended
4 ZWILLING ET AL.

software updates. Their findings associated these risky beha- intermediate ones. Recently, Bong-Hyun et al.46 emphasized
viors with employee self-feeling, defined as the feeling that the importance of developing internet-based cyber training
cyber security is not a primary concern in their place of programs in higher education institutions, offered and dis-
employment. tributed by e-mail and mobile devices with formal or informal
In fact, Hadlington and Parsons39 had already showed training sessions and presentation types (Shtudiner
that employees who feel protected in their workplace tend et al.47). Even so, the literature tends to be characterized by
to neglect cyber security behavior. This finding was con- calls for more research to address insufficient knowledge of
firmed by Tischler et al.40, who found that, in general, the relationships between individual awareness, knowledge,
employees tend to decouple their responsibility to install and self-reported behavior in cyber mitigation processes and
and operate cyber protection tools from their job, instead use of protection tools. These studies should then contribute
transferring it to senior management. As noted, Cain et al.36 to facilitate the development of substantive individual cyber
tested levels of so-called cyber hygiene, and found that self- security training programs.
identified experts exhibited less secure behaviors than self- As such, the purpose of this research is to provide
identified non-experts. In addition, they found that older a theoretical and practical solution to global lack of cyber
users engaged in more secure cyber behaviors than younger security awareness, knowledge, and behavior, highlighting
ones. Surprisingly, they found no differences in individual the need for cyber security training programs in educational
response behavior to experienced and inexperienced users – and academic institutions to generate improved individual
being attacked by cyber malware for the first time or more cyber security outcomes.
than once, didn’t change their response to cyber attack. Our hypotheses are thus the following:
They also did not detect any individual effect in the impor-
tance of cyber training programs. However, they noted that H1: Cyber security knowledge is positively connected to cyber
future studies could shed light on the impact of effective awareness.
cyber training programs, which may encourage younger
users to behave more securely when confronted with H2: The netizens country of residence will moderate the
a cyber security incident. connection between cyber knowledge and cyber security
These training programs were evaluated by Dodge30, who awareness.
noted that the number of phishing scam victims dropped after
students were exposed to “staged” phishing attacks. H3: Netizens with higher cyber security awareness will engage
McCrohan et al.41 evaluated training programs aimed to in more cyber protection behaviors.
improve the knowledge and awareness of potential cyber
security hazards among users. They focused on cyber security H4: Cyber security awareness will serve as a mediator between
aspects of password protection awareness and ability to secure cyber knowledge and cyber protection, i.e., individuals with
computers pre- and post-cyber security training. They high- greater cyber knowledge will be more aware of potential cyber
lighted the critical role of cyber education/training, emphasiz- hazards and, therefore, exhibit more cyber protection beha-
ing appropriate security practices to improve day-to-day vior than individuals who lack the needed levels of awareness
online behavior. Following this study, Eminağaoğlu et al.42 or knowledge.
showed that awareness campaigns can play a positive role in
reducing cyber risk behavior. The authors found that the level The study model is provided in Figure 1.
of exposure to and practice in training programs pushed To the best of our knowledge, this is the first study to
students to use complex passwords. They suggested that pro- compare internet user behaviors and level of cyber security
viding security awareness training courses can comprehen- awareness and knowledge in the four selected countries based
sively influence attitudes to information security on their GDP differences. It is important to note that the
management. Similarly, Abawajy5 divided cyber security research was conducted on a student sample. Even so, the
training into three categories: online, contextual, and study findings may stimulate follow-up research on the effec-
embedded training. He concluded that a combination of tiveness of cyber security training programs in similar coun-
delivery methods (such as text-based, game-based, and video- tries with a wider sample of respondents.
based) should determine the training type. Following
Abawahy5, Pawlowski et al.43 recommended that cyber secur-
ity training courses should be treated as problem-centered,
utilizing case studies that are tailored to student levels of
awareness. Alternatively, Son et al.44 suggested a different
cyber security teaching approach: integration of security labs
with the curriculum in three forms – (1) pure virtual, (2)
traditional physical, and (3) hybrid. They concluded that
security labs should be an essential part of the curriculum,
although they suggested that the deployment model should be
based on individual institutional requirements. Indeed, Harris
and Patten45 developed a cyber security taxonomy that allows
moving security issues from higher-level courses to lower and Figure 1. Study hypothesized model.
JOURNAL OF COMPUTER INFORMATION SYSTEMS 5

3. Material and methods 3.2.2. Knowledge


We measured respondent knowledge of several aspects of
3.1. Subjects
cyber security, cyber threats, and general cyber knowledge as
A paper-based survey was distributed to cohorts of under- follows:
graduate and graduate students. In each country, the subjects
were located through convenience sampling, with the assis- 3.2.2.1. Threats. Threats were measured by presenting
tance of the relevant department in the university. Since respondents with different cyber security scenarios and asking
different disciplines require varying levels of cyber knowledge, them to rate the degree of threat. Threat types ranged from
we have chosen to focus on Management and/or Business loss of data, loss of money, blocking access to information,
Administration departments as a baseline for our comparison. etc. We measured the answers on a Likert scale that ranged
All the students majored in Management and Business from 1 – strongly disagree to 5 – strongly agree. We also
Administration. These included BA students in the depart- measured the total amount of threats (“threats”) by calculat-
ment of Economics and Business Administration at Ariel ing the mean score of the different items. Therefore, the
University in Israel (n = 89) and in the department of higher the total score, the higher the amount of threats that
Business Administration at Lublin University in Poland (n = the respondents estimated during a cyber-attack.
182). BA and MBA students at the school of Business
Administration from Celje (ISSBS) in Slovenia (n = 35) also 3.2.2.2. Education awareness. We measured level of respon-
filled out surveys, and data from a sample in Turkey (n = 153) dent education awareness (“edu_awareness”) by asking the
was adjusted to the data of the other countries. Overall, the extent to which their current education influenced their
sample included 459 subjects who participated in the survey: cyber-security awareness. This was ranked on a Likert scale,
52% were female and 48% were male. Ten percent of the ranging from 1 – definitely not affected to 5 – strongly
subjects declared that they were studying in a full-time pro- affected. We also measured whether students had attended
gram, whereas 58% stated that they worked a part-time job. IT scrutiny training (“IT_past”) on a three-level scale (1-yes,
The rest of the subjects (32%) declined to answer. 2-no, 3-I’m not sure). We transformed this variable into
Sixty percent were enrolled in their first degree (BA), 30% a dummy variable based on attendance (“d_attendance”),
in their second degree (MBA), and 10% in their PhD. Detailed with 1 – attended cyber security course or program and 0 –
information for each country appears in Appendix A. other. We asked respondents about their desire to attend an
IT security training program to improve cyber security aware-
ness (“IT_future”) on a Likert scale that ranged from 1 –
3.2. Instruments definitely not to 5 – definitely yes. We measured knowledge
by asking if respondents know the difference between http
To provide a theoretical framework, we developed a questionnaire and https protocol (“Recognition”) on a binary scale (1-yes,
that included several questions aimed to test global familiarity of 0-no). Lastly, we measured respondent knowledge of different
the subjects with cyber security issues as well as, specifically, level programs and applications such as text editor, spreadsheets,
of awareness of cyber security risks. To develop the questionnaire, social media, etc. The answers were ranged on a Likert scale as
we used face validity. As such, the measurements were developed 1 – no skill to 5 – very high skills. We also measured the total
by a research team, most of whom are experts in cyber education. mean score for the different items (“computer_knowledge”).
The team formulated several questions to capture the level of cyber Higher results indicated that respondents possess more skills
awareness and cyber hazard awareness, the behaviors exhibited using computer programs and applications.
when confronted with cyber threats and the knowledge regarding
cyber, in general, and cyber-attack, in particular. After deleting 3.2.2.3. Familiarity. To measure familiarity, respondents
redundant questions, the questionnaire was delivered to the were asked to evaluate their knowledge of cyber security
subjects. issues based on a series of different items. These included
Activity type of cyber security defense used by the subjects internet sources, university courses, IT journals, etc.
was also explored. This ranged from participating in cyber Respondents had to report if they have (1) or do not have
security training programs to more focused cyber behaviors (0) sufficient knowledge of each item. We also measured total
such as installing specific cyber security defense tools. Each amount of familiarity (“familiarity”) by summing responses.
respondent was also asked to report their previous cyber Therefore, the higher the result, the higher the amount of
knowledge, internet usage, and cyber security behavior. respondent familiarity with cyber security knowledge.
Classification was based on three criteria: (1) level of cyber
security awareness (Awareness), (2) knowledge of cyber secur- 3.2.3. Behavioral aspects
ity and threats (Knowledge), and (3) attempts to prevent Several questions measured the means used by the respon-
cyber-attack (Behavior). dents to prevent cyber-attack situations. For the first beha-
vioral variables, we presented the respondents with different
3.2.1. Awareness information and measured their readiness to provide the
Awareness was measured with the question: “To what degree information if they were asked by a digital media outlet.
are you familiar with the term cyber security?” The item was Items included information regarding: home address, age,
on a scale of 4 degrees, with 1 – no knowledge to 4 – very e-mail password, etc. Each question was measured on
good knowledge. a categorical scale (1-yes, 0-no). We calculated the total
6 ZWILLING ET AL.

information provided (“provide”) by summing the score of respondent answers indicated high familiarity with the term
the different types of information. Therefore, the higher the “cyber-security” – either through the internet (81%), social
score, the higher the respondent level of agreement to reveal media (60%), conversations with friends and traditional
information on the internet. media (45%), classes at the university (29%), IT journals
In the second behavioral variable, we showed the respon- (21%), and/or scientific journals (15%). Only 9% reported
dents different means, tools, or applications (e.g. strong pass- having personal experience with cyber-attacks. Respondents
word or spam protection) and asked them whether they use also agreed that cyber-attacks could cause damage in multiple
this instrument to avoid cyberattack on a categorical scale arenas. Their main cyber-attack concerns were violation of
(1-yes, 0-no). We calculated the total protection (“protection”) privacy (M = 4.20), loss of data (M = 4.17), spying on private
by summing the score of the different types of instruments. citizens (M = 4.14), loss of money (M = 4.13), spying on
Therefore, the higher the score, the higher the level of respon- organizations (M = 4.12), and potential role in terror attacks
dent protection of their computer from cyberattack. We also (M = 4.11), among others. On the other hand, they did not
asked a directed question regarding their knowledge in case of feel that cyber-attacks block access to information
cyberattack (“behavioral”) on a scale from 1 – definitely no to (M = 1.78).
5 – definitely yes. Since the question measured lack of knowl- In parallel with high cyberattack awareness, respondents
edge of how to behave, its direction was negative. The higher avoid disclosure of sensitive information on the web, espe-
the response, the less knowledge they possessed in the event of cially e-mail passwords (M = 1.77), ID number (M = 1.81),
a cyber-attack. home address (M = 2.19), social network login (M = 2.02),
Another behavioral variable measured whether using cyber and phone number (M2.15). Their only readiness was to
products and services made respondents feel as if their knowl- provide their age (M = 3.34). Other positive respondent
edge of cyber-attacks was forced on them or acquired by cyber security habits include using strong password (85%),
choice (“Choice”). The question was measured on a Likert installing antivirus software (75%), regular data backup (61%),
scale that ranged from 1 – definitely by coercion to 5 – frequent password changes, and updating software (approxi-
definitely by choice. mately 56%). On the other hand, only 45% used spam protec-
To measure how respondents protect their devices, we tion, 35% avoided using a public computer, and just 15%
asked them to list the length of a standard account password performed computer security audits. When asking about the
(e-mail, social media, etc.) (“length”) and whether they use the means they use to protect their instrument from 11 threat
same password (“password”) for different portals, systems, options, respondents used five protection tools on average.
and applications on a categorical scale (1-yes, 0-no). We also About 56% of respondents used the same password for dif-
asked respondents to describe their behaviors when finishing ferent applications and usages, with average password length
up work on their computer. Presented with individual activ- of six characters. Lastly, only two protection behaviors were
ities such as shutting down or locking their computer, they conducted at the end of usage: logging off all programs (51%)
were requested to confirm if they engaged in (1) or did not and shutting off the computer (66%). Therefore, respondent
engage in (0) these behaviors. We measured a total score for behavior indicated a discrepancy between awareness and
each respondent such that the higher the results, the more the amount of activities used to protect themselves from cyber-
subjects ensured their computer was safe (“finish”). attacks.
This gap may be attributed to participant knowledge. Based
3.2.4. Characteristics of the sample on self-evaluation of skills and knowledge, the results indi-
We measured gender (male – 1, female – 0), years of study cated that respondents reported having sufficient knowledge
(1 – no academic background to 6 – PhD student), type of (M = 3.33) especially of e-mail (M = 4.02), computer applica-
study (1 – part time, 0 – full time) and country (1 – Israel, 2 – tions (M = 3.97), web browsers (M = 3.98), smartphone (M =
Poland, 3 – Slovenia, 4 – Turkey). 3.93), and social networks (M = 3.92). They felt less secure
about web page development (M = 2.42), application devel-
opment environments (M = 2.44), network architecture (M =
3.3. Procedure
2.77), and computer architecture (M = 2.90). Judging their
The questionnaire was uploaded to the internet for the knowledge of IT security, most respondents never attended an
respondents from the four tested countries. The authors dis- IT security training program in the past (around 66%), but
tributed the site link to the respondents in class during the were willing to participate in this kind of training in the future
academic year of 2017. The questionnaire was in English, (M = 3.68). Even so, we need to treat this readiness with
although for Turkish students the English version was trans- caution, since results may suggest a social desirability bias.
lated into Turkish. That is, respondents may feel more obligated to participate in
future training after having a host of cyber threats pointed out
to them. Indeed, when asked about their behaviors, only 11%
4. Results
reported taking part in cyber security courses.
Descriptive analysis was initially conducted to capture level We also conducted a correlation analysis to detect multi-
of awareness, knowledge, and behaviors toward cyber- collinearity between the dependent and independent variables
attacks. The results of the means and standard deviation that were later included in the regression analysis. We entered
scores for the total countries and each country individually country of residence as the dummy variable (d_Israel,
are presented in Appendix B. The results from the total d_Poland, d_Slovenia and d_Turkey), indicating 1 – for the
JOURNAL OF COMPUTER INFORMATION SYSTEMS 7

Table 1. Correlation analysis with the dependent and independent variables.


Variables 1 2 3 4 5 6 7 8 9 10 11 12 13
1. Awareness 1
2. Edu_awamess .309** 1
3. Familiarity .268** .194** 1
4. Threats .269** .266** .161** 1
5.d_attendance (0-no, 1-yes) .090 .036 .029 −.12 1** 1
6. computer_knowledge .314** .215** .255** .136** .158** 1
7. protection .300** .318** .344** .305** −.036 .232** 1
8. provide −.067 −.188** −.046 −.89 .087 .012 −.225** 1
9. Recognition (0-do not know the .230** .077 .097* −.077 .173** .346** .093* −.013 1
difference, 1-know)
10. d_Israel −.006 −.093* −.056 .025 .067 −.074 −.290** .168** .020 1
11. d_Poland −.254** −.2568 .021 −.344** .066 .187* −.128** .177 .059 −.398** 1
12. d_Slovenia .064 .020 .189** −.009 −.009 .-.081 .114* −.023 −.013 −.141** −.233** 1
13. d Turkey 233** .332** −.081 .341** −.120** −.087 .312** −.311** −.071 −.347** −.573** −.203** 1
Note: N = 459; * p < .05, **p < 0.01.

subject living in that country, 0 – any other country. The p < .01). While Turkey had a significant and positive connection to
results appear in Table 1. awareness (α = 2.654, p < .01), both Israel (β = −.139, p < .01) and
The result shows that the variables did not display multi- Poland (β = −.315, p < .01) were negatively associated with cyber-
collinearity. Interestingly, we found that all the countries attack awareness. That is, levels of awareness in Israel and Poland
showed negative, yet significant, correlation. This indicates were lower compared to other countries. Entering gender into the
that subjects showed unique country-specific behaviors, regression analysis added a significant contribution of 3% to the
although the highest levels of difference were between subjects level of awareness (R2 = 0.10, F (4,453) = 13.72, p < .01). Based on
living in Turkey and Poland (r = −.573, p < .001). the direction of the coefficient, males were found to have more
awareness of cyber-attacks compared to females. The last regres-
sion step indicated that cyber knowledge added another 16% to
4.1. Connection between cyber knowledge and total variance over netizens country of residence and the gender of
awareness respondents (R2 = .26, F(8,449) = 20.92, p < .01). Education
The connection between previous cyber knowledge and level of awareness (Edu_awareness) was positively associated with aware-
cyber security awareness was analyzed controlling for respon- ness (β = .143, p < .01), meaning that respondents who felt that
dent country of residence and gender. Three steps were applied their current education influenced their awareness to cyber-
in the multiple hierarchical regression. In the first step, we security also felt higher awareness toward this hazard.
entered country as dummy variables (d_Israel, d_Poland and Understanding the differences between http and https protocol
d_Slovenia), with Turkey as the comparison country. Gender (Recognition) was associated with higher amount of cyber-attack
was included in the second step, and in the last step, we entered awareness (β = 0.11, p < .05). Lastly, extensive knowledge of
the different knowledge variables. Table 2 shows the results of different aspects of computer usage and applications was also
the multiple hierarchical regression analyses. positively connected to more awareness of cyber-attacks (β =
In the first step, respondent country type explained 7.4% of 0.28, p < .01). Therefore, the results suggest that knowledge of
variance in awareness of cyber-attack (R2 = 0.74, F(3,454) = 13.03, the cyber world and security problems is associated with more

Table 2. Results of the multiple hierarchical regression between awareness and the country, gender, and computer knowledge.
Model 1
Step 1 Step 2 Step 3 Model 2 Model 3 Model 4 Model 5 Model 6 Model 7
‘d_Israel −.139ᵃ** −.138** −.110** −.190** −.118** −.233** −.551** −.111* −.184*
d_poland −.315** −.307** −.318** −.308** −.198** −.197** −.306** .075 −.194**
d_slovenia −.029 −.008 .013 .015 .010 .012 .012 .015 .011
Gender (0-female, 1-male) .171** .144** .150** .147** .146** .153** .147** .122*
Edu_awarness .143** .154** .135** .122** .148** .136** .170
Recognition (o-do not know the differences, 1-know) .112** .075 .216** .187* .106* .101* .069
d_attendance (0-no, 1-yes) .048 .043 .048 .082 .045 .049 .046
Computer_knowledge .285** .274* .264** .291** .234** .343** .284**
Interaction Israel*Recognition .125*
Interaction Ploand*Recognition −.199**
Interaction Slovenia*Recognition .042
Interaction Israel*computer knowledge .456*
Interaction Poland*computer knowledge −.414’
Interaction Slovenia*computer knowledge .826 ‘
R2 .074 .102 .261 .274 .271 .209** .278** .245 .224**
Chg R2 .03* .16** .13** .10** .007 .17** .070 .021’
F 13.03** 13.72** 20.92** 19.16** 19.37** 6.384** 23.98 6.98* 6.855**
Std,E .73 .72 .69 .652 .651 .721 .713 .685 .715
Note: ᵃThe results demonstrate the standardized beta coefficient (β).Dependent variable was awareness to cyber-attack; ‘Turkey was measured as the base line for
comparison; edu_awarness measured the extent in which the current education influenced their cyber-security awareness; d_attandency measured whether the
student were attendant in IT scrutiny training; Computer knowledge measured the amount of knowledge the responders have in different application and usages;
**p < .05, **p < .01, ‘p < .10
8 ZWILLING ET AL.

awareness of the phenomenon of cyber-attacks, supporting the


first hypothesis.
Models 2 to 7 focused on the netizen country of residence
as a moderator in the connection between cyber knowledge
and cyber awareness. The interaction was significant for two
variables: recognition and computer knowledge. For the recog-
nition variable, the interaction among Israeli respondents was
significant (β = .125, p < .05), meaning that respondents who
recognize differences between http and https protocol and live
in Israel exhibited a higher awareness of cyber-attacks com-
pared to people living outside Israel with the same knowledge.
The opposite was found with respondents with no recognition
of differences between http and https protocol. The group that
lives in Israel was characterized by the lowest awareness
compared to all other groups and students who live outside Figure 3. The interaction between cyber recognition in Poland and level of
awareness.
Israel.
The interaction was also found to be significant for Polish
respondents but in a negative direction (β = −.199, p < .01).
That is, students who live outside Poland had higher aware-
ness of cyber-security problems. However, this awareness was
lower and was similar to Polish respondents who could not
differentiate between http and https protocol. The interaction
was not significant in the case of Slovenian respondents. Even
so, since the gender distribution of the Slovenian subjects
diverged from the general population, this might have affected
the results. Figures 2 and 3 illustrate the results of the inter-
actions between recognition, countries, and awareness.1
For computer knowledge, the interaction for Israeli students
was also found significant and positive (β = .456, p < .05),
meaning that students with higher knowledge of computer
usages who live in Israel had higher awareness of cyber-
attacks compared to those living outside Israel with the Figure 4. The interaction between computer knowledge in Israel and level of
same knowledge. The opposite was true for students who awareness.
had less computer knowledge. The group that lives in Israel
was characterized by the lowest awareness compared to all
other groups and students who live outside Israel.
In the case of Poland, the interaction was close to signifi-
cant but in the negative direction (β = −.414 p < .10), meaning
that students who live outside of Poland exhibited higher

Figure 5. The interaction between computer knowledge in Poland and level of


awareness.

awareness compared to those who live in Poland. However,


this awareness was lower and was similar to Polish respon-
dents when examining those with less computer knowledge.
Figures 4 and 5 illustrate the results of the interaction between
Figure 2. The interaction between cyber recognition in Israel and level of
awareness.
recognition, countries, and awareness. To aid us in

1
We excluded Slovenian respondents since the interaction was not significant.
JOURNAL OF COMPUTER INFORMATION SYSTEMS 9

Table 3. Results of the multiple hierarchical regression between behavioral variables, the responders’ country, gender, and
awareness.
Model 8- protection Model 9- provide
Step 1 Step 2 Step 3 Step 1 Step 2 Step 3
‘d_Israel −.409** −408** −376** .309** .310** .311**
d_poland −.294** −292** −217** .322** .323** .325**
d_solovenia −.012** −.007 −.005 .096* .098* .098*
Gender (0-female, 1-male) .037 −.004 .021 .020
Awareness .243** .008
R2 .155 .156 .209 .107 .107 .107
Chg R2 .001 .053** .00 .00
F 27.83** 21.04** 23.94** 18.10** 13.61** 10.87**
Std,E 1.95 1.95 1.89 .90 .90 .90
Note: ᵃThe results demonstrate the standardized beta coefficient (β). Dependent variable was behavioral variables; ‘Turkey was
measured as the base line for comparison; awareness measured the amount of awareness to cyber security term; **p < .05,
**p < .01, ‘p < .10.

interpreting the results, we classified the continues variables, aimed to protect devices. As such, this finding supported the
i.e. computer knowledge, into two categories based on the third hypothesis. We also conducted an interaction analysis
median (3.28). As such, we had two groups: those with com- between awareness and each of the countries. However, the
puter knowledge (1) and without computer knowledge (0). interaction failed to be significant and was not reported in the
regression model (β = .038, p > .05, for Israel; β = .056, p > .05
for Poland and β = −.069, p > .05 for Slovenia).
4.2. Connection between country, awareness, and Model 9 shows the results of the regression analysis between
behaviors awareness and readiness to provide information. The findings
Our next analysis aimed to measure whether awareness is con- indicate that respondent country was the sole variable that sig-
nected to cyber user protective habits. Therefore, multivariate nificantly contributed to overall variance of the readiness to pro-
hierarchical regressions were conducted with behavior variables vide information (R2 = .107, p < .01). The results show that
as the dependent variables. In the first step, we entered country as readiness to provide information on the Internet was higher for
dummy variables (d_Israel, d_Poland and d_Slovenia) with respondents who live in Israel (β = .309, p < .01), Poland (β = .322,
Turkey as the comparison country. Gender was included in p < .01), and Slovenia (β = .096, p < .05) compared to those who
the second step, and in the last step, we entered the awareness live outside the respondent’s country. Turkey was also positively
variables. Table 3 shows the result of the multiple hierarchical associated with willingness to provide information (a = 1.793, p <
regression analysis of the protection variables in Model 8 and the .01), meaning that even in Turkey people are willing to disclose
information provided by the respondents in Model 9. We also information on the web. As such, we can assume that people today
conducted a regression analysis with the behaviors that respon- feel more secure providing information online – even when they
dents engage in when finishing working on their computer. are more aware of the cyber-attack potential. Gender was not
However, none of the stages in the regression was found to be significant, indicating that both male and female users are ready
significant. to provide the same amount of information. Surprisingly, aware-
Model 8 presents the results of the regression analysis con- ness of the cyber-attack problem was not associated with readiness
ducted with the behaviors that respondents used to protect their to disclose information (β = .008, p > .05). The interaction between
computer from cyber-attacks. The first step indicated that the country and awareness was not significant, and so was not
three countries made a significant contribution to the overall reported in the regression model (β = −.161, p > .05, for Israel; β
variances (R2 = .155, p < .01). The three countries were nega- = .056, p > .05 for Poland and β = .242, p > .05 for Slovenia).
tively associated with the protection behaviors. That is, Israeli Lastly, we tested if awareness also served as a mediator
(β = −.409, P < .01), Polish (β = −.294, P < .01), and Slovenian between knowledge and protection. Based on Baron and
respondents (β = −.012, P < .05) employed less protective Kenny’s model (1986), a connection was found between
measures compared to respondents in other countries. The respondent cyber knowledge and protection variables. The
exception was Turkish respondents, who used more protective first step of the regression analysis shows that knowledge
behaviors compared to respondents in other countries (a = was positively connected to protection (c = .233, p < .01).
5.693, p < .01). Even so, when we entered the rest of the In the second step, cyber knowledge was positively and
variables, the connection between Slovenian respondents and directly related with cyber security awareness (a = .317,
protection failed to be significant. Gender, entered in p < .01) and awareness was positively connected to protec-
the second step, was not significantly associated with protection tion (b = .300, p < .01). However, when the indirection
behaviors, meaning that no differences exist between males and effect was measured, the connection between knowledge
females concerning protection activities. However, entering and protection decreased (c´ = .153, p < .01), while the
awareness in the last step made a unique contribution to the connection between awareness and protection was positive
overall variance of protection behaviors (Chg. R2 = 5.3%, p < and significant (b = .233, p < .01). These results thus
.01). Awareness was found to be positively connected to pro- support our last hypothesis, that awareness (partially) med-
tection behaviors (β = .243, p < .01), indicating that higher iates the connection between knowledge and cyber protec-
awareness of cyber security resulted in extensive behaviors tion behaviors. That is, subjects with more device usage
10 ZWILLING ET AL.

knowledge were more aware of cyber hazards. This aware- insecure about the appropriate measures, and this can reduce
ness was connected to amount of protection methods and motivation to explore additional options. Indeed, we found that
measures used to protect their devices. As such, it is not knowledge of cyber and Internet usage was connected to protec-
just the amount of device usage; it is more the level of tion activities through the mediation of cyber security awareness.
awareness that determines their attempts to reduce the These results highlight the important role of cyber security
chances of cyber-attack. programs to motivate users to take proactive behaviors.
We also found a connection between awareness, knowledge,
and behaviors and the country of the respondent.2 Turkish
5. Discussion respondents viewed cyber security as very risky and threatening.
Israelis showed less concern, as did Poles. These findings can be
Research results show that internet users are aware of the term attributed to cultural differences. Israel is known as a cyber
“cyber security”. Therefore, respondents know that using the security innovation leader (Tabansky51) Israelis tend to “out-
internet may expose them to multiple threats: violation of privacy, source” their cyber security concerns to service providers and
loss of money or data, damage to devices, surveillance of them- organizations, confident in their technological sophistication to
selves or any organization to which they belong, etc. However, we ensure a safe internet environment. This may explain why
also found a discrepancy between respondent attitude and beha- Israelis were the least cautious information sharers and lowest
viors. As with previous studies (e.g. Imgraben et al.48; Rek and in cyber threat avoidance. Indeed, Tabansky51 describes Israel as
Milanovski49), we found that respondents take only basic and a country that continuously strives to develop cyberspace solu-
insufficient action such as using strong password protection and tions. Israel is one of the top five global superpower nations as
installing antivirus software. Only a minority engage in more ranked by the National Cyber Initiative (Sabilion et al.52). It can
sophisticated protection activities that require a deeper knowledge be reasonably claimed that many citizens in these countries are
of cyber security, such as avoiding using an open free network, under the mistaken impression that they have sufficient knowl-
performing computer security audits, or avoiding using public edge or defense tools to counter cyber risks. In fact, they tend to
computers. Since these activities are no costlier, the reason for this be less actively involved in daily mitigation of privacy and data
discrepancy remains unknown. While previous studies suggested and information leaks. In countries with less cyber security
that people avoid engaging in extensive cyber-attack precautions development, such as Turkey, cyber security awareness is more
(e.g. Rek and Milanovski49), we suggest that respondent cyber linked to the individual implementation of cyber protective
knowledge may explain this gap. behaviors. One explanation for the differences between Turkey
Our findings show that respondents with more computer and the other countries can be attributed to variations in ques-
science knowledge (recognition) had a higher positive connec- tionnaire language. As noted, the Turkish participants filled out
tion to cyber security awareness. However, specialization in the questionnaire in their native language, while all other sub-
computer science is not an option available to most people. jects used an English version. This difference may have produced
Still, we found that even partial attendance in a cyber security biases in response, especially if the non-Turkish students lack
program (d_attendance) or learning about cyber security during full reading comprehension in English. However, all non-
formal education (Edu_awareness) was positively connected to Turkish university students comprising our sample are required
level of cyber awareness. Since this connection was found after to possess high-level English language proficiency, and this dis-
controlling for respondent country of residence and gender, it crepancy can only explain part of the differences and should not
highlights the significant role of educational cyber security pro- be regarded as their main source. Even so, Turkey is well advised
grams to enlarge cyber-attack awareness. to develop its training programs in this field. Future comparative
On the other hand, no connection was found between degree research should focus on senior management cyber security
of awareness and the information that the subjects agreed to habits in the four evaluated countries. Thus, we claim that the
share on the internet as well as security-related activities when more a developed country (i.e., with substantial GDP value)
finishing work on the computer. This gap can be explained invests resources in cyber tools (such as Israel), the more its
through the Theory of Planned Behavior (TPB) (Fishbein and efforts should be directed to educating and increasing awareness.
Ajzen50) TPB claims that intention is the best predictor of any While mediation was found between (one type of) knowledge,
planned behavior. Therefore, if threats to computer security are awareness, and protection, we feel that there are other factors
taken seriously, then it is more likely that motivation will be that can explain why people do not protect their devices with
found to institute appropriate protective measures. Even so, more defenses. Using TPB (Fishbein and Ajzen50), more
behavior is also affected by elements such as the amount of self- research should explore the effects of psychological factors,
efficacy and controllability. As such, perception of situations as such as self-efficacy and national-cultural values (Hofstede53;
subject to control due to individual knowledge increases motiva- Klein and Shtudiner54) on internet user behaviors.
tion to act. Thus, we found that respondents with more cyber Organizations should also take more active as well as protective
security knowledge take more steps to prevent attacks, especially steps, in parallel with educational programs, such as configura-
when defense tools are simple and familiar to internet users. tion of cyber defense tools with organizational architecture to
When an action demands higher specialized knowledge, this increase the level of cyber security awareness among their
connection was found to be more complicated. People may be employees. Further studies should focus on capturing how beha-
aware of a hazard and want to protect their devices but feel viors of organizations affect employee cyber security awareness.

2
Differences analysis between respondents based on country also appear in Appendix A.
JOURNAL OF COMPUTER INFORMATION SYSTEMS 11

The urgency to reduce employee and individual cyber risks awareness, knowledge, and behavior, the questionnaire should
has only increased. As such, senior managers should build be retested to strengthen its reliability and validity. Future studies
practical training workshops and study programs with cyber should develop specific instruments to measure cyber security
awareness courses in order to: awareness and knowledge55. Although we measured this variable
using a single-item scale, multi-item scales were found to exhibit
a. Increase employee and student knowledge related to higher reliability. Even so, some researchers have suggested that if
cyber security attacks; a single-item question can elicit valuable information, its advan-
b. Cultivate new attitudes toward cyber risk and responsi- tage of simplicity can confer on its reliability and validity, even at
bility for maintaining organizational data; the expense of extensive detail (Bowling56). Still, more compre-
c. Translate awareness into action by decreasing human hensive instruments to assess cyber security awareness are desir-
factors resulting in cyber security vulnerabilities; and able. Moreover, this type of study should be conducted in
d. Develop new rules informing best cyber practices. Future additional countries that differ in their GDP values, with the
research should also focus on all aspects of this call to results compared to the current research.
action. In sum, our current reality is in many ways a cyber one. The
internet is deeply embedded in our daily life, and our dependency
on connected mobile devices seems likely to only increase. Yet
with growing dependency comes elevated risk of cyber-attack
6. Conclusions and future work
victimization. Future work should focus on exploring how specific
The study elaborates on the literature related to cyber security training programs based on our study findings improve levels of
awareness, knowledge, and behavior. To our knowledge, its novelty cyber knowledge, awareness and skill-based behaviors.
rests on it being the first to explore the factors relating to and level
of cyber security skills among individuals in various countries with
differing GDP values. Moreover, the study implicates level of cyber
Acknowledgments
hazard knowledge and exposure to risk to specific user traits This work was supported by the Ariel Cyber Innovation Center in
(gender, age, degree of using IT, etc.), concluding that specific conjunction with the Israel National Cyber directorate in the Prime
training programs should be developed by educational and aca- Minister's Office.
demic institutions. Since this is an initial study, we focused on
a comparative approach to evaluating cultural differences in cyber References
security awareness, knowledge, and behaviors. However, future
studies should isolate the roots of lack of cyber hazard awareness. 1. Aloul FA. The need for effective information security awareness.
Our research contributions may be classified into the fol- J Adv Inf Technol. 2012;3(3):176–83. doi:10.4304/jait.3.3.176-183.
2. Jalali MS, Siegel M, Madnick S. Decision-making and biases in
lowing categories: cybersecurity capability development: evidence from a simulation
game experiment. J Strategic Inf Syst. 2019;28(1):66–82.
● Elaboration on existing knowledge of cyber security doi:10.1016/j.jsis.2018.09.003.
awareness, knowledge, and behavior among individuals 3. Lee KG, Chong CW, Ramayah T. Website characteristics and web
from different countries; users’ satisfaction in a higher learning institution. Int J Manage
Educ. 2017;11(3):266–83. doi:10.1504/IJMIE.2017.084926.
● Economic need to invest in cyber security technology in 4. Maurseth PB. The effect of the Internet on economic growth:
developed countries with high GDP values (such as counter-evidence from cross-country panel data. Econ Lett.
Israel), since much of the population lacks the necessary 2018;172:74–77. doi:10.1016/j.econlet.2018.08.034.
tools and knowledge to protect against cyber hazards. 5. Abawajy J. User preference of cyber security awareness delivery
Even so, it is important to also invest in cyber training methods. Behav Inf Technol. 2014;33(3):237–48. doi:10.1080/
0144929X.2012.708787.
to change the perception of cyber hazards. 6. Furnell SM, Jusoh A, Katsabas D. The challenges of understanding
● Global need for comparative analysis derived from lack and using security: a survey of end-users. Comput Secur. 2006;25
of cyber security knowledge across cultures. Therefore, (1):27–35. doi:10.1016/j.cose.2005.12.004.
training programs should be developed with an interna- 7. Parsons K, McCormac A, Butavicius M, Pattinson M, Jerram C.
tional orientation, based on individual behavior rather Determining employee awareness using the human aspects of
information security questionnaire (HAIS-Q). Comput Secur.
than local and cultural expressions. 2014;42:165–76. doi:10.1016/j.cose.2013.12.003.
8. Schultz E. From the editor-in-chief: the human factor in security.
It is important to point out that this study has some limitations Comput Secur. 2005;24(6):425–26. doi:10.1016/j.cose.2005.07.002.
that should be taken into consideration. The limitation of this 9. Anwar M, He W, Ash I, Yuan X, Li L, Xu L. Gender difference
study lies mainly with the type of respondents. The sample size and employees’ cybersecurity behaviors. Comput Human Behav.
2017;69:437–43. doi:10.1016/j.chb.2016.12.040.
was based on students mainly from the social sciences, who 10. Herath T, Rao HR. Protection motivation and deterrence:
studied business IT or economics. To improve the study’s robust- a framework for security policy compliance in organisations. Eur
ness, it is recommended to use a wider sample size, one that is not J Inf Syst. 2009;18(2):106–25. doi:10.1057/ejis.2009.6.
considered a convenient sample and spans various disciplines. 11. Schneier B. Hacking the business climate for network security.
Another criticism can be derived from the measurement of the Computer. 2004;37(4):87–89. doi:10.1109/MC.2004.1297316.
12. Sasse MA, Flechais I Usable security: why do we need it? How do
variables. We used face validity in constructing the questionnaire, we get it? O’Reilly. 2005. http://discovery.ucl.ac.uk/20345.
relying on a team of experts to develop our survey tool. However, 13. Kshetri N. Cybersecurity and development. Markets Globalization
since this is one of the few studies to measure cyber security Dev Rev. 2016;1:2. doi:10.23860/MGDR-2016-01-02-03.
12 ZWILLING ET AL.

14. Vasiu I, Vasiu L. Cybersecurity as an essential sustainable eco- 35. Abawajy J, Kim TH. Performance analysis of cyber security awareness
nomic development factor. Eur J Sustainable Dev. 2018;7 delivery methods. Security technology, disaster recovery and business
(4):171–78. doi:10.14207/ejsd.2018.v7n4p171. continuity.In: Communication in computer and information science.
15. WorldBank Data. 2019. https://data.worldbank.org/indicator/NY. Vol. 122. Springer-Verlag; 2010. p. 142–48.
GDP.PCAP.CD. 36. Cain A, Edwards ME, Still JD. An exploratory study of cyber
16. Reid R, Van Niekerk J. Decoding audience interpretations of hygiene behaviors and knowledge. J Inf Secur Appl.
awareness campaign messages. Inf Comput Secur. 2016;24 2018;42:36–45. doi:10.1016/j.jisa.2018.08.002.
(2):177–93. doi:10.1108/ICS-01-2016-0003. 37. Safa NS, Von Solms R, Furnell S. Information security policy compli-
17. Klimburg A, editor. National cyber security framework manual. ance model in organizations. Comput Secur. 2016;56:70–82.
NATO Cooperative Cyber Defense Center of Excellence. 2012. doi:10.1016/j.cose.2015.10.006.
doi:10.1094/PDIS-11-11-0999-PDN. 38. McCormac A, Calic D, Butavicius MA, Parsons K, Pattinson MR,
18. Siponen MT. Five dimensions of information security awareness. Lillie M. Understanding the relationships between resilience, work
SIGCAS Comput Soc. 2001;31(2):24–29. doi:10.1145/503345.503348. stress and information security awareness. HAISA. 2017 Nov;
19. De Lange M, von Solms R. An e-safety educational framework in p.80–90.
South Africa. Proceedings of the Southern Africa 39. Hadlington L, Parsons K. Can cyberloafing and Internet addiction
Telecommunication Networks and Applications Conference affect organizational information security? Cyberpsychol Behav
(SATNAC); 2012 Sep. doi:10.1094/PDIS-11-11-0999-PDN. Social Networking. 2017;20(9):567–71. doi:10.1089/cyber.2017.0239.
20. Coopers P. Turnaround and transformation in cybersecurity. Key 40. Tischer M, Durumeric Z, Foster S, Duan S, Mori A, Bursztein E,
Findings Global State Inf Secur Surv. 2015;2016. Bailey M. Users really do plug in USB drives they find. 2016 IEEE
21. McCormac A, Parsons K, Butavicius M. Preventing and profiling Symposium on Security and Privacy (SP); 2016; IEEE, San Jose
malicious insider attacks (No. DSTO-TR-2697). Defence Science California, USA. p. 306–19.
and Technology Organisation Edinburgh (Australia) Command 41. McCrohan KF, Engel K, Harvey JW. Influence of awareness and
Control Communications and Intelligence Division. 2012. training on cyber security. J Internet Commerce. 2010;9(1):23–41.
doi:10.1094/PDIS-11-11-0999-PDN. doi:10.1080/15332861.2010.487415.
22. Parsons K, McCormac A, Butavicius M, Ferguson L Human factors and 42. Eminağaoğlu M, Uçar E, Eren Ş. The positive outcomes of information
information security: individual, culture and security environment. security awareness training in companies–a case study. Inf Secur
DSTO Technical Report (DSTO-TR2484). 2010 Oct. Techn Rep. 2009;14(4):223–29. doi:10.1016/j.istr.2010.05.002.
23. Schneier B. Secrets and lies: digital security in a networked world. 43. Pawlowski SD, Jung Y. Social representations of cybersecurity by
Indianapolis (IB): Wiley Publishing, Inc; 2000. university students and implications for instructional design. J Inf
24. Shropshire J, Warkentin M, Johnston A, Schmidt M. Personality Syst Educ. 2015;26:281–94.
and IT security: an application of the five-factor model. AMCIS 44. Son J, Bhuse V, Othmane LB, Lilien L. Incorporating lab experi-
2006 Proceedings; 2006 Dec 31, Acapulco, Mexico. p. 415 ence into computer security courses: three case studies. Global
25. McCormac A, Calic D, Parsons K, Butavicius M, Pattinson M, J Enterp Inf Syst. 2015;7:2.
Lillie M. The effect of resilience and job stress on information 45. Harris MA. Using bloom’s and webb’s taxonomies to integrate
security awareness. Inf Comput Secur. 2018 Jul 9;26(3):277–89. emerging cybersecurity topics into a computic curriculum. J Inf
doi:10.1108/ICS-03-2018-0032. Syst Educ. 2015;26:219–34.
26. McCormac A, Zwaans T, Parsons K, Calic D, Butavicius M, 46. Bong-Hyun K, Ki-Chan K. Development of cyber information
Pattinson M. Individual differences and information security security education and training system. Multimed Tools Appl.
awareness. Comput Human Behav. 2017;69:151–56. doi:10.1016/j. 2017;76(4):6051–64. doi:10.1007/s11042-016-3495-y.
chb.2016.11.065. 47. Shtudiner ZE, Klein G. The impact of gender and attractiveness
27. Saadatdoost R, Sim AT, Jafarkarimi H, Mei Hee J. Exploring on judgment of accountants’ misbehaviors. SSRN Electron J.
MOOC from education and Information Systems perspectives: doi:10.2139/ssrn.3391257.
a short literature review. Educ Rev. 2015;67(4):505–18. 48. Imgraben J, Engelbrecht A, Choo KK. Always connected, but are
doi:10.1080/00131911.2015.1058748. smart mobile users getting more security savvy? A survey of smart
28. Lehto M. Cyber security competencies: cyber security education and mobile device users. Behav Inf Technol. 2014;33(12):1347–60.
research in Finnish universities. ECCWS2015-Proceedings of the 14th doi:10.1080/0144929X.2014.934286.
European Conference on Cyber Warfare & Security: ECCWS 2015; 2015 49. Rek M, Milanovski BK. Mediji in srednješolci v Sloveniji.
Jul 1; Hatfield (UK): University of Hertfordshire, Academic Conferences Slovenija, Ljubljana: Fakulteta za medije [izdelava]. Slovenija
and Publishing International Limited. p. 179–88. (Ljubljana): Univerza v Ljubljani, Arhiv družboslovnih podatkov
29. Shaw RS, Chen CC, Harris AL, Huang HJ. The impact of infor- [distribucija]; 2017. IDNo: MPSS16.
mation richness on information security awareness training 50. Fishbein M, Ajzen I. Predicting and changing behavior: The rea-
effectiveness. Comput Educ. 2009;52(1):92–100. doi:10.1016/j. soned action approach. New York (NY): Psychology press; 2011.
compedu.2008.06.011. 51. Tabansky L. Critical infrastructure protection policy: the Israeli
30. Dodge RC Jr, Carver C, Ferguson AJ. Phishing for user security experience. J Inf Warfare. 2013;12:78–86.
awareness. Comput Secur. 2007;26(1):73–80. doi:10.1016/j. 52. Sabillon R, Cavaller V, Cano J. National cyber security strategies: global
cose.2006.10.009. trends in cyberspace. Int J Comput Sci Software Eng. 2016 May 1;5(5):67.
31. Kumaraguru P, Rhee Y, Acquisti A, Cranor LF, Hong J, Nunge E. 53. Hofstede G, Culture’s consequences: comparing values, behaviors,
Protecting people from phishing: the design and evaluation of an institutions and organizations across nations. London (UK): Sage
embedded training email system. Proceedings of the SIGCHI publications; 2001 Apr 20.
conference on Human factors in computing systems; 2007; 54. Klein G, Shtudiner ZE. Trust in others: does it affect investment
ACM, San Jose California, USA. p. 905–14. decisions? Qual Quant. 2016;50(5):1949–67. doi:10.1007/s11135-015-
32. Hadlington LJ. Employees attitudes towards cyber security and 0245-6.
risky online behaviours: an empirical assessment in the United 55. Zwilling M, Lesjak D, Natek S, Phusavat K, Anussornnitisarn P.
Kingdom. Int J Cyber Criminol. 2018;12:269–81. How to deal with the awareness of cyber hazards and security in
33. Pendley JA. Finance and accounting professionals and cyberse- (Higher) education?. In: Valerij D, editor. Thriving on future
curity awareness. J Corporate Accounting Finance. 2018;29 education, industry, business and society. Proceedings of the
(1):53–58. doi:10.1002/jcaf.v29.1. Makelearn and TIIM International Conference; 2019. p. 433–439.
34. Furnell SM, Bryant P, Phippen AD. Assessing the security percep- 56. Bowling A. Just one question: if one question works, why ask
tions of personal Internet users. Comput Secur. 2007;26 several? J Epidemiol Community Health. 2005;59:342–45.
(5):410–17. doi:10.1016/j.cose.2007.03.001. doi:10.1136/jech.2004.021204.
JOURNAL OF COMPUTER INFORMATION SYSTEMS 13

Appendix A

Table A1. Descriptive analysis of respondent characteristics (in percent).


Turkey Slovenia
(n = 153) (n = 35) Poland (n = 182) Israel (n = 89) Name of Variable
Gender:
48 71 53 49 Female
52 29 47 51 Male
Education year:
NA* 6 22 12 Do not have an academic
background
NA 3 44 15 First year Bachelor
NA 14 7 23.5 Second year Bachelor
NA 8 3 33 Third year Bachelor
NA 9 18 14 Master
NA 60 6 2.5 PhD
Type of studies:
NA 26 4 29 Full time study
NA 74 96 71 Part time study
*Not included in the survey for that specific country.
14
Appendix B

Table B1. Descriptive analysis of the total response.


General
results
Mean Poland-b Slovenia-c Turkey-d
Name of Variable Description/question (Sd.) Yes Israel-a (n = 89) (n = 182) (n = 35) (n = 153) F/Chi2
ZWILLING ET AL.

Awareness Are you familiar with the term cyber security (1- no knowledge to 4- very good (d > a,b; 2.40 2.39 2.16 2.57 2.65 F = 13.03**
c > b)’’ (.76) (.84)’ (.65) (.60) (.75)
Knowledge
Familiarity Familiarity of different sources – total score (range from 0 sources through 9 sources) 5.89 3.56 3.79 4.85 3.56 F = 6.67**
c > a,b,c)’’ (2.65) (1.91) (1.76) (2.36) (1.50)
Familiarity through- Internet sources2 (a > 1.96)ᵃ 81% 72% 39% 8% 35.5% X2 = 8.13*
Familiarity through-classes at the university (b,c,d > 1.96)ᵃ 29% 26% 40% 51% 12% X2 = 41.43**
Familiarity through- Traditional media (b,d > 1.96)ᵃ 45% 39% 34% 60% 57% X2 = 20.97**
Familiarity through-scientific journal (b,d > 1.96)ᵃ 15.5% 12% 9% 14% 25% X2 = 16.19**
Familiarity through-IT journals (a > 1.96)ᵃ 21% 11% 20% 34% 27% X2 = 11.78**
Familiarity through-Industry report 9% 7% 10% 17% 6% X2 = = 5.78
Familiarity through-Talking with friends 45.5% 46% 45% 60% 42% X2 = 3.55
Familiarity through-Social media (d > 1.96)ᵃ 60% 66% 65% 80% 46% X2 = 21.99**
Familiarity through-Victim of cyber attack 9% 10% 10% 3% 10% X2 = 1.88
Attendance
IT_past - Attendance in IT security training in the past (d < a,b)’’ 18% 25% 46% 7% 12% X2 = 26.86**
IT_future Would like to attend in IT security training. (1- definitely not to 5- definitely yes). (b < c,d)’’
3.68 3.65 3.46 3.97 3.90 F = 6.72**
(.99) (1.0) (.98) (.85) (.97)
Threats The main cyber security threats are-(scale 1-strongly disagrees to 5- strongly disagree) (d > a, 4.02 4.06 3.69 4.00 4.39 F = 26.69**
b,c; a > c)’’ (.76) (.88) (.64) (.86) (.63)
Threats- Blocking access to information (d > b)’’ 1.78 3.90 3.54 3.86 3.99 F = 5.18**
(1.25) (1.15) (1.07) (1.11) (1.06)
Threats-Violation of privacy (d > a,b)’’ 4.20 4.58 3.89 4.20 4.63 F = 17.05**
(1.00) (1.17) (.99) (.99) (.73)
Threats – Loss of data (d > a,b)’’ 4.17 4.09 3.8 4.20 4.56 F = 14.03**
(.99) (1.16) (1.02) (.90) (.70)
Threats-Loss of money (d > b)’’ 4.13 4.03 3.94 4.14 4.40 F = 5.81**
(1.04) (1.19) (1.02) (1.03) (.92)
Threats- Device damage (b < a,d)’’ 3.97 4.10 3.68 3.91 4.27 F = 10.51**
(1.02) (.97) (1.00) (1.06) (.96)
Threats- Spying people (b < a,d)’’ 4.14 4.28 3.77 4.09 4.51 F = 16.20**
(1.03) (1.10) (1.05) (1.09) (.77)
Threats-Spying organization (b < a,d)’’ 4.12 4.17 3.77 4.11 4.50 F = 13.84**
(1.06) (1.22) (1.07) (1.10) (.78)
Threats-Influencing the social choice elections (b < a,d)’’ 3.80 3.84 3.43 3.69 4.25 F = 17.51**
(1.08) (1.2) (.93) (1.10) (1.00)
Threats- takeover of devices (a > b; d < a,b,c)’’ 4.05 4.18 3.53 3.97 4.61 F = 35.64**
(1.06) (1.11) (.99) (1.20) (.75)
Threats-Blocking business process (d > b)’’ 3.96 4.21 3.50 4.14 4.31 F = 23.32**
(1.02) (.99) (.99) (.97) (.89)
Threats- Attack of IT infrastructures (d < a,b)’’ 4.02 4.00 3.63 4.03 4.50 F = 20.32**
(1.08) (1.27) (1.03) (1.09) (.78)
Threats- Use IT infrastructure for terrorist attacks (d < a,b)’’ 4.11 4.07 3.85 4.03 4.50 F = 12.08**
(1.04) (1.24) (1.01) (1.09) (.81)
Threats- knowing my personality details (d > a,b)’’ 4.10 4.08 3.79 4.09 4.48 F = 12.46**
(1.06) (1.10) (1.13) (1.14) (.066)
(Continued )
Table B1. (Continued).
General
results
Mean Poland-b Slovenia-c Turkey-d
Name of Variable Description/question (Sd.) Yes Israel-a (n = 89) (n = 182) (n = 35) (n = 153) F/Chi2
Threats- consumer behavior preferences (d > b)’’ 3.78 3.91 3.55 3.54 4.01 F = 5.93**
(1.10) (1.23) (1.09) (1.19) (.95)
Education awareness
Edu_awarness The extend in which the current education influenced their cyber-security awareness 3.33 3.15 3.03 3.40 3.78 F = 20.64**
(1-defintely not affected to 5- strongly affected) (.96) (.90) (1.06) (.95) (.66)
Recognition I usually recognize and know the differences between http and https protocol 51% 53% 54% 49% 46% X2 = 2.72
Provide Total sum of the amount of information that the responders provide in the web (scale 2.21 2.54 2.42 2.13 1.79 F = 18.10**
1-strongly disagree to 5- strongly disagree) (a > c,d)’ (.95) (.90) (1.06) (.95) (.66)
Provide- Home address (a > b,d)’’ 2.19 2.70 2.12 2.03 2.01 F = 5.35**
(1.38) (1.62) (1.36) (1.20) (1.22)
Provide- Age (a > b,d)’’ 3.34 3.90 3.21 3.43 3.13 F = 8.91**
(1.21) (1.22) (1.08) (.91) (1.32)
Provide- Personal phone number (d < a,c)’’ 2.15 2.44 2.33 1.83 1.85 F = 6.40**
(1.28) (1.32) (1.39) (1.12) (1.08)
Provide- Personal ID number (b > d)’’ 1.81 1.73 2.13 1.77 1.48 F = 8.19**
(1.23) (1.12) (1.44) (1.23) (.89)
Provide- Social network login (a > c; d < a,b,c)’’ 2.02 2.78 2.44 1.94 1.11 F = 49.67**
(1.36) (1.50) (1.39) (1.32) (.43)
Provide- E-Mail password 1.778 1.71 2.31 1.83 1.18 F = 25.10**
(d < a,b,c; b > a)’’ (1.27) (1.18) (1.49) (1.29) (.57)
Computer_knowledge Self-evaluation of skills and knowledge in using computer application (range from 1-no skills 3.35 3.25 3.50 3.16 3.27 F = 5.78**
(total sum) to 5- very high skills) (b > a,c,d)’’ (.65) (.70) (.59) (.60) (.66)
Self-evaluation in computer application (a > c)’’ 3.97 3.25 3.50 3.16 3.27 F = 5.78**
(.94) (.70) (.59) (.60) (.66)
Self-evaluation in – using smartphone/tablet applications (d < a,b)’’ 3.93 4.21 3.97 3.60 3.91 F = 4.00**
(1.10) (1.11) (1.02) (.73) (.75)
Self-evaluation in Computer architecture (a < b,d)’’ 2.9 4.26 4.01 3.74 3.68 F = 8.33**
(1.10) (1.08) (.93) (.85) (.83)
Self-evaluation in Network architecture(b > a,d)’’ 2.77 2.45 3.11 2.57 3.00 F = 9.40**
(1.07) (1.26) (1.04) (.94) (1.02)
Self-evaluation in Using text editor (a < b; d > a,b,c)’’ 3.82 2.37 3.05 2.66 2.69 F = 9.22**
(1.05) (1.27) (1.03) (.90) (.94)
Self-evaluation in – Using spreadsheet (b > a; d > a,c)’’ 3.52 3.12 3.81 3.63 4.29 F = 27.82**
(1.13) (1.42) (.89) (.80) (.74)
Self-evaluation in – Using web browser (a > b)’’ 3.96 2.94 3.59 3.20 3.84 F = 14.16**
(1.97) (1.40) (1.00) (1.07) (.96)
Self-evaluation in – Using an e-mail applications (b < a,d)’’ 4.02 4.26 3.85 3.74 3.97 F = 4.28**
(.93) (1.07) (1.03) (.78) (.84)
Self-evaluation in – Using internet communicators (b > d; d < a,c)’’ 3.71 4.18 3.81 3.97 4.20 F = 6.16**
(1.09) (1.12) (1.00) (.74) (.69)
Self-evaluation in – Using social networks (d < a,b)’’ 3.90 3.81 3.97 3.83 3.30 F = 11.71**
(1.04) (1.22) (.98) (.78) (1.09)
Self-evaluation in database software (b > a,d)’’ 2.97 4.34 3.98 3.86 3.56 F = 11.60**
(1.13) (1.01) (.95) (.94) (1.08)
Self-evaluation in – Using graphics packages (b > a,d)’’ 2.60 2.64 3.25 2.71 2.88 F = 7.41**
(1.14) (1.36) (.95) (1.04) (1.14)
Self-evaluation in – Using application development environments (b > a,c,d)’’ 2.44 2.25 2.97 2.40 2.42 F = 11.34**
(1.17) (1.21) (1.03) (1.06) (1.14)
JOURNAL OF COMPUTER INFORMATION SYSTEMS

Self-evaluation in – Web pages development (d < a,b)’’ 2.42 2.16 2.88 2.23 2.13 F = 15.72**
(1.19) (1.23) (1.04) (1.06) (1.15)
(Continued )
15
16

View publication stats


ZWILLING ET AL.

Table B1. (Continued).


General
results
Mean Poland-b Slovenia-c Turkey-d
Name of Variable Description/question (Sd.) Yes Israel-a (n = 89) (n = 182) (n = 35) (n = 153) F/Chi2
Behavioral
Behavioral I know how to behave in case of cyber-attack (on a scale from 1- defiantly no to 5-rather yes.) 3.14 3.07 3.18 3.17 3.12 F = .237
(a < b,c,d)’’ (1.19) (1.19) (1.09) (1.20) (1.08)
Choice Is the use of technology products coming from your desire or by coercion (1-dfinitely by 3.15 3.40 3.03 3.11 (not F = 3.66*
coercion to 5- definitely by choice (a > b))’’ (1.09) (.98) (1.10) (1.02) included)
Protection Sum of the score in the usage that the responders make to protect their instrument (ranged 4.72 3.50 4.42 5.60 5.69 F = 27.83**
from 0 to 11) (a < b,c,d; b < c; d > a,b)’’ (2.11) (1.87) (1.71) (2.39) (2.14)
Protect- strong password 85% 81% 83% 94% 88% X2 = 4.92
Protect- frequent password change 57% 41% 37% 40% 53% X2 = 8.85
Protect-Updating software (a > 1.96)ᵃ 56% 29% 45% 60% 48% X2 = 12.77**
Protect-Backup (a,b,d > 1.96)ᵃ 61% 26% 22.5% 54% 63% X2 = 68.81**
Protect- antivirus software (a,d > 1.96)ᵃ 75% 42% 76% 91% 89% X2 = 73.89**
Protect- Spam protection (a,d > 1.96)ᵃ 45% 26% 41% 54% 59% X2 = 27.27**
Protect- avoid using a public computer (d > 1.96)ᵃ 35.5% 25% 30% 40% 47% X2 = 15.96**
Protect- avoid using an open networks (b,d > 1.96)ᵃ 29% 26% 20% 23% 43% X2 = 23.44**
Protect-Taking part in cyber security courses (b,c,d > 1.96)ᵃ 11% 10% 17% 3% 0.7% X2 = 29.30**
Protect- Performing computer security audits 15.5% 15% 15% 17% 16% X2 = .270
Protect- avoid installing applications from unknown source (d > 1.96)ᵃ 47% 31% 55% 63% 62% X2 = 23.29**
Length The average length of your standard password (minimum 0 to maximum −14) 9.99 8.99 10.62 10.49 9.67 F = 1.99
(5.47) (5.72) (7.05) (3.85) (2.71)
Password Do you use the same password for different portals, system and application (c > 1.96)1 56% 63% 53% 34% 61% X2 = 10.79*
Finish Sum of the activities that the responders are acting when finish working on the computer 1.50 1.32 1.55 1.98 1.54 F = 2.11
(range from 0 to 4) (.75) (.67) (.78) (.88) (.69)
Finish – Turn off only the monitor (a > 1.96)ᵃ 14% 28% 11% 20% 10% X2 = 13.19**
Finish – Turn off the computer system(a,d > 1.96)ᵃ 66% 45% 66% 57% 80% X2 = 31.57**
Finish – Leave the computer on (d > 1.96)ᵃ 10% 11% 14% 17% 3% X2 = 15.09**
Finish – Log off all program 51% 42% 58% 43% 50% X2 = 7.38
Finish – Lock the computer system 19% 21% 21% 29% 14% X2 = 4.82
‘‘‘When I finish working in my or other computer I- I do nothing (d > 1.96)ᵃ 4% 2% 7% 9% 1% X2 = 8.39*
Note: ‘Standard deviation appears in the parentheses; ‘‘ the parentheses indicated the source of the differences according to Scheffepost hoc analysis test.
2
For the categorial variables, the results indicate the percentage of responders that agree with that sentence from that country; ᵃ the results in the parentheses indicate that the standardized residual of that country was
greater than the critical value (1.96), supporting a specific finding that they were different from the expected results. ‘‘‘excluded from the calculation of the total score of the finished item.
*p < 0.05; **p < 0.01.

You might also like