8,382
Views
10
CrossRef citations to date
0
Altmetric
Articles

Inequality in digital skills and the adoption of online safety behaviors

ORCID Icon &
Pages 712-728 | Received 06 Sep 2017, Accepted 11 Jan 2018, Published online: 06 Feb 2018

ABSTRACT

Cyber-safety behaviors are important in preventing the loss of an individual's digital assets and ensuring the safety of important daily online activities. Individuals’ cyber-safety is also critical for national cybersecurity. The issue is highly relevant for Israel, a country that relies on the digital capabilities of its workers for its major technology industries and is also often a target of cyberwarfare and cybercrime attacks. The purpose of this study is to identify the determinants of cyber-safety behavior. We investigate the role of age, gender and education in the use of safety-related digital skills and antivirus software. Using a 2014 survey of a national sample of Internet users in Israel (N = 1850), we found that age, gender, education and quality of access are associated with the level of users’ digital security skills. In addition, these skills and the frequency of conducting financial activities online are the main determinants of antivirus behaviors. Our results expand the understanding of cyber-safety by showing that social and digital disparities are reproduced in the use of measures to prevent online threats, putting the digitally disadvantaged at greater risk of becoming victims of online threats.

1. Introduction

The goal of this study is to investigate the determinants of both safety-related digital skills and behavior designed to prevent cyber-victimization. By focusing on preventive behaviors and their link with digital inequalities, the study seeks to identify at-risk populations and pave the way towards improving cyber-safety without reducing people's participation in online opportunities and the benefits of a connected life (Livingstone & Helsper, Citation2013).

Concerns have been growing about the vulnerability of mobile and Internet users to malicious software (malware)threats, fraudulent online scams and identity theft that might lead to substantial economic damage (Anderson et al., Citation2013; Levi, Citation2017; McGuire & Dowling, Citation2013b). This study focuses exclusively on Internet users who use the Internet through their personal devices as opposed to those who access it only through devices at work. These users have fewer cyber protection guidelines and access to software than people in organizational settings (Kritzinger & von Solms, Citation2010).

The cyber-victimization of personal Internet users has direct and indirect social consequences. In the former category are effects on personal belongings including hardware, software and/or bandwidth underperformance, theft from bank accounts or unauthorized access to devices and private information (Clough, Citation2010). Indirect impacts are those that affect their social and affective lives including the loss of trust in e-commerce (thus reducing e-purchases and the adoption of e-services), loss of trust in websites, increased the difficulty in communicating with banks and threats to the national infrastructure (Anderson et al., Citation2013). These outcomes may lead to data and financial losses, forced disclosure of private information and hijacking of digital devices that are later used against third parties (Liang & Xue, Citation2010).

This topic is of particular concern for Israel, a country that has been involved in almost constant military conflict and today faces a new threat ‒ cyberwarfare (Cohen, Freilich, & Siboni, Citation2016). The issue of cybersecurity became salient in Israel during the early 1990s and was concerned initially with protecting computerized systems only (Baram, Citation2017). However, over the years this focus expanded to more general threats to networks, the national infrastructure and individuals, including protection from identity theft, denial of services and malware (Baram, Citation2017).

We limit the scope of our investigation to this last type of cyber threat: malware. Malicious software (malware) is a term used to describe different kinds of software that threaten the functionality, integrity and/or security of a device or network (Rowe, Halpern, & Lentz, Citation2012). Malware-related cyber-crimes are directed against different types of digital property: personal data, digital currency, the control of devices or the devices themselves (Yar, Citation2013). They are often classified as a pure type of computer-focused crime, meaning offenses that can be committed only through the use of digital devices (McGuire & Dowling, Citation2013b). An initial malware infection can glean data that can be used in scams, identity thefts and extortion in ransomware-like threats (McGuire & Dowling, Citation2013a).

Online victimization affects a substantial percentage of Internet users (Levi, Citation2017). Malware episodes are the most common negative experiences reported in cyber-victimization surveys, both for businesses and individual users (Dunahee & Lebo, Citation2016; McGuire & Dowling, Citation2013b). A study in the European Union found that 12% of Internet users reported having experienced online fraud and 8% were victims of identity theft (European Union, Citation2012). In a survey in the United Kingdom 29% of Internet users reported that their personal computers had been infected and 6% had their credit card details stolen (Blank & Lutz, Citation2016). The World Internet Project, a comparative worldwide study on Internet usage, found that large percentages of the population globally reported being victims of virus-infected software. Reports ranged from 30% to 55% in Australia, Italy, New Zealand, Spain, the US and Uruguay (Dunahee & Lebo, Citation2016). Thus, the study of the determinants of digital safety behavior among personal Internet users is a research topic that merits attention.

In studying digital safety, we argue that, like any other social behavior, the adoption of actions to prevent online threats is affected by one's standing in the social stratification system. Socio-demographic inequalities affect the adoption of technology, as well as the development of technological skills and online literacy (Robinson et al., Citation2015; Witte & Mannon, Citation2010).

1.1. Digital disparities

The research on digital inequalities studies variances in socioeconomic groups with regard to their access to and use of technologies, and the extent to which these differences affect their offline and online welfare (Van Deursen, Helsper, Eynon, & van Dijk, Citation2017). Such disparities are not disconnected from traditional social structures and appear to be a by-product of social status in society (Ragnedda & Muschert, Citation2015; Robinson et al., Citation2015).

The core of the digital inclusion literature agrees with the notion that an ‘ … improved uptake and engagement with ICTs leads to a range of positive outcomes for the individual and society’ (Livingstone & Helsper, Citation2013). However, two contrasting theoretical perspectives propose different scenarios for how this mechanism functions (Norris, Citation2001; Van Deursen et al., Citation2017). The technological diffusion normalization model expects that technological expansion will eventually follow a normalization pathway and end with the pervasiveness of ICT in all countries and segments of society. In contrast, the stratification hypothesis or the stratification model of diffusion of technologies proposes that social groups and countries with pre-existing advantages derived from older socioeconomic stratifications will maintain their edge in the digital economy even as the digital uptake increases worldwide (Norris, Citation2001; Van Dijk, Citation2005; Van Deursen et al., Citation2017).

In line with the stratification hypothesis, we argue that, far from disappearing, disparities in access to and use of technology are reproducing themselves and even exacerbating inequalities in the physical world. By doing so, they are impeding the ability of the digitally disadvantaged to participate in society, access resources and accumulate social capital (Hargittai, Citation2008; Witte & Mannon, Citation2010).

1.2. Digital safety as a capital-preserving consequence of digital engagement

As Van Deursen et al. (Citation2017) argue, within the literature there is a normative assumption that certain types of Internet activities are more beneficial than others because they increase people's resources and opportunities. This phenomenon is referred to in the literature as the capital-enhancing consequences of Internet usage (Van Ingen & Matzat, Citation2017; Zillien & Hargittai, Citation2009).

We maintain that online safety behavior is a capital-enhancing consequence of Internet use that requires the adoption of preventive behaviors. Compared to other types of preventive behaviors, digital precautions are cognitively more complex to perform, requiring the acquisition of specialized and technical human capital (Weinstein, Citation1987). Skilled users will be more knowledgeable about how to avoid the risks or problems involved in surfing the Internet (Livingstone & Helsper, Citation2010).

The centrality of digital skills in social and digital inequality has already been firmly established (Correa, Citation2016; Van Dijk, Citation2005). Also referred to in the literature as Internet skills, e-skills and certain types of digital literacy, digital skills are a broad concept describing different sets or types of abilities related to the knowledge of the digital world (Bawden, Citation2008; Cobo, Citation2009; Van Deursen, van Dijk, & Peters, Citation2011). We define digital skills as both the basic abilities required to operate digital systems and also the skills needed to understand and use the Internet's online content. This study will primarily address the first of these components, because we are concerned with operational-level knowledge related to safety or security online.

Based on this view, socio-demographic factors such as education, age and gender are antecedents of both these skills and behaviors. We expect that specific traits of online lifestyles such as access, experience and variety of tools used, the frequency of use of certain Internet activities, and the level of digital security skills will also affect the adoption of preventive behaviors designed to thwart malware.

Moreover, similar to Büchi, Just, and Latzer (Citation2016) and Park (Citation2013), we argue that the integration of digital security skills as an independent variable is critical to the understanding of the use of online protective measures. Having the necessary skills and knowledge to engage in a cyber-safety behavior can help users avoid cyber-victimization, reducing the odds of negative outcomes such as the theft of data, money or personal information.

Preliminary evidence about cyber-safety behaviors seems to support this view. A study conducted in the US in 2013 established that frequency of Internet use and knowledge about how the Internet works were positively correlated with the installation of antivirus software on personal devices (AARP, Citation2014). Using a national sample of adult American Internet users, Park (Citation2013) found that age and gender were the main demographic predictors of privacy-related skills and knowledge. The number of years since starting to use the Internet and the diversity of Internet access points were the variables that most affected these specific knowledge and skills. In a study conducted in Switzerland, Büchi et al. (Citation2016) determined that whereas experiences with having one's privacy violated online and attitudes towards privacy were crucial to behaviors designed to protect one's privacy, Internet skills ‘ … best explain the extent to which users actively protect their privacy online’ (p. 19). Similarly, Litt and Hargittai (Citation2014) argued that among university students in the US, differences in Internet skills played an important role in the management of digital privacy, particularly concerning turbulent online experiences.

While these studies provide some indication of the role played by socioeconomic status with regard to cyber-safety, aside from Park (Citation2013) and Büchi et al.’s (Citation2016) works focusing on online privacy protection, no study has tested a comprehensive perspective such as the one presented here linking social status and privacy-related skills as determinants of digital safety behavior. Our study seeks to close this gap in the literature.

1.3. Research hypotheses

Our study has two research goals. First, we try to identify the main determinants of digital security skills. Whereas it is reasonable to expect a pattern of determinants of safety-related skills similar to those evident in more general or previous digital skills scales, recent studies showed that certain types of Internet skills might have slightly different socioeconomic and digital antecedents (Van Deursen et al., Citation2017). Younger, better-educated individuals who have access to more resources tend to have more sophisticated skills, particularly operational ones (Reynolds & Stryszowski, Citation2014; Van Deursen et al., Citation2017; Van Deursen & van Dijk, Citation2015a). Age has emerged as one of the strongest single predictors of Internet use and skills (Blank & Groselj, Citation2015). More specifically, digital skills correlate negatively with age, reflecting historical differences in the ICT socialization of different cohorts during their childhoods.

Gender is an important demographic factor that is associated with digital skills (Van Deursen et al., Citation2011). Even if the gender gap may have closed in terms of access to the Internet, digital inequalities still prevail in the frequency of use, range of online activities and self-reported digital skills (Robinson et al., Citation2015). Specifically, men tend to report higher levels of technical digital skills than women (Van Deursen et al., Citation2017).

Witte and Mannon (Citation2010) also found that education is positively related to digital skills. The higher the education, the higher the level of Internet skills.

Given the existing literature, we posit:

H1: Based on the digital inequalities literature, we expect that age, gender and education will affect the level of digital security skills and preventive antivirus behaviors. Men, younger users and better-educated individuals will have higher levels of digital security skills and will be more likely to engage in preventive antivirus behavior than women, older individuals and the less educated population.

Digital skills might be associated with the quality and type of access to the Internet. Given that our study refers to Internet users only, we employ Livingstone and Helsper’s (Citation2010) conceptualization of quality of access to refer to the diversity of the types of devices used to access the Internet and the number of years since they started using the Internet (seniority online). Seniority online is assessed as a proxy of how long the user has had to acquire habits and assets online (Van Deursen et al., Citation2011), digital security skills among them. In other words, the longer their time online the greater the chances of proper digital socialization and the acquisition of the skills needed to engage in a preventive cyber-safety behavior. Similarly, the variety of devices from which users access the Internet has a positive effect on their digital socialization and knowledge due to their exposure to different platforms and interfaces (Van Deursen & Van Dijk, Citation2015b). Therefore, we hypothesize:

H2: The more diverse the types of devices used to access the Internet and the earlier the first access to the online world, the higher the level of digital security skills and the greater the engagement in antivirus behaviors.

Certain uses of the Internet may produce better returns than others (Correa, Citation2016; Van Deursen et al., Citation2017). We propose that the frequency of activities related to e-banking and e-commerce may also affect the use of antivirus software. We argue that e-currency-intensive Internet users will probably have more contact with and exposure to institutions concerned about online safety such as banks and credit card issuers. We will use other activities such as social networking and information seeking as control variables, but we do not expect them to be correlated with safety behaviors.

Thus, we predict that:

H3: A more intensive use of online financially related activities will increase the engagement in antivirus behaviors.

Finally, as previously argued, we propose that there is a link between protective digital skills and cyber-safety behaviors. Digital security skills are a type of human capital that is required in order to be able to engage in cyber-safety behaviors. While difficult to measure in non-experimental settings, the digital skills research presents compelling evidence that it is possible to measure an individual's self-reported digital abilities through the use of questionnaires as an extremely good proxy of actual technological skills (Hargittai & Hsieh, Citation2012; Van Deursen et al., Citation2017). Therefore, we posit:

H4: Users who report having digital security skills are more likely to engage in antivirus behaviors.

2. Method

2.1. Sample

The survey on which this article is based is part of a larger project on the ‘Antecedents and Consequences of Cyber-Victimization among Personal Internet Users’ and was designed specifically to study preventive behaviors online. An academic company conducted a telephone survey of a national sample of the Israeli population (18 years old or older) in October 2014, collecting 1850 interviews. The sample is representative of all Israeli adults who use the Internet on their personal devices, and consists of landline and mobile telephone subscribers (stratified by localities, proportional to their size). The questionnaire was designed to ensure that the longest logical path of questioning was approximately 20 minutes. The final response rate was 38%. Resulting data were compared to that of the Israeli Central Bureau of Statistics on critical parameters (i.e., basic demographics such as age and education) to control for unwanted biases, but the differences were not significant.

2.2. Measures

2.2.1. Antivirus behavior

We chose anti-malware-related behavior as the main safety behavior to study for several reasons. The literature usually discusses antivirus software and anti-malware as the leading countermeasures against cyber-attacks (Rowe et al., Citation2012). Moreover, it is the most studied online preventive behavior (e.g., Choi, Citation2008). We measured the original variables by asking the respondents directly if they had engaged in any of three different types of behavior in the past year: installed or updated antivirus software on their personal computers, installed or updated antivirus software on their mobile devices and scanned a file they had received with antivirus software before opening it. Responses were made on 5-point Likert scales ranging from ‘not at all’ to ‘very frequently’ as response categories. Nevertheless, given that antivirus behavior can be pre-scheduled or automated, we added an additional response category to the variable (‘automatic update’), when we changed the measurement level of the variable from ordinal to nominal.

Due to this quasi-ordinal nature of the original variables, we used a categorical variables-specific technique called categorical principal component analysis (CATPCA) to reduce the data and create a linear summary of antivirus engagement. Only the first dimension was retained. This dimension can be interpreted linearly as having more engagement in antivirus behavior and accounted for 60.9% of the variance of the original variables. It had a Cronbach's alpha of .679.

2.2.2. Digital security skills

Whereas the literature on skills focused initially on the characterization and empirical measurement of different types of digital skills (i.e., see Hargittai, Citation2005; Van Dijk, Citation2005), a more recent wave of studies has been concerned with standardizing and testing such measures across national populations (see Van Deursen et al., Citation2016). Respondents were asked to rate their abilities such as knowing how to install antivirus software, update it, set up mobile security, use an anonymous browser, delete browsing the history and cookies and identify executable files (some of these items are also present in Park’s (Citation2013) privacy-specific scale). Respondents rated their ability to perform such tasks on a 5-point Likert scale ranging from ‘unable to perform the task/operation at all’ to ‘very capable of performing the task’. The 5-point scale is common in other web-use skills scales (Hargittai & Hsieh, Citation2012; Van Deursen et al., Citation2016). In addition, based on Van Deursen, Helsper, and Eynon (Citation2016), we converted a specific category of missing values (‘I do not understand what you mean by that’) to zero, assuming that the lack of knowledge regarding a particular action indicated the lack of the skill. A principal component analysis of the six measured digital security skills was conducted to create the dependent variable (Cronbach's alpha = .86).

2.2.3. Socio-demographic status

We assessed this factor with traditional sociological variables such as age, gender and education. We determined age by asking respondents for their birth year and then subtracted their answer from the year in which the survey was conducted. Gender was recoded as a binary variable (1 = male; 0 = female), and education was measured as years of formal education completed as reported by the respondent.

2.2.4. Quality of Internet access

We used two indicators to measure the quality of access. The first one was created as a composite index (the simple sum) of all the devices through which users accessed the Internet (shared computer, personal computer, tablet and smartphone), regardless of their frequency of use. This approach, generally known in the literature as the autonomy of use (Hargittai & Hinnant, Citation2008), was employed here in a manner similar to Livingstone and Helsper’s (Citation2010) measurement of access by totaling the number of locations from which users connected to the Internet. The second indicator was seniority of use or the years since the respondent started using the Internet (ultimately dichotomized as less than six years or six years or more due to a severely skewed distribution towards higher values).

2.2.5. Frequency of Internet use

We measured this factor with two indicators. The first was general frequency of Internet use in the last three months (from once a week at most to more than eight hours every day). The second indicator was comprised of the frequency of engaging in potentially capital-enhancing activities: social networking, information seeking, e-commerce and e-banking. Responses were made on 5-point Likert scales ranging from ‘not at all’ (1) to ‘very frequently’ (5) as response categories. We opted to use individual activity indicators in order to determine whether more financial-related activities might affect safety behavior differently, as Hypothesis 3 argued. Following most of the best practices on ICT measurement in households and individuals (ITU, Citation2014), the phrasing of the questions and response categories of frequency of use accorded with previous Internet usage surveys (e.g., Dunahee & Lebo, Citation2016).

3. Results

3.1. Description of the sample

shows that the respondents’ average age was 46.91 years (SD 16.20), and men and women were almost equally represented (45.5% men). The average completed years of education for Israeli Internet users was 14.92 (SD 3.16). More than three quarters of the users started browsing the Net more than six years ago (78.3%) and on average used 2.93 (SD .93) different types of devices to do so. Regarding frequency of use in the last three months, 16.5% used the Web less than once a day, 32.2% went online every day but for less than an hour daily, 40.3% spent one to four hours a day online and 11.2% spent more than four hours a day on the Internet.

Table 1. Summary statistics of socio-demographic, security skills and Internet-related variables.

Using a scale where 1 equals to ‘not at all’, 2 to ‘not very frequently’, 3 ‘moderately’, 4 ‘frequently’ and 5 ‘very frequently’, the averages of the frequency of the different Internet activities in the last year was 1.92 (SD 1.21) for making purchases online, 2.73 (SD 1.59) for bank transactions, 2.84 (SD 1.59) for using online social networks and 3.87 (SD 1.22) for searching for information.

Using the same scale, the average rates for digital security skills ranged from 1.74 (SD 1.68) on how to use the incognito browser mode to 2.67 (SD 1.80) for being able to identify executable files, 2.86 (SD 1.77) for being able to set security settings on smartphones, 2.87 (SD 1.82) for installing antivirus software, 3.00 (SD 1.84) for updating antivirus software and 3.06 (SD 1.87) for being able to delete a browser's history or cookies.

As illustrates, the distributions of antivirus behavior were centered on extreme values. The mode of installing or updating antivirus software on the PC was 5 (very frequently) at 37.1%, but 25.7% said they did not do this at all (1). Scanning files before opening them was a less common behavior, where 1 (not at all) was the mode with 45% of the population. On the other hand, more than a fifth of the personal Internet users (23.1%) said this activity was automated for them on their devices. Regarding mobile devices, the situation was even more skewed, with more than half of the personal Internet users (59.5%) indicating that they did not engage in the behavior.

Table 2. Summary statistics of antivirus behavior.

As described in the measures section, in order create a valid scale of digital security skills and antivirus behavior, we conducted two separate data reduction analyses that enabled us to construct scales for each concept. The first of them was a principal component analysis of the six measured digital security skills. Only one dimension had an eigenvalue exceeding 1.0 (3.55) and accounted for 59.1% of the variance. A reliability analysis (Cronbach's alpha = .86) corroborated that the scale was a good fit with the data.

The development of an index for the antivirus behaviors was slightly more complex, because the variables that comprised the desired index (installed or updated antivirus software on PCs and mobile devices, and scanned files before opening them) were not completely ordinal in nature. Consequently, we conducted a CATPCA where the first dimension signaled on the procedure accounted for 60.9% of the variance.

3.2. Correlation between variables

presents the correlation matrix of the variables (after data reduction). As the theoretical model predicted, not only did antivirus behaviors and digital security skills share most of the correlations, but also most Internet use variables shared similar links with each other. Nevertheless, the strongest correlation of all was between digital security skills and antivirus behaviors (r = .51, p < .01).

Table 3. Pearson correlations between the variables used in this study.

With regard to the two dependent variables, whereas younger people seemed more likely to engage in preventive behaviors, the correlation with age was almost three times as strong for digital security skills (r = −.32, p < .01). Men were more likely to score high in both factors, as were those who had been using the Internet for more than six years and accessed it through more types of devices.

Regarding completed years of education, while the correlations were statistically significant and in the expected theoretical direction (positive), they presented the weakest relationship of all with the dependent variables.

3.3. Predicting digital security skills

Our first research objective was to test whether the predictors of this particular group of skills was similar to other Internet skills measured in the literature on digital inequality. Based on previous studies on digital skills (Van Deursen et al., Citation2017), we expected that education and quality of access would have an influence on digital security skills.

presents the results of an O.L.S. multivariate analysis predicting digital security skills. We performed the analysis in two steps. The first contained only socio-demographic characteristics, and the second added the quality of access to the Internet.

Table 4. Ordinary least squares (OLS) coefficients: digital security skills.

As shows, all of the variables were statistically significant in the expected direction. As Model 1 illustrates, young people, men and better-educated users tended to be more proficient than those who were older, female and less educated. With an explained variance of R2 = .213, socio-demographic status explained a considerable amount of the variance in security skills levels. Moreover, its role did not seem to disappear after the introduction of digital achievements (quality of access) into the model. While the strength of the β diminished, no variable lost its statistical significance, and age (β = −.320, p < .01) and gender (β = .251, p < .01) still had the highest standardized coefficients. The relationship between education and skills followed the expected direction, yet based on the literature we were expecting that traditional human capital would have a stronger effect on this particular factor (β = .112, p < .01, the lowest of all standardized coefficients).

Model 2 improved the explained variance up to an R2 of .279 (a statistically significant change for p < .01).The results of this model accord with the previous literature both with regard to the effect of different types of Internet access and the even stronger relevance of social status for digital skills (i.e., Van Deursen et al., Citation2017; Witte & Mannon, Citation2010).

With regard to quality of access, whereas both variables were statistically significant and positively related to the level of skills, having used the Internet for more than six years (β = .214, p < .01) was by far more relevant to the skills than the diversity of devices used (β = .141, p < .01).This finding accords with the digital socialization hypothesis about the effects that online seniority may have on skills.

3.4. Predicting antivirus behavior

To answer the second research question, we also conducted an O.L.S. multivariate analysis predicting antivirus behavior. The results, which appear in , show that while the relationship between social status attributes and preventive behaviors was similar to their association with skills, the strength of the coefficients was far weaker. The adjusted R2 (.052) was also substantially smaller for this model compared to the same regressors in the case of digital security skills.

Table 5. Ordinary least squares (OLS) coefficients: preventive antivirus behavior.

Model 2 for antivirus behavior replicated the full model of digital security skills and, again, the explained variance was still modest but higher than the structural variable model (adjusted R2 = .089, an increase of more than 70%). Age and gender were still significant, but their standardized effect was lower, and the differences in completed years of education were no longer statistically relevant. Instead, differences in quality of access seemed to explain the effect of education on antivirus behavior. Contrary to the skills regression model, seniority of use had the highest β of all regressors (.164, p < .01).

A third iteration of this O.L.S. regression introduced five indicators of frequency of Internet use of which only three were statistically significant. The increase in R2 was slightly lower (adjusted R2 = .115, an increase of close to 30% from Model 2). Whereas the differences in the frequency of social networking and information seeking did not seem to explain any statistically significant change in antivirus behaviors, the more frequent the use of the Internet as a whole in the last three months (β = .075, p < .01), online purchasing (β = .058, p < .05) and e-banking (β = .079, p < .01), the more likely respondents would engage in antivirus behaviors. As we hypothesized, it is probable that the online lifestyles of frequent users of e-banking and online currency may also place them in more regular contact with and make them more concerned about the wellbeing of their financial assets, prompting them to learn about safe practices and online risks.

Finally, Model 4 added digital security skills as the last independent variable. Not only did it substantially increase the explanatory potential of the model (adjusted R2 = .270, an increase of more than 125%), but it also eliminated the statistical significance of all of the socio-demographic regressors and practically all of the other digital ones as well. As hypothesized, the effect of the digital security skills factor was by far the strongest (β = .480, p < .01) of any of the models presented in this article. The only other two statistically significant variables in Model 4 were the frequency of e-banking (β = .049, p < .05) and the seniority of Internet use (β = .052, p < .05). In both of these variables familiarity or experience with and awareness of threats played a role as predictors of antivirus behaviors.

4. Discussion

Concerns about the vulnerability of Internet users are rising. Cyber-victimization is not only harmful to individuals and their wellbeing but may also have important consequences for national economies and infrastructure (Anderson et al., Citation2013; Levi, Citation2017; McGuire & Dowling, Citation2013b).

In this study, we investigated the extent to which socio-demographic differences are reflected in digital cyber-safety skills and assessed whether socio-demographic differences in these skills affect the engagement in antivirus behaviors. Two perspectives regarding the societal effects of technology expansion dominate the literature: the normalization and stratification models. These hypotheses differ in their expectations about the socioeconomic effects of the expansion of digital technologies: the former expects disparities to disappear in the course of normalization, whereas the latter proposes that pre-digital stratifications will prevail and solidify (Norris, Citation2001; Van Dijk, Citation2005).

Our findings provide evidence for the stratification model in the cyber-safety arena. Digital security skills and the engagement in antivirus behavior are unequally distributed among Israeli Internet users and have strong links with traditional social dimensions of inequality such as gender, age and education.

Nevertheless, our findings also seem to imply that these structural variables, as well as some Internet access and usage indicators, have a stronger and clearer effect on digital security skills than on antivirus behavior. Moreover, higher levels of digital security skills are by far the best predictors of engagement in such behavior. Not only are their standardized coefficients close to three times larger than any other constructs in this study (nine times, if we consider only preventive behavior as a correlate), but also after including them in the nested models the statistical significance of almost all of the other variables disappear.

These results indicate that socio-demographic differences influence the engagement in antivirus behavior. Our findings are also in line with recent findings related to other capital-enhancing consequences of Internet use and their relations with digital skills (Büchi et al., Citation2016; Van Deursen et al., Citation2017; Van Deursen & Van Dijk, Citation2015b).In addition, seniority of Internet access is an important determinant of both digital security skills and antivirus behavior, whereas e-banking is a good predictor of the latter. We believe that the mechanism behind their effect relies mostly on stratified experiences or familiarity with the online world, a factor that may help users improve their digital socialization and/or expose them to more information about both online risks and their possible countermeasures. This idea is consistent with previous studies about digital skills and the tangible outcomes of Internet use (e.g., Van Deursen & Van Dijk, Citation2015b).

These findings make several important contributions to two distinct and not always connected fields: studies on cyber-victimization and the digital divide. By refocusing the problem of cyber-safety on digital inequalities, we suggest a framework that can not only help governments and organizations identify digitally at-risk populations, but also provide recommendations that may help personal Internet users reduce their risk of cyber-victimization without reducing their opportunities to enjoy the benefits of a connected life. The focus should be on developing skills, not restricting use. As Livingstone and Helsper (Citation2010) argue, restricting Internet use to reduce risks is also very likely to limit digital development and opportunities. This is an even less viable alternative for a ‘start-up nation’ such as Israel that rely heavily on the digital capabilities of its workers for its major technology industries but are also involved in constant cyberwarfare and face the risk of cybercrime attacks. Cyber-victimization research does not generally consider the negative effects of usage restriction, nor does it regard digital security skills as one of the most crucial social components in preventing cyber-victimization.

From a digital inequalities perspective, the assessment of behaviors to prevent cyber-victimization contributes to the field by providing additional testing of the effects of digital disparities on the antecedents of cybersecurity skills. In terms of theory, our study expands existing knowledge on the behaviors that prevent cyber-victimization from the technological to the social perspective. Consistent with the stratification hypothesis, we found that social standing shapes not only the level of computer and Internet skills in general, but also the level of cybersecurity skills. Moreover, our findings show that digital security skills have predictors more akin to operational or technical factors than global ones (i.e., Correa, Citation2016). In this sense, a salient finding is that gender disparities in digital security skills still prevail, and age inequalities are even stronger than social or creative digital skills (i.e., Van Deursen et al., Citation2017).

We also demonstrated the central role of security skills in protective behavior, underscoring that protecting users online requires more than technology. Social structure affects individuals’ digital human capital, stratifying their chances of engaging in capital-enhancing activities such as protecting their digital assets and identity. Therefore, we urge the creation of programs for the socially disadvantaged and technologically less savvy that are designed to improve their digital safety.

If digital safety is understood as an outcome that could affect one's quality of life ‒ or at least prevent its reduction ‒ the study of its determinants and prevalence among diverse, digitally engaged populations provides additional empirical evidence about the consequences of cybersecurity inequalities, a dependent variable not previously addressed in this literature.

Furthermore, an important strength of the study is that it is based on a large sample of private Internet users, thereby avoiding the sample selection bias that is common in studies using college students. Our results support our proposed hypotheses and this conceptualization of digital safety.

4.1. Limitations of the study

Finally, the study does have some limitations that must be acknowledged. First, the same determinants of skills and preventive behavior have been shown to be the determinants of risks and victimization online. A more complex approach, similar to Livingstone and Helsper’s (Citation2010) comprehensive study of both safety-related benefits and risks, needs to be developed. Risks and benefits may not be polar opposites, because improving one's skills may require opening oneself up to new risks (Livingstone & Helsper, Citation2010). A more complex econometrical model integrating the two dependent variables analyzed here would also be recommended. Such a model would allow us to test the hypothesis that digital skills mediate the effects of socioeconomic attributes on cyber-safety outcomes (i.e., see Büchi et al., Citation2016; Van Deursen et al., Citation2017).

Finally, the use of more complex measures of socioeconomic status also needs to be considered in future studies. Besides the role of gender, age and education, household income, occupational status or stratification schemes could improve the testing of the stratification hypothesis with regard to digital safety outcomes.

Acknowledgement

This article was presented at ASA's 2017 meeting. The article's body, abstract and title were improved based on suggestions and comments from other conference participants.

Disclosure statement

No potential conflict of interest was reported by the authors.

Notes on contributors

Gustavo S. Mesch holds a PhD from The Ohio State University (US). He is a Professor of Sociology at the University of Haifa (Israel). His research interests are the Internet and society, computer-mediated communication, social capital and cybercrime [email: [email protected]].

Matias Dodel holds an MA degree in Sociology from Universidad de la Republica (Uruguay) and is a PhD candidate in the Department of Sociology, University of Haifa. He is a Professor and Head of the Research Secretary at the Universidad Catolica del Uruguay. His research deals with digital inequalities, social stratification, cybercrime and the risks and benefits of Internet use [email: [email protected]].

Additional information

Funding

This study was conducted with a grant from the Ministry of Science, Technology and Space[2-01802].

References

  • AARP. (2014). Caught in the scammer’s net: Risk factors that may lead to becoming an Internet fraud victim, AARP survey of American adults age 18 and older, database. Retrieved from http://www.aarp.org/research/topics/economics/info-2014/internet-fraud-victimization-attitudes-behavior-national.html
  • Anderson, R., Barton, C., Böhme, R., Clayton, R., van Eeten, M. J., Levi, M., … Savage, S. (2013). Measuring the cost of cybercrime. In R. Böhme (Ed.), The economics of information security (pp. 265–300). Berlin: Springer-Verlag.
  • Baram, G. (2017). Israeli defense in the age of Cyber war. The Middle East Quarterly, 24, 1.
  • Bawden, D. (2008). Origins and concepts of digital literacy. In C. Lankshear, & M. Knobel (Eds.), Digital literacies: Concepts, policies and practices (pp. 17–32). New York, NY: Peter Lang.
  • Blank, G., & Groselj, D. (2015). Digital divide examining Internet use through a Weberian lens. International Journal of Communication, 9, 2763–2783.
  • Blank, G., & Lutz, C. (2016). Benefits and harms from Internet use: A differentiated analysis of Great Britain. New Media & Society, 1–23. http://journals.sagepub.com/doi/pdf/10.1177/1461444816667135
  • Büchi, M., Just, N., & Latzer, M. (2016). Caring is not enough: The importance of Internet skills for online privacy protection. Information, Communication & Society, 20(8), 1267–1278.
  • Choi, K. S. (2008). Computer crime victimization and integrated theory: An empirical assessment. International Journal of Cyber Criminology, 2(1), 308–333.
  • Clough, J. (2010). Principles of cybercrime. Cambdrige: Cambridge University Press.
  • Cobo, C. (2009). Strategies to promote the development of e-competences in the next generation of professionals: European and international trends. SKOPE issues paper series.
  • Cohen, M. S., Freilich, C. D., & Siboni, G. (2016). Israel and cyberspace: Unique threat and response. International Studies Perspectives, 17(3,1), 307–321.
  • Correa, T. (2016). Digital skills and social media use: How Internet skills are related to different types of Facebook use among ‘digital natives’. Information, Communication & Society, 19(8), 1095–1107. doi: 10.1080/1369118X.2015.1084023
  • Dunahee, M., & Lebo, H. (2016). The world Internet project international report 6th edition. Center for the digital future. Los Angeles, CA: University of Southern California. Retrieved from http://www.digitalcenter.org/wp-content/uploads/2013/06/2015-World-Internet-Report.pdf
  • European Union. (2012). Special Eurobarometer 390, cyber security (Report).
  • Hargittai, E. (2005). Survey measures of web-oriented digital literacy. Social Science Computer Review, 23(3), 371–379. doi: 10.1177/0894439305275911
  • Hargittai, E. (2008). The digital reproduction on inequality. In D. Grusky (Ed.), Social stratification: Class, race, and gender in sociological perspective (pp. 936–944). Boulder: Westview Press.
  • Hargittai, E., & Hinnant, A. (2008). Digital inequality differences in young adults’ use of the Internet. Communication Research, 35(5), 602–621. doi: 10.1177/0093650208321782
  • Hargittai, E., & Hsieh, Y. P. (2012). Succinct survey measures of web-use skills. Social Science Computer Review, 30(1), 95–107. doi: 10.1177/0894439310397146
  • ITU. (2014). Manual for measuring ICT access and use by households and individuals (2014 ed.).
  • Kritzinger, E., & von Solms, S. H. (2010). Cyber security for home users: A new way of protection through awareness enforcement. Computers & Security, 29(8), 840–847. doi: 10.1016/j.cose.2010.08.001
  • Levi, M. (2017). Assessing the trends, scale and nature of economic cybercrimes: Overview and issues. Crime, Law and Social Change, 67(1), 3–20. doi: 10.1007/s10611-016-9645-3
  • Liang, H., & Xue, Y. (2010). Understanding security behaviors in personal computer usage: A threat avoidance perspective. Journal of the Association for Information Systems, 11(7), 394–413. doi: 10.17705/1jais.00232
  • Litt, E., & Hargittai, E. (2014). A bumpy ride on the information superhighway: Exploring turbulence online. Computers in Human Behavior, 36, 520–529. doi: 10.1016/j.chb.2014.04.027
  • Livingstone, S., & Helsper, E. J. (2010). Balancing opportunities and risks in teenagers’ use of the Internet: The role of online skills and Internet self-efficacy. New Media & Society, 12(2), 309–329. doi: 10.1177/1461444809342697
  • Livingstone, S., & Helsper, E. J. (2013). Children, Internet and risk in comparative perspective. Journal of Children and Media, 7(1), 1–8. doi: 10.1080/17482798.2012.739751
  • McGuire, M., & Dowling, S. (2013a). Cybercrime: A review of the evidence. Chapter1: Cyber-dependent crime (Home Office Research Report, 75).
  • McGuire, M., & Dowling, S. (2013b). Cybercrime: A review of the evidence. Summary of key findings and implications (Home Office Research Report, 75).
  • Norris, P. (2001). Digital divide: Civic engagement, information poverty, and the Internet worldwide. Cambridge: Cambridge University Press.
  • Park, Y. J. (2013). Offline status, online status: Reproduction of social categories in personal information skill and knowledge. Social Science Computer Review, 31(6), 680–702. doi: 10.1177/0894439313485202
  • Ragnedda, M., & Muschert, G. W. (2015). Digital divide Max Weber and digital divide studies – introduction. International Journal of Communication, 9(January), 6.
  • Reynolds, T., & Stryszowski, P. (2014). Skills and jobs in the Internet economy (OECD Digital Economy Papers No. 242).
  • Robinson, L., Cotten, S. R., Ono, H., Quan-Haase, A., Mesch, G., Chen, W., … Stern, M. J. (2015). Digital inequalities and why they matter. Information, Communication & Society, 18(5), 569–582. doi: 10.1080/1369118X.2015.1012532
  • Rowe, B., Halpern, M., & Lentz, T. (2012). Understanding cyber security risk preferences: A case study analysis inspired by public health research.
  • Van Deursen, A. J., Helsper, E. J., & Eynon, R. (2016). Development and validation of the Internet Skills Scale (ISS). Information, Communication & Society, 19(6), 804–823. doi: 10.1080/1369118X.2015.1078834
  • Van Deursen, A. J., Helsper, E., Eynon, R., & van Dijk, J. A. (2017). The compoundness and sequentiality of digital inequality. International Journal of Communication.
  • Van Deursen, A. J., & van Dijk, J. A. (2015a). Internet skill levels increase, but gaps widen: A longitudinal cross-sectional analysis (2010–2013) among the Dutch population. Information, Communication & Society, 18(7), 782–797. doi: 10.1080/1369118X.2014.994544
  • Van Deursen, A. J., & Van Dijk, J. A. (2015b). Toward a multifaceted model of Internet access for understanding digital divides: An empirical investigation. The Information Society, 31(5), 379–391. doi: 10.1080/01972243.2015.1069770
  • Van Deursen, A. J. A. M., van Dijk, J. A., & Peters, O. (2011). Rethinking Internet skills: The contribution of gender, age, education, Internet experience, and hours online to medium-and content-related Internet skills. Poetics, 39(2), 125–144. doi: 10.1016/j.poetic.2011.02.001
  • Van Dijk, J. A. (2005). The deepening divide: Inequality in the information society. Sage.
  • Van Ingen, E., & Matzat, U. (2017). Inequality in mobilizing online help after a negative life event: The role of education, digital skills, and capital-enhancing Internet use. Information, Communication & Society, 21, 421–498.
  • Weinstein, N. D. (1987). Cross-hazard consistencies: Conclusions about self-protective behavior. In N. D. Weinstein (Ed.), Taking care: Understanding and encouraging self-protective behavior (pp. 325–335). Cambridge: Cambridge University Press.
  • Witte, J. C., & Mannon, S. E. (2010). The Internet and social inequalities. New York, NY: Routledge.
  • Yar, M. (2013). Cybercrime and society. London: Sage.
  • Zillien, N., & Hargittai, E. (2009). Digital distinction: Status-specific types of Internet usage. Social Science Quarterly, 90(2), 274–291. doi: 10.1111/j.1540-6237.2009.00617.x

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.