1,677
Views
1
CrossRef citations to date
0
Altmetric
Original Articles

The Weakest Link: Employee Cyber-Defense Behaviors While Working from Home

References

  • Delegach M, Klein G, Katz-Navon T. Furlough and its effects on employees after returning to work: the roles of psychological contract breach and violation, and perceived organizational support. J Manage Organ. 2022;1–18. doi:10.1017/jmo.2022.71.
  • Kumar R, Sharma S, Vachhani C, Yadav N. What changed in the cyber-security after COVID-19? Comput Secur. 2022;120:102821. doi:10.1016/j.cose.2022.102821.
  • Wolinsky J. The importance of protecting work from anywhere employees against cyber-attacks. Ceoworld Magazine. [accessed 2022 Sep 13]. https://ceoworld.biz/2022/09/13/the-importance-of-protecting-work-from-anywhere-employees-against-cyber-attacks/.
  • Crossler RE, Johnston AC, Lowry PB, Hu Q, Warkentin M, Baskerville R. Future directions for behavioral information security research. Comput Secur. 2013;32:90–101. doi:10.1016/j.cose.2012.09.010.
  • Klein G, Zwilling M, Lesjak D. A comparative study in israel and slovenia regarding the awareness, knowledge, and behavior regarding cyber security. In: Khosrow-Pour M, editor. Research anthology on business aspects of cybersecurity. Hershey (PA): IGI Global; 2022. p. 424–39.
  • Goel L, Zhang JZ, Williamson S. IT assimilation: construct, measurement, and implications in cybersecurity. Enterp Inf Syst-Uk. 2022;17(7):1–30‏. doi:10.1080/17517575.2022.2052187.
  • Pandharipande A, Parashar R. Repercussions of coronavirus on cyber-security threats. Biosci Biotech Res Comm. 2020;13(14):45–48. doi:10.21786/bbrc/13.14/11.
  • Zwilling M, Klien G, Lesjak D, Wiechetek Ł, Cetin F, Basim HN. Cyber security awareness, knowledge and behavior: a comparative study. J Comput Info Syst. 2022;62(1):82–97. doi:10.1080/08874417.2020.1712269.
  • Ifinedo P. Effects of security knowledge, self-control, and countermeasures on cybersecurity behaviors. J Comput Inf Syst. 2023;63(2):380–96. doi:10.1080/08874417.2022.2065553.
  • Ajzen I. from intentions to actions: a theory of planned behavior. In: Kuhl J Beckmann J, editors. Action control. SSSP: springer series in social psychology. Berlin, Heidelberg: Springer Berlin Heidelberg; 1985. p. 11–39. doi:10.1007/978-3-642-69746-3_2.
  • Rogers RW. A protection motivation theory of fear appeals and attitude change1. J Psychol. 1975;91(1):93–114. doi:10.1080/00223980.1975.9915803.
  • Blythe JM, Coventry L, Little L. Unpacking security policy compliance: the motivators and barriers of employees’ security behaviors. In Eleventh Symposium On Usable Privacy and Security; July 22–24, 2015, Ottawa, Canada. 2015. p. 103–22.‏
  • Gillam AR, Foster WT. Factors affecting risky cybersecurity behaviors by US workers: an exploratory study. Comput Human Behav. 2020;108:106319. doi:10.1016/j.chb.2020.106319.
  • Maalem Lahcen RA, Caulkins B, Mohapatra R, Kumar M. Review and insight on the behavioral aspects of cybersecurity. Cybersecurity. 2020;3(1):1–18. doi:10.1186/s42400-020-00050-w.
  • Georgiadou A, Mouzakitis S, Askounis D. Working from home during COVID-19 crisis: a cyber security culture assessment survey. Secur J. 2022;35(2):486–505. doi:10.1057/s41284-021-00286-2.
  • Ajzen I. The theory of planned behavior: frequently asked questions. Human Behav Emerging Technol. 2020;2(4):314–24‏‏. doi:10.1002/hbe2.195.
  • Rogers RW. Cognitive and physiological processes in fear-based attitude change: a revised theory of fear appeals and attitude change. Social psychophysiology: a sourcebook. New York (NY): Guilford; 1983. p. 153–76.
  • Floyd DL, Prentice‐Dunn S, Rogers RW. A meta‐analysis of research on protection motivation theory. J Appl Soc Psychol. 2000;30(2):407–29‏. doi:10.1111/j.1559-1816.2000.tb02323.x.
  • Corallo A, Lazoi M, Lezzi M, Luperto A. Cybersecurity awareness in the context of the industrial internet of things: a systematic literature review. Comput Ind. 2022;137:103614. doi:10.1016/j.compind.2022.103614.
  • Herath T, Rao HR. Protection motivation and deterrence: a framework for security policy compliance in organizations. Eur J Inf Syst. 2009;18(2):106–25‏. doi:10.1057/ejis.2009.6.
  • Aldawood H, Skinner G. Analysis and findings of social engineering industry experts explorative interviews: perspectives on measures, tools, and solutions. IEEE Access. 2020;8:67321–9‏. doi:10.1109/ACCESS.2020.2983280.
  • Li L, He W, Xu L, Ash I, Anwar M, Yuan X. Investigating the impact of cybersecurity policy awareness on employees’ cybersecurity behavior. Int J Inf Manage. 2019;45:13–24. doi:10.1016/j.ijinfomgt.2018.10.017.
  • Hadlington LJ. Employees attitudes toward cyber security and risky online behaviors: an empirical assessment in the United Kingdom. Int J Cyber Criminol. 2018;12(1):262–74. doi:10.5281/zenodo.495776.
  • Daengsi T, Pornpongtechavanich P, Wuttidittachotti P. Cybersecurity awareness enhancement: a study of the effects of age and gender of Thai employees associated with phishing attacks. Educ Inf Technol. 2021;27(4):4729–52. doi:10.1007/s10639-021-10806-7.
  • He W, Ash I, Anwar M, Li L, Yuan X, Xu L, Tian X. Improving employees’ intellectual capacity for cybersecurity through evidence-based malware training. JIC. 2020;21(2):203–13. doi:10.1108/JIC-05-2019-0112.
  • Zhang Z, He W, Li W, Abdous MH. Cybersecurity awareness training programs: a cost–benefit analysis framework. Ind Manage Data Syst. 2021;121(3):613–36. doi:10.1108/IMDS-08-2020-0462.
  • Alshaikh M. Developing cybersecurity culture to influence employee behavior: a practice perspective. Comput Secur. 2020;98:1–10. doi:10.1016/j.cose.2020.102003.
  • Simonet J, Teufel S. The influence of organizational, social and personal factors on cybersecurity awareness and behavior of home computer users. ICT Systems Security and Privacy Protection: 34th IFIP TC 11 International Conference, SEC 2019, Lisbon 2019; June 25-27; Portugal: Proceedings. Springer International Publishing, 2019. p. 194–208.
  • Li L, He W, Xu L, Ivan A, Anwar M, Yuan X. Does explicit information security policy affect employees’ cyber security behavior? A pilot study. Enterprise systems conference: IEEE 2014 Aug 2; Shanghai, China. p. 169–73.
  • Chowdhury NH, Adam MT, Teubner T. Time pressure in human cybersecurity behavior: theoretical framework and countermeasures. Comput Secur. 2020;97:101931‏‏. doi:10.1016/j.cose.2020.101931.
  • Borkovich DJ, Skovira RJ. Working from home: cybersecurity in the age of COVID-19. Issues Info Syst. 2020;21:234–46.
  • Sadler T. State of data loss prevention; 2020. Tessian Report. https://www.tessian.com/resources/#report/.
  • Albrechtsen E, Hovden J, Stølen K. Investigating employees’ information security behavior: a literature review. Comput Secur. 2018;76:144–59.
  • Kim S, Kim D, Jang D, Lee C. The relationship between cybersecurity knowledge and information security behavior: an empirical investigation among South Korean employees. Inf Manage. 2020;57:103250.
  • He W, Zhang Z. Enterprise cybersecurity training and awareness programs: recommendations for success. J Organ Comput Electron Commerce. 2019;29(4):249–57‏. doi:10.1080/10919392.2019.1611528.
  • Anwar M, He W, Ash I, Yuan X, Li L, Xu L. Gender difference and employees’ cybersecurity behaviors. Comput Human Behav. 2017;69:437–43‏. doi:10.1016/j.chb.2016.12.040.
  • Levene H. Robust tests for equality of variances. Contrib Probab Stat. 1960;278–92.
  • Spremić M, Šimunic A. Cyber security challenges in digital economy. In: Proceedings of the World Congress on Engineering. Vol. 1. Hong Kong, China: International Association of Engineers; July 2018. p.‏341–46.
  • Housen-Couriel D. National cyber security organisation, Israel. Washington (DC): NATO Cooperative Cyber Defence Centre of Excellence; 2017.
  • Podsakoff PM, MacKenzie SB, Lee JY, Podsakoff NP. Common method biases in behavioral research: a critical review of the literature and recommended remedies. J Appl Psychol. 2003;88(5):879–903. doi:10.1037/0021-9010.88.5.879.
  • Hayes AF. Introduction to mediation, moderation, and conditional process analysis: methodology in the social sciences. Kindle ed. New York (USA); 2013. p. 193.
  • Preacher KJ, Rucker DD, Hayes AF. Addressing moderated mediation hypotheses: theory, methods, and prescriptions. Multivariate Behav Res. 2007;42(1):185–227. doi:10.1080/00273170701341316.
  • Aiken LS, West SG. Multiple regression: testing and interpreting interactions. Thousand Oaks, California: Sage Publications; 1991.
  • McCrohan KF, Engel K, Harvey JW. Influence of awareness and training on cyber security. J Internet Commerce. 2010;9(1):23–41. doi:10.1080/15332861.2010.487415.
  • Pranggono B, Arabo A. COVID‐19 pandemic cybersecurity issues. Internet Technol Letters. 2021;4(2):1–6. doi:10.1002/itl2.247.
  • Ansari MF. A quantitative study of risk scores and the effectiveness of AI-based cybersecurity awareness training programs. IJSSAN. 2022;3(3):1–8. doi:10.47893/IJSSAN.2022.1212.
  • González-Manzano L, de Fuentes JM. Design recommendations for online cybersecurity courses. Comput Secur. 2019;80:238–56. doi:10.1016/j.cose.2018.09.009.
  • Willems C, Meinel C. Online assessment for hands-on cyber security training in a virtual lab. Proceedings of the 2012 IEEE Global Engineering Education Conference (EDUCON); IEEE; 2012 Apr 17. 2012. p. 1–10.
  • Hadlington L, Binder J, Stanulewicz N. Exploring role of moral disengagement and counterproductive work behaviours in information security awareness. Comput Human Behav. 2021;114:106557‏. doi:10.1016/j.chb.2020.106557.
  • Mwagwabi F, Jiow JH. Compliance with security guidelines in teenagers. AJIS. 2021;25:1–25. doi:https://doi.org/10.3127/ajis.v25i0.2953.
  • Hofstede G. Dimensionalizing cultures: the Hofstede model in context. Online Readings Psychol Culture. 2011;2(1):2307–919. doi:10.9707/2307-0919.1014.