Abstract
Abstract
In spite of the number of public advice campaigns, researchers have found that individuals still engage in risky password practices. There is a dearth of research available on individual differences in cyber security behaviors. This study focused on the risky practice of sharing passwords. As predicted, we found that individuals who scored high on a lack of perseverance were more likely to share passwords. Contrary to our hypotheses, we found younger people and individuals who score high on self-monitoring were more likely to share passwords. We speculate on the reasons behind these findings, and examine how they might be considered in future cyber security educational campaigns.
Introduction
D
Researchers have found that individuals are typically aware of what good password management entails.7,8 Nonetheless, it has been found that despite understanding security risks, individuals are still inclined to take risks because they are unrealistically optimistic and believe that negative events are less likely to happen to them, 9 they are unable to perceive any immediate negative consequences, 7 or they make a convenience–security trade-off. 7
In addition to these specific motivations, there might be individual factors that distinguish users who engage in risky cyber security behaviors. To date, individual differences in problematic security practices have received little attention in the psychological literature. Identifying the type of person who is more likely to make poor security decisions could assist in improving public awareness campaigns.
This paper specifically examined the type of person who is more likely to share passwords. We focused here on personality theory and work on the digital divide. Given the dearth of literature available on the topic, the hypotheses are based on the scant available literature available on individual differences and online security, as well as the research on how individuals with certain personality characteristics typically behave in their everyday lives. The results reported in this paper are part of a much larger study that examined password decision making. The hypotheses are outlined below.
Age
Older adults tend to be less knowledgeable about Internet security compared with younger users.
10
Given the “digital divide”
11
between younger and older Internet users, our first hypothesis is:
Impulsivity
Individuals who score high on impulsivity questionnaires are individuals who tend to act on a whim, displaying behaviors characterized by little forethought or consideration of the consequences of their actions.
12
Although impulsivity, to our knowledge, has not previously been considered with regards to online security, it would be reasonable to presume that these types of people are less secure online, as they are likely to focus on the short-term goal (getting an account) rather than the long-term security implications. The second hypothesis is:
Self-monitoring
Individuals who are high self-monitors are more likely to observe and regulate their expressive behaviors. These individuals are typically sensitive to social and situational cues and alter their behavior accordingly.
13
Given that individuals who score high on self-monitoring tend to consider their social surroundings prior to acting out, we might expect them to be more considerate of how others would view them should they undertake risky practices. The third hypothesis is:
Locus of control
Locus of control refers to an individual's belief about control over his/her environment. People who have an internal locus of control have the conviction that events are contingent upon one's behavior. Those with an external locus of control believe that events do not depend upon their actions, but rather upon luck, chance, or fate.
14
Those with an external locus of control have been found to engage in more risky activities.
15
If individuals believe that they have little control over whether someone compromises their data, it is reasonable to presume they will be less likely to behave securely online. The fourth hypothesis is:
Knowledge of cyber security
Although the research has found that the general population are typically aware of online security,
7
there are still clear distinctions between experts and nonexperts regarding basic security behaviors, such as patching and updating software.
16
Having a greater knowledge about online security could impact on cyber security practices. Therefore, our fifth and final hypothesis is:
Methods
Participants
Participants were invited to take part in the study via professional association mailing lists. Moderators of the lists were contacted and asked to place a message on their list inviting their users to partake in our study. The lists appeared to have hundreds of users. One list focused on cyber security issues, and five lists focused on the arts or social sciences. We focused on these lists to ensure we included both cyber security experts and nonexperts in our sample. Overall, the sample represented a broad range of knowledge about cyber security issues.
In the period from June 5, 2013, to September 7, 2013, 910 participants accessed the survey. Of these, 630 completed the survey in full and indicated that their data could be used for analysis. In order to avoid cultural bias, we only included those residing in the UK in our final sample. Additionally, one individual was excluded for being too young to give consent to complete the survey (16 years), and two individuals were excluded for providing an unlikely age (103 and 107 years). After excluding participants, 497 participants (295 male) remained, with a mean age of 41.86 years (SD=13.38; range 18–72 years).
Materials
Data were collected using a questionnaire hosted on the Qualtrics online survey platform. The questionnaire comprised a number of scales, represented online using individual or matrix-style layouts with responses entered via radio buttons, drop-down menus, or free text entry as appropriate. Password sharing was assessed using a single yes/no question: “Have you ever shared any of your passwords with anyone?”
Impulsivity was measured using the UPPS-R Impulsivity Scale. 12 The 45-item scale measures a person's tendency to act on whim, displaying behaviors characterized by little forethought or consideration of the consequences of their actions. The scale comprises four subscales: lack of premeditation (11 items), urgency (12 items), sensation seeking (12 items), and lack of perseverance (10 items). Possible scores range from 11 to 44 for the lack of premeditation subscale, from 12 to 48 for both the urgency and sensation seeking subscales, and from 10 to 40 for the lack of perseverance subscale. A lower score indicates low impulsivity for that dimension. In the current study, each of the subscales demonstrated good internal consistency (Cronbach's α=0.85, 0.89, 0.87, and 0.82 for lack of premeditation, urgency, sensation seeking, and lack of perseverance respectively).
Self-monitoring was measured using the original version of the Self-Monitoring Scale. 12 The 25-item scale measures a person's tendency to monitor (regulate, control, and observe) their behavior and image in interpersonal relationships and social situations. For each item on the scale, participants indicate whether a statement is true or false description of how they act or react in social situations. Possible scores range from 0 to 25, with a lower score indicating low self-monitoring. In the current study, the scale demonstrated good internal consistency (Cronbach's α=0.74).
Locus of control was measured using the Internal–External Control scale. 13 The 29-item scale measures a person's general tendency for an internal or external locus of control. For each item on the scale, participants indicate which of two statements they agree with most. Possible scores range from 0 to 23, with a lower score indicating a more internal locus of control insofar as a participant believes that everyday events are contingent on his or her own behavior. In the current study, the scale demonstrated good internal consistency (Cronbach's α=0.75).
Knowledge of cyber security was measured using a single question. Participants were asked to rate their knowledge about cyber security issues on a 5-point Likert scale. Overall, 24% rated themselves as “very knowledgeable,” 41% as “somewhat knowledgeable,” 26% as “about average,” 6% as “somewhat unknowledgeable,” and 2% as “very unknowledgeable.” Cyber security experts were significantly more knowledgeable about cyber security than nonexperts, Mann–Whitney U=15,803.500, W=37,958.500, Z=−9.563, p<0.001.
Procedure
Participants were asked to complete a number of demographic items, followed by the password sharing and knowledge of cyber security question, and finally the personality questionnaires. They were debriefed at the end of the questionnaire, and given a summary of their personality scores. They were also given the opportunity to leave contact details to be entered in a draw for a £500 Amazon voucher (the opportunity to enter the draw was explained in the initial participant information). Finally, they were given details of where they could access a summary of the findings once the study had been completed.
Results
All five hypotheses were tested simultaneously using standard forced entry binary logistic regression, with password sharing as the outcome variable—either participants had shared passwords in the past or they had not. As summarized below, one of our hypotheses was supported.
Overall, 51.1% had shared their passwords in the past. Table 1 summarizes the descriptive statistics for means broken down by those who had shared and not shared passwords.
I-E, Internal-External Control scale.
Impulsivity was considered using the four subscales. The overall model was statistically significant in predicting whether an individual had shared passwords, χ2(8)=49.69, p<0.001, though the amount of variance explained was low (Cox and Snell R2=0.10) The model correctly predicted whether participants had shared passwords for a good proportion (62.6%) of cases.
Table 2 demonstrates that only one of our hypotheses was supported (and only in part), with those who scored high on lack of perseverance more likely to share their passwords, B=0.05, Wald=4.29, p=0.04. We obtained two further significant results, albeit in the opposite direction to what was predicted. Younger people were more likely to share passwords compared with older people, B=−0.02, Wald=5.06, p=0.02, and those who scored high on self-monitoring were more likely to share passwords compared with those who scored low, B=0.07, Wald=9.65, p<.001.
Note. For the password sharing variable: 0=participant had not shared passwords in the past; 1=participant had shared passwords in the past.
p<0.05 (two-tailed); **p<0.01 (two-tailed); ***p<0.001 (two-tailed).
Discussion
There is a dearth of research on the psychological characteristics of those who engage in risky cyber security practice. This study highlighted the importance of understanding the types of people who are more likely to engage in the risky behavior of sharing passwords. Importantly, we identified a number of significant variables, suggesting that personality, in part, plays a role in predicting the type of person who is more likely to share passwords. However, we did find that only one of our hypotheses was supported.
Demographic characteristics
Age was a significant predictor of sharing passwords. However, the direction of the result was the opposite of what we hypothesized. Younger people were more likely to share passwords compared with older people. It would be interesting to learn more about with whom younger people are sharing passwords and why younger people are more likely to share passwords. It might be that younger people have more opportunities to share passwords, given they potentially have more family and friends who are active online compared with older people. Moreover, they may have a range of data (some of which is more important to protect, such as bank account details, and some less so, such as photo sharing services). Although this result is the opposite of what we predicted, it is nonetheless an important finding. It suggests that educational campaigns need to ensure they are including young people as their target audience.
Personality variables
For our hypothesis on impulsivity, we found that only one of the subscales was significant: perseverance. Perseverance measures the ability to remain with a task until completion and avoid becoming bored. It might be that one of the motives for sharing passwords is to delegate an online task to others to complete in order to minimize boredom and personal effort on the task. This might explain why those who score high on a lack of perseverance were more likely to share passwords. The nonsignificant results for lack of premeditation, urgency, and sensation seeking also suggest that those who are more rash, more likely to make spur of the moment decisions, and seek out risky activities are not more likely to share passwords.
Self-monitoring was a significant predictor of sharing passwords. However, the direction of the result was the opposite of what we hypothesized. Instead, we found that those who score high on self-monitoring were significantly more likely to share passwords compared with those who score low on this measure. Although the result is opposite to what we expected, it is an important finding. Perhaps those who score high on self-monitoring are more likely to feel pressured by others to share their passwords, thereby compromising security to appease other people. Further research is needed to test out this explanation.
Knowledge about cyber security
It is especially interesting that knowledge about cyber security did not distinguish between those who share passwords and those who do not share passwords. Researchers have found that individuals are generally aware of what constitutes good cyber security practices, 7 and, as with previous research, our study demonstrates that knowledge is not enough to change problematic cyber security behaviors when it comes to sharing passwords. Our research cannot speak for the motivations behind individuals' decisions to share passwords. However, we have learned that personality, at least, plays a minor role. The results of our study provide evidence that campaigns need to go beyond providing information about cyber security if poor practices are to be changed.
Conclusions
As Wiederhold 6 has empathically argued, psychology plays an important role in providing answers to why individuals engage in risky cyber security practices. This research reinforces this view. We found a number of variables that predict the risky practice of sharing passwords: age, perseverance, and self-monitoring. Although not all our significant results were in the direction we hypothesized, they nonetheless provide us with an important picture of who is sharing passwords. We have speculated on the reasons why these types of people are more likely to engage in such risky practices. Further research is needed to test out our speculations. Those creating public awareness campaigns could benefit from our study to help them refocus on the messages they tell individuals, as well as the types of individuals they choose to target.
Footnotes
Acknowledgments
The work reported in this paper was supported by award EP/J004995/1: An Exploration of Superidentity, from the UK Engineering and Physical Sciences Research Council. Colleagues on this grant are thanked for helpful contributions to the current work.
Author Disclosure Statement
No competing financial interests exist.
