Individual differences in cyber security behavior using personality-based models to predict susceptibility to sextortion attacks

Veronica Power, Abubakar Bello

Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review

1 Citation (Scopus)

Abstract

Purpose: Social engineering attacks rely on compromising users’ confidential information usually using quid pro quo methods. Understanding the psychological reasons underlying the motivation for falling prey is imperative to developing successful defenses. Cybercriminals depend on human vulnerability rather than technology with an overreliance on technical solutions for protection rather than behavioral control models. Cyber sextortion is a type of quid pro quo social engineering that is under-researched. Hence, investigating the individual differences in security behavior and susceptibility to sextortion attacks using personality-based models is crucial. Methodology: Applying a quantitative methodology with online questionnaires, data was collected and analyzed using standard multiple regressions and Spearman's correlations in light of risky cyber security behavior (RCSB) scale correlating positively and negatively with extraversion, openness, agreeableness, neuroticism, and conscientiousness. Findings: The findings indicated the hypothesis of scoring high in the RCSB scale positively correlating negatively with conscientiousness was supported, although the overall regression analysis proved to be statistically significant. Social desirability to not admit risky cyber behaviors was apparent; however, the overall score for RCSB did show slightly risker behavior, indicating participants’ vulnerability to cyber sextortion. Originality/Value: This study supports that risky security behavior could be predicted by the personality of individuals. Developing and incorporating learning materials on how to mitigate the risks of cyber sextortion with organizational security awareness and training programs becomes highly crucial. Understanding the impact of conscientiousness, openness, extraversion, agreeableness, and neuroticism are necessary to safeguard against emerging attacks by means of cyber sextortion.

Original languageEnglish
Title of host publicationCybersecurity and Cognitive Science
EditorsAhmed A. Moustafa
Place of PublicationAmsterdam
PublisherElsevier
Pages89-113
Number of pages25
ISBN (Electronic)9780323905701
ISBN (Print)9780323906968
DOIs
Publication statusPublished - 1 Jan 2022

Keywords

  • Awareness
  • Cyber security
  • Cyber sextortion
  • Individual differences
  • Personality
  • Training

Fingerprint

Dive into the research topics of 'Individual differences in cyber security behavior using personality-based models to predict susceptibility to sextortion attacks'. Together they form a unique fingerprint.

Cite this