Readiness for information security of teachers as a function of their personality traits and their assessment of threats

PurposeThis study examines the impact of personality traits on the degree of challenge experienced by individuals with respect to the threat on their information, the evaluation of their self-efficacy to secure the information and hence, their readiness to secure information.Design/methodology/approachThe study's population consisted of 157 teachers from various educational institutions across Israel. We used five questionnaires to gather data.FindingsFindings reveal a link between participants' personality traits, situation evaluation indicators and their readiness to secure information. Further, the greater subjects' information security awareness and familiarity with information security concepts, the better their application of the tools for securing information will be.Originality/valueThe importance of this research lies primarily in that it highlights the importance of individual differences while dealing with information security awareness. The findings constitute a theoretical and empirical basis for building tools toward guiding teachers to protect their information, as well as for devising educational and pedagogic programs for making a cultural change.

[1]  Jerry Chih-Yuan Sun,et al.  The moderating roles of gender and social norms on the relationship between protection motivation and risky online behavior among in-service teachers , 2017, Comput. Educ..

[2]  Irfan Ahmed,et al.  Self-reported secure and insecure cyber behaviour: factor structure and associations with personality factors , 2017 .

[3]  Hongliang Chen Antecedents of positive self-disclosure online: an empirical study of US college students’ Facebook usage , 2017, Psychology research and behavior management.

[4]  Tena Velki,et al.  Empirical study on the risky behavior and security awareness among secondary school pupils - validation and preliminary results , 2017, 2017 40th International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO).

[5]  Malcolm Robert Pattinson,et al.  Individual differences and Information Security Awareness , 2017, Comput. Hum. Behav..

[6]  Wu He,et al.  Gender difference and employees' cybersecurity behaviors , 2017, Comput. Hum. Behav..

[7]  Shian-Shyong Tseng,et al.  The mediating effect of anti-phishing self-efficacy between college students' internet self-efficacy and anti-phishing behavior and gender difference , 2016, Comput. Hum. Behav..

[8]  Lemuria Carter,et al.  Dispositional and situational factors: influences on information security policy violations , 2016, Eur. J. Inf. Syst..

[9]  R. Shillair Multiple sources for security : The influence of source networks on coping self-efficacy and protection behavior habits in online safety , 2016 .

[10]  Serge Egelman,et al.  The Myth of the Average User: Improving Privacy and Security Systems through Individualization , 2015, NSPW.

[11]  Malcolm Robert Pattinson,et al.  Factors that Influence Information Security Behavior: An Australian Web-Based Study , 2015, HCI.

[12]  Stefano Taddei,et al.  Surfing on Social Network Sites: A comprehensive instrument to evaluate online self-disclosure and related attitudes , 2015, Comput. Hum. Behav..

[13]  Aggeliki Tsohou,et al.  Analyzing the role of cognitive and cultural biases in the internalization of information security policies: Recommendations for information security awareness programs , 2015, Comput. Secur..

[14]  Zach W. Y. Lee,et al.  Self-disclosure in social networking sites: The role of perceived cost, perceived benefits and social influence , 2015, Internet Res..

[15]  Merrill Warkentin,et al.  An Enhanced Fear Appeal Rhetorical Framework: Leveraging Threats to the Human Asset Through Sanctioning Rhetoric , 2015, MIS Q..

[16]  Noa Aharony,et al.  What's App: a social capital perspective , 2015, Online Inf. Rev..

[17]  Eero Sormunen,et al.  Spanning information behaviour across the stages of a learning task: Where do personality and approach to studying matter? , 2014, J. Documentation.

[18]  Tejaswini Herath,et al.  Understanding Employee Responses to Stressful Information Security Requirements: A Coping Perspective , 2014, J. Manag. Inf. Syst..

[19]  Steve Love,et al.  Security awareness of computer users: A phishing threat avoidance perspective , 2014, Comput. Hum. Behav..

[20]  Jannica Heinström,et al.  The Emotional Valence of Information Experience: Relation to Personality and Approach to Studying , 2014 .

[21]  Eyong B. Kim,et al.  Recommendations for information security awareness training for college students , 2014, Inf. Manag. Comput. Secur..

[22]  Aaron Striegel,et al.  An exploratory investigation of message-person congruence in information security awareness campaigns , 2014, Comput. Secur..

[23]  Malcolm Robert Pattinson,et al.  Determining employee awareness using the Human Aspects of Information Security Questionnaire (HAIS-Q) , 2014, Comput. Secur..

[24]  N. Aharony,et al.  The effect of personal and situational factors on LIS students' and professionals' intentions to use e-books , 2014 .

[25]  Dan Bouhnik,et al.  Gender differences in the moral judgment and behavior of Israeli adolescents in the internet environment , 2014, J. Assoc. Inf. Sci. Technol..

[26]  Noa Aharony,et al.  Factors affecting the adoption of Facebook by information professionals , 2013, ASIST.

[27]  Guido Alessandri,et al.  The determinants of scholastic achievement: The contribution of personality traits, self-esteem, and academic self-efficacy , 2013 .

[28]  Yannis Theocharis,et al.  Online Political Engagement, Facebook, and Personality Traits , 2013 .

[29]  Guido Alessandri,et al.  Academic Achievement: The Unique Contribution of Self-Efficacy Beliefs in Self-Regulated Learning beyond Intelligence, Personality Traits, and Self-Esteem. , 2013 .

[30]  Shuting Xu,et al.  Applying Protection Motivation Theory to Information Security Training for College Students , 2013 .

[31]  Nathan L. Clarke,et al.  Power to the people? The evolving recognition of human aspects of security , 2012, Comput. Secur..

[32]  Lisa Wise,et al.  The effects of personality traits, self-esteem, loneliness, and narcissism on Facebook use among university students , 2012, Comput. Hum. Behav..

[33]  Jin-Liang Wang,et al.  The relationships among the Big Five Personality factors, self-esteem, narcissism, and sensation-seeking to Chinese University students' uses of social networking sites (SNSs) , 2012, Comput. Hum. Behav..

[34]  Rebecca LeFebvre The human element in cyber security: a study on student motivation to act , 2012, InfoSecCD.

[35]  Tamara Dinev,et al.  Managing Employee Compliance with Information Security Policies: The Critical Role of Top Management and Organizational Culture , 2012, Decis. Sci..

[36]  Mikko T. Siponen,et al.  Motivating IS security compliance: Insights from Habit and Protection Motivation Theory , 2012, Inf. Manag..

[37]  Portia Pusey,et al.  Preservice Teacher Concerns about Teaching Cyberethics, Cybersafety, and Cybersecurity: A Focus Group Study , 2012 .

[38]  Carol A. Mullen,et al.  Self-Efficacy as an Engaged Learner , 2012 .

[39]  Lemuria Carter,et al.  The Role of Individual Characteristics on Insider Abuse Intentions , 2012, AMCIS.

[40]  Natasha F. Veltri,et al.  AIS Electronic Library (AISeL) , 2022 .

[41]  Yair Amichai-Hamburger,et al.  Social network use and personality , 2010, Comput. Hum. Behav..

[42]  Ritu Agarwal,et al.  Practicing Safe Computing: A Multimedia Empirical Examination of Home Computer User Security Behavioral Intentions , 2010, MIS Q..

[43]  Jim Blascovich,et al.  Cardiovascular measures independently predict performance in a university course. , 2010, Psychophysiology.

[44]  N. Aharony,et al.  Web 2.0 use by librarians , 2009 .

[45]  Norman A. Johnson,et al.  Personality traits and concern for privacy: an empirical study in the context of location-based services , 2008, Eur. J. Inf. Syst..

[46]  J. Blascovich Challenge and Threat , 2008 .

[47]  Jim Blascovich,et al.  Threatened by the unexpected: physiological responses during social interactions with expectancy-violating partners. , 2007, Journal of personality and social psychology.

[48]  LeAnne Coder,et al.  Personality Characteristics of Established IT Professionals I: Big Five Personality Characteristics , 2006 .

[49]  Shambhu Upadhyaya,et al.  Role of Perceived Importance of Information Security: An Exploratory Study of Middle School Children's Information Security Behavior , 2006 .

[50]  Irene Woon,et al.  A Protection Motivation Theory Approach to Home Wireless Security , 2005, ICIS.

[51]  H. Cooper,et al.  The Relation Between Self-Beliefs and Academic Achievement: A Meta-Analytic Review , 2004 .

[52]  S. Gosling,et al.  Development of personality in early and middle adulthood: set like plaster or persistent change? , 2003, Journal of personality and social psychology.

[53]  Li-fang Zhang,et al.  Measuring thinking styles in addition to measuring personality traits , 2002 .

[54]  Gilad Chen,et al.  Validation of a New General Self-Efficacy Scale , 2001 .

[55]  P. Sheeran,et al.  Prediction and Intervention in Health-Related Behavior: A Meta-Analytic Review of Protection Motivation Theory , 2000 .

[56]  S. Srivastava,et al.  The Big Five Trait taxonomy: History, measurement, and theoretical perspectives. , 1999 .

[57]  Albert Bandura,et al.  Exploration of Fortuitous Determinants of Life Paths , 1998 .

[58]  Philip M. Wilson,et al.  The relationship between competitive anxiety and self-presentational concerns , 1998 .

[59]  R. Rapee,et al.  A cognitive-behavioral model of anxiety in social phobia. , 1997, Behaviour research and therapy.

[60]  Paul T. Costa,et al.  The Five-Factor Model of Personality and Its Relevance to Personality Disorders , 1992 .

[61]  P. Costa,et al.  Validation of the five-factor model of personality across instruments and observers. , 1987, Journal of personality and social psychology.

[62]  R. L. Archer,et al.  Openers: Individuals who elicit intimate self-disclosure. , 1983 .