Abstract
Personality traits and demographic factors can shape security behavior intentions. The impact of these factors on security behavior intentions can vary based on the cultural context in which individuals reside. In this study, we explore cultural variations in security behavior intentions, followed by an analysis of the personality traits and demographic factors that can predict these intentions. We investigate Arab local and Arab ex-pats in Europe and European populations, analyzing the varying effects of predictors on each group. Data was collected from 513 participants through an online survey. Age, gender, need for cognition, and personality traits, including agreeableness, conscientiousness, and neuroticism, were used to predict security behavior intentions. The findings reveal a slight inclination among Arab individuals towards higher security behavior intentions than Europeans, with varying impacts of predictors observed between the two samples. These findings significantly enrich the existing literature by including cultural factors and studying populations not WEIRD (Western, Educated, Industrialized, Rich, and Democratic). The research identifies predictive factors and their strength, covering diverse populations across Arab and European countries to comprehensively understand these dynamics.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Egelman, S., Harbach, M., Peer, E.: Behavior Ever Follows Intention? pp. 5257–5261, 7 May 2016
Ajzen, I.: From intentions to actions: a theory of planned behavior. In: Action Control, pp. 11–39 (1985). https://doi.org/10.1007/978-3-642-69746-3_2
Gratian, M., Bandi, S., Cukier, M., Dykstra, J., Ginther, A.: Correlating human traits and cyber security behavior intentions. Comput. Secur. 73, 345–358 (2018). https://doi.org/10.1016/J.COSE.2017.11.015
Salahdine, F., Kaabouch, N.: Social engineering attacks: a survey. Future Internet 11, 89 (2019). https://doi.org/10.3390/fi11040089
Blauth, T.F., Gstrein, O.J., Zwitter, A.: Artificial intelligence crime: an overview of malicious use and abuse of AI. IEEE Access 10, 77110–77122 (2022). https://doi.org/10.1109/ACCESS.2022.3191790
Aloul, F.A.: The need for effective information security awareness. J. Adv. Inf. Technol. 3(3), 176–183 (2012)
Egelman, S., Peer, E.: Scaling the Security Wall: Developing a Security Behavior Intentions Scale (SeBIS), pp. 2873–2882, 18 April 2015
Sawaya, Y., Sharif, M., Christin, N., Kubota, A., Nakarai, A., Yamada, A.: Self-confidence Trumps Knowledge, pp. 2202–2214, 2 May 2017
Rammstedt, B., John, O.P.: Measuring personality in one minute or less: a 10-item short version of the Big Five Inventory in English and German. J. Res. Pers. 41, 203–212 (2007)
Lins de Holanda Coelho, G., Hanel, P.H.P., Wolf, L.J.: The very efficient assessment of the need for cognition: developing a six-item version. Assessment 27, 1870–1885 (2018). https://doi.org/10.1177/1073191118793208
Ajzen, I.: Theory of reasoned action. In: Encyclopedia of Psychology, vol. 8, pp. 61–63. Oxford University Press, New York (2000)
Shropshire, J., Warkentin, M., Sharma, S.: Personality, attitudes, and intentions: predicting initial adoption of information security behavior. Comput. Secur. 49, 177–191 (2015)
Roberts, B.W., Lejuez, C., Krueger, R.F., Richards, J.M., Hill, P.L.: What is conscientiousness and how can it be assessed? Dev. Psychol. 50, 1315–1330 (2014)
Jackson, J.J., Wood, D., Bogg, T., Walton, K.E., Harms, P.D., Roberts, B.W.: What do conscientious people do? Development and validation of the Behavioral Indicators of Conscientiousness (BIC). J. Res. Pers. 44, 501–511 (2010)
Yeng, P.K., Fauzi, M.A., Yang, B.: A comprehensive assessment of human factors in cyber security compliance toward enhancing the security practice of healthcare staff in paperless hospitals. Information (Basel) 13, 335 (2022)
Cacioppo, J.T., Petty, R.E., Feinstein, J.A., Jarvis, W.B.G.: Dispositional differences in cognitive motivation: the life and times of individuals varying in need for cognition. Psychol. Bull. 119(2), 197–253 (1996). https://doi.org/10.1037/0033-2909.119.2.197
Das, S., Echambadi, R., McCardle, M., et al.: The effect of interpersonal trust, need for cognition, and social loneliness on shopping, information seeking and surfing on the web. Mark. Lett. 14, 185–202 (2003). https://doi.org/10.1023/A:1027448801656
Kennison, S.M., Chan-Tin, D.E.: Personality and cognitive factors in password security behaviors. N. Am. J. Psychol. 25(3), 599–618 (2023)
JASP Team: A Fresh Way to Do Statistics, JASP, vol. 2023 (2022)
Inglehart, R., et al.: WVS database, World Values Survey Project Pages (2022). https://www.worldvaluessurvey.Org/WVSContents.Jsp?CMSID=Findings
Alohali, M., Clarke, N., Furnell, S., Albakri, S.: Information security behavior: recognizing the influencers, pp. 844–853, July 2017
John, O.P., Srivastava, S., John, O.P.: The Big-Five Trait Taxonomy: History, Measurement, and Theoretical Perspectives (1999)
Parsons, K., McCormac, A., Butavicius, M., Ferguson, L.: Human factors and information security: individual, culture and security environment. DSTO Formal Reports, vol. TR, 1 January 2010
Park, H., Blenkinsopp, J., Oktem, M.K., et al.: Cultural orientation and attitudes toward different forms of whistleblowing: a comparison of South Korea, Turkey, and the U.K. J. Bus. Ethics 82, 929–939 (2008). https://doi.org/10.1007/s10551-007-9603-1
Russell, J.D., Weems, C.F., Ahmed, I., Richard III, G.G.: Self-reported secure and insecure cyber behavior: factor structure and associations with personality factors. J. Cyber Secur. Technol. 1(3–4), 163–174 (2017). https://doi.org/10.1080/23742917.2017.1345271
Anwar, M., He, W., Ash, I., Yuan, X., Li, L., Xu, L.: Gender difference and employees’ cybersecurity behaviors. Comput. Human Behav. 69, 437–443 (2017). https://doi.org/10.1016/J.CHB.2016.12.040
Dwyer, P.D., Gilkeson, J.H., List, J.A.: Gender differences in revealed risk-taking: evidence from mutual fund investors. Econ. Lett. 76(2), 151–158 (2002). https://doi.org/10.1016/S0165-1765(02)00045-9
Khan, N.F., Ikram, N., Saleem, S., Zafar, S.: Cyber-security and risky behaviors in a developing country context: a Pakistani perspective. Secur. J. 36(2), 373–405 (2023). https://doi.org/10.1057/S41284-022-00343-4/TABLES/8
Acknowledgments
This publication was made possible by NPRP 14 Cluster Grant number NPRP 14C-0916-210015 from the Qatar National Research Fund (a member of Qatar Foundation). The findings herein reflect the work and are solely the responsibility of the authors.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2025 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Al-Hamad, E.A., Alshakhsi, S., Babiker, A., Erbad, A., Ali, R. (2025). The Impact of Personality Traits and Need for Cognition on Cybersecurity Behavior: A Study Across Arab and European Samples. In: Barhamgi, M., Wang, H., Wang, X. (eds) Web Information Systems Engineering – WISE 2024. WISE 2024. Lecture Notes in Computer Science, vol 15438. Springer, Singapore. https://doi.org/10.1007/978-981-96-0570-5_28
Download citation
DOI: https://doi.org/10.1007/978-981-96-0570-5_28
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-96-0569-9
Online ISBN: 978-981-96-0570-5
eBook Packages: Computer ScienceComputer Science (R0)