Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content

The Impact of Personality Traits and Need for Cognition on Cybersecurity Behavior: A Study Across Arab and European Samples

  • Conference paper
  • First Online:
Web Information Systems Engineering – WISE 2024 (WISE 2024)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 15438))

Included in the following conference series:

  • 119 Accesses

Abstract

Personality traits and demographic factors can shape security behavior intentions. The impact of these factors on security behavior intentions can vary based on the cultural context in which individuals reside. In this study, we explore cultural variations in security behavior intentions, followed by an analysis of the personality traits and demographic factors that can predict these intentions. We investigate Arab local and Arab ex-pats in Europe and European populations, analyzing the varying effects of predictors on each group. Data was collected from 513 participants through an online survey. Age, gender, need for cognition, and personality traits, including agreeableness, conscientiousness, and neuroticism, were used to predict security behavior intentions. The findings reveal a slight inclination among Arab individuals towards higher security behavior intentions than Europeans, with varying impacts of predictors observed between the two samples. These findings significantly enrich the existing literature by including cultural factors and studying populations not WEIRD (Western, Educated, Industrialized, Rich, and Democratic). The research identifies predictive factors and their strength, covering diverse populations across Arab and European countries to comprehensively understand these dynamics.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 64.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 79.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Egelman, S., Harbach, M., Peer, E.: Behavior Ever Follows Intention? pp. 5257–5261, 7 May 2016

    Google Scholar 

  2. Ajzen, I.: From intentions to actions: a theory of planned behavior. In: Action Control, pp. 11–39 (1985). https://doi.org/10.1007/978-3-642-69746-3_2

  3. Gratian, M., Bandi, S., Cukier, M., Dykstra, J., Ginther, A.: Correlating human traits and cyber security behavior intentions. Comput. Secur. 73, 345–358 (2018). https://doi.org/10.1016/J.COSE.2017.11.015

    Article  Google Scholar 

  4. Salahdine, F., Kaabouch, N.: Social engineering attacks: a survey. Future Internet 11, 89 (2019). https://doi.org/10.3390/fi11040089

    Article  Google Scholar 

  5. Blauth, T.F., Gstrein, O.J., Zwitter, A.: Artificial intelligence crime: an overview of malicious use and abuse of AI. IEEE Access 10, 77110–77122 (2022). https://doi.org/10.1109/ACCESS.2022.3191790

    Article  Google Scholar 

  6. Aloul, F.A.: The need for effective information security awareness. J. Adv. Inf. Technol. 3(3), 176–183 (2012)

    Google Scholar 

  7. Egelman, S., Peer, E.: Scaling the Security Wall: Developing a Security Behavior Intentions Scale (SeBIS), pp. 2873–2882, 18 April 2015

    Google Scholar 

  8. Sawaya, Y., Sharif, M., Christin, N., Kubota, A., Nakarai, A., Yamada, A.: Self-confidence Trumps Knowledge, pp. 2202–2214, 2 May 2017

    Google Scholar 

  9. Rammstedt, B., John, O.P.: Measuring personality in one minute or less: a 10-item short version of the Big Five Inventory in English and German. J. Res. Pers. 41, 203–212 (2007)

    Google Scholar 

  10. Lins de Holanda Coelho, G., Hanel, P.H.P., Wolf, L.J.: The very efficient assessment of the need for cognition: developing a six-item version. Assessment 27, 1870–1885 (2018). https://doi.org/10.1177/1073191118793208

  11. Ajzen, I.: Theory of reasoned action. In: Encyclopedia of Psychology, vol. 8, pp. 61–63. Oxford University Press, New York (2000)

    Google Scholar 

  12. Shropshire, J., Warkentin, M., Sharma, S.: Personality, attitudes, and intentions: predicting initial adoption of information security behavior. Comput. Secur. 49, 177–191 (2015)

    Google Scholar 

  13. Roberts, B.W., Lejuez, C., Krueger, R.F., Richards, J.M., Hill, P.L.: What is conscientiousness and how can it be assessed? Dev. Psychol. 50, 1315–1330 (2014)

    Google Scholar 

  14. Jackson, J.J., Wood, D., Bogg, T., Walton, K.E., Harms, P.D., Roberts, B.W.: What do conscientious people do? Development and validation of the Behavioral Indicators of Conscientiousness (BIC). J. Res. Pers. 44, 501–511 (2010)

    Google Scholar 

  15. Yeng, P.K., Fauzi, M.A., Yang, B.: A comprehensive assessment of human factors in cyber security compliance toward enhancing the security practice of healthcare staff in paperless hospitals. Information (Basel) 13, 335 (2022)

    Google Scholar 

  16. Cacioppo, J.T., Petty, R.E., Feinstein, J.A., Jarvis, W.B.G.: Dispositional differences in cognitive motivation: the life and times of individuals varying in need for cognition. Psychol. Bull. 119(2), 197–253 (1996). https://doi.org/10.1037/0033-2909.119.2.197

    Article  Google Scholar 

  17. Das, S., Echambadi, R., McCardle, M., et al.: The effect of interpersonal trust, need for cognition, and social loneliness on shopping, information seeking and surfing on the web. Mark. Lett. 14, 185–202 (2003). https://doi.org/10.1023/A:1027448801656

    Article  Google Scholar 

  18. Kennison, S.M., Chan-Tin, D.E.: Personality and cognitive factors in password security behaviors. N. Am. J. Psychol. 25(3), 599–618 (2023)

    Google Scholar 

  19. JASP Team: A Fresh Way to Do Statistics, JASP, vol. 2023 (2022)

    Google Scholar 

  20. Inglehart, R., et al.: WVS database, World Values Survey Project Pages (2022). https://www.worldvaluessurvey.Org/WVSContents.Jsp?CMSID=Findings

  21. Alohali, M., Clarke, N., Furnell, S., Albakri, S.: Information security behavior: recognizing the influencers, pp. 844–853, July 2017

    Google Scholar 

  22. John, O.P., Srivastava, S., John, O.P.: The Big-Five Trait Taxonomy: History, Measurement, and Theoretical Perspectives (1999)

    Google Scholar 

  23. Parsons, K., McCormac, A., Butavicius, M., Ferguson, L.: Human factors and information security: individual, culture and security environment. DSTO Formal Reports, vol. TR, 1 January 2010

    Google Scholar 

  24. Park, H., Blenkinsopp, J., Oktem, M.K., et al.: Cultural orientation and attitudes toward different forms of whistleblowing: a comparison of South Korea, Turkey, and the U.K. J. Bus. Ethics 82, 929–939 (2008). https://doi.org/10.1007/s10551-007-9603-1

  25. Russell, J.D., Weems, C.F., Ahmed, I., Richard III, G.G.: Self-reported secure and insecure cyber behavior: factor structure and associations with personality factors. J. Cyber Secur. Technol. 1(3–4), 163–174 (2017). https://doi.org/10.1080/23742917.2017.1345271

  26. Anwar, M., He, W., Ash, I., Yuan, X., Li, L., Xu, L.: Gender difference and employees’ cybersecurity behaviors. Comput. Human Behav. 69, 437–443 (2017). https://doi.org/10.1016/J.CHB.2016.12.040

    Article  Google Scholar 

  27. Dwyer, P.D., Gilkeson, J.H., List, J.A.: Gender differences in revealed risk-taking: evidence from mutual fund investors. Econ. Lett. 76(2), 151–158 (2002). https://doi.org/10.1016/S0165-1765(02)00045-9

    Article  Google Scholar 

  28. Khan, N.F., Ikram, N., Saleem, S., Zafar, S.: Cyber-security and risky behaviors in a developing country context: a Pakistani perspective. Secur. J. 36(2), 373–405 (2023). https://doi.org/10.1057/S41284-022-00343-4/TABLES/8

    Article  Google Scholar 

Download references

Acknowledgments

This publication was made possible by NPRP 14 Cluster Grant number NPRP 14C-0916-210015 from the Qatar National Research Fund (a member of Qatar Foundation). The findings herein reflect the work and are solely the responsibility of the authors.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Eiman A. Al-Hamad .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2025 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Al-Hamad, E.A., Alshakhsi, S., Babiker, A., Erbad, A., Ali, R. (2025). The Impact of Personality Traits and Need for Cognition on Cybersecurity Behavior: A Study Across Arab and European Samples. In: Barhamgi, M., Wang, H., Wang, X. (eds) Web Information Systems Engineering – WISE 2024. WISE 2024. Lecture Notes in Computer Science, vol 15438. Springer, Singapore. https://doi.org/10.1007/978-981-96-0570-5_28

Download citation

  • DOI: https://doi.org/10.1007/978-981-96-0570-5_28

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-96-0569-9

  • Online ISBN: 978-981-96-0570-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics