Access the full text.
Sign up today, get DeepDyve free for 14 days.
M. Prensky (2001)
Digital Natives, Digital Immigrants Part 1on The Horizon, 9
R. McCrae, P. Costa (1987)
Validation of the five-factor model of personality across instruments and observers.Journal of personality and social psychology, 52 1
N. Arachchilage, S. Love (2014)
Security awareness of computer users: A phishing threat avoidance perspectiveComput. Hum. Behav., 38
P. Podsakoff, Scott MacKenzie, J. Paine, Daniel Bachrach (2000)
Organizational Citizenship Behaviors: A Critical Review of the Theoretical and Empirical Literature and Suggestions for Future ResearchJournal of Management, 26
Noa Aharony (2016)
Relationships among attachment theory, social capital perspective, personality characteristics, and Facebook self-disclosureAslib J. Inf. Manag., 68
S. Srivastava, O. John, S. Gosling, J. Potter (2003)
Development of personality in early and middle adulthood: set like plaster or persistent change?Journal of personality and social psychology, 84 5
R. Shillair (2016)
Multiple sources for security : The influence of source networks on coping self-efficacy and protection behavior habits in online safety
A. Tsohou, Maria Karyda, S. Kokolakis (2015)
Analyzing the role of cognitive and cultural biases in the internalization of information security policies: Recommendations for information security awareness programsComput. Secur., 52
Portia Pusey, W. Sadera (2012)
Preservice Teacher Concerns about Teaching Cyberethics, Cybersafety, and Cybersecurity: A Focus Group Study, 2012
Mikko Siponen, Seppo Pahnila, Adam Mahmood (2005)
A Protection Motivation Theory Approach to Home Wireless Security
Yair Amichai-Hamburger, Gideon Vinitzky (2010)
Social network use and personalityComput. Hum. Behav., 26
Li‐fang Zhang (2002)
Measuring thinking styles in addition to measuring personality traitsPersonality and Individual Differences, 33
B. Contena, Y. Loscalzo, S. Taddei (2015)
Surfing on Social Network Sites: A comprehensive instrument to evaluate online self-disclosure and related attitudesComput. Hum. Behav., 49
D. Etzion, S. Laski (1998)
Personality traits questionnaire
Hongliang Chen (2017)
Antecedents of positive self-disclosure online: an empirical study of US college students’ Facebook usagePsychology Research and Behavior Management, 10
Merrill Warkentin, M. McBride, Lemuria Carter, Allen Johnston (2012)
The Role of Individual Characteristics on Insider Abuse Intentions
Y. Eshet-Alkalai (2004)
Digital Literacy: A Conceptual Framework for Survival Skills in the Digital eraJournal of Educational Multimedia and Hypermedia, 13
L. Miller, J. Berg, R. Archer (1983)
Openers: Individuals who elicit intimate self-disclosure.Journal of Personality and Social Psychology, 44
R. Helson, Sau Kwan (2000)
Personality development in adulthood: The broad picture and processes in one longitudinal sample
J. Twenge (2002)
Birth cohort, social change, and personality: The interplay of dysphoria and individualism in the 20th century.
Stephen Rains, Steven Brunner, Kyle Oman (2016)
Self-disclosure and new communication technologiesJournal of Social and Personal Relationships, 33
Mohd Anwar, Wu He, Ivan Ash, Xiaohong Yuan, L. Li, Li Xu (2017)
Gender difference and employees' cybersecurity behaviorsComput. Hum. Behav., 69
Christy Cheung, Zach Lee, Tommy Chan (2015)
Self-disclosure in social networking sites: The role of perceived cost, perceived benefits and social influenceInternet Res., 25
M. Pattinson, M. Butavicius, K. Parsons, Agata McCormac, D. Calic (2015)
Factors that Influence Information Security Behavior: An Australian Web-Based Study
I. Junglas, N. Johnson, Christiane Spitzmüller (2008)
Personality traits and concern for privacy: an empirical study in the context of location-based servicesEuropean Journal of Information Systems, 17
M. Prensky (2001)
Do They Really Think Differentlyon The Horizon, 9
Younghwa Lee, K. Kozar (2005)
Investigating factors affecting the adoption of anti-spyware systemsCommun. ACM, 48
D. Bouhnik, Mor Deshen (2013)
Unethical Behavior of Youth in the Internet Environment
Geordie Stewart, D. Lacey (2012)
Death by a Thousand Facts: Criticising the Technocratic Approach to Information Security Awareness
J. D'Arcy, Tejaswini Herath, Mindy Shoss (2014)
Understanding Employee Responses to Stressful Information Security Requirements: A Coping PerspectiveJournal of Management Information Systems, 31
M. Whitty, J. Doodson, S. Creese, Duncan Hodges (2015)
Individual Differences in Cyber Security Behaviors: An Examination of Who Is Sharing PasswordsCyberpsychology, behavior and social networking, 18 1
Ronald Ash, Joshua Rosenbloom, LeAnne Coder, Brandon Dupont (2006)
Personality Characteristics of Established IT Professionals I: Big Five Personality Characteristics
Justin Russell, C. Weems, Irfan Ahmed, Golden III (2017)
Self-reported secure and insecure cyber behaviour: factor structure and associations with personality factorsJournal of Cyber Security Technology, 1
T. Velki, K. Solic, V. Gorjanac, K. Nenadić (2017)
Empirical study on the risky behavior and security awareness among secondary school pupils - validation and preliminary results2017 40th International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO)
J. Twenge (2000)
The age of anxiety? Birth cohort change in anxiety and neuroticism, 1952-1993.Journal of personality and social psychology, 79 6
B. Roberts, Kate Walton, W. Viechtbauer (2006)
Patterns of mean-level change in personality traits across the life course: a meta-analysis of longitudinal studies.Psychological bulletin, 132 1
Catherine Anderson, Ritu Agarwal (2010)
Practicing Safe Computing: A Multimedia Empirical Examination of Home Computer User Security Behavioral IntentionsMIS Q., 34
K. Rantos, Konstantinos Fysarakis, C. Manifavas (2012)
How Effective Is Your Security Awareness Program? An Evaluation MethodologyInformation Security Journal: A Global Perspective, 21
N. Pancar (2014)
Effectiveness of a security portal for improving student's knowledge and skills in information technology (IT) security
Faruk Şahin, F. Çetin (2017)
The Mediating Role of General Self-Efficacy in the Relationship Between the Big Five Personality Traits and Perceived Stress: A Weekly Assessment StudyPsychological Studies, 62
O. John, S. Srivastava (1999)
The Big Five Trait taxonomy: History, measurement, and theoretical perspectives.
Mitchell Kajzer, J. D'Arcy, C. Crowell, A. Striegel, D. Bruggen (2014)
An exploratory investigation of message-person congruence in information security awareness campaignsComput. Secur., 43
Rebecca LeFebvre (2012)
The human element in cyber security: a study on student motivation to act
Noa Aharony (2014)
The effect of personal and situational factors on LIS students' and professionals' intentions to use e-booksLibrary & Information Science Research, 36
(2017)
McAfee labs quarterly threat report April 2017
Saida Al-Jerbie, Mohd Jali (2014)
A SECOND LOOK AT THE INFORMATION SECURITY AWARENESS AMONG SECONDARY SCHOOL STUDENTS
Hanna Krasnova, Natasha Veltri (2011)
Behind the Curtains of Privacy Calculus on Social Networking Sites: The Study of Germany and the USA
Jin-Liang Wang, L. Jackson, Da-Jun Zhang, Zhi-Qiang Su (2012)
The relationships among the Big Five Personality factors, self-esteem, narcissism, and sensation-seeking to Chinese University students' uses of social networking sites (SNSs)Comput. Hum. Behav., 28
Hui-Lien Chou, J. Sun (2017)
The moderating roles of gender and social norms on the relationship between protection motivation and risky online behavior among in-service teachersComput. Educ., 112
Allen Johnston, Merrill Warkentin, M. Siponen (2015)
An Enhanced Fear Appeal Rhetorical Framework: Leveraging Threats to the Human Asset Through Sanctioning RhetoricMIS Q., 39
K. Parsons, Agata McCormac, M. Butavicius, M. Pattinson, C. Jerram (2014)
Determining employee awareness using the Human Aspects of Information Security Questionnaire (HAIS-Q)Comput. Secur., 42
Gilad Chen, S. Gully, D. Eden (2001)
Validation of a New General Self-Efficacy ScaleOrganizational Research Methods, 4
The study focuses on adolescents and the influence the big five great personality traits – extroversion, agreeableness, neuroticism, openness to experiences and conscientiousness – on self-disclosure. These personality traits, combined with the ability to cope with stress, determine the degree of threat felt by an individual towards their information, their evaluation of their personal ability to keep their information secure, and their willingness to secure information.Design/methodology/approachFive questionnaires relating to the big five personality traits, self-disclosure, cognitive assessment, self-efficacy and IS awareness were distributed among 157 adolescents.FindingsReadiness for IS. Furthermore, the study showed that the more ostentatiousness, agreeable, goal oriented and open the subjects are, the lower they will evaluate the threat to their information. A relationship was also revealed between the subjects' agreeableness, goal orientation and their information threat assessment. It was also found that the more extroverted, agreeable, conscientious and the more inclined to self-disclosure, the higher they evaluate their self-ability to handle threats to their information.Originality/valueFor IS behavior to become second nature to adolescents they must first be educated and trained to do so. Knowing what motivates them and, on the other hand, what hinders them, to practice IS can help build training models for teachers which may be adapted according to their personal traits, thus getting the most out of such programs.
Online Information Review – Emerald Publishing
Published: Aug 30, 2021
Keywords: Big five personality traits; Information security; InfoSec behavior; Threat assessment
Read and print from thousands of top scholarly journals.
Already have an account? Log in
Bookmark this article. You can see your Bookmarks on your DeepDyve Library.
To save an article, log in first, or sign up for a DeepDyve account if you don’t already have one.
Copy and paste the desired citation format or use the link below to download a file formatted for EndNote
Access the full text.
Sign up today, get DeepDyve free for 14 days.
All DeepDyve websites use cookies to improve your online experience. They were placed on your computer when you launched this website. You can change your cookie settings through your browser.