Exploring potential gender differences in information security and privacy

PurposeInformation technology users often fail to adopt necessary security and privacy measures, leading to increased risk of cybercrimes. There has been limited research on how demographic differences influence information security behaviour and understanding this could be important in identifying...

Full description

Saved in:
Bibliographic Details
Published inInformation and computer security Vol. 29; no. 5; pp. 850 - 865
Main Authors McGill, Tanya, Thompson, Nik
Format Journal Article
LanguageEnglish
Published Bingley Emerald Group Publishing Limited 12.11.2021
Subjects
Online AccessGet full text
ISSN2056-4961
2056-497X
DOI10.1108/ICS-07-2020-0125

Cover

Abstract PurposeInformation technology users often fail to adopt necessary security and privacy measures, leading to increased risk of cybercrimes. There has been limited research on how demographic differences influence information security behaviour and understanding this could be important in identifying users who may be more likely to have poor information security behaviour. This study aims to investigate whether there are any gender differences in security and privacy behaviours and perceptions, to identify potential differences that may have implications for protecting users’ privacy and securing their devices, software and data.Design/methodology/approachThis paper addresses this research gap by investigating security behaviours and perceptions in the following two studies: one focussing on information security and one on information privacy. Data was collected in both studies using anonymous online surveys.FindingsThis study finds significant differences between men and women in over 40% of the security and privacy behaviours considered, suggesting that overall levels of both are significantly lower for women than for men, with behaviours that require more technical skill being adopted less by female users. Furthermore, individual perceptions exhibited some gender differences.Originality/valueThis research suggests that potential gender differences in some security and privacy behaviours and perceptions should be taken into account when designing information security education, training and awareness initiatives for both organisations and the broader community. This study also provides a strong foundation to explore information security individual differences more deeply.
AbstractList PurposeInformation technology users often fail to adopt necessary security and privacy measures, leading to increased risk of cybercrimes. There has been limited research on how demographic differences influence information security behaviour and understanding this could be important in identifying users who may be more likely to have poor information security behaviour. This study aims to investigate whether there are any gender differences in security and privacy behaviours and perceptions, to identify potential differences that may have implications for protecting users’ privacy and securing their devices, software and data.Design/methodology/approachThis paper addresses this research gap by investigating security behaviours and perceptions in the following two studies: one focussing on information security and one on information privacy. Data was collected in both studies using anonymous online surveys.FindingsThis study finds significant differences between men and women in over 40% of the security and privacy behaviours considered, suggesting that overall levels of both are significantly lower for women than for men, with behaviours that require more technical skill being adopted less by female users. Furthermore, individual perceptions exhibited some gender differences.Originality/valueThis research suggests that potential gender differences in some security and privacy behaviours and perceptions should be taken into account when designing information security education, training and awareness initiatives for both organisations and the broader community. This study also provides a strong foundation to explore information security individual differences more deeply.
Author McGill, Tanya
Thompson, Nik
Author_xml – sequence: 1
  givenname: Tanya
  surname: McGill
  fullname: McGill, Tanya
– sequence: 2
  givenname: Nik
  surname: Thompson
  fullname: Thompson, Nik
BookMark eNp1kEFLAzEQhYNUsNbePS54Xp3ZNNndo5SqlYIHFbyFbJItKdtkTVKx_96tFQ-CMDBzeG9m3ndORs47Q8glwjUiVDfL-XMOZV5AATlgwU7IuADG81ldvo1-Z45nZBrjBgCwRk45jsnj4rPvfLBunfU-GZes7LK1cdqETNu2NcE4ZWJm3VCtD1uZrHdZNGoXbNpn0umsD_ZDqv0FOW1lF830p0_I693iZf6Qr57ul_PbVa4oYspZVRiukXLJoKiBybrRdIYVMqVBG9C0aThttOaSa1bhjKsKa8kV1bw2paQTcnXc2wf_vjMxiY3fBTecFAWr2ZCTVmxQwVGlgo8xmFYMb25l2AsEcYAmBmgCSnGAJg7QBgv_Y1E2fedNQdruf-MXkRdyzQ
CitedBy_id crossref_primary_10_1093_cybsec_tyae012
crossref_primary_10_1371_journal_pone_0301178
crossref_primary_10_1007_s13178_024_01015_1
crossref_primary_10_1080_07421222_2023_2267318
crossref_primary_10_1057_s41300_023_00176_2
crossref_primary_10_3389_fpubh_2024_1334263
crossref_primary_10_1007_s10639_022_11086_5
crossref_primary_10_1007_s44217_024_00144_4
crossref_primary_10_1080_10447318_2023_2291608
crossref_primary_10_62273_PELX2965
Cites_doi 10.1016/S1353-4858(19)30032-7
10.2307/25750694
10.1016/j.cose.2017.11.015
10.1108/ICS-03-2017-0009
10.2190/H7E1-XMM7-GU9B-3HWR
10.1080/0144929X.2016.1212091
10.1080/0144929X.2017.1352028
10.1007/s11257-019-09236-5
10.17705/1jais.00232
10.1016/j.chb.2008.04.005
10.1108/ICS-04-2017-0020
10.1016/j.chb.2018.01.028
10.1016/j.compedu.2016.11.003
10.1023/A:1011902718709
10.1016/j.cose.2016.02.009
10.1080/00208825.1983.11656358
10.1016/j.chb.2016.12.040
10.1145/1290958.1290968
10.2307/249477
10.1016/j.chb.2012.07.008
10.1016/j.chb.2017.12.001
10.1080/07421222.1992.11517949
10.1111/j.1745-6606.2009.01148.x
10.2307/25750704
10.1016/j.cose.2017.07.003
10.1080/17437199.2014.922895
10.1016/j.ijinfomgt.2019.05.004
10.1287/isre.6.2.144
10.1145/1325555.1325569
10.1080/15252019.2010.10722168
10.25300/MISQ/2016/40.1.09
10.1016/S0148-2963(02)00363-6
10.1037/1089-2699.6.1.101
10.1016/j.chb.2014.05.041
10.1016/j.cose.2011.10.007
10.1108/ICS-03-2018-0037
10.1089/cpb.2005.8.21
10.1108/ICS-04-2019-0041
10.1016/j.im.2013.08.006
10.1016/j.cose.2014.03.004
10.1108/ICS-01-2019-0022
10.2307/3250981
10.1002/asi.24372
10.1016/j.chb.2016.11.065
10.1016/j.im.2015.03.002
ContentType Journal Article
Copyright Emerald Publishing Limited 2021
Copyright_xml – notice: Emerald Publishing Limited 2021
DBID AAYXX
CITATION
0-V
7SC
7WY
7WZ
7XB
8AO
8FD
8FE
8FG
8FI
ABUWG
AFKRA
ALSLI
ARAPS
AZQEC
BENPR
BEZIV
BGLVJ
BGRYB
CCPQU
CNYFK
DWQXO
E3H
F2A
FYUFA
F~G
GNUQQ
HCIFZ
JQ2
K6~
K7-
L.-
L.0
L7M
L~C
L~D
M0C
M0N
M0O
M0T
M1O
P5Z
P62
PHGZM
PHGZT
PJZUB
PKEHL
PPXIY
PQBIZ
PQEST
PQGLB
PQQKQ
PQUKI
PRQQA
PYYUZ
Q9U
DOI 10.1108/ICS-07-2020-0125
DatabaseName CrossRef
ProQuest Social Sciences Premium Collection
Computer and Information Systems Abstracts
ABI/INFORM Collection
ABI/INFORM Global (PDF only)
ProQuest Central (purchase pre-March 2016)
ProQuest Pharma Collection
Technology Research Database
ProQuest SciTech Collection
ProQuest Technology Collection
ProQuest Hospital Collection
ProQuest Central
ProQuest Central UK/Ireland
Social Science Premium Collection
Advanced Technologies & Aerospace Collection
ProQuest Central Essentials
ProQuest Central
Business Premium Collection
Technology Collection (via ProQuest SciTech Premium Collection)
Criminology Collection
ProQuest One Community College
Library & Information Science Collection
ProQuest Central
Library & Information Sciences Abstracts (LISA)
Library & Information Science Abstracts (LISA)
Health Research Premium Collection
ABI/INFORM Global (Corporate)
ProQuest Central Student
ProQuest SciTech Premium Collection
ProQuest Computer Science Collection
ProQuest Business Collection
Computer Science Database
ABI/INFORM Professional Advanced
ABI/INFORM Professional Standard
Advanced Technologies Database with Aerospace
Computer and Information Systems Abstracts – Academic
Computer and Information Systems Abstracts Professional
ABI/INFORM Global
Computing Database
Criminal Justice Database
Healthcare Administration Database
Library Science Database
ProQuest advanced technologies & aerospace journals
ProQuest Advanced Technologies & Aerospace Collection
ProQuest Central Premium
ProQuest One Academic (New)
ProQuest Health & Medical Research Collection
ProQuest One Academic Middle East (New)
ProQuest One Health & Nursing
ProQuest One Business
ProQuest One Academic Eastern Edition (DO NOT USE)
ProQuest One Applied & Life Sciences
ProQuest One Academic
ProQuest One Academic UKI Edition
ProQuest One Social Sciences
ABI/INFORM Collection China
ProQuest Central Basic
DatabaseTitle CrossRef
Computer Science Database
ProQuest Central Student
Library and Information Science Abstracts (LISA)
ProQuest Advanced Technologies & Aerospace Collection
ProQuest Central Essentials
ProQuest Computer Science Collection
Computer and Information Systems Abstracts
SciTech Premium Collection
ABI/INFORM Complete
ProQuest One Applied & Life Sciences
Health Research Premium Collection
Health & Medical Research Collection
Library & Information Science Collection
ProQuest Central (New)
Advanced Technologies & Aerospace Collection
Business Premium Collection
Social Science Premium Collection
ABI/INFORM Global
ProQuest One Academic Eastern Edition
ProQuest Hospital Collection
ProQuest Technology Collection
ProQuest Business Collection
Criminology Collection
ProQuest Social Sciences Premium Collection
ProQuest One Academic UKI Edition
ProQuest One Academic
ProQuest One Academic (New)
ABI/INFORM Global (Corporate)
ProQuest One Business
Technology Collection
Technology Research Database
Computer and Information Systems Abstracts – Academic
ProQuest One Academic Middle East (New)
ProQuest Central (Alumni Edition)
ProQuest One Community College
ProQuest One Health & Nursing
ProQuest Pharma Collection
ProQuest Central
ABI/INFORM Professional Advanced
ProQuest Library Science
ProQuest Health & Medical Research Collection
ProQuest Criminal Justice
ABI/INFORM Professional Standard
ProQuest Central Korea
Advanced Technologies Database with Aerospace
ProQuest Computing
ProQuest One Social Sciences
ProQuest Central Basic
ProQuest Health Management
ABI/INFORM China
ProQuest SciTech Collection
Computer and Information Systems Abstracts Professional
Advanced Technologies & Aerospace Database
DatabaseTitleList Computer Science Database
Database_xml – sequence: 1
  dbid: 8FG
  name: ProQuest Technology Collection
  url: https://search.proquest.com/technologycollection1
  sourceTypes: Aggregation Database
DeliveryMethod fulltext_linktorsrc
Discipline Computer Science
Library & Information Science
Business
EISSN 2056-497X
EndPage 865
ExternalDocumentID 10_1108_ICS_07_2020_0125
GroupedDBID .WU
0-V
3FY
5VS
7WY
8AO
8FE
8FG
8FI
8FW
9F-
AAGBP
AAKOT
AAMCF
AAUDR
AAXBI
AAYXX
ABIJV
ABJNI
ABSDC
ABUWG
ABXQL
ABYQI
ACGFS
ACTSA
ACZKX
ADBBV
ADOMW
ADQHX
ADWNT
AFKRA
AFNTC
AFZLO
AGTVX
AHMHQ
AILOG
AJEBP
ALIPV
ALMA_UNASSIGNED_HOLDINGS
ALSLI
AODMV
AQUVI
ARALO
ARAPS
AUCOK
AZQEC
BENPR
BEZIV
BGLVJ
BGRYB
BPHCQ
BVXVI
CCPQU
CITATION
CNYFK
DWQXO
EBS
ECCUG
FNNZZ
FYUFA
GEA
GEI
GMX
GNUQQ
GQ.
H13
HCIFZ
K6V
K6~
K7-
KBGRL
M0C
M0O
M0T
M1O
M42
P62
PHGZM
PHGZT
PJZUB
PPXIY
PQBIZ
PQGLB
PQQKQ
PROAC
PRQQA
SCAQC
SDURG
SLOBJ
TEM
TGG
TMF
TMI
TMT
UKHRP
Z11
Z12
Z21
ZYZAG
.DC
29I
4.4
5GY
70U
77K
7SC
7XB
8FD
8R4
8R5
9E0
AAPSD
ABEAN
ACGFO
AEBZA
AEDOK
AEMMR
AETHF
AFNZV
AIAFM
AJFKA
APPLU
ATGMP
CS3
DU5
E3H
F2A
GEB
GEC
GMM
GMN
J1Y
JI-
JL0
JQ2
L.-
L.0
L7M
L~C
L~D
M0N
P2P
PKEHL
PQEST
PQUKI
Q2X
Q3A
Q9U
RWL
TAE
TDQ
TET
TMD
TMK
TMX
Z22
ID FETCH-LOGICAL-c311t-582e6d136a502905a9bd341815cd0de0d3bb63bdd6a6d58146c819a6c3d69e7a3
IEDL.DBID GEI
ISSN 2056-4961
IngestDate Wed Aug 13 04:50:57 EDT 2025
Thu Jul 31 00:40:18 EDT 2025
Thu Apr 24 23:11:45 EDT 2025
IsPeerReviewed true
IsScholarly true
Issue 5
Language English
License https://www.emerald.com/insight/site-policies
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c311t-582e6d136a502905a9bd341815cd0de0d3bb63bdd6a6d58146c819a6c3d69e7a3
Notes ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 14
PQID 2595496385
PQPubID 31135
PageCount 16
ParticipantIDs proquest_journals_2595496385
crossref_primary_10_1108_ICS_07_2020_0125
crossref_citationtrail_10_1108_ICS_07_2020_0125
PublicationCentury 2000
PublicationDate 2021-11-12
PublicationDateYYYYMMDD 2021-11-12
PublicationDate_xml – month: 11
  year: 2021
  text: 2021-11-12
  day: 12
PublicationDecade 2020
PublicationPlace Bingley
PublicationPlace_xml – name: Bingley
PublicationTitle Information and computer security
PublicationYear 2021
Publisher Emerald Group Publishing Limited
Publisher_xml – name: Emerald Group Publishing Limited
References (key2021111012415788800_ref042) 2015
(key2021111012415788800_ref036) 2012; 28
(key2021111012415788800_ref040) 2014; 38
(key2021111012415788800_ref041) 2019; 28
(key2021111012415788800_ref045) 2017; 25
(key2021111012415788800_ref028) 2010; 11
(key2021111012415788800_ref060) 2015; 52
(key2021111012415788800_ref008) 2005; 8
(key2021111012415788800_ref003) 2018; 26
(key2021111012415788800_ref047) 2001; 19
(key2021111012415788800_ref056) 2020; 71
(key2021111012415788800_ref064) 2008; 24
(key2021111012415788800_ref062) 1993; 29
(key2021111012415788800_ref059) 2016; 59
(key2021111012415788800_ref035) 2009; 43
(key2021111012415788800_ref057) 2017; 70
(key2021111012415788800_ref015) 2004; 57
(key2021111012415788800_ref026) 2009; 12
(key2021111012415788800_ref016) 2018; 73
(key2021111012415788800_ref019) 2009
(key2021111012415788800_ref032) 2017; 36
(key2021111012415788800_ref010) 1995; 12
(key2021111012415788800_ref012) 2016; 40
(key2021111012415788800_ref018) 1992; 9
(key2021111012415788800_ref007) 2017; 69
key2021111012415788800_ref043
(key2021111012415788800_ref006) 2010; 34
(key2021111012415788800_ref044) 2010; 34
(key2021111012415788800_ref034) 2018; 83
(key2021111012415788800_ref038) 2002; 6
(key2021111012415788800_ref024) 2007; 50
(key2021111012415788800_ref004) 2015
(key2021111012415788800_ref029) 2020; 50
(key2021111012415788800_ref014) 2017; 36
(key2021111012415788800_ref050) 2010
(key2021111012415788800_ref030) 2010
key2021111012415788800_ref001
(key2021111012415788800_ref051) 2014; 51
(key2021111012415788800_ref027) 2008; 51
key2021111012415788800_ref005
key2021111012415788800_ref049
(key2021111012415788800_ref037) 2018; 41
(key2021111012415788800_ref020) 2004
key2021111012415788800_ref054
(key2021111012415788800_ref046) 2014; 43
(key2021111012415788800_ref063) 2005
(key2021111012415788800_ref002) 2019; 29
(key2021111012415788800_ref017) 2014
(key2021111012415788800_ref033) 2018
(key2021111012415788800_ref039) 1978
(key2021111012415788800_ref061) 2000; 24
(key2021111012415788800_ref025) 2018
(key2021111012415788800_ref055) 2020
(key2021111012415788800_ref048) 2020; 28
(key2021111012415788800_ref023) 2012; 31
(key2021111012415788800_ref053) 1995; 6
(key2021111012415788800_ref022) 2010; 10
(key2021111012415788800_ref013) 2018; 81
(key2021111012415788800_ref031) 2017; 69
(key2021111012415788800_ref052) 1996; 20
(key2021111012415788800_ref021) 1983; 13
(key2021111012415788800_ref058) 2016; 10
(key2021111012415788800_ref011) 2017; 105
(key2021111012415788800_ref009) 2017; 25
References_xml – ident: key2021111012415788800_ref001
  doi: 10.1016/S1353-4858(19)30032-7
– volume-title: Psychometric Theory
  year: 1978
  ident: key2021111012415788800_ref039
– volume: 34
  start-page: 613
  issue: 3
  year: 2010
  ident: key2021111012415788800_ref006
  article-title: Practicing safe computing: a multimethod empirical examination of home computer user security behavioural intentions
  publication-title: MIS Quarterly
  doi: 10.2307/25750694
– volume: 73
  start-page: 345
  year: 2018
  ident: key2021111012415788800_ref016
  article-title: Correlating human traits and cyber security behavior intentions
  publication-title: Computers and Security
  doi: 10.1016/j.cose.2017.11.015
– volume: 25
  start-page: 593
  issue: 5
  year: 2017
  ident: key2021111012415788800_ref009
  article-title: Spear phishing in organisations explained
  publication-title: Information and Computer Security
  doi: 10.1108/ICS-03-2017-0009
– volume: 12
  start-page: 147
  issue: 2
  year: 1995
  ident: key2021111012415788800_ref010
  article-title: Gender differences in self-efficacy and attitudes toward computers
  publication-title: Journal of Educational Computing Research
  doi: 10.2190/H7E1-XMM7-GU9B-3HWR
– volume: 36
  start-page: 178
  issue: 2
  year: 2017
  ident: key2021111012415788800_ref014
  article-title: Exploring the relative impact of biological sex and masculinity–femininity values on information technology use
  publication-title: Behaviour and Information Technology
  doi: 10.1080/0144929X.2016.1212091
– volume-title: A Primer on Partial Least Squares Structural Equation Modeling (PLS-SEM)
  year: 2014
  ident: key2021111012415788800_ref017
– volume: 36
  start-page: 1111
  issue: 11
  year: 2017
  ident: key2021111012415788800_ref032
  article-title: Old risks, new challenges: exploring differences in security between home computer and mobile device use
  publication-title: Behaviour and Information Technology
  doi: 10.1080/0144929X.2017.1352028
– volume: 29
  start-page: 701
  issue: 3
  year: 2019
  ident: key2021111012415788800_ref002
  article-title: Exploring user behavioral data for adaptive cybersecurity
  publication-title: User Modeling and User-Adapted Interaction
  doi: 10.1007/s11257-019-09236-5
– volume: 12
  start-page: 93
  issue: 1
  year: 2009
  ident: key2021111012415788800_ref026
  article-title: Consumer concerns for healthcare information privacy: a comparison of US and Canadian perspectives
  publication-title: Research in Healthcare Financial Management
– volume: 11
  start-page: 394
  issue: 7
  year: 2010
  ident: key2021111012415788800_ref028
  article-title: Understanding security behaviors in personal computer usage: a threat avoidance perspective
  publication-title: Journal of the Association for Information Systems
  doi: 10.17705/1jais.00232
– volume: 24
  start-page: 2799
  issue: 6
  year: 2008
  ident: key2021111012415788800_ref064
  article-title: Security lapses and the omission of information security measures: a threat control model and empirical test
  publication-title: Computers in Human Behavior
  doi: 10.1016/j.chb.2008.04.005
– volume-title: Proceedings of the International Conference on Human Aspects of Information Security, Privacy, and Trust
  year: 2015
  ident: key2021111012415788800_ref004
  article-title: Exploring the adoption of physical security controls in smartphones
– volume: 25
  start-page: 190
  issue: 2
  year: 2017
  ident: key2021111012415788800_ref045
  article-title: Factors in an end user security expertise instrument
  publication-title: Information and Computer Security
  doi: 10.1108/ICS-04-2017-0020
– volume: 83
  start-page: 32
  year: 2018
  ident: key2021111012415788800_ref034
  article-title: The impact of information security threat awareness on privacy-protective behaviors
  publication-title: Computers in Human Behavior
  doi: 10.1016/j.chb.2018.01.028
– volume: 105
  start-page: 1
  year: 2017
  ident: key2021111012415788800_ref011
  article-title: Gender and attitudes toward technology use: a meta-analysis
  publication-title: Computers and Education
  doi: 10.1016/j.compedu.2016.11.003
– volume: 19
  start-page: 122
  issue: 3
  year: 2001
  ident: key2021111012415788800_ref047
  article-title: Transforming the ‘weakest link’ – a human/computer interaction approach to usable and effective security
  publication-title: BT Technology Journal
  doi: 10.1023/A:1011902718709
– volume: 59
  start-page: 138
  year: 2016
  ident: key2021111012415788800_ref059
  article-title: Understanding online safety behaviors: a protection motivation theory perspective
  publication-title: Computers and Security
  doi: 10.1016/j.cose.2016.02.009
– year: 2005
  ident: key2021111012415788800_ref063
  article-title: A protection motivation theory approach to home wireless security
– volume: 13
  start-page: 46
  issue: 1-2
  year: 1983
  ident: key2021111012415788800_ref021
  article-title: National cultures in four dimensions: a research-based theory of cultural differences among nations
  publication-title: International Studies of Management and Organization
  doi: 10.1080/00208825.1983.11656358
– year: 2018
  ident: key2021111012415788800_ref025
  article-title: Privacy concerns and acceptance of government surveillance in Australia
– year: 2020
  ident: key2021111012415788800_ref055
  article-title: Who are you talking about? Contrasting determinants of online disclosure about self or others
  publication-title: Information Technology and People
– volume: 69
  start-page: 437
  year: 2017
  ident: key2021111012415788800_ref007
  article-title: Gender difference and employees' cybersecurity behaviors
  publication-title: Computers in Human Behavior
  doi: 10.1016/j.chb.2016.12.040
– volume: 50
  start-page: 94
  issue: 10
  year: 2007
  ident: key2021111012415788800_ref024
  article-title: Social phishing
  publication-title: Communications of the ACM
  doi: 10.1145/1290958.1290968
– ident: key2021111012415788800_ref049
– volume: 20
  start-page: 167
  issue: 2
  year: 1996
  ident: key2021111012415788800_ref052
  article-title: Information privacy: measuring individual's concerns about organizational practices
  publication-title: MIS Quarterly
  doi: 10.2307/249477
– volume: 28
  start-page: 2366
  issue: 6
  year: 2012
  ident: key2021111012415788800_ref036
  article-title: Information privacy concerns, antecedents and privacy measure use in social networking sites: evidence from Malaysia
  publication-title: Computers in Human Behavior
  doi: 10.1016/j.chb.2012.07.008
– year: 2018
  ident: key2021111012415788800_ref033
  article-title: Gender differences in information security perceptions and behaviour
– volume: 41
  start-page: 147
  issue: 1
  year: 2018
  ident: key2021111012415788800_ref037
  article-title: Short-term and long-term effects of fear appeals in improving compliance with password guidelines
  publication-title: Communications of the Association for Information Systems
– volume: 81
  start-page: 42
  year: 2018
  ident: key2021111012415788800_ref013
  article-title: The role of privacy fatigue in online privacy behavior
  publication-title: Computers in Human Behavior
  doi: 10.1016/j.chb.2017.12.001
– volume: 9
  start-page: 93
  issue: 1
  year: 1992
  ident: key2021111012415788800_ref018
  article-title: The influence of individual differences on skill in end-user computing
  publication-title: Journal of Management Information Systems
  doi: 10.1080/07421222.1992.11517949
– volume-title: SPSS Explained
  year: 2004
  ident: key2021111012415788800_ref020
– volume: 43
  start-page: 449
  issue: 3
  year: 2009
  ident: key2021111012415788800_ref035
  article-title: Toward an understanding of the online consumer’s risky behavior and protection practices
  publication-title: Journal of Consumer Affairs
  doi: 10.1111/j.1745-6606.2009.01148.x
– volume: 34
  start-page: 757
  issue: 4
  year: 2010
  ident: key2021111012415788800_ref044
  article-title: Improving employees' compliance through information systems security training: an action research study
  publication-title: MIS Quarterly
  doi: 10.2307/25750704
– ident: key2021111012415788800_ref054
– volume: 70
  start-page: 376
  year: 2017
  ident: key2021111012415788800_ref057
  article-title: Security begins at home”: determinants of home computer and mobile device security behavior
  publication-title: Computers and Security
  doi: 10.1016/j.cose.2017.07.003
– volume: 10
  start-page: 1
  issue: 1
  year: 2016
  ident: key2021111012415788800_ref058
  article-title: Reasoned versus reactive prediction of behaviour: a meta-analysis of the prototype willingness model
  publication-title: Health Psychology Review
  doi: 10.1080/17437199.2014.922895
– volume: 50
  start-page: 45
  year: 2020
  ident: key2021111012415788800_ref029
  article-title: Examining gender differences in people’s information-sharing decisions on social networking sites
  publication-title: International Journal of Information Management
  doi: 10.1016/j.ijinfomgt.2019.05.004
– volume: 6
  start-page: 144
  issue: 2
  year: 1995
  ident: key2021111012415788800_ref053
  article-title: Understanding information technology usage: a test of competing models
  publication-title: Information Systems Research
  doi: 10.1287/isre.6.2.144
– volume: 51
  start-page: 71
  issue: 3
  year: 2008
  ident: key2021111012415788800_ref027
  article-title: Promoting personal responsibility for internet safety
  publication-title: Communications of the ACM
  doi: 10.1145/1325555.1325569
– volume: 10
  start-page: 28
  issue: 2
  year: 2010
  ident: key2021111012415788800_ref022
  article-title: Gender differences in privacy-related measures for young adult facebook users
  publication-title: Journal of Interactive Advertising
  doi: 10.1080/15252019.2010.10722168
– volume: 40
  start-page: 205
  issue: 1
  year: 2016
  ident: key2021111012415788800_ref012
  article-title: Individuals' internet security perceptions and behaviors: polycontextual contrasts between the United States and China
  publication-title: MIS Quarterly
  doi: 10.25300/MISQ/2016/40.1.09
– volume: 57
  start-page: 768
  issue: 7
  year: 2004
  ident: key2021111012415788800_ref015
  article-title: Gender differences in the perceived risk of buying online and the effects of receiving a site recommendation
  publication-title: Journal of Business Research
  doi: 10.1016/S0148-2963(02)00363-6
– volume: 6
  start-page: 101
  issue: 1
  year: 2002
  ident: key2021111012415788800_ref038
  article-title: Harvesting implicit group attitudes and beliefs from a demonstration web site
  publication-title: Group Dynamics: Theory, Research, and Practice
  doi: 10.1037/1089-2699.6.1.101
– year: 2010
  ident: key2021111012415788800_ref030
  article-title: The influence of human factors on vulnerability to information security breaches
– volume: 38
  start-page: 296
  year: 2014
  ident: key2021111012415788800_ref040
  article-title: Understanding privacy knowledge and skill in mobile communication
  publication-title: Computers in Human Behavior
  doi: 10.1016/j.chb.2014.05.041
– volume: 31
  start-page: 83
  issue: 1
  year: 2012
  ident: key2021111012415788800_ref023
  article-title: Understanding information systems security policy compliance: an integration of the theory of planned behavior and the protection motivation theory
  publication-title: Computers and Security
  doi: 10.1016/j.cose.2011.10.007
– volume: 29
  start-page: 515
  issue: 7/8
  year: 1993
  ident: key2021111012415788800_ref062
  article-title: Gender roles, computer attitudes, and dyadic computer interaction performance in college students
  publication-title: Sex Roles
– volume: 26
  start-page: 306
  issue: 3
  year: 2018
  ident: key2021111012415788800_ref003
  article-title: Identifying and predicting the factors affecting end-users’ risk-taking behavior
  publication-title: Information and Computer Security
  doi: 10.1108/ICS-03-2018-0037
– volume-title: Proceedings of the International Conference on Human Aspects of Information Security, Privacy, and Trust
  year: 2015
  ident: key2021111012415788800_ref042
  article-title: Factors that influence information security behavior: an australian web-based study
– volume: 8
  start-page: 21
  issue: 1
  year: 2005
  ident: key2021111012415788800_ref008
  article-title: Gender and information and communication technologies (ICT) anxiety: male self-assurance and female hesitation
  publication-title: CyberPsychology and Behavior
  doi: 10.1089/cpb.2005.8.21
– volume: 28
  start-page: 293
  issue: 2
  year: 2020
  ident: key2021111012415788800_ref048
  article-title: Cybersecurity behaviour of smartphone users in India: an empirical analysis
  publication-title: Information and Computer Security
  doi: 10.1108/ICS-04-2019-0041
– volume: 51
  start-page: 217
  issue: 2
  year: 2014
  ident: key2021111012415788800_ref051
  article-title: Employees’ adherence to information security policies: an exploratory field study
  publication-title: Information and Management
  doi: 10.1016/j.im.2013.08.006
– volume: 43
  start-page: 90
  year: 2014
  ident: key2021111012415788800_ref046
  article-title: Information security knowledge sharing in organizations: investigating the effect of behavioral information security governance and national culture
  publication-title: Computers and Security
  doi: 10.1016/j.cose.2014.03.004
– volume-title: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
  year: 2010
  ident: key2021111012415788800_ref050
  article-title: Who falls for phish?: a demographic analysis of phishing susceptibility and effectiveness of interventions
– volume: 28
  start-page: 1
  issue: 1
  year: 2019
  ident: key2021111012415788800_ref041
  article-title: Matching training to individual learning styles improves information security awareness
  publication-title: Information and Computer Security
  doi: 10.1108/ICS-01-2019-0022
– volume: 24
  start-page: 115
  issue: 1
  year: 2000
  ident: key2021111012415788800_ref061
  article-title: Why don't men ever stop to ask for directions? Gender, social influence, and their role in technology acceptance and usage behavior
  publication-title: MIS Quarterly
  doi: 10.2307/3250981
– volume: 71
  start-page: 1129
  issue: 9
  year: 2020
  ident: key2021111012415788800_ref056
  article-title: Cultural factors and the role of privacy concerns in acceptance of government surveillance
  publication-title: Journal of the Association for Information Science and Technology
  doi: 10.1002/asi.24372
– volume: 69
  start-page: 151
  year: 2017
  ident: key2021111012415788800_ref031
  article-title: Individual differences and information security awareness
  publication-title: Computers in Human Behavior
  doi: 10.1016/j.chb.2016.11.065
– ident: key2021111012415788800_ref043
– ident: key2021111012415788800_ref005
– year: 2009
  ident: key2021111012415788800_ref019
  article-title: Are men more technology-oriented than women? The role of gender on the development of general computer self-efficacy of college students
– volume: 52
  start-page: 506
  issue: 4
  year: 2015
  ident: key2021111012415788800_ref060
  article-title: Learning to cope with information security risks regarding mobile device loss or theft: an empirical examination
  publication-title: Information and Management
  doi: 10.1016/j.im.2015.03.002
SSID ssj0001916361
ssj0004345
Score 2.3460188
Snippet PurposeInformation technology users often fail to adopt necessary security and privacy measures, leading to increased risk of cybercrimes. There has been...
SourceID proquest
crossref
SourceType Aggregation Database
Enrichment Source
Index Database
StartPage 850
SubjectTerms Behavior
Cybercrime
Electronic devices
Females
Gender aspects
Gender differences
Men
Passwords
Perceptions
Personal information
Privacy
Security
Security management
Self-efficacy
Social networks
Social research
Software upgrading
Women
SummonAdditionalLinks – databaseName: ProQuest Technology Collection
  dbid: 8FG
  link: http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwfV3dS8MwEA86QXwRnYrTTfIggg9hadKk7ZPIcM6BvuhgbyVNOhlIN7cq-N9716Wbvuy5vTzcXe4rd_cj5NoKpyYyEEwoG7HQGcuS0DgWK5NxcLeRsFjveH7Rg1E4HKuxL7gtfVtlbRMrQ-1mFmvkXQjTIZUBbVF380-GqFH4uuohNHbJXgCeBvU87j9u5iJlBVIswMkzoA3qZ0oed596r1ihE5g9gY1W_93Sf6tcuZr-ETn0MSK9Xwn1mOzkRZPs1y3qTdLxwwb0hvppIuQu9df0hAzXjXV0PiuxHQhOe68w42gNiALmgU4LOv1Dv_RQdtQUjs4X029jf07JqP_w1hswj5nArAyCkqlY5NoFUhvFRcKVSTIHjioOlHXc5dzJLNMyc04b7RTW_yzEBEZb6XSSR0aekUYxK_JzQrm1IppAfma1DZULTYS7wUCwcjVy2iLdmmWp9QvFEdfiI60SCx6nwOSURykyOUUmt8jtmmK-Wqax5d92LYXUX6tlulGCi-2fL8mBwOYT7NcTbdIoF195B6KHMruqVOQXUBrA2g
  priority: 102
  providerName: ProQuest
Title Exploring potential gender differences in information security and privacy
URI https://www.proquest.com/docview/2595496385
Volume 29
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwrV1JS8NAFH5ovXhxF-tS5uDFQ0wyk5kkxyrWBaziAuolTGZSLWpa2lTQX--bJFNQRBC85BCyzrx8b8mb7wPYVVTzHvOpQ7kKnUBL5cSB1E7EZeqhuw2pMvWO8644uQ3O7vjdDHTtWpiyrbIqx5Q43c_HJkl1TeM2ovCUcMCo15weXpsqGzUZEOIsd03F2n0qXl9m0dK5sEt_bcUFIyFWEqhS9PpOEAvf_rf84WJf_dRXmC59T2cRBvapq5aT5_1Jke6rj2-Ejv_3WkuwUIeppF3Z1TLMZPkKLFoJCFIjwiqcTXv4yHBg7oHmTB5LeTpitVcQiUg_JzVFqzEEMq5V84jMNRmO-m9Sva_Bbefo5vDEqeUZHMV8v3B4RDOhfSYk92jscRmnGn1i5HOlPZ15mqWpYKnWQgrNTalRYfghhWJaxFko2To08kGebQDxlKJhD1NBJVTAdSBDQ0OGNsSq1a1NcO1kJKrmLjcSGi9JmcN4UYKDlnhhYgYtMYPWhL3pGcOKt-OXY7ft_Cb1FzxOMC3E1BnRiW_-4VJbME9N04vpE6Tb0ChGk2wHo5YibcFs1DluwdzBUffyqlWaJm7P_Qvc93D_0D7-BD9B6rU
linkProvider Emerald
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtV1LT9wwEB7BIkEviNIinq0PbSUO1jp27GQPVUUpaJfHClGQuBnHDtVKKLuwC4g_1d_YmawD5cKNc2IrGn-Zl2fmA_jiZdBXKpFcap_xNDjPO6kLPNeuEGhuM-kp33HcN93z9OBCX8zA36YXhsoqG51YK-ow9JQjb6ObjqEMokX_GN1wYo2i29WGQmMKi8Py8QFDtvH33i88369S7u-d7XZ5ZBXgXiXJhOtcliYkyjgtZEdo1ykCqvI80T6IUIqgisKoIgTjTNCUIfNoNZ3xKphOmTmF-87CXEodrS2Y-7nXPzl97sRUNS2yRLeC49cmzcWoyNu93d-UE5QUr6FV0C8N4Us7UBu3_SVYjF4p25nC6D3MlNUyzDdF8cuwFdsb2DcW-5foPFlUDB_g4KmUj42GEypAwt3-1Cx1rKFgQYXEBhUb_Ld-HMnzmKsCG90O7p1__AjnbyLPFWhVw6pcBSa8l9kVRoTe-FSH1GU0jQyhpKZNrmvQbkRmfRxhTkwa17YOZURuUchWZJaEbEnIa7D9tGI0Hd_xyrubzSnY-COP7TPs1l9__BkWumfHR_ao1z_cgHeSSl-oWlBuQmtye1duoe8yKT5FwDC4fGuM_gMZFP7V
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Exploring+potential+gender+differences+in+information+security+and+privacy&rft.jtitle=Information+and+computer+security&rft.au=McGill%2C+Tanya&rft.au=Thompson%2C+Nik&rft.date=2021-11-12&rft.issn=2056-4961&rft.volume=29&rft.issue=5&rft.spage=850&rft.epage=865&rft_id=info:doi/10.1108%2FICS-07-2020-0125&rft.externalDBID=n%2Fa&rft.externalDocID=10_1108_ICS_07_2020_0125
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=2056-4961&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=2056-4961&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=2056-4961&client=summon