Exploring potential gender differences in information security and privacy
PurposeInformation technology users often fail to adopt necessary security and privacy measures, leading to increased risk of cybercrimes. There has been limited research on how demographic differences influence information security behaviour and understanding this could be important in identifying...
Saved in:
Published in | Information and computer security Vol. 29; no. 5; pp. 850 - 865 |
---|---|
Main Authors | , |
Format | Journal Article |
Language | English |
Published |
Bingley
Emerald Group Publishing Limited
12.11.2021
|
Subjects | |
Online Access | Get full text |
ISSN | 2056-4961 2056-497X |
DOI | 10.1108/ICS-07-2020-0125 |
Cover
Abstract | PurposeInformation technology users often fail to adopt necessary security and privacy measures, leading to increased risk of cybercrimes. There has been limited research on how demographic differences influence information security behaviour and understanding this could be important in identifying users who may be more likely to have poor information security behaviour. This study aims to investigate whether there are any gender differences in security and privacy behaviours and perceptions, to identify potential differences that may have implications for protecting users’ privacy and securing their devices, software and data.Design/methodology/approachThis paper addresses this research gap by investigating security behaviours and perceptions in the following two studies: one focussing on information security and one on information privacy. Data was collected in both studies using anonymous online surveys.FindingsThis study finds significant differences between men and women in over 40% of the security and privacy behaviours considered, suggesting that overall levels of both are significantly lower for women than for men, with behaviours that require more technical skill being adopted less by female users. Furthermore, individual perceptions exhibited some gender differences.Originality/valueThis research suggests that potential gender differences in some security and privacy behaviours and perceptions should be taken into account when designing information security education, training and awareness initiatives for both organisations and the broader community. This study also provides a strong foundation to explore information security individual differences more deeply. |
---|---|
AbstractList | PurposeInformation technology users often fail to adopt necessary security and privacy measures, leading to increased risk of cybercrimes. There has been limited research on how demographic differences influence information security behaviour and understanding this could be important in identifying users who may be more likely to have poor information security behaviour. This study aims to investigate whether there are any gender differences in security and privacy behaviours and perceptions, to identify potential differences that may have implications for protecting users’ privacy and securing their devices, software and data.Design/methodology/approachThis paper addresses this research gap by investigating security behaviours and perceptions in the following two studies: one focussing on information security and one on information privacy. Data was collected in both studies using anonymous online surveys.FindingsThis study finds significant differences between men and women in over 40% of the security and privacy behaviours considered, suggesting that overall levels of both are significantly lower for women than for men, with behaviours that require more technical skill being adopted less by female users. Furthermore, individual perceptions exhibited some gender differences.Originality/valueThis research suggests that potential gender differences in some security and privacy behaviours and perceptions should be taken into account when designing information security education, training and awareness initiatives for both organisations and the broader community. This study also provides a strong foundation to explore information security individual differences more deeply. |
Author | McGill, Tanya Thompson, Nik |
Author_xml | – sequence: 1 givenname: Tanya surname: McGill fullname: McGill, Tanya – sequence: 2 givenname: Nik surname: Thompson fullname: Thompson, Nik |
BookMark | eNp1kEFLAzEQhYNUsNbePS54Xp3ZNNndo5SqlYIHFbyFbJItKdtkTVKx_96tFQ-CMDBzeG9m3ndORs47Q8glwjUiVDfL-XMOZV5AATlgwU7IuADG81ldvo1-Z45nZBrjBgCwRk45jsnj4rPvfLBunfU-GZes7LK1cdqETNu2NcE4ZWJm3VCtD1uZrHdZNGoXbNpn0umsD_ZDqv0FOW1lF830p0_I693iZf6Qr57ul_PbVa4oYspZVRiukXLJoKiBybrRdIYVMqVBG9C0aThttOaSa1bhjKsKa8kV1bw2paQTcnXc2wf_vjMxiY3fBTecFAWr2ZCTVmxQwVGlgo8xmFYMb25l2AsEcYAmBmgCSnGAJg7QBgv_Y1E2fedNQdruf-MXkRdyzQ |
CitedBy_id | crossref_primary_10_1093_cybsec_tyae012 crossref_primary_10_1371_journal_pone_0301178 crossref_primary_10_1007_s13178_024_01015_1 crossref_primary_10_1080_07421222_2023_2267318 crossref_primary_10_1057_s41300_023_00176_2 crossref_primary_10_3389_fpubh_2024_1334263 crossref_primary_10_1007_s10639_022_11086_5 crossref_primary_10_1007_s44217_024_00144_4 crossref_primary_10_1080_10447318_2023_2291608 crossref_primary_10_62273_PELX2965 |
Cites_doi | 10.1016/S1353-4858(19)30032-7 10.2307/25750694 10.1016/j.cose.2017.11.015 10.1108/ICS-03-2017-0009 10.2190/H7E1-XMM7-GU9B-3HWR 10.1080/0144929X.2016.1212091 10.1080/0144929X.2017.1352028 10.1007/s11257-019-09236-5 10.17705/1jais.00232 10.1016/j.chb.2008.04.005 10.1108/ICS-04-2017-0020 10.1016/j.chb.2018.01.028 10.1016/j.compedu.2016.11.003 10.1023/A:1011902718709 10.1016/j.cose.2016.02.009 10.1080/00208825.1983.11656358 10.1016/j.chb.2016.12.040 10.1145/1290958.1290968 10.2307/249477 10.1016/j.chb.2012.07.008 10.1016/j.chb.2017.12.001 10.1080/07421222.1992.11517949 10.1111/j.1745-6606.2009.01148.x 10.2307/25750704 10.1016/j.cose.2017.07.003 10.1080/17437199.2014.922895 10.1016/j.ijinfomgt.2019.05.004 10.1287/isre.6.2.144 10.1145/1325555.1325569 10.1080/15252019.2010.10722168 10.25300/MISQ/2016/40.1.09 10.1016/S0148-2963(02)00363-6 10.1037/1089-2699.6.1.101 10.1016/j.chb.2014.05.041 10.1016/j.cose.2011.10.007 10.1108/ICS-03-2018-0037 10.1089/cpb.2005.8.21 10.1108/ICS-04-2019-0041 10.1016/j.im.2013.08.006 10.1016/j.cose.2014.03.004 10.1108/ICS-01-2019-0022 10.2307/3250981 10.1002/asi.24372 10.1016/j.chb.2016.11.065 10.1016/j.im.2015.03.002 |
ContentType | Journal Article |
Copyright | Emerald Publishing Limited 2021 |
Copyright_xml | – notice: Emerald Publishing Limited 2021 |
DBID | AAYXX CITATION 0-V 7SC 7WY 7WZ 7XB 8AO 8FD 8FE 8FG 8FI ABUWG AFKRA ALSLI ARAPS AZQEC BENPR BEZIV BGLVJ BGRYB CCPQU CNYFK DWQXO E3H F2A FYUFA F~G GNUQQ HCIFZ JQ2 K6~ K7- L.- L.0 L7M L~C L~D M0C M0N M0O M0T M1O P5Z P62 PHGZM PHGZT PJZUB PKEHL PPXIY PQBIZ PQEST PQGLB PQQKQ PQUKI PRQQA PYYUZ Q9U |
DOI | 10.1108/ICS-07-2020-0125 |
DatabaseName | CrossRef ProQuest Social Sciences Premium Collection Computer and Information Systems Abstracts ABI/INFORM Collection ABI/INFORM Global (PDF only) ProQuest Central (purchase pre-March 2016) ProQuest Pharma Collection Technology Research Database ProQuest SciTech Collection ProQuest Technology Collection ProQuest Hospital Collection ProQuest Central ProQuest Central UK/Ireland Social Science Premium Collection Advanced Technologies & Aerospace Collection ProQuest Central Essentials ProQuest Central Business Premium Collection Technology Collection (via ProQuest SciTech Premium Collection) Criminology Collection ProQuest One Community College Library & Information Science Collection ProQuest Central Library & Information Sciences Abstracts (LISA) Library & Information Science Abstracts (LISA) Health Research Premium Collection ABI/INFORM Global (Corporate) ProQuest Central Student ProQuest SciTech Premium Collection ProQuest Computer Science Collection ProQuest Business Collection Computer Science Database ABI/INFORM Professional Advanced ABI/INFORM Professional Standard Advanced Technologies Database with Aerospace Computer and Information Systems Abstracts Academic Computer and Information Systems Abstracts Professional ABI/INFORM Global Computing Database Criminal Justice Database Healthcare Administration Database Library Science Database ProQuest advanced technologies & aerospace journals ProQuest Advanced Technologies & Aerospace Collection ProQuest Central Premium ProQuest One Academic (New) ProQuest Health & Medical Research Collection ProQuest One Academic Middle East (New) ProQuest One Health & Nursing ProQuest One Business ProQuest One Academic Eastern Edition (DO NOT USE) ProQuest One Applied & Life Sciences ProQuest One Academic ProQuest One Academic UKI Edition ProQuest One Social Sciences ABI/INFORM Collection China ProQuest Central Basic |
DatabaseTitle | CrossRef Computer Science Database ProQuest Central Student Library and Information Science Abstracts (LISA) ProQuest Advanced Technologies & Aerospace Collection ProQuest Central Essentials ProQuest Computer Science Collection Computer and Information Systems Abstracts SciTech Premium Collection ABI/INFORM Complete ProQuest One Applied & Life Sciences Health Research Premium Collection Health & Medical Research Collection Library & Information Science Collection ProQuest Central (New) Advanced Technologies & Aerospace Collection Business Premium Collection Social Science Premium Collection ABI/INFORM Global ProQuest One Academic Eastern Edition ProQuest Hospital Collection ProQuest Technology Collection ProQuest Business Collection Criminology Collection ProQuest Social Sciences Premium Collection ProQuest One Academic UKI Edition ProQuest One Academic ProQuest One Academic (New) ABI/INFORM Global (Corporate) ProQuest One Business Technology Collection Technology Research Database Computer and Information Systems Abstracts – Academic ProQuest One Academic Middle East (New) ProQuest Central (Alumni Edition) ProQuest One Community College ProQuest One Health & Nursing ProQuest Pharma Collection ProQuest Central ABI/INFORM Professional Advanced ProQuest Library Science ProQuest Health & Medical Research Collection ProQuest Criminal Justice ABI/INFORM Professional Standard ProQuest Central Korea Advanced Technologies Database with Aerospace ProQuest Computing ProQuest One Social Sciences ProQuest Central Basic ProQuest Health Management ABI/INFORM China ProQuest SciTech Collection Computer and Information Systems Abstracts Professional Advanced Technologies & Aerospace Database |
DatabaseTitleList | Computer Science Database |
Database_xml | – sequence: 1 dbid: 8FG name: ProQuest Technology Collection url: https://search.proquest.com/technologycollection1 sourceTypes: Aggregation Database |
DeliveryMethod | fulltext_linktorsrc |
Discipline | Computer Science Library & Information Science Business |
EISSN | 2056-497X |
EndPage | 865 |
ExternalDocumentID | 10_1108_ICS_07_2020_0125 |
GroupedDBID | .WU 0-V 3FY 5VS 7WY 8AO 8FE 8FG 8FI 8FW 9F- AAGBP AAKOT AAMCF AAUDR AAXBI AAYXX ABIJV ABJNI ABSDC ABUWG ABXQL ABYQI ACGFS ACTSA ACZKX ADBBV ADOMW ADQHX ADWNT AFKRA AFNTC AFZLO AGTVX AHMHQ AILOG AJEBP ALIPV ALMA_UNASSIGNED_HOLDINGS ALSLI AODMV AQUVI ARALO ARAPS AUCOK AZQEC BENPR BEZIV BGLVJ BGRYB BPHCQ BVXVI CCPQU CITATION CNYFK DWQXO EBS ECCUG FNNZZ FYUFA GEA GEI GMX GNUQQ GQ. H13 HCIFZ K6V K6~ K7- KBGRL M0C M0O M0T M1O M42 P62 PHGZM PHGZT PJZUB PPXIY PQBIZ PQGLB PQQKQ PROAC PRQQA SCAQC SDURG SLOBJ TEM TGG TMF TMI TMT UKHRP Z11 Z12 Z21 ZYZAG .DC 29I 4.4 5GY 70U 77K 7SC 7XB 8FD 8R4 8R5 9E0 AAPSD ABEAN ACGFO AEBZA AEDOK AEMMR AETHF AFNZV AIAFM AJFKA APPLU ATGMP CS3 DU5 E3H F2A GEB GEC GMM GMN J1Y JI- JL0 JQ2 L.- L.0 L7M L~C L~D M0N P2P PKEHL PQEST PQUKI Q2X Q3A Q9U RWL TAE TDQ TET TMD TMK TMX Z22 |
ID | FETCH-LOGICAL-c311t-582e6d136a502905a9bd341815cd0de0d3bb63bdd6a6d58146c819a6c3d69e7a3 |
IEDL.DBID | GEI |
ISSN | 2056-4961 |
IngestDate | Wed Aug 13 04:50:57 EDT 2025 Thu Jul 31 00:40:18 EDT 2025 Thu Apr 24 23:11:45 EDT 2025 |
IsPeerReviewed | true |
IsScholarly | true |
Issue | 5 |
Language | English |
License | https://www.emerald.com/insight/site-policies |
LinkModel | DirectLink |
MergedId | FETCHMERGED-LOGICAL-c311t-582e6d136a502905a9bd341815cd0de0d3bb63bdd6a6d58146c819a6c3d69e7a3 |
Notes | ObjectType-Article-1 SourceType-Scholarly Journals-1 ObjectType-Feature-2 content type line 14 |
PQID | 2595496385 |
PQPubID | 31135 |
PageCount | 16 |
ParticipantIDs | proquest_journals_2595496385 crossref_primary_10_1108_ICS_07_2020_0125 crossref_citationtrail_10_1108_ICS_07_2020_0125 |
PublicationCentury | 2000 |
PublicationDate | 2021-11-12 |
PublicationDateYYYYMMDD | 2021-11-12 |
PublicationDate_xml | – month: 11 year: 2021 text: 2021-11-12 day: 12 |
PublicationDecade | 2020 |
PublicationPlace | Bingley |
PublicationPlace_xml | – name: Bingley |
PublicationTitle | Information and computer security |
PublicationYear | 2021 |
Publisher | Emerald Group Publishing Limited |
Publisher_xml | – name: Emerald Group Publishing Limited |
References | (key2021111012415788800_ref042) 2015 (key2021111012415788800_ref036) 2012; 28 (key2021111012415788800_ref040) 2014; 38 (key2021111012415788800_ref041) 2019; 28 (key2021111012415788800_ref045) 2017; 25 (key2021111012415788800_ref028) 2010; 11 (key2021111012415788800_ref060) 2015; 52 (key2021111012415788800_ref008) 2005; 8 (key2021111012415788800_ref003) 2018; 26 (key2021111012415788800_ref047) 2001; 19 (key2021111012415788800_ref056) 2020; 71 (key2021111012415788800_ref064) 2008; 24 (key2021111012415788800_ref062) 1993; 29 (key2021111012415788800_ref059) 2016; 59 (key2021111012415788800_ref035) 2009; 43 (key2021111012415788800_ref057) 2017; 70 (key2021111012415788800_ref015) 2004; 57 (key2021111012415788800_ref026) 2009; 12 (key2021111012415788800_ref016) 2018; 73 (key2021111012415788800_ref019) 2009 (key2021111012415788800_ref032) 2017; 36 (key2021111012415788800_ref010) 1995; 12 (key2021111012415788800_ref012) 2016; 40 (key2021111012415788800_ref018) 1992; 9 (key2021111012415788800_ref007) 2017; 69 key2021111012415788800_ref043 (key2021111012415788800_ref006) 2010; 34 (key2021111012415788800_ref044) 2010; 34 (key2021111012415788800_ref034) 2018; 83 (key2021111012415788800_ref038) 2002; 6 (key2021111012415788800_ref024) 2007; 50 (key2021111012415788800_ref004) 2015 (key2021111012415788800_ref029) 2020; 50 (key2021111012415788800_ref014) 2017; 36 (key2021111012415788800_ref050) 2010 (key2021111012415788800_ref030) 2010 key2021111012415788800_ref001 (key2021111012415788800_ref051) 2014; 51 (key2021111012415788800_ref027) 2008; 51 key2021111012415788800_ref005 key2021111012415788800_ref049 (key2021111012415788800_ref037) 2018; 41 (key2021111012415788800_ref020) 2004 key2021111012415788800_ref054 (key2021111012415788800_ref046) 2014; 43 (key2021111012415788800_ref063) 2005 (key2021111012415788800_ref002) 2019; 29 (key2021111012415788800_ref017) 2014 (key2021111012415788800_ref033) 2018 (key2021111012415788800_ref039) 1978 (key2021111012415788800_ref061) 2000; 24 (key2021111012415788800_ref025) 2018 (key2021111012415788800_ref055) 2020 (key2021111012415788800_ref048) 2020; 28 (key2021111012415788800_ref023) 2012; 31 (key2021111012415788800_ref053) 1995; 6 (key2021111012415788800_ref022) 2010; 10 (key2021111012415788800_ref013) 2018; 81 (key2021111012415788800_ref031) 2017; 69 (key2021111012415788800_ref052) 1996; 20 (key2021111012415788800_ref021) 1983; 13 (key2021111012415788800_ref058) 2016; 10 (key2021111012415788800_ref011) 2017; 105 (key2021111012415788800_ref009) 2017; 25 |
References_xml | – ident: key2021111012415788800_ref001 doi: 10.1016/S1353-4858(19)30032-7 – volume-title: Psychometric Theory year: 1978 ident: key2021111012415788800_ref039 – volume: 34 start-page: 613 issue: 3 year: 2010 ident: key2021111012415788800_ref006 article-title: Practicing safe computing: a multimethod empirical examination of home computer user security behavioural intentions publication-title: MIS Quarterly doi: 10.2307/25750694 – volume: 73 start-page: 345 year: 2018 ident: key2021111012415788800_ref016 article-title: Correlating human traits and cyber security behavior intentions publication-title: Computers and Security doi: 10.1016/j.cose.2017.11.015 – volume: 25 start-page: 593 issue: 5 year: 2017 ident: key2021111012415788800_ref009 article-title: Spear phishing in organisations explained publication-title: Information and Computer Security doi: 10.1108/ICS-03-2017-0009 – volume: 12 start-page: 147 issue: 2 year: 1995 ident: key2021111012415788800_ref010 article-title: Gender differences in self-efficacy and attitudes toward computers publication-title: Journal of Educational Computing Research doi: 10.2190/H7E1-XMM7-GU9B-3HWR – volume: 36 start-page: 178 issue: 2 year: 2017 ident: key2021111012415788800_ref014 article-title: Exploring the relative impact of biological sex and masculinity–femininity values on information technology use publication-title: Behaviour and Information Technology doi: 10.1080/0144929X.2016.1212091 – volume-title: A Primer on Partial Least Squares Structural Equation Modeling (PLS-SEM) year: 2014 ident: key2021111012415788800_ref017 – volume: 36 start-page: 1111 issue: 11 year: 2017 ident: key2021111012415788800_ref032 article-title: Old risks, new challenges: exploring differences in security between home computer and mobile device use publication-title: Behaviour and Information Technology doi: 10.1080/0144929X.2017.1352028 – volume: 29 start-page: 701 issue: 3 year: 2019 ident: key2021111012415788800_ref002 article-title: Exploring user behavioral data for adaptive cybersecurity publication-title: User Modeling and User-Adapted Interaction doi: 10.1007/s11257-019-09236-5 – volume: 12 start-page: 93 issue: 1 year: 2009 ident: key2021111012415788800_ref026 article-title: Consumer concerns for healthcare information privacy: a comparison of US and Canadian perspectives publication-title: Research in Healthcare Financial Management – volume: 11 start-page: 394 issue: 7 year: 2010 ident: key2021111012415788800_ref028 article-title: Understanding security behaviors in personal computer usage: a threat avoidance perspective publication-title: Journal of the Association for Information Systems doi: 10.17705/1jais.00232 – volume: 24 start-page: 2799 issue: 6 year: 2008 ident: key2021111012415788800_ref064 article-title: Security lapses and the omission of information security measures: a threat control model and empirical test publication-title: Computers in Human Behavior doi: 10.1016/j.chb.2008.04.005 – volume-title: Proceedings of the International Conference on Human Aspects of Information Security, Privacy, and Trust year: 2015 ident: key2021111012415788800_ref004 article-title: Exploring the adoption of physical security controls in smartphones – volume: 25 start-page: 190 issue: 2 year: 2017 ident: key2021111012415788800_ref045 article-title: Factors in an end user security expertise instrument publication-title: Information and Computer Security doi: 10.1108/ICS-04-2017-0020 – volume: 83 start-page: 32 year: 2018 ident: key2021111012415788800_ref034 article-title: The impact of information security threat awareness on privacy-protective behaviors publication-title: Computers in Human Behavior doi: 10.1016/j.chb.2018.01.028 – volume: 105 start-page: 1 year: 2017 ident: key2021111012415788800_ref011 article-title: Gender and attitudes toward technology use: a meta-analysis publication-title: Computers and Education doi: 10.1016/j.compedu.2016.11.003 – volume: 19 start-page: 122 issue: 3 year: 2001 ident: key2021111012415788800_ref047 article-title: Transforming the ‘weakest link’ – a human/computer interaction approach to usable and effective security publication-title: BT Technology Journal doi: 10.1023/A:1011902718709 – volume: 59 start-page: 138 year: 2016 ident: key2021111012415788800_ref059 article-title: Understanding online safety behaviors: a protection motivation theory perspective publication-title: Computers and Security doi: 10.1016/j.cose.2016.02.009 – year: 2005 ident: key2021111012415788800_ref063 article-title: A protection motivation theory approach to home wireless security – volume: 13 start-page: 46 issue: 1-2 year: 1983 ident: key2021111012415788800_ref021 article-title: National cultures in four dimensions: a research-based theory of cultural differences among nations publication-title: International Studies of Management and Organization doi: 10.1080/00208825.1983.11656358 – year: 2018 ident: key2021111012415788800_ref025 article-title: Privacy concerns and acceptance of government surveillance in Australia – year: 2020 ident: key2021111012415788800_ref055 article-title: Who are you talking about? Contrasting determinants of online disclosure about self or others publication-title: Information Technology and People – volume: 69 start-page: 437 year: 2017 ident: key2021111012415788800_ref007 article-title: Gender difference and employees' cybersecurity behaviors publication-title: Computers in Human Behavior doi: 10.1016/j.chb.2016.12.040 – volume: 50 start-page: 94 issue: 10 year: 2007 ident: key2021111012415788800_ref024 article-title: Social phishing publication-title: Communications of the ACM doi: 10.1145/1290958.1290968 – ident: key2021111012415788800_ref049 – volume: 20 start-page: 167 issue: 2 year: 1996 ident: key2021111012415788800_ref052 article-title: Information privacy: measuring individual's concerns about organizational practices publication-title: MIS Quarterly doi: 10.2307/249477 – volume: 28 start-page: 2366 issue: 6 year: 2012 ident: key2021111012415788800_ref036 article-title: Information privacy concerns, antecedents and privacy measure use in social networking sites: evidence from Malaysia publication-title: Computers in Human Behavior doi: 10.1016/j.chb.2012.07.008 – year: 2018 ident: key2021111012415788800_ref033 article-title: Gender differences in information security perceptions and behaviour – volume: 41 start-page: 147 issue: 1 year: 2018 ident: key2021111012415788800_ref037 article-title: Short-term and long-term effects of fear appeals in improving compliance with password guidelines publication-title: Communications of the Association for Information Systems – volume: 81 start-page: 42 year: 2018 ident: key2021111012415788800_ref013 article-title: The role of privacy fatigue in online privacy behavior publication-title: Computers in Human Behavior doi: 10.1016/j.chb.2017.12.001 – volume: 9 start-page: 93 issue: 1 year: 1992 ident: key2021111012415788800_ref018 article-title: The influence of individual differences on skill in end-user computing publication-title: Journal of Management Information Systems doi: 10.1080/07421222.1992.11517949 – volume-title: SPSS Explained year: 2004 ident: key2021111012415788800_ref020 – volume: 43 start-page: 449 issue: 3 year: 2009 ident: key2021111012415788800_ref035 article-title: Toward an understanding of the online consumer’s risky behavior and protection practices publication-title: Journal of Consumer Affairs doi: 10.1111/j.1745-6606.2009.01148.x – volume: 34 start-page: 757 issue: 4 year: 2010 ident: key2021111012415788800_ref044 article-title: Improving employees' compliance through information systems security training: an action research study publication-title: MIS Quarterly doi: 10.2307/25750704 – ident: key2021111012415788800_ref054 – volume: 70 start-page: 376 year: 2017 ident: key2021111012415788800_ref057 article-title: Security begins at home”: determinants of home computer and mobile device security behavior publication-title: Computers and Security doi: 10.1016/j.cose.2017.07.003 – volume: 10 start-page: 1 issue: 1 year: 2016 ident: key2021111012415788800_ref058 article-title: Reasoned versus reactive prediction of behaviour: a meta-analysis of the prototype willingness model publication-title: Health Psychology Review doi: 10.1080/17437199.2014.922895 – volume: 50 start-page: 45 year: 2020 ident: key2021111012415788800_ref029 article-title: Examining gender differences in people’s information-sharing decisions on social networking sites publication-title: International Journal of Information Management doi: 10.1016/j.ijinfomgt.2019.05.004 – volume: 6 start-page: 144 issue: 2 year: 1995 ident: key2021111012415788800_ref053 article-title: Understanding information technology usage: a test of competing models publication-title: Information Systems Research doi: 10.1287/isre.6.2.144 – volume: 51 start-page: 71 issue: 3 year: 2008 ident: key2021111012415788800_ref027 article-title: Promoting personal responsibility for internet safety publication-title: Communications of the ACM doi: 10.1145/1325555.1325569 – volume: 10 start-page: 28 issue: 2 year: 2010 ident: key2021111012415788800_ref022 article-title: Gender differences in privacy-related measures for young adult facebook users publication-title: Journal of Interactive Advertising doi: 10.1080/15252019.2010.10722168 – volume: 40 start-page: 205 issue: 1 year: 2016 ident: key2021111012415788800_ref012 article-title: Individuals' internet security perceptions and behaviors: polycontextual contrasts between the United States and China publication-title: MIS Quarterly doi: 10.25300/MISQ/2016/40.1.09 – volume: 57 start-page: 768 issue: 7 year: 2004 ident: key2021111012415788800_ref015 article-title: Gender differences in the perceived risk of buying online and the effects of receiving a site recommendation publication-title: Journal of Business Research doi: 10.1016/S0148-2963(02)00363-6 – volume: 6 start-page: 101 issue: 1 year: 2002 ident: key2021111012415788800_ref038 article-title: Harvesting implicit group attitudes and beliefs from a demonstration web site publication-title: Group Dynamics: Theory, Research, and Practice doi: 10.1037/1089-2699.6.1.101 – year: 2010 ident: key2021111012415788800_ref030 article-title: The influence of human factors on vulnerability to information security breaches – volume: 38 start-page: 296 year: 2014 ident: key2021111012415788800_ref040 article-title: Understanding privacy knowledge and skill in mobile communication publication-title: Computers in Human Behavior doi: 10.1016/j.chb.2014.05.041 – volume: 31 start-page: 83 issue: 1 year: 2012 ident: key2021111012415788800_ref023 article-title: Understanding information systems security policy compliance: an integration of the theory of planned behavior and the protection motivation theory publication-title: Computers and Security doi: 10.1016/j.cose.2011.10.007 – volume: 29 start-page: 515 issue: 7/8 year: 1993 ident: key2021111012415788800_ref062 article-title: Gender roles, computer attitudes, and dyadic computer interaction performance in college students publication-title: Sex Roles – volume: 26 start-page: 306 issue: 3 year: 2018 ident: key2021111012415788800_ref003 article-title: Identifying and predicting the factors affecting end-users’ risk-taking behavior publication-title: Information and Computer Security doi: 10.1108/ICS-03-2018-0037 – volume-title: Proceedings of the International Conference on Human Aspects of Information Security, Privacy, and Trust year: 2015 ident: key2021111012415788800_ref042 article-title: Factors that influence information security behavior: an australian web-based study – volume: 8 start-page: 21 issue: 1 year: 2005 ident: key2021111012415788800_ref008 article-title: Gender and information and communication technologies (ICT) anxiety: male self-assurance and female hesitation publication-title: CyberPsychology and Behavior doi: 10.1089/cpb.2005.8.21 – volume: 28 start-page: 293 issue: 2 year: 2020 ident: key2021111012415788800_ref048 article-title: Cybersecurity behaviour of smartphone users in India: an empirical analysis publication-title: Information and Computer Security doi: 10.1108/ICS-04-2019-0041 – volume: 51 start-page: 217 issue: 2 year: 2014 ident: key2021111012415788800_ref051 article-title: Employees’ adherence to information security policies: an exploratory field study publication-title: Information and Management doi: 10.1016/j.im.2013.08.006 – volume: 43 start-page: 90 year: 2014 ident: key2021111012415788800_ref046 article-title: Information security knowledge sharing in organizations: investigating the effect of behavioral information security governance and national culture publication-title: Computers and Security doi: 10.1016/j.cose.2014.03.004 – volume-title: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems year: 2010 ident: key2021111012415788800_ref050 article-title: Who falls for phish?: a demographic analysis of phishing susceptibility and effectiveness of interventions – volume: 28 start-page: 1 issue: 1 year: 2019 ident: key2021111012415788800_ref041 article-title: Matching training to individual learning styles improves information security awareness publication-title: Information and Computer Security doi: 10.1108/ICS-01-2019-0022 – volume: 24 start-page: 115 issue: 1 year: 2000 ident: key2021111012415788800_ref061 article-title: Why don't men ever stop to ask for directions? Gender, social influence, and their role in technology acceptance and usage behavior publication-title: MIS Quarterly doi: 10.2307/3250981 – volume: 71 start-page: 1129 issue: 9 year: 2020 ident: key2021111012415788800_ref056 article-title: Cultural factors and the role of privacy concerns in acceptance of government surveillance publication-title: Journal of the Association for Information Science and Technology doi: 10.1002/asi.24372 – volume: 69 start-page: 151 year: 2017 ident: key2021111012415788800_ref031 article-title: Individual differences and information security awareness publication-title: Computers in Human Behavior doi: 10.1016/j.chb.2016.11.065 – ident: key2021111012415788800_ref043 – ident: key2021111012415788800_ref005 – year: 2009 ident: key2021111012415788800_ref019 article-title: Are men more technology-oriented than women? The role of gender on the development of general computer self-efficacy of college students – volume: 52 start-page: 506 issue: 4 year: 2015 ident: key2021111012415788800_ref060 article-title: Learning to cope with information security risks regarding mobile device loss or theft: an empirical examination publication-title: Information and Management doi: 10.1016/j.im.2015.03.002 |
SSID | ssj0001916361 ssj0004345 |
Score | 2.3460188 |
Snippet | PurposeInformation technology users often fail to adopt necessary security and privacy measures, leading to increased risk of cybercrimes. There has been... |
SourceID | proquest crossref |
SourceType | Aggregation Database Enrichment Source Index Database |
StartPage | 850 |
SubjectTerms | Behavior Cybercrime Electronic devices Females Gender aspects Gender differences Men Passwords Perceptions Personal information Privacy Security Security management Self-efficacy Social networks Social research Software upgrading Women |
SummonAdditionalLinks | – databaseName: ProQuest Technology Collection dbid: 8FG link: http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwfV3dS8MwEA86QXwRnYrTTfIggg9hadKk7ZPIcM6BvuhgbyVNOhlIN7cq-N9716Wbvuy5vTzcXe4rd_cj5NoKpyYyEEwoG7HQGcuS0DgWK5NxcLeRsFjveH7Rg1E4HKuxL7gtfVtlbRMrQ-1mFmvkXQjTIZUBbVF380-GqFH4uuohNHbJXgCeBvU87j9u5iJlBVIswMkzoA3qZ0oed596r1ihE5g9gY1W_93Sf6tcuZr-ETn0MSK9Xwn1mOzkRZPs1y3qTdLxwwb0hvppIuQu9df0hAzXjXV0PiuxHQhOe68w42gNiALmgU4LOv1Dv_RQdtQUjs4X029jf07JqP_w1hswj5nArAyCkqlY5NoFUhvFRcKVSTIHjioOlHXc5dzJLNMyc04b7RTW_yzEBEZb6XSSR0aekUYxK_JzQrm1IppAfma1DZULTYS7wUCwcjVy2iLdmmWp9QvFEdfiI60SCx6nwOSURykyOUUmt8jtmmK-Wqax5d92LYXUX6tlulGCi-2fL8mBwOYT7NcTbdIoF195B6KHMruqVOQXUBrA2g priority: 102 providerName: ProQuest |
Title | Exploring potential gender differences in information security and privacy |
URI | https://www.proquest.com/docview/2595496385 |
Volume | 29 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwrV1JS8NAFH5ovXhxF-tS5uDFQ0wyk5kkxyrWBaziAuolTGZSLWpa2lTQX--bJFNQRBC85BCyzrx8b8mb7wPYVVTzHvOpQ7kKnUBL5cSB1E7EZeqhuw2pMvWO8644uQ3O7vjdDHTtWpiyrbIqx5Q43c_HJkl1TeM2ovCUcMCo15weXpsqGzUZEOIsd03F2n0qXl9m0dK5sEt_bcUFIyFWEqhS9PpOEAvf_rf84WJf_dRXmC59T2cRBvapq5aT5_1Jke6rj2-Ejv_3WkuwUIeppF3Z1TLMZPkKLFoJCFIjwiqcTXv4yHBg7oHmTB5LeTpitVcQiUg_JzVFqzEEMq5V84jMNRmO-m9Sva_Bbefo5vDEqeUZHMV8v3B4RDOhfSYk92jscRmnGn1i5HOlPZ15mqWpYKnWQgrNTalRYfghhWJaxFko2To08kGebQDxlKJhD1NBJVTAdSBDQ0OGNsSq1a1NcO1kJKrmLjcSGi9JmcN4UYKDlnhhYgYtMYPWhL3pGcOKt-OXY7ft_Cb1FzxOMC3E1BnRiW_-4VJbME9N04vpE6Tb0ChGk2wHo5YibcFs1DluwdzBUffyqlWaJm7P_Qvc93D_0D7-BD9B6rU |
linkProvider | Emerald |
linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtV1LT9wwEB7BIkEviNIinq0PbSUO1jp27GQPVUUpaJfHClGQuBnHDtVKKLuwC4g_1d_YmawD5cKNc2IrGn-Zl2fmA_jiZdBXKpFcap_xNDjPO6kLPNeuEGhuM-kp33HcN93z9OBCX8zA36YXhsoqG51YK-ow9JQjb6ObjqEMokX_GN1wYo2i29WGQmMKi8Py8QFDtvH33i88369S7u-d7XZ5ZBXgXiXJhOtcliYkyjgtZEdo1ykCqvI80T6IUIqgisKoIgTjTNCUIfNoNZ3xKphOmTmF-87CXEodrS2Y-7nXPzl97sRUNS2yRLeC49cmzcWoyNu93d-UE5QUr6FV0C8N4Us7UBu3_SVYjF4p25nC6D3MlNUyzDdF8cuwFdsb2DcW-5foPFlUDB_g4KmUj42GEypAwt3-1Cx1rKFgQYXEBhUb_Ld-HMnzmKsCG90O7p1__AjnbyLPFWhVw6pcBSa8l9kVRoTe-FSH1GU0jQyhpKZNrmvQbkRmfRxhTkwa17YOZURuUchWZJaEbEnIa7D9tGI0Hd_xyrubzSnY-COP7TPs1l9__BkWumfHR_ao1z_cgHeSSl-oWlBuQmtye1duoe8yKT5FwDC4fGuM_gMZFP7V |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Exploring+potential+gender+differences+in+information+security+and+privacy&rft.jtitle=Information+and+computer+security&rft.au=McGill%2C+Tanya&rft.au=Thompson%2C+Nik&rft.date=2021-11-12&rft.issn=2056-4961&rft.volume=29&rft.issue=5&rft.spage=850&rft.epage=865&rft_id=info:doi/10.1108%2FICS-07-2020-0125&rft.externalDBID=n%2Fa&rft.externalDocID=10_1108_ICS_07_2020_0125 |
thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=2056-4961&client=summon |
thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=2056-4961&client=summon |
thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=2056-4961&client=summon |