1
|
Crede M, Kim HS, Cindrich SL, Ferreira PA, Wasinger G, Kim EL, Karakaya K, Seguin HR, Lopez HN, Muhammad AA, Goldstein AR, Yurtsever A. The relationship between adverse childhood experiences and non-clinical personality traits: A meta-analytic synthesis. PERSONALITY AND INDIVIDUAL DIFFERENCES 2023. [DOI: 10.1016/j.paid.2022.111868] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Submit a Manuscript] [Subscribe] [Scholar Register] [Indexed: 10/14/2022]
|
2
|
Xu L, Wang J, Xu D, Xu L. Integrating Individual Factors to Construct Recognition Models of Consumer Fraud Victimization. INTERNATIONAL JOURNAL OF ENVIRONMENTAL RESEARCH AND PUBLIC HEALTH 2022; 19:ijerph19010461. [PMID: 35010720 PMCID: PMC8744553 DOI: 10.3390/ijerph19010461] [Citation(s) in RCA: 4] [Impact Index Per Article: 2.0] [Reference Citation Analysis] [Abstract] [Key Words] [MESH Headings] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 11/22/2021] [Revised: 12/20/2021] [Accepted: 12/21/2021] [Indexed: 02/01/2023]
Abstract
Consumer financial fraud has become a serious problem because it often causes victims to suffer economic, physical, mental, social, and legal harm. Identifying which individuals are more likely to be scammed may mitigate the threat posed by consumer financial fraud. Based on a two-stage conceptual framework, this study integrated various individual factors in a nationwide survey (36,202 participants) to construct fraud exposure recognition (FER) and fraud victimhood recognition (FVR) models by utilizing a machine learning method. The FER model performed well (f1 = 0.727), and model interpretation indicated that migration status, financial status, urbanicity, and age have good predictive effects on fraud exposure in the Chinese context, whereas the FVR model shows a low predictive effect (f1 = 0.565), reminding us to consider more psychological factors in future work. This research provides an important reference for the analysis of individual differences among people vulnerable to consumer fraud.
Collapse
Affiliation(s)
- Liuchang Xu
- College of Mathematics and Computer Science, Zhejiang A&F University, Hangzhou 311300, China; (L.X.); (D.X.)
| | - Jie Wang
- Department of Psychology and Behavioral Sciences, Zhejiang University, Hangzhou 310058, China;
| | - Dayu Xu
- College of Mathematics and Computer Science, Zhejiang A&F University, Hangzhou 311300, China; (L.X.); (D.X.)
| | - Liang Xu
- Department of Psychology and Behavioral Sciences, Zhejiang University, Hangzhou 310058, China;
- Correspondence:
| |
Collapse
|
3
|
Herrero J, Torres A, Vivas P, Hidalgo A, Rodríguez FJ, Urueña A. Smartphone Addiction and Cybercrime Victimization in the Context of Lifestyles Routine Activities and Self-Control Theories: The User's Dual Vulnerability Model of Cybercrime Victimization. INTERNATIONAL JOURNAL OF ENVIRONMENTAL RESEARCH AND PUBLIC HEALTH 2021; 18:3763. [PMID: 33916541 PMCID: PMC8038488 DOI: 10.3390/ijerph18073763] [Citation(s) in RCA: 3] [Impact Index Per Article: 1.0] [Reference Citation Analysis] [Abstract] [Key Words] [MESH Headings] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 02/06/2021] [Revised: 03/25/2021] [Accepted: 04/01/2021] [Indexed: 01/21/2023]
Abstract
(1) Background: This paper combines lifestyle-routine activities (L-RAT) and self-control (SCT) theories along with the literature on smartphone addiction in a joint model that addresses the multiple vulnerabilities that make the smartphone user a potential victim of cybercrime. This model, which we call the dual vulnerability model of cybercrime victimization, was subjected to empirical testing on a nationally representative sample of smartphone users. (2) Methods: Data from 2837 participants from a nationally representative sample of Spanish smartphone users were modeled using Mplus causal modeling software. (3) Results: The results of the study confirm the predictions of L-RAT and SCT in explaining cybercrime victimization (higher cybercrime victimization under conditions of high exposure, proximity, and suitability, relative absence of capable guardian, and low self-control). A significant effect of smartphone addiction on cybercrime victimization was also observed above and beyond L-RAT and SCT predictors. (4) Conclusions: The potential victim of cybercrime presents a double vulnerability, on the one hand, those identified by criminological theories such as L-RAT and SCT, and on the other hand, those derived from the deregulated-addicted use of the Internet access device (smartphone in our work).
Collapse
Affiliation(s)
- Juan Herrero
- Department of Psychology, Universidad de Oviedo, 33000 Oviedo, Spain; (J.H.); (A.T.); (F.J.R.)
| | - Andrea Torres
- Department of Psychology, Universidad de Oviedo, 33000 Oviedo, Spain; (J.H.); (A.T.); (F.J.R.)
| | - Pep Vivas
- Department of Psychology, Universitat Oberta de Catalunya (UOC), Rambla del Poblenou, 156, 08018 Barcelona, Spain;
| | - Antonio Hidalgo
- Departamento de Ingeniería de Organización, Administración de Empresas y Estadística ETSI Industriales José Gutiérrez Abascal, Universidad Politécnica de Madrid (UPM), 2. 28006-Madrid, Spain;
| | - Francisco J. Rodríguez
- Department of Psychology, Universidad de Oviedo, 33000 Oviedo, Spain; (J.H.); (A.T.); (F.J.R.)
| | - Alberto Urueña
- Departamento de Ingeniería de Organización, Administración de Empresas y Estadística ETSI Industriales José Gutiérrez Abascal, Universidad Politécnica de Madrid (UPM), 2. 28006-Madrid, Spain;
| |
Collapse
|
4
|
Dalal RS, Howard DJ, Bennett RJ, Posey C, Zaccaro SJ, Brummel BJ. Organizational science and cybersecurity: abundant opportunities for research at the interface. JOURNAL OF BUSINESS AND PSYCHOLOGY 2021; 37:1-29. [PMID: 33564206 PMCID: PMC7861585 DOI: 10.1007/s10869-021-09732-9] [Citation(s) in RCA: 5] [Impact Index Per Article: 1.7] [Reference Citation Analysis] [Abstract] [Key Words] [Grants] [Track Full Text] [Subscribe] [Scholar Register] [Accepted: 01/05/2021] [Indexed: 06/10/2023]
Abstract
Cybersecurity is an ever-present problem for organizations, but organizational science has barely begun to enter the arena of cybersecurity research. As a result, the "human factor" in cybersecurity research is much less studied than its technological counterpart. The current manuscript serves as an introduction and invitation to cybersecurity research by organizational scientists. We define cybersecurity, provide definitions of key cybersecurity constructs relevant to employee behavior, illuminate the unique opportunities available to organizational scientists in the cybersecurity arena (e.g., publication venues that reach new audiences, novel sources of external funding), and provide overall conceptual frameworks of the antecedents of employees' cybersecurity behavior. In so doing, we emphasize both end-users of cybersecurity in organizations and employees focused specifically on cybersecurity work. We provide an expansive agenda for future organizational science research on cybersecurity-and we describe the benefits such research can provide not only to cybersecurity but also to basic research in organizational science itself. We end by providing a list of potential objections to the proposed research along with our responses to these objections. It is our hope that the current manuscript will catalyze research at the interface of organizational science and cybersecurity.
Collapse
Affiliation(s)
- Reeshad S. Dalal
- Department of Psychology, George Mason University, 4400 University Drive, MSN 3F5, Fairfax, VA 22030-4444 USA
| | - David J. Howard
- Department of Psychology and Muma College of Business, University of South Florida, Tampa, FL USA
| | - Rebecca J. Bennett
- Department of Management, College of Business, University of Central Florida, Orlando, FL USA
| | - Clay Posey
- Department of Management, College of Business, University of Central Florida, Orlando, FL USA
- Cybersecurity and Privacy Cluster, University of Central Florida, Orlando, FL USA
| | - Stephen J. Zaccaro
- Department of Psychology, George Mason University, 4400 University Drive, MSN 3F5, Fairfax, VA 22030-4444 USA
| | | |
Collapse
|
5
|
van der Schyff K, Flowerday S, Lowry PB. Information privacy behavior in the use of Facebook apps: A personality-based vulnerability assessment. Heliyon 2020; 6:e04714. [PMID: 32904276 PMCID: PMC7452521 DOI: 10.1016/j.heliyon.2020.e04714] [Citation(s) in RCA: 8] [Impact Index Per Article: 2.0] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 07/13/2020] [Revised: 08/06/2020] [Accepted: 08/10/2020] [Indexed: 12/03/2022] Open
Abstract
The unauthorized use of personal information belonging to users of apps integrated with the Facebook platform affects millions of users. Crucially, although privacy concerns and awareness have increased, the use of these apps, and related privacy behaviors, remain largely unchanged. Given that such privacy behaviors are likely influenced by individuals' personality traits, it is imperative to better understand which personality traits make individuals more vulnerable to such unauthorized uses. We build on a recontextualized version of the theory of planned behavior (TPB) to evaluate the influence of the Big Five personality traits on attitudes toward Facebook privacy settings, social norms, and information privacy concerns (IPCs)—all within the context of Facebook app use. To evaluate this study's model, we analyzed 576 survey responses by way of partial least squares path modeling. Results indicate that highly extraverted individuals are particularly vulnerable to privacy violations (e.g., unauthorized use of personal information) because of their negative attitudes toward Facebook privacy settings. Our post hoc analysis uncovered interesting combinations of personality traits that make individuals particularly vulnerable to the unauthorized use of app-based information. In particular, the combination of extraversion and conscientiousness had a negative effect on individuals' attitude toward privacy settings. We also found a significant negative relationship between IPCs and intention to use Facebook apps. Finally, we found a positive relationship between social norms and intentions. Taken together, these results infer that individuals are likely to be influenced by their peers in the use of Facebook apps but that their intentions to use these apps declines as privacy concerns increase.
Collapse
Affiliation(s)
- Karl van der Schyff
- Department of Information Systems, Rhodes University, Grahamstown, South Africa
- Corresponding author.
| | - Stephen Flowerday
- Department of Information Systems, Rhodes University, Grahamstown, South Africa
| | - Paul Benjamin Lowry
- Pamplin College of Business, Virginia Tech, Blacksburg, VA, 24061, United States
| |
Collapse
|
6
|
Abstract
A number of positive and negative trends are becoming more prevalent, along with the widespread use of information and communication technologies in everyday life—negative ones being virtual offences such as stalking, bullying, identity theft, scamming and abuse or harassment. The article discusses the relations between demographic factors, the occurrence of virtual offenses and personality traits. The next Big Five Inventory (BFI-2) was used for assessment of personality traits. As for the findings, more extraversion, less agreeableness, more negative emotionality, less consciousness and being a man have been found to be associated with at least one of the investigated types of virtual offenses.
Collapse
|
7
|
Smith KT, Jones A, Johnson L, Smith LM. Examination of cybercrime and its effects on corporate stock value. JOURNAL OF INFORMATION COMMUNICATION & ETHICS IN SOCIETY 2019. [DOI: 10.1108/jices-02-2018-0010] [Citation(s) in RCA: 13] [Impact Index Per Article: 2.6] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 11/17/2022]
Abstract
Purpose
Cybercrime is a prevalent and serious threat to publicly traded companies. Defending company information systems from cybercrime is one of the most important aspects of technology management. Cybercrime often not only results in stolen assets and lost business but also damages a company’s reputation, which in turn may affect the company’s stock market value. This is a serious concern to company managers, financial analysts, investors and creditors. This paper aims to examine the impact of cybercrime on stock prices of a sample of publicly traded companies.
Design/methodology/approach
Financial data were gathered on companies that were reported in news stories as victims of cybercrime. The market price of the company’s stock was recorded for several days before the news report and several days after. The percentage change in the stock price was compared to the change in the Dow Jones Industrial average to determine whether the stock price increased or decreased along with the rest of the market.
Findings
Stock prices were negatively affected in all time periods examined, significantly so in one period.
Practical implications
This paper describes cases concerning cybercrime, thereby bringing attention to the value of cybersecurity in protecting computers, identity and transactions. Cyber security is necessary to avoid becoming a victim of cybercrime. Specific security improvements and preventive measures are provided within the paper. Preventive measures are generally less costly than repairs after a cybercrime.
Originality/value
This is an original manuscript that adds to the literature regarding cybercrime and preventive measures.
Collapse
|
8
|
Jones HS, Towse JN, Race N, Harrison T. Email fraud: The search for psychological predictors of susceptibility. PLoS One 2019; 14:e0209684. [PMID: 30650114 PMCID: PMC6334892 DOI: 10.1371/journal.pone.0209684] [Citation(s) in RCA: 33] [Impact Index Per Article: 6.6] [Reference Citation Analysis] [Abstract] [MESH Headings] [Track Full Text] [Download PDF] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 07/30/2018] [Accepted: 12/09/2018] [Indexed: 11/26/2022] Open
Abstract
Decisions that we make about email legitimacy can result in a pernicious threat to security of both individuals and organisations. Yet user response to phishing emails is far from uniform; some respond while others do not. What is the source of this diversity in decision-making? From a psychological perspective, we consider cognitive and situational influences that might explain why certain users are more susceptible than others. Alongside an email judgment task employed as a proxy for fraud susceptibility, 224 participants completed a range of cognitive tasks. In addition, we manipulated time pressure for email legitimacy judgments. We identify cognitive reflection and sensation seeking as significant, albeit modest, predictors of susceptibility. Further to this, participants asked to make quicker responses made more judgment errors. We conclude there are cognitive signatures that partially contribute to email fraud susceptibility, with implications for efforts to limit online security breaches and train secure behaviors.
Collapse
Affiliation(s)
- Helen S. Jones
- Department of Psychology, Lancaster University, Lancaster, United Kingdom
- * E-mail:
| | - John N. Towse
- Department of Psychology, Lancaster University, Lancaster, United Kingdom
| | - Nicholas Race
- School of Computing and Communications, Lancaster University, Lancaster, United Kingdom
| | - Timothy Harrison
- Defence Science and Technology Laboratory, Salisbury, United Kingdom
| |
Collapse
|
9
|
Heartfield R, Loukas G, Budimir S, Bezemskij A, Fontaine JR, Filippoupolitis A, Roesch E. A taxonomy of cyber-physical threats and impact in the smart home. Comput Secur 2018. [DOI: 10.1016/j.cose.2018.07.011] [Citation(s) in RCA: 26] [Impact Index Per Article: 4.3] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 10/28/2022]
|