Uzma Kiran , Naurin Farooq Khan , Hajra Murtaza , Ali Farooq , Henri Pirkkalainen
{"title":"Explanatory and predictive modeling of cybersecurity behaviors using protection motivation theory","authors":"Uzma Kiran , Naurin Farooq Khan , Hajra Murtaza , Ali Farooq , Henri Pirkkalainen","doi":"10.1016/j.cose.2024.104204","DOIUrl":null,"url":null,"abstract":"<div><h3>Context</h3><div>Protection motivation theory (PMT) is the most frequently used theory in understanding cyber security behaviors. However, most studies have used a cross-sectional design with symmetrical analysis techniques such as structure equation modeling (SEM) and regression. A data-driven approach, such as predictive modeling, is lacking and can potentially evaluate and validate the predictive power of PMT for cybersecurity behaviors.</div></div><div><h3>Objective</h3><div>The objective of this study is to assess the explanatory and predictive power of PMT for cyber security behaviors related to computers and smartphone.</div></div><div><h3>Method</h3><div>An online survey was employed to collect data from 1027 participants. The relationship of security behaviors with <em>threat appraisal (severity and vulnerability)</em> and <em>coping appraisal (response efficacy, self-efficacy and response cost)</em> components were tested via explanatory and predictive modeling. Explanatory modeling was employed via SEM, whereas three machine learning algorithms, namely Decision Tree (DT), Support Vector Machine (SVM), and K Nearest Neighbor (KNN) were used for predictive modeling. Wrapper feature selection was employed to understand the most important factors of PMT in predictive modeling.</div></div><div><h3>Results</h3><div>The results revealed that the <em>threat severity</em> from the <em>threat appraisal</em> component of PMT significantly influenced computer security and smartphone security behaviors. From the <em>coping appraisal, response efficacy</em> and <em>self-efficacy</em> significantly influenced computer and smartphone security behaviors. The ML analysis showed that the highest predictive power of PMT for computer security was 76 % and for smartphone security 68 % by KNN algorithm. The wrapper feature selection approach revealed that <em>the most important features in predicting security behaviors are self-efficacy, response efficacy and intention to secure device</em>s. Thus, the findings indicate the complementarity of the cross-sectional and data driven methods.</div></div>","PeriodicalId":51004,"journal":{"name":"Computers & Security","volume":"149 ","pages":"Article 104204"},"PeriodicalIF":4.8000,"publicationDate":"2024-11-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Computers & Security","FirstCategoryId":"94","ListUrlMain":"https://www.sciencedirect.com/science/article/pii/S0167404824005091","RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"COMPUTER SCIENCE, INFORMATION SYSTEMS","Score":null,"Total":0}
引用次数: 0
Abstract
Context
Protection motivation theory (PMT) is the most frequently used theory in understanding cyber security behaviors. However, most studies have used a cross-sectional design with symmetrical analysis techniques such as structure equation modeling (SEM) and regression. A data-driven approach, such as predictive modeling, is lacking and can potentially evaluate and validate the predictive power of PMT for cybersecurity behaviors.
Objective
The objective of this study is to assess the explanatory and predictive power of PMT for cyber security behaviors related to computers and smartphone.
Method
An online survey was employed to collect data from 1027 participants. The relationship of security behaviors with threat appraisal (severity and vulnerability) and coping appraisal (response efficacy, self-efficacy and response cost) components were tested via explanatory and predictive modeling. Explanatory modeling was employed via SEM, whereas three machine learning algorithms, namely Decision Tree (DT), Support Vector Machine (SVM), and K Nearest Neighbor (KNN) were used for predictive modeling. Wrapper feature selection was employed to understand the most important factors of PMT in predictive modeling.
Results
The results revealed that the threat severity from the threat appraisal component of PMT significantly influenced computer security and smartphone security behaviors. From the coping appraisal, response efficacy and self-efficacy significantly influenced computer and smartphone security behaviors. The ML analysis showed that the highest predictive power of PMT for computer security was 76 % and for smartphone security 68 % by KNN algorithm. The wrapper feature selection approach revealed that the most important features in predicting security behaviors are self-efficacy, response efficacy and intention to secure devices. Thus, the findings indicate the complementarity of the cross-sectional and data driven methods.
期刊介绍:
Computers & Security is the most respected technical journal in the IT security field. With its high-profile editorial board and informative regular features and columns, the journal is essential reading for IT security professionals around the world.
Computers & Security provides you with a unique blend of leading edge research and sound practical management advice. It is aimed at the professional involved with computer security, audit, control and data integrity in all sectors - industry, commerce and academia. Recognized worldwide as THE primary source of reference for applied research and technical expertise it is your first step to fully secure systems.