Alan R. Dennis , Sanjay Goel , Jenny Huang , Kevin J. Williams
{"title":"Who cares if we get hacked? The development and testing of a measure of information security apathy","authors":"Alan R. Dennis , Sanjay Goel , Jenny Huang , Kevin J. Williams","doi":"10.1016/j.im.2025.104166","DOIUrl":null,"url":null,"abstract":"<div><div>We develop a construct called information security apathy, which we define as the extent to which individuals lack interest in information security. In Study 1, we develop and refine a scale to measure information security apathy, assess its content and its convergent, discriminant, and predictive validity, and show that it is distinct from and more stable over time than seven security motivation and attitude constructs used in prior research. In Study 2, we examine the relative effects of security apathy and security knowledge on security decisions by presenting users with a series of security situations and asking what security actions they would be likely to take. We also investigate the personality factors that influence security apathy. In Study 3, we again examine the relative effects of security apathy (and security knowledge) and its personality correlates, but this time when job responsibilities pose strong competing priorities to security compliance, a situation in which apathy should be particularly important. Studies 2 and 3 show that security apathy has a medium to large effect on security decisions—a noticeably larger effect than security knowledge. Our measure of security apathy offers researchers a better ability to predict security compliance and organizations a better way of assessing where to focus their security efforts (reducing apathy versus providing training).</div></div>","PeriodicalId":56291,"journal":{"name":"Information & Management","volume":"62 7","pages":"Article 104166"},"PeriodicalIF":8.2000,"publicationDate":"2025-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Information & Management","FirstCategoryId":"91","ListUrlMain":"https://www.sciencedirect.com/science/article/pii/S0378720625000692","RegionNum":2,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"COMPUTER SCIENCE, INFORMATION SYSTEMS","Score":null,"Total":0}
引用次数: 0
Abstract
We develop a construct called information security apathy, which we define as the extent to which individuals lack interest in information security. In Study 1, we develop and refine a scale to measure information security apathy, assess its content and its convergent, discriminant, and predictive validity, and show that it is distinct from and more stable over time than seven security motivation and attitude constructs used in prior research. In Study 2, we examine the relative effects of security apathy and security knowledge on security decisions by presenting users with a series of security situations and asking what security actions they would be likely to take. We also investigate the personality factors that influence security apathy. In Study 3, we again examine the relative effects of security apathy (and security knowledge) and its personality correlates, but this time when job responsibilities pose strong competing priorities to security compliance, a situation in which apathy should be particularly important. Studies 2 and 3 show that security apathy has a medium to large effect on security decisions—a noticeably larger effect than security knowledge. Our measure of security apathy offers researchers a better ability to predict security compliance and organizations a better way of assessing where to focus their security efforts (reducing apathy versus providing training).
期刊介绍:
Information & Management is a publication that caters to researchers in the field of information systems as well as managers, professionals, administrators, and senior executives involved in designing, implementing, and managing Information Systems Applications.