BazEkon - Biblioteka Główna Uniwersytetu Ekonomicznego w Krakowie

BazEkon home page

Meny główne

Autor
Cichowicz Ewa (SGH Warsaw School of Economics, Warsaw, Poland), Iwanicz-Drozdowska Małgorzata (SGH Warsaw School of Economics, Warsaw, Poland), Kurowski Łukasz (SGH Warsaw School of Economics, Warsaw, Poland)
Tytuł
"Every Knock Is a Boost". Cyber Risk Behaviour among Poles
Źródło
Economics and Business Review, 2021, vol. 7 (21), nr 4, s. 94-120, rys., tab., bibliogr. 49 poz.
Słowa kluczowe
Cyberbezpieczeństwo, Usługi finansowe, Zachowania konsumenta, Świadomość konsumenta, Ocena ryzyka
Cybersecurity, Financial services, Consumer behaviour, Consumer awareness, Risk assessment
Uwagi
Klasyfikacja JEL: G51, D10, M15, P36
summ.
Abstrakt
The purpose of this study is to evaluate the safety of individuals' behaviour in the cyber world, especially when using financial services. The article focuses on knowledge of cybersecurity issues, cyber risk awareness and respondents' self-assessment as potential determinants of individual behaviour. The data obtained from a survey of a representative group of Polish citizens during the second wave of the COVID-19 pandemic was analysed. Ordinal logistic regression and instrumental variable analysis confirm the existence of a positive relationship between knowledge and awareness of cyber risk and safe behaviour in the cyber world. Older generations exhibit safer behaviour which may be linked to their life experience; however, the results do not confirm that experiencing a loss due to cyber risk convinces individuals to use Internet-based solutions in a safer manner. Therefore, educational campaigns should be expanded to include cyber risk issues and tailored to the needs of various users. (original abstract)
Dostępne w
Biblioteka Główna Uniwersytetu Ekonomicznego w Krakowie
Biblioteka SGH im. Profesora Andrzeja Grodka
Biblioteka Główna Uniwersytetu Ekonomicznego w Katowicach
Biblioteka Główna Uniwersytetu Ekonomicznego w Poznaniu
Pełny tekst
Pokaż
Bibliografia
Pokaż
  1. Aldasoro, I., Frost, J., Gambacorta, L., & Whyte, D. (2021, January). Covid-19 and cyber risk in the financial sector. BIS Bulletin, 37, 1-9.
  2. Anwar, M., He, W., Ash, I., Yuan, X., Li, L., & Xu, L. (2017). Gender difference and employees' cybersecurity behaviors. Computers in Human Behavior, 69, 437-443.
  3. Association of Certified Fraud Examiners. (2020, December). Fraud in the wake of COVID-19: Benchmarking report.
  4. Bada, M., Sasse, A.M., & Nurse, J.R.C. (2015). Cyber security awareness campaigns: Why do they fail to change behaviour?. (Paper presented at the 1st International Conference on Cyber Security for Sustainable Society). Sustainable Society Network, 118-131.
  5. Boss, S.R., Kirsch, L.J., Angermeier, I., Shingler, R.A., & Boss, R.W. (2009). If someone is watching, I'll do what I'm asked: Mandatoriness, control, and information security. European Journal of Information Systems, 18(2), 151-164.
  6. Cain, A.A., Edwards, M.E., & Still, J.D. (2018). An exploratory study of cyber hygiene behaviors and knowledge. Journal of Information Security and Applications, 42, 36-45.
  7. Chandarman, R., & Van Niekerk, B. (2017). Students' cybersecurity awareness at a private tertiary educational institution. The African Journal of Information and Communication, 20, 133-155.
  8. Chłoń-Domińczak, A., & Kotowska, I.E. (Eds.). (2015). Uwarunkowania decyzji edukacyjnych. Warszawa: Instytut Badań Edukacyjnych.
  9. Da Veiga, A. (2018). An approach to information security culture change combining ADKAR and the ISCA questionnaire to aid transition to the desired culture. Information & Computer Security, 26(5), 584-612.
  10. Dvorak, T., & Hanley, H. (2010). Financial literacy and the design of retirement plans. The Journal of Socio-Economics, 39(6), 645-652.
  11. ESRB. (2018). Press release: The general board of the European Systemic Risk Board held its 32nd regular meeting on 6 Dec 2018.
  12. Frijns, B., Gilbert, A., & Tourani-Rad, A. (2014). Learning by doing: The role of financial experience in financial literacy. Journal of Public Policy, 34(1), 123-154.
  13. Georgiadou, A., Mouzakitis, S., Bounas, K., & Askounis, D. (2020). A cyber-security culture framework for assessing organization readiness. Journal of Computer Information Systems, 1-11.
  14. Grazioli, S., & Wang, A. (2001). Looking without seeing: Understanding unsophisticated consumers' success and failure to detect Internet deception. (ICIS 2001 Proceedings, 193-203).
  15. Herath, T., & Rao, H.R. (2009). Protection motivation and deterrence: A framework for security policy compliance in organisations. European Journal of Information Systems, 18(2), 106-125.
  16. Hosany, S., & Martin, D. (2012). Self-image congruence in consumer behavior. Journal of Business Research, 65(5), 685-691.
  17. Hughes-Larteya, K., Li, M., Botchey, F.E., & Qin, Z. (2021). Human factor, a critical weak point in the information security of an organization's Internet of things. Heliyon, 7(3), 1-13.
  18. Hussain, A., Mohamed, A., & Razali, S. (2020). A review on cybersecurity: Challenges & emerging threats. (NISS2020: Proceedings of the 3rd International Conference on Networking, Information Systems & Security No. 28, 1-7).
  19. Junger, M., Montoya, & L., Overink, F.-J. (2017). Priming and warnings are not effective to prevent social engineering attacks. Computers in Human Behavior, 66, 75-87.
  20. Kennison, S.M., & Chan-Tin, E. (2020). Taking risks with cybersecurity: Using knowledge and personal characteristics to predict self-reported cybersecurity behaviors. Frontiers in Psychology, 11, 1-9.
  21. Kostyuk, N., & Wayne, C. (2021). The microfoundations of state cybersecurity: Cyber risk perceptions and the mass public. Journal of Global Security Studies, 6(2), 1-25.
  22. Kosub, T. (2015). Components and challenges of integrated cyber risk management. Zeitschrift für die gesamte Versicherungswissenschaft, 104, 615-634.
  23. Krol, K., Moroz, M., & Sasse, M.A. (2012). Don't work. Can't work? Why it's time to rethink security warnings. (Paper presented at the 7th International Conference on Risk and Security of Internet and Systems (CRiSIS), 1-8).
  24. Li, H., Xie, K.L., & Zhang, Z. (2020). The effects of consumer experience and disconfirmation on the timing of online review: Field evidence from the restaurant business. International Journal of Hospitality Management, 84, 1-11.
  25. Lis, P., & Mendel, J. (2019). Cyberattacks on critical infrastructure: An economic perspective. Economics and Business Review, 5(2), 24-47.
  26. Lusardi, A., & Tufano, P. (2015). Debt literacy, financial experiences, and overindebtedness. Journal of Pension Economics and Finance, 14(4), 332-368.
  27. Mamonov, S., & Benbunan-Fich, R. (2018). The impact of information security threat awareness on privacy-protective behaviors. Computers in Human Behavior, 83, 32-44.
  28. Mashiane, T., & Kritzinger, E. (2018). Cybersecurity behaviour: A conceptual taxonomy. In: O. Blazy, C.Y. Yeun (Eds.), Information security. Theory and practice. (12th IFIP WG 11.2 International Conference, WISTP, 147-156).
  29. Mashiane, T., & Kritzinger, E. (2021). Identifying behavioral constructs in relation to user cybersecurity behavior. Eurasian Journal of Social Sciences, 9(2), 98-122.
  30. McKinsey. (2020). Digital challengers in the next normal in Central and Eastern Europe on a path to digitally-led growth. McKinsey Digital.
  31. Milošević, N., Dobrota, M., & Barjaktarović Rakočević, S. (2018). Digital economy in Europe: Evaluation of countries' performances. Proceedings of Rijeka Faculty of Economics: Journal of Economics and Business, 36(2), 861-880.
  32. Mruk, C.J. (2006). Self-esteem research, theory, and practice: Toward a positive psychology of self-esteem. New York: Springer Publishing Company.
  33. Naidoo, R. (2020). A multi-level influence model of COVID-19 themed cybercrime. European Journal of Information Systems, 29(3), 306-321.
  34. Olmstead, K., & Smith, A. (2017, March 22). What the public knows about cybersecurity. Pew Research Center.
  35. Parsons, K.M., Young, E., Butavicius, M.A., McCormac, A., Pattinson, M., & Jerram, C. (2015). The influence of organizational information security culture on information security decision making. Journal of Cognitive Engineering and Decision Making, 9(2), 117-129.
  36. Reegård, K., Blackett, C., & Katta, V. (2019). The concept of cybersecurity culture. (Paper presented on the 29th European Safety and Reliability Conference).
  37. Shillair, R., Cotton, S.R., Tsai, H.-Y.S., Alhabash, S., LaRose, R., & Rifon, N.J. (2005). Online safety begins with you and me: Convincing Internet users to protect themselves. Computers in Human Behavior, 48, 199-207.
  38. Tedder, K. (2020). The escalation of digital fraud: Global impact of the coronavirus. Report by Javelin Strategy & Research and SAS.
  39. Van Rooij, M., Lusardi, A., & Alessie, R. (2011a). Financial literacy and stock market participation. Journal of Financial Economics, 101(2), 449-472.
  40. Van Rooij, M., Lusardi, A., & Alessie, R. (2011b). Financial literacy and retirement planning in the Netherlands. Journal of Economic Psychology, 32(4), 593-608.
  41. Vance, A., Siponen, M., & Pahnila, S. (2012). Motivating IS security compliance: Insights from habit and protection motivation theory. Information & Management, 49(3), 190-198.
  42. Venter, I.M., Blignaut, R.J., Renaud, K., & Venter, M.A. (2019). Cyber security education is as essential as "the three R's". Heliyon, 5(12), 1-8.
  43. Von Solms, R., & Van Niekerk, J. (2013). From information security to cyber security. Computers & Security, 38, 97-102.
  44. Watanapongvanich, S., Binnagan, P., Putthinun, P., Khan, M.S.R., & Kadoya, Y. (2021). Financial literacy and gambling behavior: Evidence from Japan. Journal of Gambling Studies, 37(3), 445-465.
  45. Wogalter, M.S., Laughery, Sr. K.R., & Mayhorn, C.B. (2012). Warnings and hazard communications. In: G. Salvendy (Ed.), Handbook of human factors and ergonomics (4 ed., pp. 868-894). Hoboken, NJ: John Wiley & Sons.
  46. Yasin, A., Liu, L., Li, T., Wang, J., & Zowghi, D. (2018). Design and preliminary evaluation of a cyber Security Requirements Education Game (SREG). Information and Software Technology, 95, 179-200.
  47. Yildirim, M., & Mackie, I. (2019). Encouraging users to improve password security and memorability. International Journal of Information Security, 18, 741-759.
  48. Związek Banków Polskich (ZBP). (2021). Postawy Polaków wobec cyberbezpieczeństwa. Badanie Warszawskiego Instytutu Bankowości zrealizowane w ramach projektu Bezpieczeństwo w Cyberprzestrzeni. Retrieved from https://zbp.pl/getmedia/65f267e4-3316-4198-9cce-411d8f03de32/Postawy_Polakow_wobec_Cyberbezpieczenstwa_v-3
  49. Zwilling, M., Klien, G., Lesjak, D., Wiechetek, Ł., Cetin, F., & Basim, H.N. (2020). Cyber security awareness, knowledge and behavior: A comparative study. Journal of Computer Information Systems, 1-16.
Cytowane przez
Pokaż
ISSN
2392-1641
Język
eng
URI / DOI
http://dx.doi.org/10.18559/ebr.2021.4.6
Udostępnij na Facebooku Udostępnij na Twitterze Udostępnij na Google+ Udostępnij na Pinterest Udostępnij na LinkedIn Wyślij znajomemu