Introduction: The effectiveness of human-centric cybersecurity largely depends on end-users' adherence to security and privacy behaviors. Understanding and predicting variations in the adoption of these safeguards is crucial for both theoretical advancement and practical application. While existing frameworks are often adapted from health science literature, there is potential to enhance these models by incorporating criminological constructs relevant to online victimization. This study introduce rational choice theory of thoughtfully reflective decision-making (TRDM) into the information security domain. TRDM suggests that variations in cognitive decision-making capabilities influence behavioral outcomes, particularly in the context of security and privacy practices.

Methods: The study employed a field experiment to test the applicability of TRDM in predicting end-users' engagement in security and privacy behaviors. Participants were exposed to security-related warnings, with the hypothesis that thoughtfully reflective decision-makers would be more likely to adopt robust protective behaviors. Data was collected on participants' responses to these security warnings, as well as their overall adherence to privacy and security practices.

Results: The findings support the theoretical framework: individuals exhibiting thoughtfully reflective decision-making tendencies demonstrated a higher likelihood of engaging in privacy and security behaviors. Specifically, participants with higher TRDM scores were more likely to adopt protective behaviors when warned of the consequences of non-compliance. These results indicate that cognitive decision-making capabilities significantly influence the likelihood of engaging in cybersecurity practices.

Discussion: The study challenges the prevailing one-size-fits-all approach to cybersecurity by highlighting the importance of individual differences in cognitive decision-making. Thoughtfully reflective decision-makers are better equipped to adopt preventive security measures, suggesting the need for more tailored interventions in cybersecurity education and risk assessment. This research contributes to the development of sophisticated risk assessment tools aimed at mitigating vulnerabilities and reducing users' susceptibility to digital threats. Incorporating TRDM into information security models provides a more nuanced understanding of user behavior, offering insights into how cognitive processes influence cybersecurity adherence.

Download full-text PDF

Source
http://www.ncbi.nlm.nih.gov/pmc/articles/PMC11576173PMC
http://dx.doi.org/10.3389/fpsyg.2024.1372681DOI Listing

Publication Analysis

Top Keywords

thoughtfully reflective
16
security privacy
12
cognitive decision-making
12
security
9
privacy behaviors
8
reflective decision-making
8
trdm security
8
decision-making capabilities
8
capabilities influence
8
behaviors participants
8

Similar Publications

Native and non-native winter foraging resources do not explain winter roost occupancy in Queensland, Australia.

Front Ecol Evol

October 2024

Department of Biology, Center for Infectious Disease Dynamics, The Pennsylvania State University, University Park, PA, United States.

Anthropogenic land use change concurrent with introductions of non-native species alters the abundance and distribution of foraging resources for wildlife. This is particularly concerning when resource bottlenecks for wildlife are linked to spillover of infectious diseases to humans. Hendra virus is a bat-borne pathogen in eastern Australia.

View Article and Find Full Text PDF

Hypoxic-ischemic encephalopathy (HIE) is a perinatal brain injury that is the leading cause of cerebral palsy, developmental delay, and poor cognitive outcomes in children born at term, occurring in about 1.5 out of 1000 births. The only proven therapy for HIE is therapeutic hypothermia.

View Article and Find Full Text PDF

Introduction: The effectiveness of human-centric cybersecurity largely depends on end-users' adherence to security and privacy behaviors. Understanding and predicting variations in the adoption of these safeguards is crucial for both theoretical advancement and practical application. While existing frameworks are often adapted from health science literature, there is potential to enhance these models by incorporating criminological constructs relevant to online victimization.

View Article and Find Full Text PDF

Benchmarks and leaderboards are commonly used to track the fairness impacts of artificial intelligence (AI) models. Many critics argue against this practice, since it incentivizes optimizing for metrics in an attempt to build the "most fair" AI model. However, this is an inherently impossible task since different applications have different considerations.

View Article and Find Full Text PDF

Using a Small Lever to Achieve Big Outcomes in a Devolved Health System: 20 Years of Programa Sumar in Argentina.

Health Syst Reform

December 2024

Department of Health Financing and Economics, World Health Organization, Geneva, Switzerland.

Incremental health system transformations towards universal health coverage run the risk of losing sight of the overarching objectives and can lose momentum in the implementation process. Argentina's Programa Sumar is a program born out of response to both urgent and long-standing health challenges. Starting with a relatively small share of the government's budget for health, the Program over the last 20 years has gradually expanded in pursuit of increasing access to quality health care, fostering coherence through policy alignment and coordination in a highly decentralized system, and achieving its performance objectives through conditional transfers linked to results.

View Article and Find Full Text PDF

Want AI Summaries of new PubMed Abstracts delivered to your In-box?

Enter search terms and have AI summaries delivered each week - change queries or unsubscribe any time!