research-article
Authors: Peter Banyasz, Pal Karoly Laska, Tamas Szadeczky, Kincso Boroka Vaczi
CEEeGov '24: Proceedings of the Central and Eastern European eDem and eGov Days 2024
Pages 195 - 202
Published: 12 September 2024 Publication History
Metrics
Total Citations0Total Downloads0Last 12 Months0
Last 6 weeks0
New Citation Alert added!
This alert has been successfully added and will be sent to:
You will be notified whenever a record that you have chosen has been cited.
To manage your alert preferences, click on the button below.
Manage my Alerts
New Citation Alert!
Please log in to your account
Get Access
- Get Access
- References
- Media
- Tables
- Share
Abstract
The current study endeavors to explore the linkages between the Dark Triad personality traits, namely narcissism, Machiavellianism, and psychopathy, and the attitudes towards cybersecurity among university students who are registered in an information security awareness course. The research involved administering a self-report questionnaire to 29 students that included queries on the Dark Triad personality scale and cybersecurity attitudes. The research will use a mixed-methods approach to analyse the data, including quantitative such as descriptive statistics, cross-tabulation analysis, cluster analysis. The findings of this study may offer insights that could aid in the development of customized information security training programs and the enhancement of cyber threat management.
References
[1]
Charles Abraham and Paschal Sheeran. 2004. Deciding to exercise: the role of anticipated regret. Br J Health Psychol 9, Pt 2 (May 2004), 269–278. https://doi.org/10.1348/135910704773891096
[2]
Noa Aharony, Dan Bouhnik, and Nurit Reich. 2020. Readiness for information security of teachers as a function of their personality traits and their assessment of threats. Aslib Journal of Information Management 72, 5 (January 2020), 787–812. https://doi.org/10.1108/AJIM-12-2019-0371
[3]
Terrence August and Tunay I. Tunca. 2004. Network Software Security and User Incentives. Retrieved April 27, 2024 from https://papers.ssrn.com/abstract=1708220
[4]
Danny Azucar, Davide Marengo, and Michele Settanni. 2018. Predicting the Big 5 personality traits from digital footprints on social media: A meta-analysis. Personality and Individual Differences 124, (April 2018), 150–159. https://doi.org/10.1016/j.paid.2017.12.018
[5]
Bilal Khan. 2011. Effectiveness of information security awareness methods based on psychological theories. Afr. J. Bus. Manage. 5, 26 (October 2011). https://doi.org/10.5897/AJBM11.067
[6]
Scott R Boss, Laurie J Kirsch, Ingo Angermeier, Raymond A Shingler, and R Wayne Boss. 2009. If someone is watching, I'll do what I'm asked: mandatoriness, control, and information security. European Journal of Information Systems 18, 2 (April 2009), 151–164. https://doi.org/10.1057/ejis.2009.8
[7]
Burcu Bulgurcu, Hasan Cavusoglu, and Izak Benbasat. 2010. Information Security Policy Compliance: An Empirical Study of Rationality-Based Beliefs and Information Security Awareness. MIS Quarterly 34, 3 (2010), 523–548. https://doi.org/10.2307/25750690
[8]
David R. Carroll. 2021. Cambridge Analytica. In Research Handbook on Political Propaganda. Edward Elgar Publishing, 41–50. Retrieved April 27, 2024 from https://www.elgaronline.com/edcollchap/edcoll/9781789906417/9781789906417.00010.xml
[9]
Andrea Cullen and Lorna Armitage. 2018. A Human Vulnerability Assessment Methodology. In 2018 International Conference On Cyber Situational Awareness, Data Analytics And Assessment (Cyber SA), June 2018. 1–2. https://doi.org/10.1109/CyberSA.2018.8551371
[10]
S.R. Curtis, P. Rajivan, D.N. Jones, and C. Gonzalez. 2018. Phishing attempts among the dark triad: Patterns of attack and vulnerability. Computers in Human Behavior 87, (2018), 174–182. https://doi.org/10.1016/j.chb.2018.05.037
Digital Library
[11]
John D'Arcy, Anat Hovav, and Dennis Galletta. 2009. User Awareness of Security Countermeasures and Its Impact on Information Systems Misuse: A Deterrence Approach. Information Systems Research (March 2009). https://doi.org/10.1287/isre.1070.0160
Digital Library
[12]
Wilco W. van Dijk and Marcel Zeelenberg. 2002. Investigating the Appraisal Patterns of Regret and Disappointment. Motivation and Emotion 26, 4 (December 2002), 321–331. https://doi.org/10.1023/A:1022823221146
[13]
Mustafa Eşkisu, Rumeysa Hoşoğlu, and Kyler Rasmussen. 2017. An investigation of the relationship between Facebook usage, Big Five, self-esteem and narcissism. Computers in Human Behavior 69, (April 2017), 294–301. https://doi.org/10.1016/j.chb.2016.12.036
Digital Library
[14]
Russell Haines and Lori N. K. Leonard. 2007. Situational influences on ethical decision-making in an IT context. Information & Management 44, 3 (April 2007), 313–320. https://doi.org/10.1016/j.im.2007.02.002
Digital Library
[15]
Qiwei He, Cees A. W. Glas, Michal Kosinski, David J. Stillwell, and Bernard P. Veldkamp. 2014. Predicting self-monitoring skills using textual posts on Facebook. Computers in Human Behavior 33, (April 2014), 69–78. https://doi.org/10.1016/j.chb.2013.12.026
Digital Library
[16]
Tejaswini Herath and H Raghav Rao. 2009. Protection motivation and deterrence: a framework for security policy compliance in organisations. European Journal of Information Systems 18, 2 (April 2009), 106–125. https://doi.org/10.1057/ejis.2009.6
[17]
Joanne Hinds, Emma J. Williams, and Adam N. Joinson. 2020. “It wouldn't happen to me”: Privacy concerns and perspectives following the Cambridge Analytica scandal. International Journal of Human-Computer Studies 143, (November 2020), 102498. https://doi.org/10.1016/j.ijhcs.2020.102498
[18]
Nor Shahriza Abdul Karim, Nurul Hidayah Ahmad Zamzuri, and Yakinah Muhamad Nor. 2009. Exploring the relationship between Internet ethics in university students and the big five model of personality. Computers & Education 53, 1 (August 2009), 86–93. https://doi.org/10.1016/j.compedu.2009.01.001
Digital Library
[19]
James M. LeBreton, Levi K. Shiverdecker, and Elizabeth M. Grimaldi. 2018. The Dark Triad and Workplace Behavior. Annual Review of Organizational Psychology and Organizational Behavior 5, Volume 5, 2018 (January 2018), 387–414. https://doi.org/10.1146/annurev-orgpsych-032117-104451
[20]
Nuttha Lumlertgul, Naruchorn Kijpaisalratana, Nuttorn Pityaratstian, and Danai Wangsaturaka. 2009. Cinemeducation: A pilot student project using movies to help students learn medical professionalism. Med Teach 31, 7 (July 2009), e327-332. https://doi.org/10.1080/01421590802637941
[21]
A. McCormac, T. Zwaans, K. Parsons, D. Calic, M. Butavicius, and M. Pattinson. 2017. Individual differences and Information Security Awareness. Computers in Human Behavior 69, (2017), 151–156. https://doi.org/10.1016/j.chb.2016.11.065
Digital Library
[22]
Liisa Myyry, Mikko Siponen, Seppo Pahnila, Tero Vartiainen, and Anthony Vance. 2009. What levels of moral reasoning and values explain adherence to information security rules? An empirical study. European Journal of Information Systems 18, 2 (April 2009), 126–139. https://doi.org/10.1057/ejis.2009.10
[23]
Warren T. Norman. 1963. Toward an adequate taxonomy of personality attributes: Replicated factor structure in peer nomination personality ratings. The Journal of Abnormal and Social Psychology 66, 6 (1963), 574–583. https://doi.org/10.1037/h0040291
[24]
Seppo Pahnila, Mikko Siponen, and Adam Mahmood. 2007. Employees’ Behavior towards IS Security Policy Compliance. In 2007 40th Annual Hawaii International Conference on System Sciences (HICSS’07), January 2007. 156b–156b. https://doi.org/10.1109/HICSS.2007.206
Digital Library
[25]
Delroy L Paulhus and Kevin M Williams. 2002. The Dark Triad of personality: Narcissism, Machiavellianism, and psychopathy. Journal of Research in Personality 36, 6 (December 2002), 556–563. https://doi.org/10.1016/S0092-6566(02)00505-6
[26]
Gorana Rakić-Bajić and Vladimir Hedrih. 2012. Excessive use of the Internet, life satisfaction and personality factors. Suvremena psihologija 15, 1 (July 2012), 119–130.
[27]
Jordan Shropshire and Art Gowan. 2015. Characterizing the Traits of Top-Performing Security Personnel. In Proceedings of the 2015 ACM SIGMIS Conference on Computers and People Research (SIGMIS-CPR ’15), June 04, 2015. Association for Computing Machinery, New York, NY, USA, 55–59. https://doi.org/10.1145/2751957.2751971
Digital Library
[28]
Detmar W. Straub. 1990. Effective IS Security: An Empirical Study. Information Systems Research 1, 3 (September 1990), 255–276. https://doi.org/10.1287/isre.1.3.255
Digital Library
[29]
Jörg Uffen, Michael H. Breitner, Jörg Uffen, and Michael H. Breitner. 1AD. Management of Technical Security Measures: An Empirical Examination of Personality Traits and Behavioral Intentions. https://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-4666-8111-8.ch039. Retrieved April 27, 2024 from https://www.igi-global.com/gateway/chapter/www.igi-global.com/gateway/chapter/125323
[30]
Chris Wright and Peter Ayton. 2005. Focusing on what might happen and how it could feel: can the anticipation of regret change students’ computing-related choices? International Journal of Human-Computer Studies 62, 6 (June 2005), 759–783. https://doi.org/10.1016/j.ijhcs.2005.03.001
Digital Library
Index Terms
The relationship between the dark triad personality and cybersecurity
Applied computing
Law, social and behavioral sciences
Psychology
Security and privacy
Human and societal aspects of security and privacy
Social aspects of security and privacy
Recommendations
- The Dark Triad and Facebook surveillance: How Machiavellianism, psychopathy, but not narcissism predict using Facebook to spy on others
Abstract
The Dark Triad of personality – Machiavellianism, narcissism, and psychopathy – has been shown to influence a variety of behaviours. Typically, high levels of these traits predict engaging in behaviour at the periphery of what is ...
Highlights
- The Dark Triad of personality is related to using Facebook as a surveillance tool.
Read More
- Studying the Dark Triad of Personality through Twitter Behavior
CIKM '16: Proceedings of the 25th ACM International on Conference on Information and Knowledge Management
Research into the darker traits of human nature is growing in interest especially in the context of increased social media usage. This allows users to express themselves to a wider online audience. We study the extent to which the standard model of dark ...
Read More
- Phishing attempts among the dark triad: Patterns of attack and vulnerability
Abstract
Phishing attacks are more common and more sophisticated than other forms of social engineering attacks. This study presents an investigation of the relationships between three personality traits—Machiavellianism, narcissism, and psychopathy (i.e.,...
Highlights
- We investigate the relationship between personality, phishing effort, and success.
- Three traits are: Machiavellianism, narcissism, and psychopathy (dark triad).
- Attackers high in Machiavellianism were more likely to put more ...
Read More
Comments
Information & Contributors
Information
Published In
CEEeGov '24: Proceedings of the Central and Eastern European eDem and eGov Days 2024
September 2024
303 pages
ISBN:9798400717093
DOI:10.1145/3670243
Copyright © 2024 ACM.
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [emailprotected].
Publisher
Association for Computing Machinery
New York, NY, United States
Publication History
Published: 12 September 2024
Permissions
Request permissions for this article.
Check for updates
Author Tags
- Cybersecurity Awareness
- Dark Triad
- Survey
Qualifiers
- Research-article
- Research
- Refereed limited
Funding Sources
- Ministry of Culture and Innovation of Hungary
Conference
CEEeGov 2024
CEEeGov 2024: Central and Eastern European eDem and eGov Days 2024
September 12 - 13, 2024
Budapest, Hungary
Contributors
Other Metrics
View Article Metrics
Bibliometrics & Citations
Bibliometrics
Article Metrics
Total Citations
Total Downloads
- Downloads (Last 12 months)0
- Downloads (Last 6 weeks)0
Reflects downloads up to 03 Aug 2024
Other Metrics
View Author Metrics
Citations
View Options
Get Access
Login options
Check if you have access through your login credentials or your institution to get full access on this article.
Sign in
Full Access
Get this Publication
View options
Media
Figures
Other
Tables