Skip to main content

How Safely Do We Behave Online? An Explanatory Study into the Cybersecurity Behaviors of Dutch Citizens

Part of the Lecture Notes in Networks and Systems book series (LNNS,volume 268)

Abstract

The Capability-Opportunity-Motivation-Behavior (COM-B) model states that people’s behavior can be explained by their capabilities, opportunity, motivation, and the interaction between these components. This research focuses on applying the COM-B model to Dutch citizens’ cybersecurity behavior. Data are used from a Dutch cross-sectional online survey (N = 2,426). Multivariate analysis was performed with multivariate linear regression models. The results suggest, in line with the literature, that people that have relevant knowledge, and are motivated to protect themselves, report more cyber secure behavior. The opportunity people have to protect themselves was found to be only partly related to self-reported cybersecurity behavior. Explanations are provided for these findings, as well as opportunities for future research.

Keywords

  • Precautionary behavior
  • Cyber hygiene
  • Human vulnerability
  • Information assurance

This is a preview of subscription content, access via your institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • DOI: 10.1007/978-3-030-79997-7_30
  • Chapter length: 9 pages
  • Instant PDF download
  • Readable on all devices
  • Own it forever
  • Exclusive offer for individuals only
  • Tax calculation will be finalised during checkout
eBook
USD   169.00
Price excludes VAT (USA)
  • ISBN: 978-3-030-79997-7
  • Instant PDF download
  • Readable on all devices
  • Own it forever
  • Exclusive offer for individuals only
  • Tax calculation will be finalised during checkout
Softcover Book
USD   219.99
Price excludes VAT (USA)

References

  1. Jansen, J., Leukfeldt, R.: Phishing and malware attacks on online banking customers in the Netherlands: a qualitative analysis of factors leading to victimization. Int. J. Cyber Criminol. 10(1), 79–91 (2016). https://doi.org/10.5281/zenodo.58523

    CrossRef  Google Scholar 

  2. Van der Kleij, R., Wijn, R., Hof, T.: An application and empirical test of the Capability Opportunity Motivation-Behaviour model to data leakage prevention in financial organizations. Comput. Secur. 97, 101970 (2020)

    CrossRef  Google Scholar 

  3. Cain, A.A., Edwards, M.E., Still, J.D.: An exploratory study of cyber hygiene behaviors and knowledge. J. Inf. Secur. Appl. 42, 36–45 (2018). https://doi.org/10.1016/j.jisa.2018.08.002

    CrossRef  Google Scholar 

  4. Crossler, R.E., Bélanger, F.: Why would i use location-protective settings on my smartphone? Motivating protective behaviors and the existence of the privacy knowledge-belief gap. Inf. Syst. Res. 30(3), 995–1006 (2019)

    CrossRef  Google Scholar 

  5. Stanton, J.M., Stam, K.R., Mastrangelo, P., Jolton, J.: Analysis of end user security behaviors. Comput. Secur. 24(2), 124–133 (2005)

    CrossRef  Google Scholar 

  6. Padayachee, K.: Taxonomy of compliant information security behavior. Comput. Secur. 31(5), 673–680 (2012)

    CrossRef  Google Scholar 

  7. Crossler, R.E., Bélanger, F., Ormond, D.: The quest for complete security: an empirical analysis of users’ multi-layered protection from security threats. Inf. Syst. Front. 21(2), 343–357 (2017). https://doi.org/10.1007/s10796-017-9755-1

    CrossRef  Google Scholar 

  8. Symantec: Security Center White Papers (2018). https://www.symantec.com/security-center/white-papers

  9. Michie, S., Stralen, M.M. Van, West, R.: The behaviour change wheel: a new method for characterising and designing behaviour change interventions. Implement. Sci. 42 (6) (2011). https://doi.org/10.1186/1748-5908-6-42

  10. Brown, J., Kotz, D., Michie, S., Stapleton, J., Walmsley, M., West, R.: How effective and cost-effective was the national mass media smoking cessation campaign ‘Stoptober’? Drug Alcohol Depend. 135, 52–58 (2014)

    CrossRef  Google Scholar 

  11. Atkins, L., Michie, S.: Changing eating behaviour: what can we learn from behavioural science? Nutr. Bull. 38(1), 30–35 (2013)

    CrossRef  Google Scholar 

  12. Van’t Hoff-de Goede, S., Van der Kleij, R., Van de Weijer, S., Leukfeldt, R.: Hoe veilig gedragen wij ons online? Een studie naar de samenhang tussen kennis, gelegenheid, motivatie en online gedrag van Nederlanders. WODC report (2019). https://www.wodc.nl/binaries/2975_Volledige_Tekst_tcm28-421151.pdf

  13. CBS: Bevolking; geslacht, leeftijd en burgerlijke staat (2019). https://opendata.cbs.nl/statline/#/CBS/nl/dataset/7461BEV/table?fromstatweb

  14. Mullinix, K.J., Leeper, T.J., Druckman, J.N., Freese, J.: The generalizability of survey experiments. J. Exp. Polit. Sci. 2(2), 109–138 (2015)

    CrossRef  Google Scholar 

  15. Huijg, J.M., Gebhardt, W.A., Crone, M.R., Dusseldorp, E., Presseau, J.: Discriminant content validity of a theoretical domains framework questionnaire for use in implementation research. Implement. Sci. 9 (11) (2014). https://doi.org/10.1186/1748-5908-9-11

  16. Herath, T., Rao, H.R.: Protection motivation and deterrence: a framework for security policy compliance in organisations. Eur. J. Inf. Syst. 18(2), 106–125 (2009). https://doi.org/10.1057/ejis.2009.6

    CrossRef  Google Scholar 

  17. Cohen, P., West, S.G., Aiken, L.S.: Applied Multiple Regression/Correlation Analysis for the Behavioral Sciences. Psychology Press, New York (2014)

    CrossRef  Google Scholar 

  18. Arachchilage, N.A.G., Love, S.: Security awareness of computer users: a phishing threat avoidance perspective. Comput. Hum. Behav. 38, 304–312 (2014). https://doi.org/10.1016/j.chb.2014.05.046

    CrossRef  Google Scholar 

  19. Downs, J.S., Holbrook, M., Cranor, L.F.: Behavioral response to phishing risk. In: Proceedings of the Anti-Phishing Working Groups - 2nd Annual eCrime Researchers Summit, pp. 37–44. New York, NY, USA: ACM Press (2007). https://doi.org/10.1145/1299015.1299019

  20. Holt, T.J., Bossler, A.M.: Examining the relationship between routine activities and malware infection indicators. J. Contemp. Crim. Justice 29(4), 420–436 (2013). https://doi.org/10.1177/1043986213507401

    CrossRef  Google Scholar 

  21. Parsons, K., McCormac, A., Butavicius, M., Pattinson, M., Jerram, C.: Determining employee awareness using the Human Aspects of Information Security Questionnaire (HAIS-Q). Comput. Secur. 42, 165–176 (2014). https://doi.org/10.1016/j.cose.2013.12.003

    CrossRef  Google Scholar 

  22. Shillair, R., Cotten, S.R., Tsai, H.Y.S., Alhabash, S., Larose, R., Rifon, N.J.: Online safety begins with you and me: convincing Internet users to protect themselves. Comput. Hum. Behav. 48, 199–207 (2015). https://doi.org/10.1016/j.chb.2015.01.046

    CrossRef  Google Scholar 

  23. Ellis, D.A.: Are smartphones really that bad? Improving the psychological measurement of technology-related behaviors. Comput. Hum. Behav. 97, 60–66 (2019)

    CrossRef  Google Scholar 

  24. Van ’t Hoff-de Goede, S., Leukfeldt, E., Van der Kleij, R., Van de Weijer, S.: The online behaviour and victimization study: the development of an experimental research instrument for measuring and explaining online behaviour and cybercrime victimization. In: Weulen Kranenbarg, M., Leukfeldt, R. (eds.) Cybercrime in Context, Crime and Justice in Digital Society, vol. I, pp. 21–41. Springer, Cham (2021). https://doi.org/10.1007/978-3-030-60527-8_3

Download references

Funding and Acknowledgments

This work was supported by the WODC (Research and Documentation Centre) of the Ministry of Justice and Security.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Rick van der Kleij .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and Permissions

Copyright information

© 2021 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Verify currency and authenticity via CrossMark

Cite this paper

van der Kleij, R., van ’t Hoff-De Goede, S., van de Weijer, S., Leukfeldt, R. (2021). How Safely Do We Behave Online? An Explanatory Study into the Cybersecurity Behaviors of Dutch Citizens. In: Zallio, M., Raymundo Ibañez, C., Hernandez, J.H. (eds) Advances in Human Factors in Robots, Unmanned Systems and Cybersecurity. AHFE 2021. Lecture Notes in Networks and Systems, vol 268. Springer, Cham. https://doi.org/10.1007/978-3-030-79997-7_30

Download citation