The Effect of Countermeasure Readability on Security Intentions
Abstract
:1. Introduction
2. Theoretical Background
2.1. Protection Motivation Theory, Theory of Planned Behavior, and Self-Efficacy
2.2. Text Readability
2.2.1. Measuring Text Readability
2.2.2. Limitations of Readability Metrics
2.2.3. Readability of Cybersecurity Countermeasures
3. Research Model and Hypotheses
4. Methodology
4.1. Questionnaire
4.2. Participants
4.3. Formative Measurement Model Evaluation
4.3.1. Variance Inflation Factor
4.3.2. Size and Significance of Indicator Weights
4.3.3. Convergent Validity
5. Results
5.1. Comparing Perceived Readability to Readability Metric Scores
5.2. Research Model Results
6. Discussion
6.1. Implications and Limitations
7. Conclusions
Author Contributions
Funding
Informed Consent Statement
Data Availability Statement
Conflicts of Interest
Abbreviations
ARI | automated readability index |
CA | countermeasure awareness |
CLI | Coleman–Liau index |
CR | countermeasure readability |
CRD | countermeasure reading disposition |
DC | New Dale–Chall readability formula |
FKGL | Flesch Kincaid grade level |
FOG | gunning fog score |
FRE | Flesch reading ease |
HBM | health belief model |
ISP | information security policy |
MitM | man-in-the-middle |
NLP | natural language processing |
PLS | partial least squares |
PMT | protection motivation theory |
PS | perceived severity |
PV | perceived vulnerability |
RC | response cost |
RE | response efficacy |
SB | security behavior |
SE | self-efficacy |
SEM | structural equation modeling |
SI | security intentions |
SME | small- and medium-sized enterprises |
SN | subjective norm |
TA | threat awareness |
TPB | theory of planned behavior |
VIF | variance inflation factor |
ZDE | zero-day exploit |
Appendix A. Questionnaire
Construct Item | Survey Item | Item Options/Readability Score | Source(s) |
---|---|---|---|
age | How old are you? | Under 18; 18–24; 25–34; 35–44; 45–54; 55–64; 65+ | |
english_level | “English is my _____ language”. | First; Second; Third; Fourth (or more) | |
language | What is your first language? | Open text entry | |
RS | |||
rs1 | I can understand academic English texts | 7-point Likert scale (1 = strongly disagree; 7 = strongly agree) | |
rs2 | “My English reading level is roughly equal to or above my first language reading level”. | True; False | |
TA | All variables measuring TA have the same answer options and structure. | 7-point Likert scale (1 = strongly disagree; 7 = strongly agree) | |
Definition: Malware | Malware is a term used to describe malicious software, including spyware, ransomware, viruses, and worms. Malware breaches a network through a vulnerability, typically when a user clicks a dangerous link or email attachment that then installs risky software. | Cisco Systems [54] | |
Definition: Phishing | Phishing is the practice of sending fraudulent communications that appear to come from a reputable source, usually through email. The goal is to steal sensitive data like credit card and login information or to install malware on the victim’s machine. Phishing is an increasingly common cyber threat. | Cisco Systems [54] | |
Definition: Man-in-the-Middle | Man-in-the-middle (MitM) attacks, also known as eavesdropping attacks, occur when attackers insert themselves into a two-party transaction. Once the attackers interrupt the traffic, they can filter and steal data. | Cisco Systems [54] | |
Definition: Zero-Day Exploit | A zero-day exploit is an attack that exploits a previously unknown hardware, firmware, or software vulnerability. Unknown meaning not known by software vendors or security software that relies on finding known patterns or signatures hackers use. | Dempsey et al. [92], Mulloy [93] | |
ta1 | I am familiar with malware | Hanus and Wu [10] | |
ta2 | I am familiar with phishing | Hanus and Wu [10] | |
ta3 | I am familiar with a man-in-the-middle attack | Hanus and Wu [10] | |
ta4 | I am familiar with a zero-day exploit | Hanus and Wu [10] | |
PS | All variables measuring PS have the same answer options and structure. | 7-point Likert scale (1 = strongly disagree; 7 = strongly agree) | |
ps1 | I think malware is a severe problem | Martens et al. [12] | |
ps2 | I think phishing is a severe problem | Martens et al. [12] | |
PS | All variables measuring PS have the same answer options and structure. | 7-point Likert scale (1 = strongly disagree; 7 = strongly agree) | |
ps3 | I think a man-in-the-middle attack is a severe problem | Martens et al. [12] | |
ps4 | I think a zero-day exploit is a severe problem | Martens et al. [12] | |
PV | All variables measuring PV have the same answer options and structure. | 7-point Likert scale (1 = strongly disagree; 7 = strongly agree) | |
pv1 | It is likely that I become a victim of malware | Hanus and Wu [10] | |
pv2 | It is likely that I become a victim of phishing | Hanus and Wu [10] | |
pv3 | It is likely that I become a victim of a man-in-the-middle attack | Hanus and Wu [10] | |
pv4 | It is likely that I become a victim of a zero-day exploit | Hanus and Wu [10] | |
red herring | What concept is best described by the following description? ____________, also known as eavesdropping attacks, occur when attackers insert themselves into a two-party transaction. Once the attackers interrupt the traffic, they can filter and steal data. | Phishing; Malware; Zero-Day Exploit; Man-in-the-Middle Attack | |
CRD | All variables measuring CRD have the same answer options. | 7-point Likert scale (1 = strongly disagree; 7 = strongly agree) | |
crd1 | I am interested in computer security (countermeasures) | ||
crd2 | I am motivated to read about computer security countermeasures | ||
CR | All variables measuring CR have the same answer options and structure. The countermeasure definitions’ (‘easy’ or ‘hard’) scores are found to the right of the definition. | 7-point Likert scale (1 = strongly disagree; 7 = strongly agree) | |
Measure: Malware (easy) | Where possible, make sure that updates are automatically installed. Otherwise, make sure to update all your software to the latest version. Make sure all your connections to the internet (or other networks) go through a firewall. Make sure you have set up an antivirus program that scans your systems for malware. Make sure your important data is regularly backed up in the cloud or another safe place, so coming back from an attack will be easier. | FRE = 61.2; FKGL = 8.5; FOG = 11.9; DC = 7.1; CLI = 12.3; ARI = 8.7 | Swiss Federal Department of Finance [94] |
Measure: Malware (hard) | Whenever possible, verify updates are automatically being installed. Alternatively, ensure all software packages are updated to their most recent version. Activate the operating system’s integrated firewall before you connect any device to the internet or other networks. Employ a virus protection program that frequently performs full system scans optimized for malicious software detection. Safeguard critical data by planning a regular off-site backup (e.g., cloud or tape backup) of systems, so recovery from cyber attacks will be a less complicated process. | FRE = 29.9; FKGL = 12; FOG = 14.4; DC = 10.6; CLI = 17.8; ARI = 11.3 | Swiss Federal Department of Finance [94] |
CR | All variables measuring CR have the same answer options and structure. The countermeasure definitions’ (‘easy’ or ‘hard’) scores are found to the right of the definition. | 7-point Likert scale (1 = strongly disagree; 7 = strongly agree) | |
Measure: Phishing (easy) | Make sure your systems only allow strong passwords. If it is possible, use two-factor authentication. This gives extra protection against your account being hacked. Never give out personal data on a website you have reached by clicking on a link in an email or text message. No bank will ever send you an email asking that you change your password or confirm your credit card details. Be on guard if you get emails or texts that ask you to take action with consequences when you do not do what they say (loss of money, criminal charges or legal issues, account or card blocking, missed opportunity, misfortune, etc.). | FRE = 66.4; FKGL = 8.5; FOG = 10.2; DC = 7.6; CLI = 11.2; ARI = 9.2 | Swiss Federal Department of Finance [95] |
Measure: Phishing (hard) | Enforce strong passwords throughout your information systems. Wherever possible, use two-factor authentication. This offers an additional layer of protection to prevent your account from being hacked. Never divulge confidential information (e.g., passwords or credit card details) on websites you have accessed by following a link in an email or text message. Never would a bank or credit card corporation send you an email requesting that you change your password or verify your credit card details. Be skeptical whenever you receive emails that require action from you and threaten you with consequences if you do not follow their insistence (loss of money, criminal charges or legal proceedings, account or card blocking, missed opportunity, misfortune, etc.). | FRE = 47; FKGL = 10.3; FOG = 12.7; DC = 8.8; CLI = 16.1; ARI = 11.3 | Swiss Federal Department of Finance [95] |
Measure: MitM (easy) | Make sure websites where you give personal info have an HTTPS connection, as shown by the lock icon in or around the address bar in your browser. Never give out personal data over an insecure public Wi-Fi network. Make sure your network is secured with an intrusion detection system. | FRE = 61.3; FKGL = 8.8; FOG = 11.5; DC = 7; CLI = 11.3; ARI = 8.6 | Cisco Systems [54,96], Gontharet [97] |
Measure: MitM (hard) | Verify the establishment of an HTTPS connection when submitting confidential information to a website, signified by the lock symbol in or around the URL bar in the internet browser. Do not transmit confidential information via an insecure public Wi-Fi network. Ensure security of your local network by deploying an intrusion detection system. | FRE = 27.7; FKGL = 13.8; FOG = 17.6; DC = 10.8; CLI = 16; ARI = 12.8 | Cisco Systems [54,96], Gontharet [97] |
Measure: ZDE (easy) | Stay up-to-date with the latest patches on all your programs. These patch holes in your security, so the risk of newly found weaknesses being exploited is lower. Create a list of approved applications and limit installations to only these. Try to keep down the number of applications you use, as this reduces the risk of vulnerabilities being found across a wide suite of software. Make sure your computers and networks are being scanned for fishy events by an intrusion detection system. | FRE = 61.6; FKGL = 8.8; FOG = 11.5; DC = 7.9; CLI = 12.5; ARI = 9.5 | Mulloy [93], Finjan [98], Sophos [99] |
CR | All variables measuring CR have the same answer options. The countermeasure definitions’ (‘easy’ or ‘hard’) scores are found to the right of the definition. | 7-point Likert scale (1 = strongly disagree; 7 = strongly agree) | |
Measure: ZDE (hard) | Keep updated with the latest security patches on all your applications. Patches repair the vulnerabilities in software and operating systems, reducing the risk of newly discovered vulnerabilities being exploited. Create an application whitelist and restrict installations to these. Restraining your number of applications reduces the likelihood of being vulnerable to cyberthreats throughout your software packages. Have an intrusion detection system monitor your computers and networks for suspicious activity. | FRE = 16.4; FKGL = 14.4; FOG = 19; DC = 9.7; CLI = 22.14; ARI = 15.7 | Mulloy [93], Finjan [98], Sophos [99] |
cr1 (malware) | This text is easy to read | ||
cr2 (malware) | This text is easy to understand | ||
cr3 (phishing) | This text is easy to read | ||
cr4 (phishing) | This text is easy to understand | ||
cr5 (MitM) | This text is easy to read | ||
cr6 (MitM) | This text is easy to understand | ||
cr7 (ZDE) | This text is easy to read | ||
cr8 (ZDE) | This text is easy to understand | ||
CA | All variables measuring CA have the same answer options and structure. | 7-point Likert scale (1 = strongly disagree; 7 = strongly agree) | |
ca1 (malware) | I am familiar with the content (terms and concepts) of this text | Adapted from Hanus and Wu [10] | |
ca2 (phishing) | I am familiar with the content (terms and concepts) of this text | Adapted from Hanus and Wu [10] | |
ca3 (MitM) | I am familiar with the content (terms and concepts) of this text | Adapted from Hanus and Wu [10] | |
ca4 (ZDE) | I am familiar with the content (terms and concepts) of this text | Adapted from Hanus and Wu [10] | |
SE | All variables measuring SE have the same answer options. | 7-point Likert scale (1 = strongly disagree; 7 = strongly agree) | |
se1 (malware) | I feel confident carrying out these countermeasures | Adapted from Hanus and Wu [10] | |
se2 (malware) | Carrying out these countermeasures is easy | Adapted from Anderson and Agarwal [55] | |
se3 (phishing) | I feel confident carrying out these countermeasures | Adapted from Hanus and Wu [10] | |
se4 (phishing) | Carrying out these countermeasures is easy | Adapted from Anderson and Agarwal [55] | |
se5 (MitM) | I feel confident carrying out these countermeasures | Adapted from Hanus and Wu [10] | |
se6 (MitM) | Carrying out these countermeasures is easy | Adapted from Anderson and Agarwal [55] | |
se7 (ZDE) | I feel confident carrying out these countermeasures | Adapted from Hanus and Wu [10] | |
se8 (ZDE) | Carrying out these countermeasures is easy | Adapted from Anderson and Agarwal [55] | |
RE | All variables measuring RE have the same answer options and structure. | 7-point Likert scale (1 = strongly disagree; 7 = strongly agree) | |
re1 | Carrying out these countermeasures will protect me against malware | Adapted from Martens et al. [12] | |
re2 | Carrying out these countermeasures will protect me against phishing | Adapted from Martens et al. [12] | |
re3 | Carrying out these countermeasures will protect me against a man-in-the-middle attack | Adapted from Martens et al. [12] | |
re4 | Carrying out these countermeasures will protect me against a zero-day exploit | Adapted from Martens et al. [12] | |
RC | All variables measuring RC have the same answer options and structure. | 7-point Likert scale (1 = strongly disagree; 7 = strongly agree) | |
rc1 (malware) | Carrying out these countermeasures costs me a lot (e.g., financial or mental effort) | Adapted from Hanus and Wu [10] | |
rc2 (phishing) | Carrying out these countermeasures costs me a lot (e.g., financial or mental effort) | Adapted from Hanus and Wu [10] | |
rc3 (MitM) | Carrying out these countermeasures costs me a lot (e.g., financial or mental effort) | Adapted from Hanus and Wu [10] | |
rc4 (ZDE) | Carrying out these countermeasures costs me a lot (e.g., financial or mental effort) | Adapted from Hanus and Wu [10] | |
SI | All variables measuring CR have the same answer options and structure. | 7-point Likert scale (1 = strongly disagree; 7 = strongly agree) | |
si1 | I will carry out the countermeasures against malware | Adapted from Martens et al. [12] | |
si2 | I will carry out the countermeasures against phishing | Adapted from Martens et al. [12] | |
si3 | I will carry out the countermeasures against a man-in-the-middle attack | Adapted from Martens et al. [12] | |
si4 | I will carry out the countermeasures against a zero-day exploit | Adapted from Martens et al. [12] | |
SN | All variables measuring CR have the same answer options and structure. | 7-point Likert scale (1 = strongly disagree; 7 = strongly agree) | |
sn1 | People I relate to think I should protect myself from malware | Adapted from Martens et al. [12] | |
sn2 | People I relate to think I should protect myself from phishing | Adapted from Martens et al. [12] | |
sn3 | People I relate to think I should protect myself from a man-in-the-middle attack | Adapted from Martens et al. [12] | |
sn4 | People I relate to think I should protect myself from a zero-day exploit | Adapted from Martens et al. [12] |
Appendix B. Indicator Weights
Appendix C. Item Correlations
cr1 | cr2 | cr3 | cr4 | cr5 | cr6 | cr7 | cr8 | ca1 | ca2 | ca3 | ca4 | rs1 | rs2 | ps1 | ps2 | ps3 | ps4 | |||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
cr1 | 1 | 0.77 | 0.6 | 0.59 | 0.55 | 0.5 | 0.31 | 0.32 | 0.68 | 0.53 | 0.26 | 0.16 | 0.31 | 0.11 | 0 | −0.08 | −0.12 | −0.08 | ||
cr2 | 0.77 | 1 | 0.49 | 0.63 | 0.47 | 0.48 | 0.25 | 0.34 | 0.64 | 0.44 | 0.18 | 0.09 | 0.19 | 0.04 | 0.07 | −0.05 | −0.03 | 0.02 | ||
cr3 | 0.6 | 0.49 | 1 | 0.73 | 0.47 | 0.46 | 0.3 | 0.28 | 0.51 | 0.67 | 0.28 | 0.04 | 0.29 | 0.16 | −0.04 | −0.07 | −0.06 | −0.16 | ||
cr4 | 0.59 | 0.63 | 0.73 | 1 | 0.51 | 0.49 | 0.35 | 0.32 | 0.43 | 0.67 | 0.16 | 0.02 | 0.25 | 0.08 | −0.05 | −0.06 | −0.06 | −0.16 | ||
cr5 | 0.55 | 0.47 | 0.47 | 0.51 | 1 | 0.82 | 0.36 | 0.39 | 0.45 | 0.41 | 0.5 | 0.27 | 0.12 | 0.08 | −0.04 | −0.1 | −0.02 | 0.14 | ||
cr6 | 0.5 | 0.48 | 0.46 | 0.49 | 0.82 | 1 | 0.44 | 0.45 | 0.43 | 0.39 | 0.57 | 0.3 | 0.12 | 0.14 | −0.02 | −0.07 | −0.11 | 0.11 | ||
cr7 | 0.31 | 0.25 | 0.3 | 0.35 | 0.36 | 0.44 | 1 | 0.87 | 0.3 | 0.21 | 0.38 | 0.57 | 0.12 | 0.23 | 0.02 | 0.02 | −0.12 | 0.12 | ||
cr8 | 0.32 | 0.34 | 0.28 | 0.32 | 0.39 | 0.45 | 0.87 | 1 | 0.3 | 0.2 | 0.35 | 0.55 | 0.12 | 0.11 | −0.01 | −0.01 | −0.12 | 0.06 | ||
ca1 | 0.68 | 0.64 | 0.51 | 0.43 | 0.45 | 0.43 | 0.3 | 0.3 | 1 | 0.59 | 0.52 | 0.39 | 0.35 | 0.34 | 0.1 | −0.02 | −0.03 | 0.14 | ||
ca2 | 0.53 | 0.44 | 0.67 | 0.67 | 0.41 | 0.39 | 0.21 | 0.2 | 0.59 | 1 | 0.46 | 0.15 | 0.52 | 0.23 | 0.08 | −0.03 | −0.02 | −0.01 | ||
ca3 | 0.26 | 0.18 | 0.28 | 0.16 | 0.5 | 0.57 | 0.38 | 0.35 | 0.52 | 0.46 | 1 | 0.57 | 0.22 | 0.32 | 0.22 | 0.2 | 0.19 | 0.35 | ||
ca4 | 0.16 | 0.09 | 0.04 | 0.02 | 0.27 | 0.3 | 0.57 | 0.55 | 0.39 | 0.15 | 0.57 | 1 | 0.22 | 0.35 | −0.08 | 0.01 | 0.1 | 0.15 | ||
rs1 | 0.31 | 0.19 | 0.29 | 0.25 | 0.12 | 0.12 | 0.12 | 0.12 | 0.35 | 0.52 | 0.22 | 0.22 | 1 | 0.31 | 0 | 0 | −0.13 | −0.07 | ||
rs2 | 0.11 | 0.04 | 0.16 | 0.08 | 0.08 | 0.14 | 0.23 | 0.11 | 0.34 | 0.23 | 0.32 | 0.35 | 0.31 | 1 | −0.01 | 0.14 | −0.08 | 0.13 | ||
ps1 | 0 | 0.07 | −0.04 | −0.05 | −0.04 | −0.02 | 0.02 | −0.01 | 0.1 | 0.08 | 0.22 | −0.08 | 0 | −0.01 | 1 | 0.5 | 0.33 | 0.32 | ||
ps2 | −0.08 | −0.05 | −0.07 | −0.06 | −0.1 | −0.07 | 0.02 | −0.01 | −0.02 | −0.03 | 0.2 | 0.01 | 0 | 0.14 | 0.5 | 1 | 0.31 | 0.11 | ||
ps3 | −0.12 | −0.03 | −0.06 | −0.06 | −0.02 | −0.11 | −0.12 | −0.12 | −0.03 | −0.02 | 0.19 | 0.1 | −0.13 | −0.08 | 0.33 | 0.31 | 1 | 0.5 | ||
ps4 | −0.08 | 0.02 | −0.16 | −0.16 | 0.14 | 0.11 | 0.12 | 0.06 | 0.14 | −0.01 | 0.35 | 0.15 | −0.07 | 0.13 | 0.32 | 0.11 | 0.5 | 1 | ||
pv1 | −0.24 | −0.17 | −0.32 | −0.24 | −0.26 | −0.23 | −0.22 | −0.19 | −0.28 | −0.35 | −0.32 | −0.24 | −0.31 | −0.18 | 0.24 | 0.14 | 0.13 | 0.02 | ||
pv2 | 0 | 0.02 | −0.12 | −0.02 | −0.1 | −0.12 | −0.19 | −0.15 | −0.26 | −0.28 | −0.29 | −0.3 | −0.36 | −0.22 | 0.09 | 0.09 | 0 | −0.09 | ||
pv3 | −0.16 | 0 | −0.15 | −0.12 | −0.14 | −0.14 | −0.2 | −0.14 | −0.11 | −0.26 | −0.22 | −0.21 | −0.39 | −0.22 | 0.09 | 0.12 | 0.21 | 0.18 | ||
pv4 | −0.31 | −0.21 | −0.17 | −0.21 | −0.1 | −0.11 | 0.02 | −0.05 | −0.13 | −0.2 | −0.07 | −0.19 | −0.35 | −0.18 | 0.22 | 0.19 | 0.17 | 0.37 | ||
rc1 | −0.27 | −0.2 | −0.22 | −0.2 | −0.15 | −0.1 | −0.03 | −0.02 | −0.19 | −0.21 | −0.05 | 0.02 | −0.11 | 0.06 | −0.09 | 0.01 | −0.02 | 0.02 | ||
rc2 | −0.1 | −0.08 | −0.25 | −0.28 | −0.03 | 0.04 | −0.16 | −0.15 | −0.09 | −0.28 | −0.01 | 0.05 | −0.19 | 0.07 | −0.03 | 0 | 0 | −0.03 | ||
rc3 | −0.14 | −0.04 | −0.1 | −0.14 | −0.16 | −0.25 | −0.05 | 0.02 | −0.12 | −0.26 | −0.3 | −0.05 | −0.2 | −0.07 | −0.02 | 0.09 | 0.03 | −0.14 | ||
rc4 | 0 | −0.1 | 0.05 | −0.02 | 0.02 | −0.03 | −0.19 | −0.24 | 0.14 | 0 | 0.09 | −0.1 | −0.12 | 0.1 | 0.03 | 0.09 | 0.07 | 0.06 | ||
crd1 | 0.04 | 0.04 | −0.04 | −0.11 | −0.04 | 0.03 | −0.02 | 0.07 | 0.14 | −0.05 | 0.26 | 0.28 | −0.05 | 0.05 | 0.21 | 0.12 | 0.12 | 0.1 | ||
crd2 | 0.08 | 0.08 | 0.05 | −0.03 | 0.1 | 0.09 | 0.08 | 0.14 | 0.24 | 0.11 | 0.41 | 0.35 | −0.05 | 0.17 | 0.15 | 0.1 | 0.18 | 0.22 | ||
re1 | 0.44 | 0.41 | 0.31 | 0.39 | 0.3 | 0.29 | 0.29 | 0.3 | 0.31 | 0.49 | 0.3 | 0.29 | 0.39 | 0.19 | 0.04 | 0 | 0.11 | −0.05 | ||
re2 | 0.21 | 0.21 | 0.35 | 0.32 | 0.23 | 0.11 | 0.28 | 0.24 | 0.33 | 0.5 | 0.27 | 0.16 | 0.39 | 0.17 | 0.09 | 0 | −0.07 | 0.01 | ||
re3 | 0.16 | 0.19 | 0.15 | 0.12 | 0.35 | 0.3 | 0.16 | 0.15 | 0.26 | 0.34 | 0.39 | 0.32 | 0.17 | 0.15 | 0.08 | 0.07 | 0.15 | 0.31 | ||
re4 | 0.05 | 0.05 | 0.14 | 0.2 | 0.16 | 0.12 | 0.12 | 0.11 | 0.09 | 0.23 | 0.21 | 0.13 | −0.04 | 0.14 | −0.05 | −0.06 | 0.08 | 0 | ||
rfs1 | −0.11 | −0.18 | −0.06 | −0.16 | −0.01 | −0.06 | 0.02 | 0.03 | −0.13 | −0.03 | 0.02 | 0.1 | 0 | 0.08 | −0.13 | 0 | 0.11 | 0.13 | ||
rfs2 | 0.1 | −0.1 | −0.06 | −0.11 | −0.02 | −0.08 | −0.03 | −0.08 | −0.01 | −0.08 | −0.06 | 0.09 | 0.02 | −0.01 | −0.3 | −0.09 | −0.17 | −0.14 | ||
rfs3 | −0.03 | 0.08 | 0.16 | 0.11 | −0.02 | −0.07 | −0.1 | −0.04 | 0 | 0.04 | 0.09 | −0.03 | 0.02 | 0.1 | −0.05 | 0.05 | 0.06 | −0.06 | ||
rfs4 | 0.08 | −0.13 | −0.08 | −0.13 | 0.07 | 0.02 | 0.11 | 0.01 | −0.03 | −0.1 | 0.13 | 0.21 | −0.02 | 0.17 | −0.15 | 0.03 | −0.07 | 0.02 | ||
se1 | 0.6 | 0.51 | 0.47 | 0.36 | 0.34 | 0.37 | 0.26 | 0.27 | 0.61 | 0.43 | 0.33 | 0.38 | 0.25 | 0.28 | 0.07 | 0.06 | 0.05 | −0.08 | ||
se2 | 0.41 | 0.45 | 0.21 | 0.27 | 0.32 | 0.29 | 0.13 | 0.17 | 0.45 | 0.15 | 0.08 | 0.23 | 0.08 | 0.2 | 0.09 | 0 | 0.11 | 0 | ||
se3 | 0.42 | 0.34 | 0.47 | 0.45 | 0.37 | 0.33 | 0.12 | 0.13 | 0.48 | 0.64 | 0.37 | 0.13 | 0.4 | 0.18 | 0.11 | 0.07 | −0.05 | −0.05 | ||
se4 | 0.37 | 0.38 | 0.46 | 0.59 | 0.32 | 0.23 | 0.32 | 0.3 | 0.3 | 0.42 | 0.13 | 0.08 | 0.19 | 0.05 | −0.09 | 0.05 | 0.08 | −0.06 | ||
se5 | 0.21 | 0.1 | 0.22 | 0.08 | 0.34 | 0.51 | 0.41 | 0.36 | 0.31 | 0.24 | 0.59 | 0.39 | 0.11 | 0.27 | −0.04 | −0.05 | −0.02 | 0.16 | ||
se6 | 0.3 | 0.27 | 0.35 | 0.27 | 0.47 | 0.55 | 0.19 | 0.16 | 0.29 | 0.27 | 0.43 | 0.1 | −0.12 | 0.1 | −0.01 | −0.14 | 0.04 | 0.21 | ||
se7 | 0.24 | 0.15 | 0.17 | 0.13 | 0.27 | 0.3 | 0.6 | 0.61 | 0.31 | 0.17 | 0.44 | 0.73 | 0.1 | 0.22 | −0.07 | −0.04 | 0.09 | 0.11 | ||
se8 | 0.15 | 0.21 | 0.07 | 0.14 | 0.22 | 0.19 | 0.44 | 0.53 | 0.08 | 0.02 | 0.2 | 0.48 | −0.08 | 0.01 | −0.02 | −0.02 | 0.09 | 0.17 | ||
si1 | 0.22 | 0.22 | 0.17 | 0.17 | 0.16 | 0.2 | 0.12 | 0.12 | 0.27 | 0.26 | 0.25 | 0.25 | 0.09 | 0.15 | 0.23 | 0.1 | 0.14 | −0.03 | ||
si2 | 0.14 | 0.14 | 0.25 | 0.25 | 0.29 | 0.24 | 0.21 | 0.23 | 0.18 | 0.3 | 0.25 | 0.2 | 0.23 | 0.06 | 0.08 | 0.04 | −0.01 | −0.04 | ||
si3 | 0.12 | 0.02 | 0.06 | −0.05 | 0.23 | 0.29 | 0.2 | 0.16 | 0.17 | 0.25 | 0.56 | 0.39 | 0.16 | 0.16 | 0.12 | 0.03 | 0.29 | 0.31 | ||
si4 | −0.05 | 0.02 | −0.03 | 0.03 | 0.13 | 0.15 | 0.31 | 0.32 | 0.02 | 0.04 | 0.33 | 0.34 | −0.03 | 0.06 | 0.04 | 0.03 | 0.19 | 0.14 | ||
sn1 | 0 | 0.04 | 0.09 | 0.01 | 0.16 | 0.19 | 0.15 | 0.1 | 0.19 | 0.2 | 0.35 | 0.21 | 0.09 | 0.14 | 0.04 | 0.01 | 0.12 | 0.21 | ||
sn2 | −0.05 | −0.07 | 0.15 | 0.11 | 0.17 | 0.14 | 0.05 | 0.01 | 0.07 | 0.2 | 0.29 | 0.1 | 0.06 | 0.05 | −0.05 | 0.17 | 0.13 | 0.09 | ||
sn3 | −0.07 | 0.02 | −0.01 | −0.12 | 0.05 | 0.13 | 0.11 | 0.14 | 0.06 | 0.13 | 0.33 | 0.19 | −0.02 | 0 | 0.05 | −0.01 | 0.07 | 0.24 | ||
sn4 | −0.21 | −0.1 | −0.22 | −0.24 | −0.13 | −0.09 | −0.03 | −0.03 | −0.06 | −0.03 | 0.24 | 0.13 | −0.12 | −0.12 | 0.11 | 0.19 | 0.36 | 0.28 | ||
ta1 | 0.2 | 0.12 | 0.22 | 0.09 | 0.05 | 0.17 | 0.24 | 0.23 | 0.41 | 0.21 | 0.44 | 0.41 | 0.06 | 0.25 | 0.21 | 0.09 | 0.02 | 0.06 | ||
ta2 | 0.17 | 0.07 | 0.11 | 0.03 | 0.11 | 0.12 | 0.19 | 0.17 | 0.34 | 0.23 | 0.46 | 0.42 | 0.25 | 0.31 | 0.22 | 0.32 | −0.01 | 0.04 | ||
ta3 | 0.07 | −0.01 | 0.06 | 0.06 | 0.14 | 0.17 | 0.36 | 0.31 | 0.28 | 0.16 | 0.43 | 0.42 | 0.12 | 0.33 | 0.18 | 0.22 | 0.07 | 0.29 | ||
ta4 | 0.15 | 0.01 | 0.16 | 0.09 | 0.12 | 0.2 | 0.31 | 0.21 | 0.29 | 0.2 | 0.4 | 0.42 | 0.14 | 0.29 | 0.09 | 0.06 | −0.02 | 0.18 | ||
pv1 | pv2 | pv3 | pv4 | rc1 | rc2 | rc3 | rc4 | crd1 | crd2 | re1 | re2 | re3 | re4 | rfs1 | rfs2 | rfs3 | rfs4 | |||
cr1 | −0.24 | 0 | −0.16 | −0.31 | −0.27 | −0.1 | −0.14 | 0 | 0.04 | 0.08 | 0.44 | 0.21 | 0.16 | 0.05 | −0.11 | 0.1 | −0.03 | 0.08 | ||
cr2 | −0.17 | 0.02 | 0 | −0.21 | −0.2 | −0.08 | −0.04 | −0.1 | 0.04 | 0.08 | 0.41 | 0.21 | 0.19 | 0.05 | −0.18 | −0.1 | 0.08 | −0.13 | ||
cr3 | −0.32 | −0.12 | −0.15 | −0.17 | −0.22 | −0.25 | −0.1 | 0.05 | −0.04 | 0.05 | 0.31 | 0.35 | 0.15 | 0.14 | −0.06 | −0.06 | 0.16 | −0.08 | ||
cr4 | −0.24 | −0.02 | −0.12 | −0.21 | −0.2 | −0.28 | −0.14 | −0.02 | −0.11 | −0.03 | 0.39 | 0.32 | 0.12 | 0.2 | −0.16 | −0.11 | 0.11 | −0.13 | ||
cr5 | −0.26 | −0.1 | −0.14 | −0.1 | −0.15 | −0.03 | −0.16 | 0.02 | −0.04 | 0.1 | 0.3 | 0.23 | 0.35 | 0.16 | −0.01 | −0.02 | −0.02 | 0.07 | ||
cr6 | −0.23 | −0.12 | −0.14 | −0.11 | −0.1 | 0.04 | −0.25 | −0.03 | 0.03 | 0.09 | 0.29 | 0.11 | 0.3 | 0.12 | −0.06 | −0.08 | −0.07 | 0.02 | ||
cr7 | −0.22 | −0.19 | −0.2 | 0.02 | −0.03 | −0.16 | −0.05 | −0.19 | −0.02 | 0.08 | 0.29 | 0.28 | 0.16 | 0.12 | 0.02 | −0.03 | −0.1 | 0.11 | ||
cr8 | −0.19 | −0.15 | −0.14 | −0.05 | −0.02 | −0.15 | 0.02 | −0.24 | 0.07 | 0.14 | 0.3 | 0.24 | 0.15 | 0.11 | 0.03 | −0.08 | −0.04 | 0.01 | ||
ca1 | −0.28 | −0.26 | −0.11 | −0.13 | −0.19 | −0.09 | −0.12 | 0.14 | 0.14 | 0.24 | 0.31 | 0.33 | 0.26 | 0.09 | −0.13 | −0.01 | 0 | −0.03 | ||
ca2 | −0.35 | −0.28 | −0.26 | −0.2 | −0.21 | −0.28 | −0.26 | 0 | −0.05 | 0.11 | 0.49 | 0.5 | 0.34 | 0.23 | −0.03 | −0.08 | 0.04 | −0.1 | ||
ca3 | −0.32 | −0.29 | −0.22 | −0.07 | −0.05 | −0.01 | −0.3 | 0.09 | 0.26 | 0.41 | 0.3 | 0.27 | 0.39 | 0.21 | 0.02 | −0.06 | 0.09 | 0.13 | ||
ca4 | −0.24 | −0.3 | −0.21 | −0.19 | 0.02 | 0.05 | −0.05 | −0.1 | 0.28 | 0.35 | 0.29 | 0.16 | 0.32 | 0.13 | 0.1 | 0.09 | −0.03 | 0.21 | ||
rs1 | −0.31 | −0.36 | −0.39 | −0.35 | −0.11 | −0.19 | −0.2 | −0.12 | −0.05 | −0.05 | 0.39 | 0.39 | 0.17 | −0.04 | 0 | 0.02 | 0.02 | −0.02 | ||
rs2 | −0.18 | −0.22 | −0.22 | −0.18 | 0.06 | 0.07 | −0.07 | 0.1 | 0.05 | 0.17 | 0.19 | 0.17 | 0.15 | 0.14 | 0.08 | −0.01 | 0.1 | 0.17 | ||
ps1 | 0.24 | 0.09 | 0.09 | 0.22 | −0.09 | −0.03 | −0.02 | 0.03 | 0.21 | 0.15 | 0.04 | 0.09 | 0.08 | −0.05 | −0.13 | −0.3 | −0.05 | −0.15 | ||
ps2 | 0.14 | 0.09 | 0.12 | 0.19 | 0.01 | 0 | 0.09 | 0.09 | 0.12 | 0.1 | 0 | 0 | 0.07 | −0.06 | 0 | −0.09 | 0.05 | 0.03 | ||
ps3 | 0.13 | 0 | 0.21 | 0.17 | −0.02 | 0 | 0.03 | 0.07 | 0.12 | 0.18 | 0.11 | −0.07 | 0.15 | 0.08 | 0.11 | −0.17 | 0.06 | −0.07 | ||
ps4 | 0.02 | −0.09 | 0.18 | 0.37 | 0.02 | −0.03 | −0.14 | 0.06 | 0.1 | 0.22 | −0.05 | 0.01 | 0.31 | 0 | 0.13 | −0.14 | −0.06 | 0.02 | ||
pv1 | 1 | 0.62 | 0.42 | 0.39 | 0.04 | 0.17 | 0.07 | 0.01 | 0.14 | 0.04 | −0.15 | −0.29 | −0.15 | −0.01 | 0.04 | 0.04 | 0.02 | −0.24 | ||
pv2 | 0.62 | 1 | 0.24 | 0.13 | −0.15 | 0.09 | 0.02 | −0.12 | 0.14 | 0.01 | −0.12 | −0.31 | −0.23 | −0.19 | −0.11 | 0.16 | −0.01 | −0.18 | ||
pv3 | 0.42 | 0.24 | 1 | 0.48 | 0.08 | 0.08 | 0.06 | 0.13 | 0.06 | −0.03 | −0.14 | −0.22 | −0.15 | 0 | −0.04 | 0 | 0.03 | −0.09 | ||
pv4 | 0.39 | 0.13 | 0.48 | 1 | 0.04 | 0.02 | 0.04 | 0.14 | 0.07 | 0.05 | −0.23 | −0.04 | 0.06 | −0.08 | 0.1 | −0.04 | −0.15 | −0.11 | ||
rc1 | 0.04 | −0.15 | 0.08 | 0.04 | 1 | 0.45 | 0.39 | 0.31 | −0.08 | −0.11 | −0.12 | −0.09 | 0.1 | 0.01 | −0.05 | 0.01 | 0.08 | −0.02 | ||
rc2 | 0.17 | 0.09 | 0.08 | 0.02 | 0.45 | 1 | 0.4 | 0.17 | 0.17 | 0.07 | −0.03 | −0.16 | 0.18 | 0.04 | −0.12 | 0.1 | −0.07 | 0.05 | ||
rc3 | 0.07 | 0.02 | 0.06 | 0.04 | 0.39 | 0.4 | 1 | 0.22 | 0.02 | −0.06 | −0.23 | −0.15 | −0.13 | 0 | −0.02 | 0.06 | 0.02 | 0.15 | ||
rc4 | 0.01 | −0.12 | 0.13 | 0.14 | 0.31 | 0.17 | 0.22 | 1 | 0.09 | −0.05 | −0.24 | −0.14 | −0.04 | 0.09 | −0.02 | 0.02 | 0.08 | 0.04 | ||
crd1 | 0.14 | 0.14 | 0.06 | 0.07 | −0.08 | 0.17 | 0.02 | 0.09 | 1 | 0.74 | −0.08 | −0.11 | 0.02 | 0 | −0.02 | 0.04 | 0.03 | 0.07 | ||
crd2 | 0.04 | 0.01 | −0.03 | 0.05 | −0.11 | 0.07 | −0.06 | −0.05 | 0.74 | 1 | 0.08 | 0.04 | 0.09 | 0.13 | 0.01 | −0.02 | 0.09 | 0.11 | ||
re1 | −0.15 | −0.12 | −0.14 | −0.23 | −0.12 | −0.03 | −0.23 | −0.24 | −0.08 | 0.08 | 1 | 0.62 | 0.48 | 0.27 | 0.13 | 0.1 | 0.07 | −0.18 | ||
re2 | −0.29 | −0.31 | −0.22 | −0.04 | −0.09 | −0.16 | −0.15 | −0.14 | −0.11 | 0.04 | 0.62 | 1 | 0.48 | 0.21 | 0.11 | −0.07 | 0.07 | −0.18 | ||
re3 | −0.15 | −0.23 | −0.15 | 0.06 | 0.1 | 0.18 | −0.13 | −0.04 | 0.02 | 0.09 | 0.48 | 0.48 | 1 | 0.34 | 0.27 | −0.01 | 0 | −0.04 | ||
re4 | −0.01 | −0.19 | 0 | −0.08 | 0.01 | 0.04 | 0 | 0.09 | 0 | 0.13 | 0.27 | 0.21 | 0.34 | 1 | 0.23 | 0.02 | 0.28 | 0.05 | ||
rfs1 | 0.04 | −0.11 | −0.04 | 0.1 | −0.05 | −0.12 | −0.02 | −0.02 | −0.02 | 0.01 | 0.13 | 0.11 | 0.27 | 0.23 | 1 | 0.18 | 0.11 | 0.02 | ||
rfs2 | 0.04 | 0.16 | 0 | −0.04 | 0.01 | 0.1 | 0.06 | 0.02 | 0.04 | −0.02 | 0.1 | −0.07 | −0.01 | 0.02 | 0.18 | 1 | 0.16 | 0.07 | ||
rfs3 | 0.02 | −0.01 | 0.03 | −0.15 | 0.08 | −0.07 | 0.02 | 0.08 | 0.03 | 0.09 | 0.07 | 0.07 | 0 | 0.28 | 0.11 | 0.16 | 1 | 0 | ||
rfs4 | −0.24 | −0.18 | −0.09 | −0.11 | −0.02 | 0.05 | 0.15 | 0.04 | 0.07 | 0.11 | −0.18 | −0.18 | −0.04 | 0.05 | 0.02 | 0.07 | 0 | 1 | ||
se1 | −0.11 | −0.03 | −0.09 | −0.24 | −0.31 | −0.04 | −0.08 | −0.04 | 0.21 | 0.29 | 0.47 | 0.18 | 0.21 | 0.09 | 0.03 | 0.16 | 0.05 | 0 | ||
se2 | 0.01 | 0.02 | 0.05 | −0.13 | −0.44 | −0.04 | −0.02 | −0.03 | 0.03 | 0.16 | 0.27 | 0.1 | 0.08 | 0.13 | −0.01 | −0.03 | −0.02 | 0.08 | ||
se3 | −0.15 | −0.16 | −0.22 | −0.09 | −0.23 | −0.37 | −0.17 | 0.02 | 0.06 | 0.21 | 0.31 | 0.43 | 0.18 | 0.15 | 0.03 | −0.05 | 0.08 | −0.13 | ||
se4 | −0.31 | −0.1 | −0.13 | −0.1 | −0.27 | −0.57 | −0.08 | −0.02 | −0.19 | −0.06 | 0.24 | 0.35 | 0 | 0.07 | 0.05 | −0.02 | 0 | −0.09 | ||
se5 | −0.15 | −0.1 | −0.12 | 0.01 | −0.09 | 0 | −0.33 | −0.11 | 0.22 | 0.29 | 0.22 | 0.17 | 0.22 | 0.17 | 0.14 | 0.03 | −0.02 | 0.04 | ||
se6 | −0.22 | −0.19 | 0.03 | 0.07 | −0.08 | −0.02 | −0.34 | −0.06 | 0 | 0.16 | 0.13 | 0.13 | 0.29 | 0.22 | 0.08 | 0 | 0.04 | −0.01 | ||
se7 | −0.17 | −0.22 | −0.11 | −0.18 | 0.09 | 0.09 | 0.05 | −0.26 | 0.18 | 0.32 | 0.31 | 0.14 | 0.27 | 0.31 | 0.14 | 0.13 | 0.06 | 0.2 | ||
se8 | −0.14 | −0.16 | −0.04 | −0.11 | 0.02 | 0.09 | 0.11 | −0.4 | 0 | 0.17 | 0.27 | 0.2 | 0.3 | 0.29 | 0.08 | −0.04 | 0.07 | 0.12 | ||
si1 | 0.1 | 0.01 | −0.07 | −0.1 | −0.37 | −0.07 | −0.12 | −0.08 | 0.19 | 0.37 | 0.37 | 0.09 | 0.05 | 0.17 | 0.12 | 0.02 | 0.1 | −0.07 | ||
si2 | −0.05 | −0.17 | −0.18 | −0.03 | −0.32 | −0.35 | −0.13 | −0.14 | 0.05 | 0.21 | 0.22 | 0.33 | 0.12 | 0.14 | 0.26 | −0.04 | 0.17 | −0.11 | ||
si3 | −0.14 | −0.14 | −0.14 | −0.03 | −0.12 | −0.02 | −0.36 | −0.21 | 0.27 | 0.4 | 0.31 | 0.21 | 0.37 | 0.13 | 0.26 | 0.03 | −0.06 | 0.01 | ||
si4 | 0.1 | 0.01 | −0.04 | 0.02 | −0.14 | 0.07 | −0.01 | −0.36 | 0.21 | 0.38 | 0.29 | 0.11 | 0.16 | 0.32 | 0.14 | −0.02 | 0.13 | 0.02 | ||
sn1 | −0.22 | −0.3 | −0.08 | 0 | −0.21 | −0.05 | −0.17 | 0 | 0.12 | 0.25 | 0.24 | 0.2 | 0.28 | 0.21 | 0.3 | 0.01 | 0.16 | 0.02 | ||
sn2 | −0.29 | −0.29 | −0.2 | −0.05 | −0.12 | −0.23 | −0.06 | 0.09 | −0.04 | 0.15 | 0.04 | 0.17 | 0.18 | 0.15 | 0.25 | −0.06 | 0.23 | 0.09 | ||
sn3 | −0.12 | −0.23 | −0.1 | 0 | −0.08 | 0.03 | −0.07 | −0.01 | 0.24 | 0.28 | 0.07 | 0.08 | 0.26 | 0.23 | 0.37 | −0.05 | 0.13 | 0.03 | ||
sn4 | 0.03 | −0.13 | 0.08 | 0.17 | −0.06 | 0.03 | −0.01 | −0.02 | 0.14 | 0.26 | 0.05 | 0.01 | 0.22 | 0.24 | 0.26 | −0.08 | 0.17 | 0.04 | ||
ta1 | 0.03 | 0.04 | −0.08 | 0.01 | −0.09 | 0.07 | −0.11 | 0.05 | 0.45 | 0.37 | 0.12 | 0.05 | 0.08 | 0.02 | −0.24 | 0.1 | 0.11 | −0.04 | ||
ta2 | −0.04 | −0.08 | −0.22 | −0.08 | −0.03 | 0.03 | −0.04 | 0.11 | 0.35 | 0.33 | 0.09 | 0.11 | 0.14 | 0.03 | −0.13 | 0.08 | 0.01 | 0.06 | ||
ta3 | −0.04 | −0.11 | −0.27 | 0.09 | −0.02 | 0.01 | −0.02 | −0.01 | 0.38 | 0.35 | 0.05 | 0.05 | 0.27 | 0.01 | 0.09 | 0.14 | 0.04 | 0.11 | ||
ta4 | −0.05 | −0.04 | −0.2 | 0.05 | −0.03 | 0.03 | −0.01 | −0.03 | 0.28 | 0.29 | 0.1 | 0.07 | 0.2 | −0.05 | 0.04 | 0.17 | 0.07 | 0.25 | ||
se1 | se2 | se3 | se4 | se5 | se6 | se7 | se8 | si1 | si2 | si3 | si4 | sn1 | sn2 | sn3 | sn4 | ta1 | ta2 | ta3 | ta4 | |
cr1 | 0.6 | 0.41 | 0.42 | 0.37 | 0.21 | 0.3 | 0.24 | 0.15 | 0.22 | 0.14 | 0.12 | −0.05 | 0 | −0.05 | −0.07 | −0.21 | 0.2 | 0.17 | 0.07 | 0.15 |
cr2 | 0.51 | 0.45 | 0.34 | 0.38 | 0.1 | 0.27 | 0.15 | 0.21 | 0.22 | 0.14 | 0.02 | 0.02 | 0.04 | −0.07 | 0.02 | −0.1 | 0.12 | 0.07 | −0.01 | 0.01 |
cr3 | 0.47 | 0.21 | 0.47 | 0.46 | 0.22 | 0.35 | 0.17 | 0.07 | 0.17 | 0.25 | 0.06 | −0.03 | 0.09 | 0.15 | −0.01 | −0.22 | 0.22 | 0.11 | 0.06 | 0.16 |
cr4 | 0.36 | 0.27 | 0.45 | 0.59 | 0.08 | 0.27 | 0.13 | 0.14 | 0.17 | 0.25 | −0.05 | 0.03 | 0.01 | 0.11 | −0.12 | −0.24 | 0.09 | 0.03 | 0.06 | 0.09 |
cr5 | 0.34 | 0.32 | 0.37 | 0.32 | 0.34 | 0.47 | 0.27 | 0.22 | 0.16 | 0.29 | 0.23 | 0.13 | 0.16 | 0.17 | 0.05 | −0.13 | 0.05 | 0.11 | 0.14 | 0.12 |
cr6 | 0.37 | 0.29 | 0.33 | 0.23 | 0.51 | 0.55 | 0.3 | 0.19 | 0.2 | 0.24 | 0.29 | 0.15 | 0.19 | 0.14 | 0.13 | −0.09 | 0.17 | 0.12 | 0.17 | 0.2 |
cr7 | 0.26 | 0.13 | 0.12 | 0.32 | 0.41 | 0.19 | 0.6 | 0.44 | 0.12 | 0.21 | 0.2 | 0.31 | 0.15 | 0.05 | 0.11 | −0.03 | 0.24 | 0.19 | 0.36 | 0.31 |
cr8 | 0.27 | 0.17 | 0.13 | 0.3 | 0.36 | 0.16 | 0.61 | 0.53 | 0.12 | 0.23 | 0.16 | 0.32 | 0.1 | 0.01 | 0.14 | −0.03 | 0.23 | 0.17 | 0.31 | 0.21 |
ca1 | 0.61 | 0.45 | 0.48 | 0.3 | 0.31 | 0.29 | 0.31 | 0.08 | 0.27 | 0.18 | 0.17 | 0.02 | 0.19 | 0.07 | 0.06 | −0.06 | 0.41 | 0.34 | 0.28 | 0.29 |
ca2 | 0.43 | 0.15 | 0.64 | 0.42 | 0.24 | 0.27 | 0.17 | 0.02 | 0.26 | 0.3 | 0.25 | 0.04 | 0.2 | 0.2 | 0.13 | −0.03 | 0.21 | 0.23 | 0.16 | 0.2 |
ca3 | 0.33 | 0.08 | 0.37 | 0.13 | 0.59 | 0.43 | 0.44 | 0.2 | 0.25 | 0.25 | 0.56 | 0.33 | 0.35 | 0.29 | 0.33 | 0.24 | 0.44 | 0.46 | 0.43 | 0.4 |
ca4 | 0.38 | 0.23 | 0.13 | 0.08 | 0.39 | 0.1 | 0.73 | 0.48 | 0.25 | 0.2 | 0.39 | 0.34 | 0.21 | 0.1 | 0.19 | 0.13 | 0.41 | 0.42 | 0.42 | 0.42 |
rs1 | 0.25 | 0.08 | 0.4 | 0.19 | 0.11 | −0.12 | 0.1 | −0.08 | 0.09 | 0.23 | 0.16 | −0.03 | 0.09 | 0.06 | −0.02 | −0.12 | 0.06 | 0.25 | 0.12 | 0.14 |
rs2 | 0.28 | 0.2 | 0.18 | 0.05 | 0.27 | 0.1 | 0.22 | 0.01 | 0.15 | 0.06 | 0.16 | 0.06 | 0.14 | 0.05 | 0 | −0.12 | 0.25 | 0.31 | 0.33 | 0.29 |
ps1 | 0.07 | 0.09 | 0.11 | −0.09 | −0.04 | −0.01 | −0.07 | −0.02 | 0.23 | 0.08 | 0.12 | 0.04 | 0.04 | −0.05 | 0.05 | 0.11 | 0.21 | 0.22 | 0.18 | 0.09 |
ps2 | 0.06 | 0 | 0.07 | 0.05 | −0.05 | −0.14 | −0.04 | −0.02 | 0.1 | 0.04 | 0.03 | 0.03 | 0.01 | 0.17 | −0.01 | 0.19 | 0.09 | 0.32 | 0.22 | 0.06 |
ps3 | 0.05 | 0.11 | −0.05 | 0.08 | −0.02 | 0.04 | 0.09 | 0.09 | 0.14 | −0.01 | 0.29 | 0.19 | 0.12 | 0.13 | 0.07 | 0.36 | 0.02 | −0.01 | 0.07 | −0.02 |
ps4 | −0.08 | 0 | −0.05 | −0.06 | 0.16 | 0.21 | 0.11 | 0.17 | −0.03 | −0.04 | 0.31 | 0.14 | 0.21 | 0.09 | 0.24 | 0.28 | 0.06 | 0.04 | 0.29 | 0.18 |
pv1 | −0.11 | 0.01 | −0.15 | −0.31 | −0.15 | −0.22 | −0.17 | −0.14 | 0.1 | −0.05 | −0.14 | 0.1 | −0.22 | −0.29 | −0.12 | 0.03 | 0.03 | −0.04 | −0.04 | −0.05 |
pv2 | −0.03 | 0.02 | −0.16 | −0.1 | −0.1 | −0.19 | −0.22 | −0.16 | 0.01 | −0.17 | −0.14 | 0.01 | −0.3 | −0.29 | −0.23 | −0.13 | 0.04 | −0.08 | −0.11 | −0.04 |
pv3 | −0.09 | 0.05 | −0.22 | −0.13 | −0.12 | 0.03 | −0.11 | −0.04 | −0.07 | −0.18 | −0.14 | −0.04 | −0.08 | −0.2 | −0.1 | 0.08 | −0.08 | −0.22 | −0.27 | −0.2 |
pv4 | −0.24 | −0.13 | −0.09 | −0.1 | 0.01 | 0.07 | −0.18 | −0.11 | −0.1 | −0.03 | −0.03 | 0.02 | 0 | −0.05 | 0 | 0.17 | 0.01 | −0.08 | 0.09 | 0.05 |
rc1 | −0.31 | −0.44 | −0.23 | −0.27 | −0.09 | −0.08 | 0.09 | 0.02 | −0.37 | −0.32 | −0.12 | −0.14 | −0.21 | −0.12 | −0.08 | −0.06 | −0.09 | −0.03 | −0.02 | −0.03 |
rc2 | −0.04 | −0.04 | −0.37 | −0.57 | 0 | −0.02 | 0.09 | 0.09 | −0.07 | −0.35 | −0.02 | 0.07 | −0.05 | −0.23 | 0.03 | 0.03 | 0.07 | 0.03 | 0.01 | 0.03 |
rc3 | −0.08 | −0.02 | −0.17 | −0.08 | −0.33 | −0.34 | 0.05 | 0.11 | −0.12 | −0.13 | −0.36 | −0.01 | −0.17 | −0.06 | −0.07 | −0.01 | −0.11 | −0.04 | −0.02 | −0.01 |
rc4 | −0.04 | −0.03 | 0.02 | −0.02 | −0.11 | −0.06 | −0.26 | −0.4 | −0.08 | −0.14 | −0.21 | −0.36 | 0 | 0.09 | −0.01 | −0.02 | 0.05 | 0.11 | −0.01 | −0.03 |
crd1 | 0.21 | 0.03 | 0.06 | −0.19 | 0.22 | 0 | 0.18 | 0 | 0.19 | 0.05 | 0.27 | 0.21 | 0.12 | −0.04 | 0.24 | 0.14 | 0.45 | 0.35 | 0.38 | 0.28 |
crd2 | 0.29 | 0.16 | 0.21 | −0.06 | 0.29 | 0.16 | 0.32 | 0.17 | 0.37 | 0.21 | 0.4 | 0.38 | 0.25 | 0.15 | 0.28 | 0.26 | 0.37 | 0.33 | 0.35 | 0.29 |
re1 | 0.47 | 0.27 | 0.31 | 0.24 | 0.22 | 0.13 | 0.31 | 0.27 | 0.37 | 0.22 | 0.31 | 0.29 | 0.24 | 0.04 | 0.07 | 0.05 | 0.12 | 0.09 | 0.05 | 0.1 |
re2 | 0.18 | 0.1 | 0.43 | 0.35 | 0.17 | 0.13 | 0.14 | 0.2 | 0.09 | 0.33 | 0.21 | 0.11 | 0.2 | 0.17 | 0.08 | 0.01 | 0.05 | 0.11 | 0.05 | 0.07 |
re3 | 0.21 | 0.08 | 0.18 | 0 | 0.22 | 0.29 | 0.27 | 0.3 | 0.05 | 0.12 | 0.37 | 0.16 | 0.28 | 0.18 | 0.26 | 0.22 | 0.08 | 0.14 | 0.27 | 0.2 |
re4 | 0.09 | 0.13 | 0.15 | 0.07 | 0.17 | 0.22 | 0.31 | 0.29 | 0.17 | 0.14 | 0.13 | 0.32 | 0.21 | 0.15 | 0.23 | 0.24 | 0.02 | 0.03 | 0.01 | −0.05 |
rfs1 | 0.03 | −0.01 | 0.03 | 0.05 | 0.14 | 0.08 | 0.14 | 0.08 | 0.12 | 0.26 | 0.26 | 0.14 | 0.3 | 0.25 | 0.37 | 0.26 | −0.24 | −0.13 | 0.09 | 0.04 |
rfs2 | 0.16 | −0.03 | −0.05 | −0.02 | 0.03 | 0 | 0.13 | −0.04 | 0.02 | −0.04 | 0.03 | −0.02 | 0.01 | −0.06 | −0.05 | −0.08 | 0.1 | 0.08 | 0.14 | 0.17 |
rfs3 | 0.05 | −0.02 | 0.08 | 0 | −0.02 | 0.04 | 0.06 | 0.07 | 0.1 | 0.17 | −0.06 | 0.13 | 0.16 | 0.23 | 0.13 | 0.17 | 0.11 | 0.01 | 0.04 | 0.07 |
rfs4 | 0 | 0.08 | −0.13 | −0.09 | 0.04 | −0.01 | 0.2 | 0.12 | −0.07 | −0.11 | 0.01 | 0.02 | 0.02 | 0.09 | 0.03 | 0.04 | −0.04 | 0.06 | 0.11 | 0.25 |
se1 | 1 | 0.65 | 0.42 | 0.31 | 0.4 | 0.27 | 0.44 | 0.15 | 0.59 | 0.3 | 0.31 | 0.11 | 0.28 | 0.1 | 0.11 | 0.06 | 0.39 | 0.27 | 0.28 | 0.24 |
se2 | 0.65 | 1 | 0.2 | 0.29 | 0.12 | 0.19 | 0.2 | 0.18 | 0.55 | 0.33 | 0.08 | 0.08 | 0.15 | 0.04 | −0.1 | −0.07 | 0.14 | 0.05 | 0.03 | 0 |
se3 | 0.42 | 0.2 | 1 | 0.53 | 0.27 | 0.24 | 0.07 | −0.05 | 0.33 | 0.59 | 0.31 | −0.02 | 0.14 | 0.31 | 0.08 | 0.05 | 0.21 | 0.21 | 0.13 | 0.23 |
se4 | 0.31 | 0.29 | 0.53 | 1 | 0.05 | 0.22 | 0.08 | 0.16 | 0.14 | 0.48 | 0.09 | −0.02 | 0.04 | 0.25 | −0.07 | −0.08 | −0.06 | 0.03 | 0.02 | 0.04 |
se5 | 0.4 | 0.12 | 0.27 | 0.05 | 1 | 0.59 | 0.48 | 0.15 | 0.23 | 0.25 | 0.68 | 0.24 | 0.25 | 0.12 | 0.32 | 0.12 | 0.29 | 0.18 | 0.29 | 0.24 |
se6 | 0.27 | 0.19 | 0.24 | 0.22 | 0.59 | 1 | 0.29 | 0.26 | 0.1 | 0.26 | 0.49 | 0.09 | 0.15 | 0.09 | 0.18 | −0.02 | 0.11 | −0.01 | 0.11 | 0.11 |
se7 | 0.44 | 0.2 | 0.07 | 0.08 | 0.48 | 0.29 | 1 | 0.65 | 0.26 | 0.17 | 0.42 | 0.48 | 0.18 | 0.01 | 0.23 | 0.16 | 0.29 | 0.22 | 0.39 | 0.33 |
se8 | 0.15 | 0.18 | −0.05 | 0.16 | 0.15 | 0.26 | 0.65 | 1 | 0.13 | 0.15 | 0.2 | 0.42 | 0.05 | 0.01 | 0.18 | 0.1 | 0.1 | 0.05 | 0.12 | 0.05 |
si1 | 0.59 | 0.55 | 0.33 | 0.14 | 0.23 | 0.1 | 0.26 | 0.13 | 1 | 0.51 | 0.37 | 0.36 | 0.5 | 0.25 | 0.27 | 0.27 | 0.24 | 0.17 | 0.19 | 0.16 |
si2 | 0.3 | 0.33 | 0.59 | 0.48 | 0.25 | 0.26 | 0.17 | 0.15 | 0.51 | 1 | 0.43 | 0.23 | 0.33 | 0.39 | 0.16 | 0.15 | 0 | 0.05 | 0.15 | 0.13 |
si3 | 0.31 | 0.08 | 0.31 | 0.09 | 0.68 | 0.49 | 0.42 | 0.2 | 0.37 | 0.43 | 1 | 0.37 | 0.37 | 0.23 | 0.44 | 0.34 | 0.14 | 0.08 | 0.29 | 0.27 |
si4 | 0.11 | 0.08 | −0.02 | −0.02 | 0.24 | 0.09 | 0.48 | 0.42 | 0.36 | 0.23 | 0.37 | 1 | 0.32 | 0.12 | 0.24 | 0.47 | 0.2 | 0.09 | 0.38 | 0.33 |
sn1 | 0.28 | 0.15 | 0.14 | 0.04 | 0.25 | 0.15 | 0.18 | 0.05 | 0.5 | 0.33 | 0.37 | 0.32 | 1 | 0.65 | 0.65 | 0.57 | 0.13 | 0.03 | 0.25 | 0.19 |
sn2 | 0.1 | 0.04 | 0.31 | 0.25 | 0.12 | 0.09 | 0.01 | 0.01 | 0.25 | 0.39 | 0.23 | 0.12 | 0.65 | 1 | 0.48 | 0.53 | 0.01 | 0.07 | 0.14 | 0.05 |
sn3 | 0.11 | −0.1 | 0.08 | −0.07 | 0.32 | 0.18 | 0.23 | 0.18 | 0.27 | 0.16 | 0.44 | 0.24 | 0.65 | 0.48 | 1 | 0.59 | 0.06 | 0.07 | 0.27 | 0.08 |
sn4 | 0.06 | −0.07 | 0.05 | −0.08 | 0.12 | −0.02 | 0.16 | 0.1 | 0.27 | 0.15 | 0.34 | 0.47 | 0.57 | 0.53 | 0.59 | 1 | 0.13 | 0.04 | 0.27 | 0.16 |
ta1 | 0.39 | 0.14 | 0.21 | −0.06 | 0.29 | 0.11 | 0.29 | 0.1 | 0.24 | 0 | 0.14 | 0.2 | 0.13 | 0.01 | 0.06 | 0.13 | 1 | 0.65 | 0.52 | 0.5 |
ta2 | 0.27 | 0.05 | 0.21 | 0.03 | 0.18 | −0.01 | 0.22 | 0.05 | 0.17 | 0.05 | 0.08 | 0.09 | 0.03 | 0.07 | 0.07 | 0.04 | 0.65 | 1 | 0.56 | 0.45 |
ta3 | 0.28 | 0.03 | 0.13 | 0.02 | 0.29 | 0.11 | 0.39 | 0.12 | 0.19 | 0.15 | 0.29 | 0.38 | 0.25 | 0.14 | 0.27 | 0.27 | 0.52 | 0.56 | 1 | 0.76 |
ta4 | 0.24 | 0 | 0.23 | 0.04 | 0.24 | 0.11 | 0.33 | 0.05 | 0.16 | 0.13 | 0.27 | 0.33 | 0.19 | 0.05 | 0.08 | 0.16 | 0.5 | 0.45 | 0.76 | 1 |
Appendix D. Code Used for Analysis
References
- Kemp, S.; Hootsuite; We Are Social. Digital 2021 July Global Statshot Report. Available online: https://datareportal.com/reports/digital-2021-july-global-statshot (accessed on 17 August 2021).
- Agostino, D.; Arnaboldi, M.; Lema, M.D. New development: COVID-19 as an accelerator of digital transformation in public service delivery. Public Money Manag. 2020, 41, 69–72. [Google Scholar] [CrossRef]
- ENISA. Top Ten Cyber Hygiene Tips for SMEs during COVID-19 Pandemic. Available online: https://www.enisa.europa.eu/news/enisa-news/top-ten-cyber-hygiene-tips-for-smes-during-covid-19-pandemic (accessed on 24 May 2021).
- Lida, J. Digital Transformation vs COVID-19: The Case of Japan. Digit. Law J. 2020, 1, 8–16. [Google Scholar] [CrossRef]
- Soto-Acosta, P. COVID-19 Pandemic: Shifting Digital Transformation to a High-Speed Gear. Inf. Syst. Manag. 2020, 37, 260–266. [Google Scholar] [CrossRef]
- Smith, Z.; Lostri, E.; Lewis, J. The Hidden Costs of Cybercrime; Technical Report; McAfee Inc.: San Jose, CA, USA, 2020. [Google Scholar]
- Heidt, M.; Gerlach, J.P.; Buxmann, P. Investigating the Security Divide between SME and Large Companies: How SME Characteristics Influence Organizational IT Security Investments. Inf. Syst. Front. 2019, 21, 1285–1305. [Google Scholar] [CrossRef]
- Van Haastrecht, M.; Yigit Ozkan, B.; Brinkhuis, M.; Spruit, M. Respite for SMEs: A Systematic Review of Socio-Technical Cybersecurity Metrics. Appl. Sci. 2021, 11, 6909. [Google Scholar] [CrossRef]
- Holt, T.; Bossler, A. Cybercrime in Progress, 1st ed.; Routledge: Abingdon, UK, 2015. [Google Scholar] [CrossRef]
- Hanus, B.; Wu, Y. Impact of Users’ Security Awareness on Desktop Security Behavior: A Protection Motivation Theory Perspective. Inf. Syst. Manag. 2015, 33, 2–16. [Google Scholar] [CrossRef]
- Ifinedo, P. Understanding information systems security policy compliance: An integration of the theory of planned behavior and the protection motivation theory. Comput. Secur. 2012, 31, 83–95. [Google Scholar] [CrossRef]
- Martens, M.; De Wolf, R.; De Marez, L. Investigating and comparing the predictors of the intention towards taking security measures against malware, scams and cybercrime in general. Comput. Hum. Behav. 2019, 92, 139–150. [Google Scholar] [CrossRef]
- Alkhurayyif, Y.; Weir, G.R.S. Readability as a basis for information security policy assessment. In Proceedings of the 2017 Seventh International Conference on Emerging Security Technologies (EST), Canterbury, UK, 6–8 September 2017; pp. 114–121. [Google Scholar] [CrossRef] [Green Version]
- Alkhurayyif, Y.; Weir, G.R.S. Using Sequential Exploratory Mixed Methods Design to Explore Readability of ISPs. In Proceedings of the 2018 International Conference on Computing, Electronics Communications Engineering (iCCECE), Southend, UK, 16–17 August 2018; pp. 123–127. [Google Scholar] [CrossRef]
- Hameed, M.A.; Arachchilage, N.A.G. The role of self-efficacy on the adoption of information systems security innovations: A meta-analysis assessment. Pers. Ubiquitous Comput. 2021, 25, 911–925. [Google Scholar] [CrossRef]
- Hong, Y.; Furnell, S. Understanding cybersecurity behavioral habits: Insights from situational support. J. Inf. Secur. Appl. 2021, 57, 102710. [Google Scholar] [CrossRef]
- Vrhovec, S.; Mihelič, A. Redefining threat appraisals of organizational insiders and exploring the moderating role of fear in cyberattack protection motivation. Comput. Secur. 2021, 106, 1–22. [Google Scholar] [CrossRef]
- Wood, R.; Bandura, A. Impact of conceptions of ability on self-regulatory mechanisms and complex decision making. J. Personal. Soc. Psychol. 1989, 56, 407–415. [Google Scholar] [CrossRef]
- Bandura, A.; Jourden, F.J. Self-regulatory mechanisms governing the impact of social comparison on complex decision making. J. Personal. Soc. Psychol. 1991, 60, 941–951. [Google Scholar] [CrossRef]
- Stajkovic, A.D.; Luthans, F. Social cognitive theory and self-efficacy: Going beyond traditional motivational and behavioral approaches. Organ. Dyn. 1998, 26, 62–74. [Google Scholar] [CrossRef]
- Bandura, A. Social Foundations of Thought and Action; Prentice Hall: Upper Saddle River, NJ, USA, 1986. [Google Scholar]
- Bandura, A. Self-efficacy: Toward a unifying theory of behavioral change. Psychol. Rev. 1977, 84, 191–215. [Google Scholar] [CrossRef]
- Rogers, R.W. A Protection Motivation Theory of Fear Appeals and Attitude Change. J. Psychol. 1975, 91, 93–114. [Google Scholar] [CrossRef]
- Gagné, M.; Deci, E.L. Self-determination theory and work motivation. J. Organ. Behav. 2005, 26, 331–362. [Google Scholar] [CrossRef] [Green Version]
- Champion, V.; Skinner, C. The Health Belief Model. In Health Behavior and Health Education: Theory, Research, and Practice, 4th ed.; Jossey-Bass: San Francisco, CA, USA, 2008; pp. 45–65. [Google Scholar]
- Claar, C. The Adoption of Computer Security: An Analysis of Home Personal Computer User Behavior Using the Health Belief Model. Ph.D. Thesis, Utah State University, Logan, UT, USA, 2011. [Google Scholar]
- Ng, B.Y.; Kankanhalli, A.; Xu, Y.C. Studying users’ computer security behavior: A health belief perspective. Decis. Support Syst. 2009, 46, 815–825. [Google Scholar] [CrossRef]
- Bauer, S.; Bernroider, E.W. The Effects of Awareness Programs on Information Security in Banks: The Roles of Protection Motivation and Monitoring; Lecture Notes in Computer Science; Springer Publishing: New York, NY, USA, 2015; pp. 154–164. [Google Scholar] [CrossRef]
- Sommestad, T.; Karlzén, H.; Hallberg, J. A Meta-Analysis of Studies on Protection Motivation Theory and Information Security Behaviour. Int. J. Inf. Secur. Priv. 2015, 9, 26–46. [Google Scholar] [CrossRef] [Green Version]
- Milne, S.; Sheeran, P.; Orbell, S. Prediction and Intervention in Health-Related Behavior: A Meta-Analytic Review of Protection Motivation Theory. J. Appl. Soc. Psychol. 2000, 30, 106–143. [Google Scholar] [CrossRef]
- Ajzen, I. The theory of planned behavior. Organ. Behav. Hum. Decis. Process. 1991, 50, 179–211. [Google Scholar] [CrossRef]
- Fishbein, M.; Ajzen, I. Belief, Attitude, Intention and Behavior: An Introduction to Theory and Research (Addison-Wesley Series in Social Psychology); Addison-Wesley: Boston, MA, USA, 1975. [Google Scholar]
- Ajzen, I.; Madden, T.J. Prediction of goal-directed behavior: Attitudes, intentions, and perceived behavioral control. J. Exp. Soc. Psychol. 1986, 22, 453–474. [Google Scholar] [CrossRef]
- Richards, J.; Schmidt, R. Longman Dictionary of Language Teaching and Applied Linguistics, 4th ed.; Taylor & Francis: Abingdon, UK, 2015. [Google Scholar]
- DuBay, W. Smart Language: Readers, Readability, and the Grading of Text; BookSurge Publishing: North Charleston, SC, USA, 2007. [Google Scholar]
- Dale, E.; Chall, J.S. The Concept of Readability. Elem. Engl. 1949, 26, 19–26. [Google Scholar]
- Klare, G.R. The Measurement of Readability; Amsterdam University Press: Amsterdam, The Netherlands, 1963. [Google Scholar]
- Calonia, J. What Is Readability? Available online: https://www.grammarly.com/blog/readability/ (accessed on 24 May 2021).
- Hargis, G.; Carey, M.; Hernandez, A.K.; Hughes, P.; Longo, D.; Rouiller, S.; Wilde, E. Developing Quality Technical Information: A Handbook for Writers and Editors, 2nd ed.; IBM Press: Indianapolis, IN, USA, 2004. [Google Scholar]
- Dell’Orletta, F.; Wieling, M.; Venturi, G.; Cimino, A.; Montemagni, S. Assessing the Readability of Sentences: Which Corpora and Features? In Proceedings of the Ninth Workshop on Innovative Use of NLP for Building Educational Applications, Association for Computational Linguistics (ACL), Baltimore, MD, USA, 26 June 2015; pp. 163–173. [Google Scholar] [CrossRef]
- Campbell, G.; Weir, G. Matching readers to texts with the Strathclyde readability measure. In ICT in the Analysis, Teaching and Learning of Languages; Preprints of the ICTATLL Workshop 2006; Strathprints: Glasgow, UK, 2006. [Google Scholar]
- Chapin, D.; Akridge, S. How can security be measured? Inf. Syst. Control J. 2005, 2, 43–47. [Google Scholar]
- Van Oosten, P.; Tanghe, D.; Hoste, V. Towards an improved methodology for automated readability prediction. In Proceedings of the 7th Conference on International Language Resources and Evaluation (LREC 2010), European Language Resources Association (ELRA), Valetta, Malta, 19–21 May 2010; pp. 775–782. [Google Scholar]
- Chenoweth, T.; Minch, R.; Gattiker, T. Application of Protection Motivation Theory to Adoption of Protective Technologies. In Proceedings of the 2009 42nd Hawaii International Conference on System Sciences, Waikoloa, HI, USA, 5–8 January 2009; pp. 1–10. [Google Scholar] [CrossRef]
- Dang-Pham, D.; Pittayachawan, S. Comparing intention to avoid malware across contexts in a BYOD-enabled Australian university: A Protection Motivation Theory approach. Comput. Secur. 2015, 48, 281–297. [Google Scholar] [CrossRef]
- Gurung, A.; Luo, X.; Liao, Q. Consumer motivations in taking action against spyware: An empirical investigation. Inf. Manag. Comput. Secur. 2009, 17, 276–289. [Google Scholar] [CrossRef] [Green Version]
- Lee, Y.; Larsen, K.R. Threat or coping appraisal: Determinants of SMB executives’ decision to adopt anti-malware software. Eur. J. Inf. Syst. 2009, 18, 177–187. [Google Scholar] [CrossRef]
- Meso, P.; Ding, Y.; Xu, S. Applying Protection Motivation Theory to Information Security Training for College Students. J. Inf. Priv. Secur. 2013, 9, 47–67. [Google Scholar] [CrossRef]
- Tsai, H.y.S.; Jiang, M.; Alhabash, S.; LaRose, R.; Rifon, N.J.; Cotten, S.R. Understanding online safety behaviors: A protection motivation theory perspective. Comput. Secur. 2016, 59, 138–150. [Google Scholar] [CrossRef] [Green Version]
- Laukkanen, T. Consumer adoption versus rejection decisions in seemingly similar service innovations: The case of the Internet and mobile banking. J. Bus. Res. 2016, 69, 2432–2439. [Google Scholar] [CrossRef]
- Yousafzai, S.Y.; Foxall, G.R.; Pallister, J.G. Explaining Internet Banking Behavior: Theory of Reasoned Action, Theory of Planned Behavior, or Technology Acceptance Model? J. Appl. Soc. Psychol. 2010, 40, 1172–1202. [Google Scholar] [CrossRef]
- Woon, I.; Tan, G.; Low, R. A Protection Motivation Theory Approach to Home Wireless Security; Association for Information Systems: Atlanta, GA, USA, 2005. [Google Scholar]
- Wason, K.D.; Polonsky, M.J.; Hyman, M.R. Designing Vignette Studies in Marketing. Australas. Mark. J. 2002, 10, 41–58. [Google Scholar] [CrossRef] [Green Version]
- Cisco Systems. What Are the Most Common Cyber Attacks? Available online: https://www.cisco.com/c/en/us/products/security/common-cyberattacks.html (accessed on 19 February 2021).
- Anderson, C.; Agarwal, R. Practicing Safe Computing: A Multimethod Empirical Examination of Home Computer User Security Behavioral Intentions. MIS Q. 2010, 34, 613–643. [Google Scholar] [CrossRef] [Green Version]
- Vagias, W. Likert-Type Scale Response Anchors; Technical Report; Clemson University: Clemson, SC, USA, 2006. [Google Scholar]
- Liu, Y.; Doucette, W.R.; Farris, K.B. Perceived difficulty and self-efficacy in the factor structure of perceived behavioral control to seek drug information from physicians and pharmacists. Res. Soc. Adm. Pharm. 2007, 3, 145–159. [Google Scholar] [CrossRef] [PubMed]
- My Byline Media. Dale-Chall Readability Calculator. Available online: https://readabilityformulas.com/free-dale-chall-test.php (accessed on 8 July 2021).
- WebFX. Readable. Available online: https://www.webfx.com/tools/read-able/ (accessed on 24 May 2021).
- Harrison, C. Tip Sheet on Question Wording. Available online: https://psr.iq.harvard.edu/files/psr/files/PSRQuestionnaireTipSheet_0.pdf (accessed on 24 May 2021).
- Hair, J.; Hult, T.; Ringle, C.; Sarstedt, M. A Primer on Partial Least Squares Structural Equation Modeling (PLS-SEM), 2nd ed.; SAGE Publications: Thousand Oaks, CA, USA, 2017. [Google Scholar]
- Ray, S.; Danks, N.; Valdez, A.; Estrada, J.; Uanhoro, J.; Nakayama, J.; Koyan, L.; Burbach, L.; Bejar, A.; Adler, S. SEMinR (2.1.0). Available online: https://cran.r-project.org/web/packages/seminr/ (accessed on 8 July 2021).
- Diamantopoulos, A. The error term in formative measurement models: Interpretation and modeling implications. J. Model. Manag. 2006, 1, 7–17. [Google Scholar] [CrossRef]
- Hair, J.F.; Sarstedt, M.; Ringle, C.M.; Mena, J.A. An assessment of the use of partial least squares structural equation modeling in marketing research. J. Acad. Mark. Sci. 2011, 40, 414–433. [Google Scholar] [CrossRef]
- Hanafiah, M. Formative Vs. Reflective Measurement Model: Guidelines for Structural Equation Modeling Research. Int. J. Anal. Appl. 2020, 18, 876–889. [Google Scholar] [CrossRef]
- Edwards, J.R.; Bagozzi, R.P. On the nature and direction of relationships between constructs and measures. Psychol. Methods 2000, 5, 155–174. [Google Scholar] [CrossRef]
- Petter, S.; Straub, D.; Rai, A. Specifying Formative Constructs in Information Systems Research. MIS Q. 2007, 31, 623. [Google Scholar] [CrossRef] [Green Version]
- Ramayah, T.; Cheah, J.; Chuah, F.; Ting, H.; Memon, M. Partial Least Squares Structural Equation Modeling (PLS-SEM) Using SmartPLS 3.0: An Updated Guide and Practical Guide to Statistical Analysis, 2nd ed.; Pearson: London, UK, 2018. [Google Scholar]
- Henseler, J.; Dijkstra, T.K.; Sarstedt, M.; Ringle, C.M.; Diamantopoulos, A.; Straub, D.W.; Ketchen, D.J.; Hair, J.F.; Hult, G.T.M.; Calantone, R.J. Common Beliefs and Reality About PLS. Organ. Res. Methods 2014, 17, 182–209. [Google Scholar] [CrossRef] [Green Version]
- Roberts, N.; Thatcher, J. Conceptualizing and testing formative constructs. Database Adv. Inf. Syst. 2009, 40, 9–39. [Google Scholar] [CrossRef]
- Marakas, G.; Johnson, R.; Clay, P. The Evolving Nature of the Computer Self-Efficacy Construct: An Empirical Investigation of Measurement Construction, Validity, Reliability and Stability Over Time. J. Assoc. Inf. Syst. 2007, 8, 16–46. [Google Scholar] [CrossRef]
- Trochim, W.; Donnelly, J. The Research Methods Knowledge Base, 3rd ed.; Atomic Dog: Cincinnati, OH, USA, 2006. [Google Scholar]
- Chin, W. The partial least squares approach for structural equation modeling. In Modern Methods for Business Research; Lawrence Erlbaum Associates Publishers: Abingdon, UK, 1998; pp. 295–336. [Google Scholar]
- Keith, T. Multiple Regression and Beyond, 3rd ed.; Taylor & Francis: Abingdon, UK, 2019. [Google Scholar] [CrossRef]
- Kenny, D. Correlation and Causality; Wiley: Hoboken, NJ, USA, 1979. [Google Scholar]
- Becker, J. Interpreting Path Coefficients. Available online: https://forum.smartpls.com/viewtopic.php?t=16088 (accessed on 8 July 2021).
- Johnston, A.; Warkentin, M. Fear Appeals and Information Security Behaviors: An Empirical Study. MIS Q. 2010, 34, 549–566. [Google Scholar] [CrossRef]
- Rhee, H.S.; Kim, C.; Ryu, Y.U. Self-efficacy in information security: Its influence on end users’ information security practice behavior. Comput. Secur. 2009, 28, 816–826. [Google Scholar] [CrossRef]
- Cohen, J. Statistical Power Analysis for the Behavioral Sciences, 2nd ed.; Routledge: Abingdon, UK, 1988. [Google Scholar]
- Benoit, K.; Watanabe, K.; Wang, H.; Nulty, P.; Obeng, A.; Müller, S.; Matsuo, A. Quanteda: An R package for the quantitative analysis of textual data. J. Open Source Softw. 2018, 3, 774. [Google Scholar] [CrossRef] [Green Version]
- DiMascio, C.; Amos, R.; Stevens, M.; Chakraborty, S. Py-Readability-Metrics. Available online: https://github.com/cdimascio/py-readability-metrics (accessed on 8 July 2021).
- Lumley, T.; Diehr, P.; Emerson, S.; Chen, L. The Importance of the Normality Assumption in Large Public Health Data Sets. Annu. Rev. Public Health 2002, 23, 151–169. [Google Scholar] [CrossRef]
- Hanel, P.H.P.; Vione, K.C. Do Student Samples Provide an Accurate Estimate of the General Public? PLoS ONE 2016, 11, e0168354. [Google Scholar] [CrossRef] [Green Version]
- Frost, J. Introduction to Bootstrapping in Statistics with an Example. Available online: https://statisticsbyjim.com/hypothesis-testing/bootstrapping/ (accessed on 8 July 2021).
- Wanous, J.P.; Reichers, A.E.; Hudy, M.J. Overall job satisfaction: How good are single-item measures? J. Appl. Psychol. 1997, 82, 247–252. [Google Scholar] [CrossRef]
- Cheah, J.H.; Sarstedt, M.; Ringle, C.M.; Ramayah, T.; Ting, H. Convergent validity assessment of formatively measured constructs in PLS-SEM. Int. J. Contemp. Hosp. Manag. 2018, 30, 3192–3210. [Google Scholar] [CrossRef]
- Drolet, A.L.; Morrison, D.G. Do We Really Need Multiple-Item Measures in Service Research? J. Serv. Res. 2001, 3, 196–204. [Google Scholar] [CrossRef]
- Crossley, S.A.; Skalicky, S.; Dascalu, M.; McNamara, D.S.; Kyle, K. Predicting Text Comprehension, Processing, and Familiarity in Adult Readers: New Approaches to Readability Formulas. Discourse Process. 2017, 54, 340–359. [Google Scholar] [CrossRef]
- Curto, P.; Mamede, N.; Baptista, J. Automatic Text Difficulty Classifier—Assisting the Selection of Adequate Reading Materials for European Portuguese Teaching; SCITEPRESS—Science and and Technology Publications: Setúbal, Portugal, 2015; pp. 36–44. [Google Scholar] [CrossRef]
- Nadeem, F.; Ostendorf, M. Estimating Linguistic Complexity for Science Texts. In Proceedings of the Thirteenth Workshop on Innovative Use of NLP for Building Educational Applications, Association for Computational Linguistics (ACL), New Orleans, LA, USA, 5 June 2018; pp. 45–55. [Google Scholar] [CrossRef]
- Gratian, M.; Bandi, S.; Cukier, M.; Dykstra, J.; Ginther, A. Correlating human traits and cyber security behavior intentions. Comput. Secur. 2018, 73, 345–358. [Google Scholar] [CrossRef]
- Dempsey, K.; Eavy, P.; Goren, N.; Moore, G. Automation Support for Security Control Assessments; Technical Report NISTIR 8011; National Institute of Standards and Technology (NIST): Gaithersburg, MD, USA, 2018. [Google Scholar] [CrossRef]
- Mulloy, E. Zero-Day Vulnerabilities and Zero-Day Attacks. Available online: https://www.sdsolutionsllc.com/zero-day-vulnerabilities-and-zero-day-attacks/ (accessed on 24 May 2021).
- Swiss Federal Department of Finance. Malware. Available online: https://www.ncsc.admin.ch/ncsc/en/home/cyberbedrohungen/malware.html (accessed on 24 May 2021).
- Swiss Federal Department of Finance. Phishing. Available online: https://www.ncsc.admin.ch/ncsc/en/home/cyberbedrohungen/phishing.html (accessed on 24 May 2021).
- Cisco Systems. Cisco IOS Firewall Intrusion Detection System. Available online: https://newsroom.cisco.com/dlls/IOSIDSDS.pdf (accessed on 24 May 2021).
- Gontharet, F. Man-in-The-Middle Attacks & Countermeasures Analysis. Master’s Thesis, Abertay University, Dundee, UK, 2015. [Google Scholar] [CrossRef]
- Finjan. What Are Zero-Day Threats and How to Guard against Them? Available online: https://blog.finjan.com/zero-day-threats/ (accessed on 24 May 2021).
- Sophos. Zero-Day Threats: Guarding against the Unknown Enemy. Available online: https://www.sophos.com/en-us/security-news-trends/security-trends/zeroday-threats.aspx (accessed on 24 May 2021).
Index | Hypothesis | Source(s) |
---|---|---|
H1 | Countermeasure reading disposition positively affects countermeasure readability | [35] |
H2 | Countermeasure awareness positively affects countermeasure readability | [35] |
H3 | Threat awareness is a positive predictor of perceived severity | [10,12] |
H4 | Threat awareness is a positive predictor of perceived vulnerability | [48] |
H5 | Countermeasure readability is a positive predictor of self-efficacy | Proposed |
H6 | Countermeasure readability is a negative predictor of response cost | Proposed |
H7 | Countermeasure awareness is a positive predictor of self-efficacy | [10,12] |
H8 | Countermeasure awareness is a negative predictor of response cost | [10] |
H9 | Countermeasure awareness is a positive predictor of response efficacy | [10,12] |
H10 | Perceived severity is a positive predictor of security intentions | [28,44,45,52] |
H11 | Perceived vulnerability is a positive predictor of security intentions | [44] |
H12 | Self-efficacy is a positive predictor of security intentions | [10,28,45,52] |
H13 | Response cost is a negative predictor of security intentions | [44,45,48,49,52] |
H14 | Response efficacy is a positive predictor of security intentions | [10,28,44,52] |
H15 | Subjective norm is a positive predictor of security intentions | [12,49] |
Construct | Relationship | Correlation |
---|---|---|
Countermeasure reading disposition | crd1 crd2 | 0.739 |
Countermeasure readability | cr1 cr2 | 0.773 |
Countermeasure readability | cr3 cr4 | 0.733 |
Countermeasure readability | cr5 cr6 | 0.818 |
Countermeasure readability | cr7 cr8 | 0.869 |
Self-efficacy | se1 se2 | 0.654 |
Self-efficacy | se3 se4 | 0.532 |
Self-efficacy | se5 se6 | 0.592 |
Self-efficacy | se7 se8 | 0.649 |
This Text Is Easy to Read | This Text Is Easy to Understand | |||
---|---|---|---|---|
M | 5.47 (‘hard’) | 5.95 (‘easy’) | 5.36 (‘hard’) | 5.84 (‘easy’) |
1.29 (‘hard’) | 1.06 (‘easy’) | 1.33 (‘hard’) | 1.17 (‘easy’) | |
350 | 350 | |||
t | 3.9 | 3.6 | ||
p | <0.001 | <0.001 | ||
Skewness | −1.28 | −1.19 | ||
Kurtosis | 1.40 | 0.84 |
Hypothesis | Path Coefficient | T Stat. | 2.5%CI | 97.5%CI | Supported? | |
---|---|---|---|---|---|---|
H1: CRDCR | −0.074 | −0.671 | 0.020 | −0.223 | 0.205 | No |
H2: TAPS | 0.440 | 1.386 | −0.491 | 0.240 | 0.706 | Yes |
H3: TAPV | −0.392 | −1.235 | −0.614 | 0.181 | 0.487 | No |
H4: CRSE | 0.322 | 1.892 | 0.047 | 0.138 | 0.719 | No |
H5: CRRC | −0.142 | −0.522 | −0.714 | 0.015 | 0.372 | Yes |
H6: CACR | 0.758 | 10.047 | 0.611 | 1.184 | 0.899 | No |
H7: CASE | 0.487 | 2.764 | 0.071 | 0.223 | 0.770 | Yes |
H8: CARC | −0.201 | −0.743 | −0.703 | 0.033 | 0.410 | No |
H9: CARE | 0.547 | 2.928 | 0.080 | 0.426 | 0.760 | Yes |
H10: PSSI | −0.021 | −0.139 | −0.257 | −0.005 | 0.343 | No |
H11: PVSI | −0.073 | −0.685 | −0.223 | −0.008 | 0.206 | No |
H12: SESI | 0.575 | 3.563 | 0.192 | 0.190 | 0.794 | Yes |
H13: RCSI | −0.096 | −0.803 | −0.340 | 0.007 | 0.129 | No |
H14: RESI | −0.036 | −0.277 | −0.210 | −0.014 | 0.297 | No |
H15: SNSI | 0.296 | 2.308 | 0.042 | 0.179 | 0.542 | Yes |
Threat | Countermeasure | Metric Scores |
---|---|---|
Malware | Whenever possible, verify updates are automatically being installed. Alternatively, ensure all software packages are updated to their most recent version. Activate the operating system’s integrated firewall before you connect any device to the internet or other networks. Employ a virus protection program that frequently performs full system scans optimized for malicious software detection. Safeguard critical data by planning a regular off-site backup (e.g., cloud or tape backup) of systems, so recovery from cyber attacks will be a less complicated process. | FRE = 29.9 FKGL = 12.0 FOG = 14.4 DC = 10.6 CLI = 17.8 ARI = 11.3 |
Malware | Where possible, make sure that updates are automatically installed. Otherwise, make sure to update all your software to the latest version. Make sure all your connections to the internet (or other networks) go through a firewall. Make sure you have set up an antivirus program that scans your systems for malware. Make sure your important data is regularly backed up in the cloud or another safe place, so coming back from an attack will be easier. | FRE = 61.2 FKGL = 8.5 FOG = 11.9 DC = 7.1 CLI = 12.3 ARI = 8.7 |
MitM | Verify the establishment of an HTTPS connection when submitting confidential information to a website, signified by the lock symbol in or around the URL bar in the internet browser. Do not transmit confidential information via an insecure public Wi-Fi network. Ensure security of your local network by deploying an intrusion detection system. | FRE = 27.7 FKGL = 13.8 FOG = 17.6 DC = 10.8 CLI = 16.0 ARI = 12.8 |
MitM | Make sure websites where you give personal info have an HTTPS connection as shown by the lock icon in or around the address bar in your browser. Never give out personal data over an insecure public Wi-Fi network. Make sure your network is secured with an intrusion detection system. | FRE = 61.3 FKGL = 8.8 FOG = 11.5 DC = 7.0 CLI = 11.3 ARI = 8.6 |
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations. |
© 2021 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Smit, T.; van Haastrecht, M.; Spruit, M. The Effect of Countermeasure Readability on Security Intentions. J. Cybersecur. Priv. 2021, 1, 675-703. https://doi.org/10.3390/jcp1040034
Smit T, van Haastrecht M, Spruit M. The Effect of Countermeasure Readability on Security Intentions. Journal of Cybersecurity and Privacy. 2021; 1(4):675-703. https://doi.org/10.3390/jcp1040034
Chicago/Turabian StyleSmit, Tim, Max van Haastrecht, and Marco Spruit. 2021. "The Effect of Countermeasure Readability on Security Intentions" Journal of Cybersecurity and Privacy 1, no. 4: 675-703. https://doi.org/10.3390/jcp1040034
APA StyleSmit, T., van Haastrecht, M., & Spruit, M. (2021). The Effect of Countermeasure Readability on Security Intentions. Journal of Cybersecurity and Privacy, 1(4), 675-703. https://doi.org/10.3390/jcp1040034