The Cybersecurity Awareness INventory (CAIN): Early Phases of Development of a Tool for Assessing Cybersecurity Knowledge Based on the ISO/IEC 27032
Abstract
:1. Introduction
2. Cybersecurity Awareness
3. Survey Measures in Cybersecurity
4. The Cybersecurity Awareness Inventory (CAIN)
4.1. Overview
4.2. Methods
4.2.1. Development of the Questionnaire
4.2.2. Participants
4.2.3. Risk Level Measure
4.3. Procedure
5. Data Analysis and Results
5.1. CAIN Scores
5.2. Item Response Model Analysis
5.3. Relation of CAIN Scores to Risk Level
6. Discussion
7. Conclusions
Author Contributions
Funding
Data Availability Statement
Acknowledgments
Conflicts of Interest
References
- Lallie, H.S.; Shepherd, L.A.; Nurse, J.R.; Erola, A.; Epiphaniou, G.; Maple, C.; Bellekens, X. Cyber security in the age of COVID-19: A timeline and analysis of cyber-crime and cyber-attacks during the pandemic. Comput. Secur. 2021, 105, 102248. [Google Scholar] [CrossRef] [PubMed]
- World Economic Forum. COVID-19 Risks Outlook: A Preliminary Mapping and its Implications. 2020. Available online: https://www.weforum.org/reports/covid-19-risks-outlook-a-preliminary-mapping-and-itsimplications (accessed on 1 July 2022).
- Kennison, S.M.; Chan-Tin, E. Taking risks with cybersecurity: Using knowledge and personal characteristics to predict self-reported cybersecurity behaviors. Front. Psychol. 2020, 11, 3030. [Google Scholar] [CrossRef] [PubMed]
- IBM Security Services 2014 Cyber Security Intelligence Index. Available online: https://media.scmagazine.com/documents/82/ibm_cyber_security_intelligenc_20450.pdf (accessed on 1 July 2022).
- El-Bably, A.Y. Overview of the Impact of Human Error on Cybersecurity based on ISO/IEC 27001 Information Security Management. J. Inf. Secur. Cybercrimes Res. 2021, 4, 95–102. [Google Scholar] [CrossRef]
- Lorenz, B.; Kikkas, K.; Klooster, A. “The four most-used passwords are love, sex, secret, and god”: Password security and training in different user groups. In Proceedings of the International Conference on Human Aspects of Information Security, Privacy, and Trust, Las Vegas, NV, USA, 21–26 July 2013; pp. 276–283. [Google Scholar]
- ISO/IEC 27032:2012; Information Technology e Security Techniques e Guidelines for Cybersecurity. International Organization for Standardization: Geneva, Switzerland, 2012.
- Arpaci, I.; Sevinc, K. Development of the cybersecurity scale (CS-S): Evidence of validity and reliability. Inf. Dev. 2021, 38, 026666692199751. [Google Scholar] [CrossRef]
- Chandarman, R.; Van Niekerk, B. Students’ cybersecurity awareness at a private tertiary educational institution. Afr. J. Inf. Commun. 2017, 20, 133–155. [Google Scholar]
- Chaudhary, S.; Gkioulos, V.; Katsikas, S. Developing metrics to assess the effectiveness of cybersecurity awareness program. J. Cybersecur. 2022, 8, tyac006. [Google Scholar] [CrossRef]
- Shaw, R.S.; Chen, C.C.; Harris, A.L.; Huang, H.J. The impact of information richness on information security awareness training effectiveness. Comput. Educ. 2009, 52, 92–100. [Google Scholar] [CrossRef]
- Ben-Asher, N.; Gonzalez, C. Effects of cyber security knowledge on attack detection. Comput. Hum. Behav. 2015, 48, 51–61. [Google Scholar] [CrossRef]
- Barth, S.; De Jong, M.D. The privacy paradox–Investigating discrepancies between expressed privacy concerns and actual online behavior–A systematic literature review. Telemat. Inform. 2017, 34, 1038–1058. [Google Scholar] [CrossRef]
- Furnell, S.M.; Bryant, P.; Phippen, A.D. Assessing the security perceptions of personal Internet users. Comput. Secur. 2007, 26, 410–417. [Google Scholar] [CrossRef]
- Huang, D.L.; Rau, P.L.P.; Salvendy, G.; Gao, F.; Zhou, J. Factors affecting perception of information security and their impacts on IT adoption and security practices. Int. J. Hum.-Comput. Stud. 2011, 69, 870–883. [Google Scholar] [CrossRef]
- Bravo-Lillo, C.; Cranor, L.; Komanduri, S.; Schechter, S.; Sleeper, M. Harder to Ignore? Revisiting {Pop-Up} Fatigue and Approaches to Prevent It. In Proceedings of the 10th Symposium On Usable Privacy and Security (SOUPS 2014), Menlo Park, CA, USA, 9–11 July 2014; pp. 105–111. [Google Scholar]
- Bravo-Lillo, C.; Komanduri, S.; Cranor, L.F.; Reeder, R.W.; Sleeper, M.; Downs, J.; Schechter, S. Your attention please: Designing security-decision UIs to make genuine risks harder to ignore. In Proceedings of the Ninth Symposium on Usable Privacy and Security, Newcastle, UK, 24–26 July 2013; pp. 1–12. [Google Scholar]
- Li, L.; He, W.; Xu, L.; Ivan, A.; Anwar, M.; Yuan, X. Does explicit information security policy affect employees’ cyber security behavior? A pilot study. In Proceedings of the 2014 Enterprise Systems Conference, Shanghai, China, 2–3 August 2014; pp. 169–173. [Google Scholar]
- Parsons, K.; McCormac, A.; Butavicius, M.; Pattinson, M.; Jerram, C. Determining employee awareness using the human aspects of information security questionnaire (HAIS-Q). Comput. Secur. 2014, 42, 165–176. [Google Scholar] [CrossRef]
- Furnell, S. Why users cannot use security. Comput. Secur. 2005, 24, 274–279. [Google Scholar] [CrossRef]
- R Core Team. R: A Language and Environment for STATISTICAL Computing; R Foundation for Statistical Computing: Vienna, Austria, 2022; Available online: https://www.R-project.org/ (accessed on 4 November 2022).
- Rizopoulos, D. ltm: An R package for latent variable modeling and item response analysis. J. Stat. Softw. 2022, 17, 1–25. [Google Scholar]
- Razaque, A.; Al Ajlan, A.; Melaoune, N.; Alotaibi, M.; Alotaibi, B.; Dias, I.; Oad, A.; Hariri, S.; Zhao, C. Avoidance of Cybersecurity Threats with the Deployment of a Web-Based Blockchain-Enabled Cybersecurity Awareness System. Appl. Sci. 2021, 11, 7880. [Google Scholar] [CrossRef]
Item | Correct Response | Correct Responses |
---|---|---|
1. Some programs can send a large number of emails automatically. | TRUE | 98% |
2. Computers can be controlled remotely. | TRUE | 99% |
3. It is not possible to secretly install software on a computer. | FALSE | 87% |
4. Personal data shared on the Internet (including social networks) can be eventually accessed by others even if the user deletes them. | TRUE | 99% |
5. Criminal organizations use spyware to exploit any weakness in cyberspace. | TRUE | 99% |
6. Activities of a single user cannot affect the cybersecurity of an entire system. | FALSE | 82% |
7. Users are responsible for their actions in cyberspace, even when such actions are unintentional. | TRUE | 93% |
8. Avoiding using real names or pictures keeps a user safe from possible threats. | TRUE | 73% |
9. Virtual money has no value in the real world. | FALSE | 91% |
10. A hacker stealing a user’s virtual information cannot access the user’s sensitive information. | FALSE | 92% |
11. Banks may accept transactions using virtual currency. | TRUE | 78% |
12. Credit information can be sold on the black market. | TRUE | 98% |
13. Cyber criminals can prevent users from accessing their personal applications and services. | TRUE | 91% |
14. Cyber criminals are not interested in the personal information recorded in online games. | FALSE | 93% |
15. An organization’s URL is a critical resource. | TRUE | 90% |
16. Phishing emails can be used to steal users’ personal information. | TRUE | 97% |
17. Documents received by email cannot convey viruses. | FALSE | 93% |
18. Cyber-attacks cannot be delivered by legitimate websites. | FALSE | 88% |
19. Individuals may receive cyber-attacks from people they know. | TRUE | 96% |
20. A free Wi-Fi Internet access can be used to steal personal information. | TRUE | 97% |
21. Hackers can remotely capture the keypresses from a computer (e.g., for stealing passwords). | TRUE | 93% |
22. Intranets (organizations’ private networks) are secure from cyber-attacks. | FALSE | 80% |
23. It is not possible to sneak into another computer just by knowing the IP (Internet Protocol) address. | FALSE | 78% |
24. A user should report to the appropriate authority if they inadvertently gain access to a site that requires authorization. | TRUE | 94% |
25. When buying or selling online, one may unintentionally participate in criminal transactions. | TRUE | 90% |
26. An organization is not responsible for its employees’ security education. | FALSE | 83% |
27. Reading the security policy of a website is useless to prevent cyber-attacks. | FALSE | 82% |
28. When a user is not aware of the risks, it is better to ask someone trusted before acting online. | TRUE | 96% |
29. Online stores have no specific rules regarding security management. | FALSE | 79% |
30. Some online payment mechanisms are not reliable. | TRUE | 95% |
31. A blog owner is not responsible for materials uploaded by other users. | FALSE | 59% |
32. An organization does not need an authorization to release sensitive information of its employees on any website. | FALSE | 78% |
33. Cookies are a mechanism to steal sensitive information. | FALSE | 48% |
34. Software updating is not relevant for cybersecurity. | FALSE | 91% |
35. Antivirus software works even if temporarily disabled. | FALSE | 75% |
36. Unsolicited opened window can transmit a virus. | TRUE | 92% |
37. Malicious pieces of code (scripts) hidden in some websites can infect a device. | TRUE | 97% |
38. Browsers have tools for protecting against cyber-attacks. | TRUE | 92% |
39. Current operating systems have embedded firewalls. | TRUE | 92% |
40. Firewalls slow down the performance of devices. | TRUE | 49% |
41. A fake account can be created to contact a user with the aim to steal their sensitive information. | TRUE | 96% |
42. Emails requesting username and password are legitimate. | FALSE | 88% |
43. A freebies offer can be a way to steal personal information. | TRUE | 93% |
44. A two-factor authentication (e.g., password + sms code, authenticator app) is a security tool. | TRUE | 96% |
45. A device involved in suspicious activity should be quarantined (i.e., isolated for preventing infections of other devices). | TRUE | 83% |
46. If a cyber-attack happens today, the consequences may be visible weeks away. | TRUE | 94% |
1 | 0.784 | 13 | 0.781 | 25 | 0.776 | 37 | 0.780 |
2 | 0.783 | 14 | 0.772 | 26 | 0.776 | 38 | 0.776 |
3 | 0.778 | 15 | 0.785 | 27 | 0.776 | 39 | 0.782 |
4 | 0.781 | 16 | 0.783 | 28 | 0.780 | 40 | 0.798 |
5 | 0.783 | 17 | 0.775 | 29 | 0.777 | 41 | 0.777 |
6 | 0.771 | 18 | 0.773 | 30 | 0.780 | 42 | 0.777 |
7 | 0.779 | 19 | 0.775 | 31 | 0.788 | 43 | 0.778 |
8 | 0.790 | 20 | 0.781 | 32 | 0.776 | 44 | 0.777 |
9 | 0.782 | 21 | 0.779 | 33 | 0.798 | 45 | 0.781 |
10 | 0.774 | 22 | 0.770 | 34 | 0.772 | 46 | 0.780 |
11 | 0.787 | 23 | 0.784 | 35 | 0.779 | ||
12 | 0.783 | 24 | 0.778 | 36 | 0.780 |
Proportion | Logit | Difficulty | se | z | χ2 | Pr ( >χ2) | |
---|---|---|---|---|---|---|---|
1 | 0.982 | 3.996 | −4.415 | 0.462 | −9.567 | 5.537 | 0.672 |
2 | 0.989 | 4.515 | −4.943 | 0.588 | −8.403 | 3.867 | 0.796 |
3 | 0.870 | 1.901 | −2.185 | 0.199 | −10.985 | 9.742 | 0.429 |
4 | 0.986 | 4.223 | −4.649 | 0.513 | −9.057 | 4.398 | 0.780 |
5 | 0.986 | 4.223 | −4.649 | 0.513 | −9.057 | 2.231 | 0.966 |
6 | 0.823 | 1.538 | −1.775 | 0.179 | −9.920 | 16.201 | 0.093 |
7 | 0.931 | 2.609 | −2.961 | 0.255 | −11.621 | 5.775 | 0.742 |
8 | 0.726 | 0.973 | −1.126 | 0.158 | −7.148 | 18.936 | 0.055 |
9 | 0.910 | 2.311 | −2.637 | 0.228 | −11.559 | 13.424 | 0.111 |
10 | 0.917 | 2.402 | −2.738 | 0.236 | −11.607 | 13.028 | 0.138 |
11 | 0.776 | 1.244 | −1.439 | 0.166 | −8.645 | 16.167 | 0.105 |
12 | 0.978 | 3.810 | −4.226 | 0.424 | −9.964 | 8.915 | 0.283 |
13 | 0.906 | 2.267 | −2.590 | 0.225 | −11.527 | 7.624 | 0.581 |
14 | 0.928 | 2.553 | −2.902 | 0.250 | −11.630 | 17.411 | 0.034 |
15 | 0.895 | 2.146 | −2.457 | 0.216 | −11.402 | 8.440 | 0.497 |
16 | 0.971 | 3.515 | −3.920 | 0.371 | −10.554 | 4.447 | 0.851 |
17 | 0.928 | 2.553 | −2.902 | 0.250 | −11.630 | 10.190 | 0.288 |
18 | 0.881 | 2.001 | −2.296 | 0.205 | −11.182 | 9.488 | 0.394 |
19 | 0.957 | 3.095 | −3.479 | 0.310 | −11.232 | 12.488 | 0.113 |
20 | 0.971 | 3.515 | −3.920 | 0.371 | −10.554 | 4.593 | 0.831 |
21 | 0.931 | 2.609 | −2.961 | 0.255 | −11.622 | 6.883 | 0.635 |
22 | 0.801 | 1.395 | −1.613 | 0.173 | −9.350 | 26.978 | 0.002 |
23 | 0.776 | 1.244 | −1.439 | 0.166 | −8.646 | 3.953 | 0.970 |
24 | 0.939 | 2.728 | −3.089 | 0.267 | −11.576 | 5.474 | 0.783 |
25 | 0.903 | 2.226 | −2.544 | 0.221 | −11.490 | 13.376 | 0.124 |
26 | 0.830 | 1.588 | −1.832 | 0.181 | −10.100 | 5.089 | 0.914 |
27 | 0.823 | 1.538 | −1.775 | 0.179 | −9.920 | 8.664 | 0.552 |
28 | 0.964 | 3.285 | −3.679 | 0.336 | −10.955 | 6.188 | 0.652 |
29 | 0.787 | 1.307 | −1.512 | 0.169 | −8.952 | 4.744 | 0.922 |
30 | 0.950 | 2.933 | −3.308 | 0.290 | −11.418 | 9.017 | 0.354 |
31 | 0.588 | 0.358 | −0.407 | 0.145 | −2.802 | 23.247 | 0.039 |
32 | 0.780 | 1.264 | −1.463 | 0.167 | −8.747 | 6.943 | 0.795 |
33 | 0.480 | −0.080 | 0.104 | 0.143 | 0.726 | 39.473 | 0.003 |
34 | 0.913 | 2.355 | −2.687 | 0.232 | −11.586 | 20.986 | 0.012 |
35 | 0.747 | 1.084 | −1.255 | 0.161 | −7.801 | 7.239 | 0.786 |
36 | 0.921 | 2.450 | −2.790 | 0.240 | −11.622 | 8.868 | 0.437 |
37 | 0.975 | 3.653 | −4.061 | 0.395 | −10.291 | 10.114 | 0.210 |
38 | 0.924 | 2.501 | −2.844 | 0.245 | −11.630 | 5.762 | 0.764 |
39 | 0.924 | 2.501 | −2.845 | 0.245 | −11.630 | 2.670 | 0.986 |
40 | 0.491 | −0.036 | 0.054 | 0.143 | 0.373 | 42.400 | 0.002 |
41 | 0.964 | 3.285 | −3.679 | 0.336 | −10.956 | 16.242 | 0.041 |
42 | 0.881 | 2.001 | −2.296 | 0.205 | −11.183 | 7.747 | 0.617 |
43 | 0.928 | 2.553 | −2.902 | 0.250 | −11.630 | 7.381 | 0.583 |
44 | 0.964 | 3.285 | −3.679 | 0.336 | −10.955 | 8.498 | 0.377 |
45 | 0.827 | 1.563 | −1.804 | 0.180 | −10.011 | 12.522 | 0.227 |
46 | 0.942 | 2.792 | −3.158 | 0.274 | −11.537 | 8.256 | 0.451 |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2023 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Tempestini, G.; Rovira, E.; Pyke, A.; Di Nocera, F. The Cybersecurity Awareness INventory (CAIN): Early Phases of Development of a Tool for Assessing Cybersecurity Knowledge Based on the ISO/IEC 27032. J. Cybersecur. Priv. 2023, 3, 61-75. https://doi.org/10.3390/jcp3010005
Tempestini G, Rovira E, Pyke A, Di Nocera F. The Cybersecurity Awareness INventory (CAIN): Early Phases of Development of a Tool for Assessing Cybersecurity Knowledge Based on the ISO/IEC 27032. Journal of Cybersecurity and Privacy. 2023; 3(1):61-75. https://doi.org/10.3390/jcp3010005
Chicago/Turabian StyleTempestini, Giorgia, Ericka Rovira, Aryn Pyke, and Francesco Di Nocera. 2023. "The Cybersecurity Awareness INventory (CAIN): Early Phases of Development of a Tool for Assessing Cybersecurity Knowledge Based on the ISO/IEC 27032" Journal of Cybersecurity and Privacy 3, no. 1: 61-75. https://doi.org/10.3390/jcp3010005
APA StyleTempestini, G., Rovira, E., Pyke, A., & Di Nocera, F. (2023). The Cybersecurity Awareness INventory (CAIN): Early Phases of Development of a Tool for Assessing Cybersecurity Knowledge Based on the ISO/IEC 27032. Journal of Cybersecurity and Privacy, 3(1), 61-75. https://doi.org/10.3390/jcp3010005