The Big Five Personality Traits Have a Significant Direct Influence on Cybersecurity Compliance.

This article explores how individual psychological factors and perceptions interact to
shape employees’ attitudes toward cybersecurity compliance in organizational settings. The study
reveals that the Big Five personality traits have a significant direct influence on cybersecurity
compliance, with perceived security risks serving as a facilitator, highlighting the need for
personal cybersecurity training programs.


Relation/Connection to Social Science Principles
The article deeply integrates principles from psychology and behavioral sciences, two
core pillars of the social sciences. It shows the differences within individuals, highlighting how
traits such as conscientiousness and neuroticism influence defense behavior. It also connects to
organizational and social norms, linked to agreeableness. Illustrating how a person’s interactions
in a computing environment, such as perceived security risks, shape their response to security
threats. The study aligns with commitment and consistency, in which individuals’ behaviors
align with their traits and attitudes, expressing their commitment to security policy, and
compliance attitudes reflect individuals’ tendency towards rules and guidelines.


Research Question
How do perceived security risks and Big Five personality traits influence cybersecurity
behaviors, and what mediating roles do these factors play?
Hypothesis / Independent / Dependent Variable
The Big Five personality traits have a significant influence on cybersecurity behavior.
The Big Five personality traits have a substantial impact on cybersecurity compliance attitudes.
Cybersecurity behavior significantly mediates the relationship between Big Five personality
traits and cybersecurity compliance attitude. Perceived security and privacy risk significantly

moderate the relationship between Big Five personality traits and cybersecurity behavior.
Perceived security and privacy risk significantly moderate the relationship between cybersecurity
behavior traits and cybersecurity compliance attitude. Independent Variable: Perceived security
risks and Big Five personality traits. Dependent Variable: Cybersecurity compliance attitude.
(Ghaleb, M. M. S., & Sattarov, D., 2025).


Research Methods
The study employed a quantitative research method. Two hundred fifty-nine employees
across various organizations, exposed to cybersecurity policies, digital communication platforms,
and information systems, participated; cybersecurity behavior was measured by focusing on
preventive and protective security actions. Researchers evaluated Cybersecurity compliance
attitude through alignment and willingness to adhere to security protocols. Perceived security
and privacy risks were captured by emphasizing the cognitive evaluation of potential security
threats and their implications. The data were analyzed using Stata software in a two-step manner.
The validity and reliability of the model were assessed using a confirmatory factor analysis
(CFA), and the structural model was evaluated to test the direct, indirect, and interaction effects
of the hypothesized relationships (Ghaleb, M. M. S., & Sattarov, D., 2025, p. 38).

Data Analysis
The authors used structural equation modeling (SEM) with STATA to analyze the direct
and indirect associations between personality attributes, cybersecurity behavior, perceived risk,
and compliance attitudes. (Ghaleb, M. M. S., & Sattarov, D., 2025, p.27).

Connections to other Course Concepts
This study reinforces and delves deeper into course concepts from the PowerPoint
modules on Applying Psychological Principles of Cyber Offending, Victimization, and

Professionals, particularly the slide on “Personality theories,” discussing how personal
psychological traits (Big Five Personality Traits) contribute to behavior. It also ties to
“Psychology Experiments,” which is considered the Gold standard in research design, one of the
most rigorous forms of research.


Connections to the Concerns or Contributions of Marginalized Groups
The study doesn’t specify a marginalized group. Researchers found that individuals’
personality traits shape cognitive processing, risk perception, and decision-making.
Conscientious individuals who are equally hardworking and law-abiding are more likely to adhere to security protocols. At the same time, those who are open-minded tend to investigate
more and are thus more prone to novel cyberattacks. (Ghaleb, M. M. S., & Sattarov, D., 2025,
p.30).


In conclusion, this research assessed how psychological factors in cybersecurity impact
digital safety, showing that the Big Five personality traits influence the willingness to adhere to
security protocols and practice online safety. Implementing an approach that combines
psychology with cybersecurity to encourage security compliance within an organization can
create fewer vulnerabilities and promote cybersecurity hygiene.


Reference
Ghaleb, M. M. S., & Sattarov, D. (2025). Perceived Security Risks and Cybersecurity
Compliance Attitude: Role of Personality Traits and Cybersecurity Behavior. International
Journal of Cyber Criminology, vol 19 (1).
Article link: https://cybercrimejournal.com/menuscript/index.php/cybercrimejournal/article/view/438/124

Leave a Reply

Your email address will not be published. Required fields are marked *