{"id":402,"date":"2025-11-30T00:25:14","date_gmt":"2025-11-30T00:25:14","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/ayomideadewaleadebowale\/?p=402"},"modified":"2025-11-30T00:25:14","modified_gmt":"2025-11-30T00:25:14","slug":"the-big-five-personality-traits-have-a-significant-direct-influence-on-cybersecurity-compliance","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/ayomideadewaleadebowale\/2025\/11\/30\/the-big-five-personality-traits-have-a-significant-direct-influence-on-cybersecurity-compliance\/","title":{"rendered":"The Big Five Personality Traits Have a Significant Direct Influence on Cybersecurity Compliance."},"content":{"rendered":"\n<p style=\"font-size:14px\">This article explores how individual psychological factors and perceptions interact to<br>shape employees&#8217; attitudes toward cybersecurity compliance in organizational settings. The study<br>reveals that the Big Five personality traits have a significant direct influence on cybersecurity<br>compliance, with perceived security risks serving as a facilitator, highlighting the need for<br>personal cybersecurity training programs.<\/p>\n\n\n\n<p style=\"font-size:14px\"><br><strong>Relation\/Connection to Social Science Principles<\/strong><br>The article deeply integrates principles from psychology and behavioral sciences, two<br>core pillars of the social sciences. It shows the differences within individuals, highlighting how<br>traits such as conscientiousness and neuroticism influence defense behavior. It also connects to<br>organizational and social norms, linked to agreeableness. Illustrating how a person&#8217;s interactions<br>in a computing environment, such as perceived security risks, shape their response to security<br>threats. The study aligns with commitment and consistency, in which individuals&#8217; behaviors<br>align with their traits and attitudes, expressing their commitment to security policy, and<br>compliance attitudes reflect individuals&#8217; tendency towards rules and guidelines.<\/p>\n\n\n\n<p style=\"font-size:14px\"><br><strong>Research Question<\/strong><br>How do perceived security risks and Big Five personality traits influence cybersecurity<br>behaviors, and what mediating roles do these factors play?<br>Hypothesis \/ Independent \/ Dependent Variable<br>The Big Five personality traits have a significant influence on cybersecurity behavior.<br>The Big Five personality traits have a substantial impact on cybersecurity compliance attitudes.<br>Cybersecurity behavior significantly mediates the relationship between Big Five personality<br>traits and cybersecurity compliance attitude. Perceived security and privacy risk significantly<\/p>\n\n\n\n<p style=\"font-size:14px\">moderate the relationship between Big Five personality traits and cybersecurity behavior.<br>Perceived security and privacy risk significantly moderate the relationship between cybersecurity<br>behavior traits and cybersecurity compliance attitude. Independent Variable: Perceived security<br>risks and Big Five personality traits. Dependent Variable: Cybersecurity compliance attitude.<br>(Ghaleb, M. M. S., &amp; Sattarov, D., 2025).<\/p>\n\n\n\n<p style=\"font-size:14px\"><br><strong>Research Methods<\/strong><br>The study employed a quantitative research method. Two hundred fifty-nine employees<br>across various organizations, exposed to cybersecurity policies, digital communication platforms,<br>and information systems, participated; cybersecurity behavior was measured by focusing on<br>preventive and protective security actions. Researchers evaluated Cybersecurity compliance<br>attitude through alignment and willingness to adhere to security protocols. Perceived security<br>and privacy risks were captured by emphasizing the cognitive evaluation of potential security<br>threats and their implications. The data were analyzed using Stata software in a two-step manner.<br>The validity and reliability of the model were assessed using a confirmatory factor analysis<br>(CFA), and the structural model was evaluated to test the direct, indirect, and interaction effects<br>of the hypothesized relationships (Ghaleb, M. M. S., &amp; Sattarov, D., 2025, p. 38).<\/p>\n\n\n\n<p style=\"font-size:14px\"><strong>Data Analysis<\/strong><br>The authors used structural equation modeling (SEM) with STATA to analyze the direct<br>and indirect associations between personality attributes, cybersecurity behavior, perceived risk,<br>and compliance attitudes. (Ghaleb, M. M. S., &amp; Sattarov, D., 2025, p.27).<\/p>\n\n\n\n<p style=\"font-size:14px\"><strong>Connections to other Course Concepts<\/strong><br>This study reinforces and delves deeper into course concepts from the PowerPoint<br>modules on Applying Psychological Principles of Cyber Offending, Victimization, and<\/p>\n\n\n\n<p style=\"font-size:14px\">Professionals, particularly the slide on &#8220;Personality theories,&#8221; discussing how personal<br>psychological traits (Big Five Personality Traits) contribute to behavior. It also ties to<br>&#8220;Psychology Experiments,&#8221; which is considered the Gold standard in research design, one of the<br>most rigorous forms of research.<\/p>\n\n\n\n<p style=\"font-size:14px\"><br><strong>Connections to the Concerns or Contributions of Marginalized Groups<\/strong><br>The study doesn&#8217;t specify a marginalized group. Researchers found that individuals&#8217;<br>personality traits shape cognitive processing, risk perception, and decision-making.<br>Conscientious individuals who are equally hardworking and law-abiding are more likely to adhere to security protocols. At the same time, those who are open-minded tend to investigate<br>more and are thus more prone to novel cyberattacks. (Ghaleb, M. M. S., &amp; Sattarov, D., 2025,<br>p.30).<\/p>\n\n\n\n<p style=\"font-size:14px\"><br><strong>In conclusion<\/strong>, this research assessed how psychological factors in cybersecurity impact<br>digital safety, showing that the Big Five personality traits influence the willingness to adhere to<br>security protocols and practice online safety. Implementing an approach that combines<br>psychology with cybersecurity to encourage security compliance within an organization can<br>create fewer vulnerabilities and promote cybersecurity hygiene.<\/p>\n\n\n\n<p><br><strong>Reference<\/strong><br>Ghaleb, M. M. S., &amp; Sattarov, D. (2025). Perceived Security Risks and Cybersecurity<br>Compliance Attitude: Role of Personality Traits and Cybersecurity Behavior. International<br>Journal of Cyber Criminology, vol 19 (1).<br>Article link: https:\/\/cybercrimejournal.com\/menuscript\/index.php\/cybercrimejournal\/article\/view\/438\/124<\/p>\n","protected":false},"excerpt":{"rendered":"<p>This article explores how individual psychological factors and perceptions interact toshape employees&#8217; attitudes toward cybersecurity compliance in organizational settings. The studyreveals that the Big Five personality traits have a significant direct influence on cybersecuritycompliance, with perceived security risks serving as a facilitator, highlighting the need forpersonal cybersecurity training programs. Relation\/Connection to Social Science PrinciplesThe article &hellip; <a href=\"https:\/\/sites.wp.odu.edu\/ayomideadewaleadebowale\/2025\/11\/30\/the-big-five-personality-traits-have-a-significant-direct-influence-on-cybersecurity-compliance\/\" class=\"more-link\">Continue reading <span class=\"screen-reader-text\">The Big Five Personality Traits Have a Significant Direct Influence on Cybersecurity Compliance.<\/span> <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":31393,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/ayomideadewaleadebowale\/wp-json\/wp\/v2\/posts\/402"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/ayomideadewaleadebowale\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/ayomideadewaleadebowale\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/ayomideadewaleadebowale\/wp-json\/wp\/v2\/users\/31393"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/ayomideadewaleadebowale\/wp-json\/wp\/v2\/comments?post=402"}],"version-history":[{"count":5,"href":"https:\/\/sites.wp.odu.edu\/ayomideadewaleadebowale\/wp-json\/wp\/v2\/posts\/402\/revisions"}],"predecessor-version":[{"id":407,"href":"https:\/\/sites.wp.odu.edu\/ayomideadewaleadebowale\/wp-json\/wp\/v2\/posts\/402\/revisions\/407"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/ayomideadewaleadebowale\/wp-json\/wp\/v2\/media?parent=402"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/ayomideadewaleadebowale\/wp-json\/wp\/v2\/categories?post=402"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/ayomideadewaleadebowale\/wp-json\/wp\/v2\/tags?post=402"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}