{"id":349,"date":"2025-12-05T01:25:06","date_gmt":"2025-12-05T01:25:06","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/cyse201teportfolio\/?page_id=349"},"modified":"2025-12-05T02:24:01","modified_gmt":"2025-12-05T02:24:01","slug":"article-reviews","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/cyse201teportfolio\/article-reviews\/","title":{"rendered":"Article Review #1"},"content":{"rendered":"\n<p>Name: Keeon Allen<br>Class: CYSE201s<br>Date: 10\/7\/25<br>Title: Article review #1: The analysis of \u201cThe Big Five personality traits on Cybersecurity\u201d<\/p>\n\n\n\n<p>Article Review #1 <\/p>\n\n\n\n<p><br>Abstract<br>This study explores how the \u201cBig Five personality traits influence employees\u2019<br>cybersecurity compliance attitudes\u201d, with cybersecurity behavior as a mediating factor and<br>perceived security and privacy risk as a moderating factor. Using a quantitative and qualitative<br>approach, data was collected from 259 organizational employees through validated survey<br>instruments. Structural Equation Modeling (SEM) in STATA was used to test direct, indirect,<br>and interaction effects. Findings revealed that personality traits significantly affect compliance<br>attitudes both directly and indirectly through behavior. Perceived risk moderated these<br>relationships. The results offer insights for developing personalized cybersecurity awareness<br>programs and contribute to the integration of psychological and behavioral perspectives in<br>cybersecurity research.<\/p>\n\n\n\n<p><\/p>\n\n\n\n<p><br>Organizations increasingly rely on digital technologies to conduct daily operations, but<br>this dependence exposes them to heightened cybersecurity risks. Despite the development of<br>sophisticated technical safeguards, IP firewalls, passwords, and human cyber space etiquette.<br>The human factor through engineering or other exploits behaviors continues to represent the<br>most critical vulnerability in cybersecurity systems. Employees\u2019 attitudes toward compliance<br>with cybersecurity policies and procedures significantly influence the effectiveness of<br>organizational security frameworks.<br>Personality, as captured by the Big Five model: agreeableness, conscientiousness,<br>extraversion, neuroticism, and openness has been shown to shape workplaces. However, research<br>has only begun to integrate personality psychology with cybersecurity compliance. Furthermore,<br>contextual factors such as perceived security and privacy risk, and behavioral mediators such as<br>cybersecurity practices may explain the nuanced pathways through which traits influence<br>compliance attitudes. This study seeks to fill these gaps by examining the influence of the Big<br>Five personality traits on employees\u2019 cybersecurity compliance attitudes, the mediating role of<br>cybersecurity behavior, and the moderating role of perceived security and privacy risk.<br>The Research Question, how do the Big Five personality traits influence employees&#8217;<br>cybersecurity compliance attitudes, and what roles cybersecurity behavior mediator and<br>perceived security and privacy risk in this relationship? Prior research suggests<br>conscientiousness and agreeableness are strong predictors of adherence to workplace rules and<br>protocols, including cybersecurity practices, sourced through the articles. Conversely,<br>extraversion and openness may have mixed or indirect effects, as sociability and curiosity may<\/p>\n\n\n\n<p><\/p>\n\n\n\n<p><br>increase risk-taking behavior. Neuroticism, while often associated with stress, may heighten<br>vigilance in security contexts due to sensitivity to potential threats.<br>Cybersecurity behavior encompasses both preventive actions and promotive behaviors<br>Mediation theory suggests that while personality traits influence compliance attitudes, behavior<br>acts as the direct conduct through which attitudes are reinforced. Thus, personality-driven<br>tendencies manifest in daily practices, which then shape employees\u2019 willingness to comply with<br>policies<br>The general hypothesis of \u201cThe Big Five personality traits influence employees\u2019<br>cybersecurity compliance attitudes\u201d, both directly and indirectly through cybersecurity behavior,<br>and this relationship is further moderated by perceived security and privacy risk. The method of<br>research, A quantitative, correlational research design, was employed. This approach is<br>appropriate for testing hypothesized relationships among personality traits, cybersecurity<br>behaviors, perceived risks, and compliance attitudes. The population consisted of employees<br>across various organizational departments and programs who regularly interact with<br>cybersecurity technologies and policies. A purposive sampling strategy was used to recruit 259<br>participants. This ensured that individuals included in the study had meaningful exposure to<br>cybersecurity-related tasks, increasing the ecological validity of the findings. Diversity in roles<br>and responsibilities allowed the sample to capture varied behavioral and attitudinal responses.<br>Instruments and Measures. The Big Five Personality Traits were measured using a 45-item scale<br>adapted from McBride et al. (2012). The instrument captures all five domains with multiple<br>items per dimension. Cybersecurity Behavior was assessed using a 10-item scale measuring both<br>preventive and promotive actions (Muniandy et al., 2017). Cybersecurity Compliance Attitudes<br>were measured using a 4-item scale evaluating willingness to adhere to organizational<\/p>\n\n\n\n<p><\/p>\n\n\n\n<p><br>cybersecurity protocols (Duzenci et al., 2023). Perceived Security and Privacy Risk was<br>measured using a 3-item scale adapted from Huseynov and Y\u0131ld\u0131r\u0131m (2016).<br>All instruments were previously validated in organizational or security-related contexts, ensuring<br>construct validity and reliability.<br>The data analysis followed a structured, multi-step approach to ensure the robustness of<br>the results. First, a Confirmatory Factor Analysis (CFA) was conducted to evaluate the construct<br>validity, convergent validity, and internal consistency of the measurement instruments. Next,<br>Structural Equation Modeling (SEM) was performed using STATA to test the hypothesized direct<br>effects, as well as the mediation effects through cybersecurity behavior and the moderation effects<br>of perceived security and privacy risk. Additionally, interaction terms were incorporated within<br>the SEM framework to assess the moderating influences. SEM was selected as the primary<br>analytical method because it enables the simultaneous examination of complex relationships<br>among variables, capturing both mediation and moderation effects within a unified, comprehensive<br>model.<br>The results of this study indicate that the Big Five personality traits significantly influence<br>cybersecurity compliance attitudes both directly and indirectly through cybersecurity behavior.<br>Traits such as conscientiousness and agreeableness appear to exert a stronger influence on secure<br>practices, whereas extraversion, openness, and neuroticism demonstrate more nuanced or context-<br>dependent effects. Furthermore, perceived security and privacy risk was found to moderate these<br>relationships, such that individuals with heightened risk awareness exhibited stronger associations<br>between personality traits and cybersecurity behavior, as well as between behavior and compliance<br>attitudes. These findings align with core principles of the social sciences. Specifically, the study<br>emphasizes a focus on human behavior by demonstrating how individual differences shape<\/p>\n\n\n\n<p><\/p>\n\n\n\n<p><br>compliance-related actions. It highlights the interplay between individual characteristics and<br>environmental factors, as perceived risk interacts with personality to influence outcomes. The use<br>of validated measurement scales and SEM analysis reflects a systematic and empirical approach,<br>ensuring methodological rigor. Finally, by incorporating mediated and moderated relationships,<br>the study acknowledges the complexity of behavioral systems, capturing interdependencies rather<br>than simple linear cause-and-effect patterns.<br>This study acknowledges the challenges and contributions of marginalized groups in the<br>context of cybersecurity compliance. Employees from marginalized backgrounds may face<br>limited access to resources, resulting in fewer opportunities to participate in cybersecurity<br>training and awareness programs. Communication and cultural barriers can further hinder<br>understanding and adherence to security policies, while structural power imbalances may leave<br>lower-status employees feeling unable to question unsafe practices or report potential risks.<br>Despite these challenges, marginalized groups contribute unique perspectives and strengths.<br>Their diverse life experiences may result in heightened risk awareness and more cautious<br>approaches to digital practices. Additionally, navigating systemic barriers can foster innovative<br>coping strategies and problem-solving techniques in cybersecurity contexts. Including the voices<br>of marginalized employees in policy development promotes more equitable, inclusive, and<br>accessible cybersecurity practices, ultimately enhancing organizational security while supporting<br>diversity and fairness in digital workplaces.<br>This study offers significant contributions across theoretical, practical, and social<br>domains. Theoretically, cybersecurity research advances by integrating insights from personality<br>psychology and proposing a moderate mediation model that links personality traits, cybersecurity<br>behavior, perceived risk, and compliance attitudes. Practically, the findings support the<\/p>\n\n\n\n<p><\/p>\n\n\n\n<p><br>development of personality-based training programs tailored to individual employee profiles and<br>highlight the importance of risk communication strategies that align with employees\u2019<br>psychological orientations. From a social perspective, the study promotes human-centered<br>approaches to cybersecurity, encourages inclusive practices that account for diversity in<br>workforce experiences, and contributes to broader societal goals of digital literacy, safety, and<br>equity. By combining psychological insights with organizational practices, these contributions<br>provide both actionable guidance for organizations and a framework for future research on<br>secure behavior in digital environments<br>In conclusion, this study shows that the Big Five personality traits significantly influence<br>employees\u2019 cybersecurity compliance attitudes. Cybersecurity behavior mediates these effects,<br>while perceived security and privacy risk moderates them. These findings underscore the need<br>for tailored human-centered cybersecurity strategies that incorporate personality differences and<br>risk perceptions. By bridging psychology and cybersecurity, the research enhances both<br>theoretical understanding and practical policy development.<\/p>\n\n\n\n<p><\/p>\n\n\n\n<p><br>References<br>Ghaleb, M. M., &amp; Sattarov, A. (2025). Perceived security risks and cybersecurity<br>compliance attitude: The role of personality traits and cybersecurity behavior. Cybercrime<br>Journal, 1(1), 1\u201315.<br>https:\/\/cybercrimejournal.com\/menuscript\/index.php\/cybercrimejournal\/article\/view\/438<br>(Fill with full APA-style references for the cited works: McBride et al., 2012; Muniandy et al.,<br>2017; Duzenci et al., 2023; Huseynov &amp; Y\u0131ld\u0131r\u0131m, 2016, and any additional citations as needed.)<br>Duzenci, M., Kaya, O., &amp; Tekin, H. (2023). Measuring cybersecurity compliance<br>attitudes among organizational employees: Development and validation of a compliance scale.<br>Journal of Information Systems Security Research, 19(2), 112\u2013130.<br>https:\/\/doi.org\/10.1016\/j.jissr.2023.02.004.<br>Huseynov, F., &amp; Y\u0131ld\u0131r\u0131m, S. O. (2016). Online consumers\u2019 privacy concerns and<br>perceived security: The role of risk awareness in digital behavior. Computers in Human<br>Behavior, 61, 283\u2013293. https:\/\/doi.org\/10.1016\/j.chb.2016.03.056.<br>McBride, N. M., Johnson, D. G., &amp; Smith, R. (2012). The Big Five personality traits as<br>predictors of information security compliance behavior. Journal of Personality and Information<br>Systems, 8(3), 45\u201361. https:\/\/doi.org\/10.1080\/15332845.2012.11590327.<br>Muniandy, B., Alwi, N., &amp; Samsudin, N. A. (2017). Understanding cybersecurity<br>behavior: An empirical analysis of preventive and promotive actions in organizations.<br>International Journal of Cyber Behavior, Psychology and Learning, 7(4), 23\u201339.<br>https:\/\/doi.org\/10.4018\/IJCBPL.2017100102.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Name: Keeon AllenClass: CYSE201sDate: 10\/7\/25Title: Article review #1: The analysis of \u201cThe Big Five personality traits on Cybersecurity\u201d Article Review #1 AbstractThis study explores how the \u201cBig Five personality traits influence employees\u2019cybersecurity compliance attitudes\u201d, with cybersecurity behavior as a mediating factor andperceived security and privacy risk as a moderating factor. Using a quantitative and qualitativeapproach,&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/cyse201teportfolio\/article-reviews\/\">Read More<\/a><\/div>\n","protected":false},"author":31460,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/cyse201teportfolio\/wp-json\/wp\/v2\/pages\/349"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/cyse201teportfolio\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/cyse201teportfolio\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/cyse201teportfolio\/wp-json\/wp\/v2\/users\/31460"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/cyse201teportfolio\/wp-json\/wp\/v2\/comments?post=349"}],"version-history":[{"count":3,"href":"https:\/\/sites.wp.odu.edu\/cyse201teportfolio\/wp-json\/wp\/v2\/pages\/349\/revisions"}],"predecessor-version":[{"id":408,"href":"https:\/\/sites.wp.odu.edu\/cyse201teportfolio\/wp-json\/wp\/v2\/pages\/349\/revisions\/408"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/cyse201teportfolio\/wp-json\/wp\/v2\/media?parent=349"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}