{"id":138,"date":"2026-04-27T21:35:41","date_gmt":"2026-04-27T21:35:41","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/ramankpaul\/?page_id=138"},"modified":"2026-04-27T22:40:18","modified_gmt":"2026-04-27T22:40:18","slug":"career-paper","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/ramankpaul\/cyse-201s-course-tab\/career-paper\/","title":{"rendered":"Career Paper"},"content":{"rendered":"\n<div class=\"wp-block-cover alignwide has-custom-content-position is-position-top-center\"><span aria-hidden=\"true\" class=\"wp-block-cover__background has-background-dim\"><\/span><div class=\"wp-block-cover__inner-container is-layout-flow wp-block-cover-is-layout-flow\">\n<div class=\"wp-block-group alignwide is-vertical is-layout-flex wp-container-core-group-layout-1 wp-block-group-is-layout-flex\">\n<figure class=\"wp-block-pullquote has-small-font-size\"><blockquote><p><strong>Article Review 2, Perceived Security Risks and Cybersecurity Compliance Attitude:<br>Role of Personality Traits and Cybersecurity Behavior<br>Student Name: Raman Paul<br>School of Cybersecurity, Old Dominion University<br>CYSE 201S Cybersecurity and the Social Sciences<br>Instructor Name: Diwakar Yalpi<br>Date: April 5, 2026<\/strong><\/p><\/blockquote><\/figure>\n\n\n\n<p class=\"has-regular-font-size\"><br><strong>Introduction<br><\/strong>This review digs into &#8220;Perceived Security Risks and Cybersecurity Compliance Attitude:<br>Role of Personality Traits and Cybersecurity Behavior&#8221; by Ghaleb and Sattarov, published in the<br>International Journal of Cyber Criminology, Volume 19, Issue 1. The main idea here is pretty clear,<br>who you are (your makeup across the Big Five personality traits) really shapes whether you will<br>follow cybersecurity rules at work. But it is not just about personality, but perceived security risk<br>and actual security behavior both play big roles in this equation. That matters a lot because it shifts<br>the focus in cybersecurity. Instead of just patching technical holes, we have to look at why people<br>do or do not play by the rules in the first place (Ghaleb and Sattarov 27).<br><br><strong>Connection to Social Science Principles<br><\/strong>Now, thinking about social science principles, the article stands out for a few reasons. First,<br>it is all about empiricism. Ghaleb and Sattarov did not just guess or rely on stories; they got hard<br>numbers from 259 employees and ran stats to prove their points. That is the kind of evidence social<br>science thrives on.<br><br>Determinism is key, too. The researchers&#8217; figure compliance is not random personality,<br>behavior, and risk perceptions are real drivers. They are basically saying people&#8217;s security behavior<br>follows patterns you can study, not just wild guesses.<br><br>Then there&#8217;s relativism. Not everyone sees a security threat the same way, and those<br>differences matter for compliance. That is pretty obvious if you have worked in any organization,<br>some people worry about risks while others shrug them off. The study also makes sure to stay<br>objective, using tested scales rather than homemade ones that might skew results. And, honestly,<br>the article embraces skepticism, it does not take the easy road of blaming &#8220;just tech&#8221; or &#8220;just<br>awareness.&#8221; There is more going on underneath.<br><br><strong>Research Question<br><\/strong>So, what is the research question? It is straightforward, do the Big Five personality traits<br>affect employees&#8217; attitudes toward cybersecurity compliance, and how do perceived risks and<br>behaviors play into that? The authors hypothesize these traits (agreeableness, conscientiousness,<br>extraversion, neuroticism, openness) directly shape compliance attitudes. Security behavior<br>mediates that relationship, while perceived risk tweaks how strong the personality effect is (Ghaleb<br>and Sattarov 30).<br><br>In terms of variables, the Big Five traits are the independent variables. The dependent<br>variable is the compliance attitude, meaning whether employees follow security protocols or not.<br>Security behavior is the bridge (mediator), while perceived risk is the knob that changes how much<br>personality matters (moderator). That makes for a pretty sophisticated setup.<br><br><strong>Types of Research Methods Used<br><\/strong>The researchers went with a quantitative approach. They used structured surveys built from<br>trusted, previously validated scales. Surveys work well here; they are quick, standardized, and<br>make comparisons easy. The study is not experimental, nothing was manipulated, just measured.<br>So we are dealing with real-world personality and risk perceptions, not anything cooked up in a<br>lab.<br><br><strong>Types of Data and Analysis Done<br><\/strong>When it comes to data analysis, Structural Equation Modeling (SEM) is center stage, done<br>with STATA software. SEM is powerful; it lets you look at multiple relationships all at once, like<br>direct personality effects, mediation via behavior, and moderation through risk. That is exactly<br>what this study needs. The use of standardized scales probably means the authors checked<br>reliability in ways researchers always do, like calculating Cronbach&#8217;s alpha (Ghaleb and Sattarov<br>35).<br><br><strong>Connections to Course Concepts<br><\/strong>Looking back at what we have studied this semester, the article ties closely to Protection<br>Motivation Theory (PMT). PMT says people react to threats realistically when they believe the<br>risk is real, and they know their actions can help. In this study, perceived risk works as a moderator,<br>and people who take threats seriously are more likely to let their personality impact their<br>compliance.<br><br>Social Learning Theory comes into play here. In the workplace, your behavior isn&#8217;t just<br>about your own personality, it really depends on your surroundings. Workers who are more<br>conscientious or agreeable might start following safe habits just by watching others, or sometimes<br>they just don\u2019t want to stand out by breaking the rules. And there\u2019s a deterrence to consider. The<br>threat of getting caught or facing consequences pushes people to comply, right along with how<br>risky they think the situation is.<br><br><strong>Connections to the Concerns<br><\/strong>The article doesn\u2019t highlight the marginalized communities directly, but the implications<br>are there. Employees in lower pay jobs usually do not get much security training. For them,<br>compliance rests more on personality than knowledge, which really is not fair. Besides that, risk<br>perceptions and willingness to trust rules often vary across racial, ethnic, and socioeconomic lines,<br>rooted in history with discrimination or oversight. If risk shapes compliance, but marginalized<br>groups perceive risk differently, the study misses something by leaving out those demographic<br>layers. Adding them would have made the research stronger.<br><br><strong>Conclusion<\/strong><br>Coming to a close, Ghaleb and Sattarov&#8217;s study gives cybersecurity research a real boost.<br>It shows that personality drives compliance, but perceived risk and security behavior matter, too.<br>That means organizations must look beyond technical fixes; they should factor in the psychology<br>of their teams when planning security measures. As cyber threats keep growing, understanding<br>what makes people vulnerable or strong is crucial. This study recommends personalized training<br>and smart hiring, tuned to individual differences. In the end, the message is clear, cybersecurity is<br>a people problem just as much as a tech problem, and the tools we need come from social science<br>as much as IT.<br><br><strong>Reference<br><\/strong>Ghaleb, M. M. S., &amp; Sattarov, A. (2025). Perceived security risks and cybersecurity compliance<br>attitude: Role of personality traits and cybersecurity behavior. International Journal of<br>Cyber Criminology, 19(1), 27\u201353.<br>Article Link:<br>https:\/\/cybercrimejournal.com\/menuscript\/index.php\/cybercrimejournal\/article\/view\/438\/124<\/p>\n<\/div>\n\n\n\n<p><\/p>\n\n\n\n<p class=\"has-regular-font-size\"><a href=\"https:\/\/olddominion-my.sharepoint.com\/:b:\/r\/personal\/rpaul008_odu_edu\/Documents\/presentation\/Raman%20Paul%20Career%20Paper.pdf?csf=1&amp;web=1&amp;e=aVCgnU\">https:\/\/olddominion-my.sharepoint.com\/:b:\/r\/personal\/rpaul008_odu_edu\/Documents\/presentation\/Raman%20Paul%20Career%20Paper.pdf?csf=1&amp;web=1&amp;e=aVCgnU<\/a><\/p>\n<\/div><\/div>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":31289,"featured_media":0,"parent":126,"menu_order":3,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/ramankpaul\/wp-json\/wp\/v2\/pages\/138"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/ramankpaul\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/ramankpaul\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/ramankpaul\/wp-json\/wp\/v2\/users\/31289"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/ramankpaul\/wp-json\/wp\/v2\/comments?post=138"}],"version-history":[{"count":5,"href":"https:\/\/sites.wp.odu.edu\/ramankpaul\/wp-json\/wp\/v2\/pages\/138\/revisions"}],"predecessor-version":[{"id":178,"href":"https:\/\/sites.wp.odu.edu\/ramankpaul\/wp-json\/wp\/v2\/pages\/138\/revisions\/178"}],"up":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/ramankpaul\/wp-json\/wp\/v2\/pages\/126"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/ramankpaul\/wp-json\/wp\/v2\/media?parent=138"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}