Next Article in Journal
Modeling Correlation between Android Permissions Based on Threat and Protection Level Using Exploratory Factor Plane Analysis
Next Article in Special Issue
Cybersecurity Practices for Social Media Users: A Systematic Literature Review
Previous Article in Journal
New Semi-Prime Factorization and Application in Large RSA Key Attacks
Previous Article in Special Issue
Augmented Reality and the Digital Twin: State-of-the-Art and Perspectives for Cybersecurity
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

The Effect of Countermeasure Readability on Security Intentions

1
Department of Information and Computing Sciences, Utrecht University, Princetonplein 5, 3584 CC Utrecht, The Netherlands
2
Leiden Institute of Advanced Computer Science (LIACS), Leiden University, Niels Bohrweg 1, 2333 CA Leiden, The Netherlands
3
Department of Public Health and Primary Care, Leiden University Medical Center (LUMC), Albinusdreef 2, 2333 ZA Leiden, The Netherlands
*
Author to whom correspondence should be addressed.
J. Cybersecur. Priv. 2021, 1(4), 675-703; https://doi.org/10.3390/jcp1040034
Submission received: 20 September 2021 / Revised: 15 November 2021 / Accepted: 17 November 2021 / Published: 19 November 2021
(This article belongs to the Special Issue Cyber Situational Awareness Techniques and Human Factors)

Abstract

:
Human failure is a primary contributor to successful cyber attacks. For any cybersecurity initiative, it is therefore vital to motivate individuals to implement secure behavior. Research using protection motivation theory (PMT) has given insights into what motivates people to safeguard themselves in cyberspace. Recent PMT results have highlighted the central role of the coping appraisal in the cybersecurity context. In cybersecurity, we cope with threats using countermeasures. Research has shown that countermeasure awareness is a significant antecedent to all coping appraisal elements. Yet, although awareness plays a key role within the PMT framework, it is generally challenging to influence. A factor that is easy to influence is countermeasure readability. Earlier work has shown the impact of readability on understanding and that readability metrics make measuring and improving readability simple. Therefore, our research aims to clarify the relationship between countermeasure readability and security intentions. We propose an extended theoretical framework and investigate its implications using a survey. In line with related studies, results indicate that people are more likely to have favorable security intentions if they are aware of countermeasures and are confident in their ability to implement them. Crucially, the data show that countermeasure readability influences security intentions. Our results imply that cybersecurity professionals can utilize readability metrics to assess and improve the readability of countermeasure texts, providing an actionable avenue towards influencing security intentions.

1. Introduction

Online presence is greater than ever. According to a conservative estimate, as of July 2021, there were 4.8 billion active internet users worldwide. The global internet population has grown by more than 257 million over the past year [1]. Especially since the outbreak of COVID-19, companies and public institutions were pushed to adapt their (business) strategy to a more digital one [2,3,4,5]. With that, people’s likelihood of becoming a victim of cybercrime increased.
McAfee reported worldwide losses from cybercrime in 2020 amounted to just under $1 trillion, an increase greater than 50 percent from 2018 [6]. Besides monetary loss, there are other costs like opportunity costs, system downtime, brand damage and loss of trust, and employee morale damage [6]. Therefore, it is pivotal that SMEs are aware of their risks related to data protection, privacy, and cybersecurity, and receive help in minimizing them. Available solutions are abundant, but these do not meet the needs of for instance small- and medium-sized enterprises (SMEs) that have no proficiency in information technology (IT) or resources to invest in complex and expensive applications [7,8].
Application developers often look to motivate their users to steer them towards favorable security behavior (SB). This is a response to the common proposition that humans are the weakest link in the security chain [9]. To do this, theories and findings in the field of behavioral cybersecurity should be applied. Looking at the issue from both a protection motivation theory (PMT) and the theory of planned behavior (TPB) perspective, self-efficacy is often found to be a strong predictor of security behavior [10,11].
Concisely, self-efficacy in the security context can be seen as “the feeling of being able to implement the protection methods” [12]. Hanus and Wu [10] concluded that, within PMT, self-efficacy is the strongest antecedent of security behavior. Therefore, it is imperative to (textually) formulate proposed countermeasures in such a way that self-efficacy in users of cybersecurity assessment applications is stimulated optimally.
Increasing readability could very well be a key to persuading users to implement these cybersecurity controls, as readability positively influences people’s understanding of information security policies [13,14]. Several widely used readability formulas can be applied to give feedback on the readability of countermeasures before being exposed to end-users. However, this approach currently lacks a scientific ground, as behavioral security research does not take into account the relationship between countermeasure readability and security intentions [15,16,17].
PMT provides a tried and tested framework that can be used to explain behavior in the security context [10]. This paper, therefore, aims to analyze and clarify the relationship between countermeasure readability and behavioral intention through the lens of PMT (extended by TPB) in the cybersecurity context. This work seeks to provide an answer to the following question: how does the readability of cybersecurity countermeasures influence security intentions? In answering this research question, we contribute an extension to the PMT framework. Additionally, by quantifying the impact of countermeasure readability, we open up an actionable path towards positively influencing security intentions.
Answering the main research question involves building up a theoretical framework from relevant findings in the literature (Section 2), which then serves as a foundation for the conceptual framework presented in Section 3. Based on these sections, Section 4 discusses the developed research methodology. Section 5 describes our analysis and its results. The results are followed by an elaboration of the findings in the discussion in Section 6, giving a display of interpretations, implications, limitations, and recommendations for future work. We conclude our paper in Section 7, providing a summary of our research.

2. Theoretical Background

Self-efficacy (SE) is defined as “beliefs in one’s capabilities to mobilize the motivation, cognitive resources, and courses of action needed to meet given situational demands” [18]. Self-efficacy has been argued as the most focal or pervasive mechanism of human agency which motivates and regulates individual behavior [19].
When people have a high level of SE, they have a stronger internal conviction about their ability to mobilize the motivation, cognitive resources, and courses of action needed to successfully execute the task at hand [20]. It influences the amount of effort, self-regulation, and the initiation and persistence of coping efforts when facing obstacles (relating to the task at hand) [21].
Determinants of SE are performance accomplishments, vicarious experiences, verbal persuasion, and physiological feedback. Performance accomplishments are the most important factor in SE and refer to experiences of executing similar behaviors or tasks. If a person performed well previously in a similar task, they are more likely to feel confident about the current task.
Vicarious experience refers to derived confidence from other people (that one can relate to) carrying out a task. If one sees a peer failing at a task, this negatively affects his/her SE. Verbal persuasion describes encouragement or discouragement to one’s performance or capability to perform a task. The effect of this factor is dependent on the credibility of the one persuading.
Lastly, physiological feedback refers to sensations from a person’s body and how this is interpreted by that person. For instance, one could sense a tension in the stomach after realizing that their operating system is prone to security breaches due to a lack of updates. Interpreted as anxiety, this will negatively impact SE. Conversely, when this is interpreted as excitement, the person’s SE will be increased in the task at hand [22]. The task being updating the system with the latest security patches.
The concept of SE is an important construct in several theories on human behavior and motivation; examples being protection motivation theory (PMT) [23], self-efficacy theory of motivation [21], self-determination theory [24], and health belief model (HBM) [25]. Studies applying HBM and PMT to the security context, have pointed out that SE is a strong determinant of computer SB [26,27] and desktop SB [10], respectively. Other studies showed a significant relationship between SE and intention to information system security policy compliance [11] and intention for compliant SB [28].
The three domains, computer SB, desktop SB, and information system security policy compliance, can be paralleled to the more general idea of users’ integration of cybersecurity controls into their SB. Bauer and Bernroider [28] showed that in this general sense, SE had a significant effect on user intentions for compliant SB. The next subsection will elaborate on these theories applied to this context and what role SE plays in them.

2.1. Protection Motivation Theory, Theory of Planned Behavior, and Self-Efficacy

Protection motivation theory (PMT) comes from research on fear appeals, which is mainly centered around how fear-arousing communication affects behavior [23]. In brief, PMT assumes that human behavior is formed through a cost–benefit analysis where risks associated with certain behavior are held up against the costs of trying to eliminate or mitigate these risks [29].
PMT distinguishes multiple components within fear appeals. This makes it possible to determine common variables that impact attitude, which affects behavioral change [30]. These components are one’s cognitive processes and are defined by coping appraisal (perceptions of the recommended coping response to the threat in question) and threat appraisal (perceptions of how threatened one believes they are). The two components each have their antecedent (coping awareness and threat awareness, respectively) and are both split up into multiple factors.
Hanus and Wu [10], looking at the impact of users’ security awareness on desktop security behavior from a PMT perspective, adjusted the model to fit their context. That is, they translated coping awareness to countermeasure awareness (CA). Results demonstrated that there was support for their suggested model (Figure 1).
A few years prior, Ifinedo [11] saw an overlap between the theory of planned behavior (TPB) and PMT and sought to integrate these to help explain users’ compliance in information system security policy. Later, Martens et al. [12] also synthesized PMT and TPB, showing elements of TPB (mainly subjective norm) are valuable to add to PMT.
TPB is based on the premise that, when behaving in certain ways, individuals make logical, reasoned decisions by evaluating the information available to them [31]. TPB states that intention is the primary antecedent of planned behaviors. Intention is influenced by three determinants, attitude toward a behavior, subjective norm, and perceived behavioral control.
Fishbein and Ajzen [32] define subjective norm as follows: “[someone’s] perception that most people who are important to him or her think he or she should or should not perform the behavior in question”. Perceived behavioral control represents “the person’s belief as to how easy or difficult performance of the behavior is likely to be” and is based upon SE as introduced by Bandura in 1977 [22,33].

2.2. Text Readability

Richards and Schmidt [34] explain that reading is the process of perceiving a text to understand its content. Readability is what causes some texts to be easier to read than others.
There is a clear distinction with legibility, which is concerned with the visual perception of layout and typeface [35]. Dale and Chall [36] define readability as follows. “The sum total (including all the interactions) of all those elements within a given piece of printed material that affect the success a group of readers has with it. The success is the extent to which they understand it, read it at an optimal speed, and find it interesting”.
Klare [37] offers a more concise definition: “the ease of understanding or comprehension due to the style of writing”. This definition, along with others [38,39], emphasize vocabulary and sentences, noting that these are the primary sources of reading difficulty.
Research has shown that an increase in readability causes better comprehension, retention, reading speed, and perseverance [35]. However, there are antecedents to readability too. These can be divided into two dimensions, the reader and the text itself.
Text features that impact readability are content, style, design, and organization and belong to the internal dimension. On the reader’s part, prior knowledge, reading skill, interest, and motivation affect the ease of reading. Prior knowledge, interest, and motivation are related to the subject of the text, whereas reading skill captures a reader’s overall reading proficiency in the language at hand [35]. Interest and motivation can be related to a reader’s disposition or inclination to reading a certain text.

2.2.1. Measuring Text Readability

People have sought to measure the textual dimension of readability. Predicting the difficulty of texts has many useful applications and is therefore widely used in publishing, education, healthcare, and the military. Even courts accept their use in testimonies [35]. Therefore, this has been an area of research since the late nineteenth century.
A century later, over 200 readability formulas had been constructed for different languages and validated each with their study [35]. These metrics take in two or three textual features (e.g., number of words, syllables, complex words, or characters), which are negatively correlated with a text’s readability. A major advantage of these formulas is that they can be applied to a text immediately, without the need for a corpus, training of models, and expert knowledge, as would be the case if a natural language processing approach was taken [40].

2.2.2. Limitations of Readability Metrics

There are a few limitations to traditional readability metrics. Firstly, in general, they focus solely on internal features of the texts in question and ignore the familiarity (or lack thereof) that readers might have with terms (prior knowledge) [41].
Secondly, they do not take semantics into account. This means texts could have issues concerning their meaning, affecting their readability. Thirdly, these formulas presuppose people are similar in interest, motivation, maturity, reading skill, and characteristics [35,42]. Fourthly, formulas do not score textual organization and design [35].
Lastly, they are language-specific, being optimized only for one language [43]. This implies usage for other languages is not possible without tweaking and tuning them.
Fortunately, the field of natural language processing (NLP) is catching up, meaning algorithms with higher accuracy have already emerged. These can take into account as many as 70 features and can classify sentences far more precisely.
However, it should be noted that work by Dell’Orletta et al. [40] concluded that basic features, such as sentence length and word length, are still the most important in both sentence and document readability classification. Nonetheless, since traditional formulas take in basic internal features (e.g., average sentence/word length or average syllables per word), measurements become increasingly inaccurate as text length decreases.

2.2.3. Readability of Cybersecurity Countermeasures

Research into the effect of readability in the cybersecurity domain is scarce. Yet, earlier work exists and has formed an inspiration for our approach. Alkhurayyif and Weir [13] compared the eight most popular traditional readability metrics against manual human comprehension metrics in information security policies (ISPs) and demonstrated a correlation between human and computer metrics.
They pose that since “readability has an impact upon understanding ISPs, […] the application of suitably selected readability metrics may allow policy designers to evaluate their draft policies for ease of comprehension prior to policy release”. They mention that “there may be grounds for a readability compliance test that future ISPs must satisfy”. In a later paper, Alkhurayyif and Weir [14] further examine the relationship between readability and ISP understanding, concluding that readability has a clear influence. As ISPs include cybersecurity controls and cover similar material, applying readability metrics to countermeasures might be beneficial.

3. Research Model and Hypotheses

A couple of conclusions can be derived from Section 2. Firstly, PMT and TPB apply to the context of cybersecurity safeguards. Moreover, they can be synthesized.
This research takes the approach of Martens et al. [12], adding ‘subjective norm’. As with others [10,44,45,46,47,48,49], in this research, ‘attitude toward protective behavior’ is left out, meaning the predictive value of the framework on security intentions (SI) is examined directly.
Within this model, SE was shown to be a strong predictor multiple times [10,11]. SE is likely correlated with countermeasure readability (CR) since it seems evident that the extent to which one comprehends a task influences their confidence in doing what is needed to aptly cope with a cyber threat.
For response cost (RC), likewise, it seems clear that task comprehension affects one’s perception of the mental effort it takes to perform that task. Since implementing countermeasures is the coping behavior for PMT in the cybersecurity context, CR can only be conceptually linked to constructs that fall under coping appraisal.
Nevertheless, a relationship between CR and RE will not be hypothesized, as it is not evident from both literature and common sense that CR affects one’s perception of how well implementing a security control will guard them against a cyber threat. SE and RC are therefore chosen to be the points of attachment CR will have in the extended PMT framework (Figure 2). Text readability has two dimensions: the human side and the textual side. For the human side, DuBay [35] mentions four antecedents for a text’s readability. Two of these, interest and motivation, are captured by the latent construct countermeasure reading disposition (CRD). Another antecedent is prior knowledge. However, because of the strong conceptual overlap with CA, prior knowledge is not seen as a separate construct in the model, but seen as congruent with CA.
Reading skill will not be taken up in the framework since an assessment thereof is outside of the scope of this research and would make the questionnaire too long. Five readability formulas will be used to capture the internal dimension of readability.
Section 2.2.2 mentioned some drawbacks of traditional readability metrics. For instance, their language dependence. From this, it follows that this work will be done in the context of the English language only. However, for the proposed conceptual model, these drawbacks mainly imply that CR is a latent construct measured by an operationalization of perceived readability.
These conclusions lead to the conceptual framework and hypotheses of Figure 2.
Most of our conceptual framework has already been studied in earlier work. In this paper, the readability section is sought to be added to the PMT/TPB model to explain the effect of CR on SI. Hypotheses proceeding from the PMT/TPB variables will be based on the literature and therefore only be aimed to be confirmed.
Ultimately, this research aims to find a relation between CR and security intentions through SE and RC. Therefore, SI and CR are the main dependent and independent variables in the research model, respectively.
Intention is taken rather than actual behavior, as behavior is difficult to measure or observe in this research context. Fortunately, a strong and consistent relationship between the two constructs has been established before [50,51].
Our model contains multiple exogenous and endogenous variables. Table 1 provides an overview of all relationships and corresponding hypotheses along with their sources. Hypotheses H1 and H2 are deduced from work done by DuBay [35]. These hypotheses will be tested since DuBay [35] did not quantitatively demonstrate these relations.
Relationships denoted by H5 and H6 are the main focus of this study and are sought to be established. The other hypotheses are previously confirmed by the respective studies mentioned in Table 1.

4. Methodology

4.1. Questionnaire

Based on the literature discussed in previous sections, a structured questionnaire was drawn up. It started with a brief overview, including the goal of the study, what was expected of the participants in the online questionnaire, and an informed consent form.
After respondents gave consent, they were introduced with a case description. This is also known as a vignette and its usage is recommended by [53]. Participants were asked to project themselves into this hypothetical situation to minimize faulty data that could result from respondents feeling disassociated from the context. Applied to our context, this could mean that cybersecurity threats were not being felt or seen. This is included, as the application of PMT requires participants to recognize being exposed to a threat [23].
A feeling of indifference about the statements, for example, could arise otherwise, which would yield distorted data. It also provides for more alignment between the participants, concerning how they approach the questions and statements. Lastly, it straightens out possible differing associations participants may have with the statements.
In the questionnaire, participants are shown four cyber threat definitions and countermeasures against them. The selection of threats (Appendix A) and corresponding controls are based on the most common cyber threats as recognized by Cisco Systems [54].
Respondents were asked to respond to statements about both threats and controls related to all constructs found in the conceptual framework (Section 3). Statements corresponding to the constructs within PMT are based on work by Hanus and Wu [10], Martens et al. [12], and Anderson and Agarwal [55]. All statements were to be rated using a 7-point Likert scale, ranging from ‘strongly disagree’ to ‘strongly agree’ to make the questions uniform across the measured constructs. This was in line with Vagias’s [56] proposed usage of Likert scales.
What is important to highlight are the constructs SE, SI, and CR, as these are the focus of this study. SE was operationalized through two statements per countermeasure. The first is “I feel confident carrying out these countermeasures”. The statement is a derivative of Hanus and Wu’s [10] operationalization and is based on SE’s definition worked out in Section 2.1. “Carrying out these countermeasures is easy” is the second questionnaire item used for measuring SE. This one is based on the application of PMT for cybercrime in the work of Anderson and Agarwal [55], which is also used by Martens et al. [12]. Work by Liu et al. [57] could also be used to support this operationalization, as they conclude that perceived difficulty is a dimension of SE. SI was inquired through one statement per countermeasure, e.g.: “I will carry out the countermeasures against malware”.
The four cybersecurity safeguards each had two versions, one ‘hard’ version according to the five readability metrics (found in Appendix A), and likewise one ‘easy’ version. This was done to create more varied data concerning the variable CR. They were also used as a ‘sanity check’ on the variable CR, to see whether ‘hard’ texts were actually perceived as harder (see Section 5). Online tools enabled convenient and fast calculations of the readability scores [58,59].
A respondent was randomly appointed either a ‘hard’ or an ‘easy’ version. These four safeguards were then shown in random order between participants (evenly distributed), so decreased attention would not affect one safeguard that would be the last one shown each time. The questionnaire closed with two text entries, one for joining the gift card draft, the other for any comments the respondents may have had.

4.2. Participants

Participants were found using convenience and snowball sampling. Some participants were personally asked to participate, others through WhatsApp groups. A second platform used to draw participants was the Microsoft Teams channel of the bachelor’s course Information Security, taught at Utrecht University. As a reward, we included a EUR 15.00 gift card draft (i.e., a EUR 15.00 gift card was randomly allotted to one participant).
Taking PMT into the questionnaire meant the number of questions became quite high. Harrison [60] advises against a questionnaire that is too long because respondents are less likely to answer (compared to a short one) and often pay less attention. For that reason, further questions that were not essential (e.g., demographic) to this research, but would increase the questionnaire’s length, were excluded.
This gained 131 respondents after running the survey for 14 days. This number was reduced to 88 ( N = 88 ) after checking the responses’ validity using three measures.
First, the ‘red herring’ question had to be answered correctly (see Appendix A). This question asked participants to fill the gap (multiple choice) in the previously given definition of a man-in-the-middle attack, which was essential to understand since statements about it had to be responded to later.
Second, all questions needed to be answered. Third, the survey had to be completed in a credible time span (>5 min). With an average duration of 15.80 min and a standard deviation of 10.25 min ( M e d i a n = 13.04 ) when removing outliers, this duration threshold was seen as reasonable. Outliers were defined by data points with greater duration than one hour, as these subjects had most likely paused between questions (some even resumed after days, causing enormous outliers). If a record failed to meet one of these criteria, it was not taken into the results.
The total sample was composed of mostly non-native English speakers (97%). Three people reported English as their first language, 82 noted it was their second language, two called it their third language, and one respondent described English as a fourth language.
Of the 88 subjects, 77 were Dutch speakers (first language). The other 11 subjects reported having the following languages as their first tongue: 1 Arabic, 4 Indonesian, 1 Russian, 1 Swahili, and 1 Tamil. Of these 85 non-natives, 59 reported their English reading level was roughly on par with or above their reading level in their native tongue.
This implies that at least 26 out of 88 participants have an English reading level below their first language reading level. Expectedly these reported, on average, a score significantly lower ( M = 5.50 , S D = 0.91 ) on reading skill than the other 62 ( M = 6.21 , S D = 1.03 ), t ( 52.91 ) = 3.22 , p = 0.002 .
Reading skill was measured by a 7-point Likert scale (ranging from ‘strongly disagree’ to ‘strongly agree’) response to the statement “I can understand academic English texts”. Of the subjects, 61 (69%) were between 18 and 24 years old (most likely being students due to convenience and snowball sampling), 11 were between ages 25 and 34, seven were between 55 and 64, five were 65 or older, two between 45 and 54, and the remaining two respondents fell into the age groups under 18 and 35–44 years old, respectively.

4.3. Formative Measurement Model Evaluation

As this work sought to supplement PMT, the data resulting from the questionnaire had to be analyzed using a suitable method. The partial least squares structural equation modeling (PLS-SEM) method is the perfect fit for this research, as it allows for the estimation of causal systems that include latent variables that can be endogenous, exogenous, or both [61]. Moreover, Hanus and Wu [10], Ifinedo [11], and Bauer and Bernroider [28] use this method. All calculations concerning the PLS algorithms were done in R using the SEMinR package [62]. The link to the code and data used for the analysis can be found in Appendix D.
This research’s conceptual model translated into a formative measurement model in PLS-SEM. Each construct was considered a latent variable since they could not be directly measured but merely estimated by an operationalization of the concept. This operationalization resulted in manifest variables (a.k.a. indicators in SEM) that measured, or ‘formed,’ the latent constructs.
Contrary to reflective models, in formative models evaluating the internal consistency of constructs is inappropriate. Diamantopoulos [63] stresses, when “formative measurement is involved, reliability becomes an irrelevant criterion for assessing measurement quality”. Criteria, such as Cronbach’s α and composite reliability, were therefore not applicable to this research.
In a critical assessment of the usage of PLS-SEM Hair et al. [64] find inter alia that researchers do not employ and sometimes even misuse criteria for model evaluation. Considering this, this study will be attentive to their proposed guidelines, elaborated upon by Hanafiah [65].
Within PLS-SEM, there are certain recommended methods for model assessment. For formative outer models, there are three criteria to assess. First, multicollinearity, measured by the variance inflation factor (VIF). Second, the indicators’ relative contribution to their constructs, noted by their weights. Third, construct validity, estimated by the significance of weights and convergent validity.
Since formative measurement model construction should be primarily founded on theory rather than statistics [66,67], the latter two of these criteria do not have a fixed value that must be achieved. Hair et al. [64] propose important statistics concerning these criteria should at least be reported.

4.3.1. Variance Inflation Factor

Before the significance of outer weights of the measurement model could be analyzed and relationships could be interpreted, the formative measurement model had to be assessed for collinearity issues. The first step in this process was detecting collinearity; that is, looking for high correlations between two formative indicators [61].
High correlations were not expected, since PMT is well-tested and its constructs and their operationalizations (which output indicators/manifest variables) are distinct and well delineated. Moreover, operationalizations were based on other work, where they were shown to be valid [10,12,55]. Manifest variables are the basis of the measurement model and, therefore, SEM analysis as a whole. As a result, high collinearity between them would be problematic.
To assess collinearity between formative indicators, the variance inflation factor was calculated, as recommended by Ramayah et al. [68]. Hair et al. [61] state that if VIF 5 , it is likely a collinearity issue is at play. The VIF values for the manifest variables did not surpass 4.671 and averaged at 2.062, safely failing to exceed the recommended threshold.

4.3.2. Size and Significance of Indicator Weights

The original sample ( N = 88 ) was resampled using the commonly used bootstrap technique [69]. This was done to test the significance of path coefficients as well as weight significance. Following the recommendation of Hair et al. [61], the number of bootstrap subsamples was set to 5000.
Regarding indicator weights, ultimately, this process resulted in few significant weights. Only ta3, cr1, re1, ps2, se3, and sn1 were found to be significant. The affixes 1, 2, and 3 stand for malware, phishing, and MitM, respectively. The indicator weights, when significant, imply that a measured variable explains a significant share of the variance in the latent formative construct [70].
Despite the fact that many indicator weights were not significantly related to the latent construct, they were not dropped. The rationale behind this was the fact that these variables each contribute conceptually to their formative constructs. This was further substantiated by the indicators being based on both theory regarding the concepts [35] and their operationalizations [10,12,55].
Moreover, previous research [47,71] also retained the indicators with insignificant weights for the same reason. This argument was also supported by Edwards and Bagozzi [66] and Petter et al. [67], as they pose that though statistical considerations should be taken into account, conceptual reasoning has more weight in determining whether or not to leave out formative indicators. Appendix B displays a complete overview of all indicator weights.

4.3.3. Convergent Validity

An assessment of convergent validity looked at whether observed variables measuring the same construct were related [72]. For this research, the constructs CRD, CA, CR, and SE were measured using different aspects of those concepts. The other constructs measured the same aspect for the four different cyber threats.
Table 2 presents the correlations between these constructs’ indicators and Appendix A provides exact statements that were used for each of the indicators. For a complete overview of all correlation values, please consult Appendix C.
This section assessed the measurement model, which gave insight into the validity of the measured constructs and their indicators. The formative measurement model that was put forth was found to be adequately valid, mainly due to theoretical grounds.

5. Results

5.1. Comparing Perceived Readability to Readability Metric Scores

For perceived readability, two operationalizations were used, “This text is easy to read” and “This text is easy to understand”. An independent-samples t-test was conducted to compare the readability between ‘hard’ (n = 180) and ‘easy’ (n = 172) countermeasure texts. Table 3 delineates a significant difference in the perceived readability for ‘hard’ and ‘easy’ for both operationalizations.

5.2. Research Model Results

In this study, a PLS-SEM analysis tested all posed hypotheses. Its results are visually displayed in Figure 3.
The main focus of this work was to check whether CR influences SI. To assess this accurately, PMT was enhanced with a readability section and applied to the cybersecurity context. The primary endogenous (or dependent) variable was security intentions. Ultimately, the model explained 58% of its variance ( R 2 = 0.577 ).
R 2 indicates the model’s predictive power [73]. R 2 = 0.577 falls well within standards for behavioral studies [74,75] and is considered a moderate effect size by Hair et al. [61]. Moreover, it was higher than the R 2 Hanus and Wu [10] ( R 2 = 0.461 ) and Martens et al. [12] ( R 2 = 0.28 ) achieved.
Besides security intentions, other R 2 values were deemed weak (RE) or very weak (PS, PV, and RC). This indicates that the variance in those variables was not well explained by the constructs anteceding them. CR, on the other hand, did receive a high R 2 value, with R 2 = 0.552 . Finally, 57% ( R 2 = 0.573 ) of the variance in self-efficacy was explained by countermeasure readability and countermeasure awareness.
Figure 3 corresponds with the structural, or inner, model of the PLS-SEM model. After having analyzed the outer model in Section 4.3, the structural model was analyzed. The path coefficients the PLS algorithms produced can be interpreted as regular beta coefficients. Meaning in this case, that if SE changes by one standard deviation, SI changes by 0.567 ( β = 0.567 ) standard deviations [76].
Significance and confidence intervals were estimated for path coefficients using the bootstrapping method. This resulted in six hypothesized relationships being confirmed through significance.
Countermeasure awareness was found to be a strong significant positive predictor of countermeasure readability ( β = 0.758 , p < 0.001 ; H2). Countermeasure readability positively predicted self-efficacy ( β = 0.322 , p < 0.05 ; H5). Countermeasure awareness was a strong positive predictor for both self-efficacy ( β = 0.487 , p < 0.01 ; H7) and response efficacy ( β = 0.547 , p < 0.01 ; H9).
Self-efficacy was found to be a strong significant positive predictor of security intentions ( β = 0.575 , p < 0.0001 ; H12). Lastly, for the variable subjective norm a significant positive relationship ( β = 0.296 , p < 0.05 ) with security intentions was established, supporting H15. Table 4 displays the findings of the PLS-SEM analysis of the structural model concerning the hypotheses.

6. Discussion

The main research question this study aims to answer is: how does the readability of cybersecurity countermeasures influence security intentions?
The results of the analysis of our framework confirm that countermeasure readability affects security intentions through self-efficacy since H5 and H12 are supported. The study demonstrates countermeasure readability is significantly predicted by countermeasure awareness (H2), meaning the more familiar one is with security measures, the easier the measure will be perceived to read.
H1 was not supported, implying that a reader’s disposition to reading about countermeasures does not affect their perceived readability. The data suggest countermeasure readability is a critical determinant of self-efficacy (H5). This means that when people are exposed to security controls that help them safeguard against a cyber threat, they feel more confident applying these when they perceive them to be easy to read.
In line with previous research [10,45,52], the results indicate that self-efficacy is a significant predictor of security intentions (H12). When individuals believe or feel confident they can implement a countermeasure, they are likely to have the intention to carry out the security measure.
Countermeasure readability does not predict response cost (H6 was rejected); that is, the readability of a presented countermeasure does not affect how much mental or financial effort people think implementing the measure takes. As a result, countermeasure readability only influences security intentions through self-efficacy.
Confirmation of H7 and H9 mean awareness of countermeasures is a significant antecedent of the coping appraisal mechanisms self-efficacy and response efficacy. The awareness of threats was not found to be a significant determinant of perceived severity (H3) and perceived vulnerability (H4). More specifically, this implies that evoking awareness of cyber threats or appealing to fear is not enough to steer people to desired security behavior if they do not know of countermeasures or do not know how to counteract cyber threats. This conforms to findings by Hanus and Wu [10], Johnston and Warkentin [77], and Rhee et al. [78].
Concerning the last supported hypothesis, the data point out that subjective norm is a significant determinant for security intentions (H15). This signifies that one is more inclined to act safely regarding cyber threats and measures when people (that individual relates to) think they should adopt protective security behavior.
Finally, the proposed model explains 58% of the variance in the variable SI. According to Hair et al. [61], this is a moderate effect size. F 2 indicates an effect for 11 of the 15 relationships (Table 2). F 2 measures the change in R 2 (on a dependent variable) when an independent variable is left out of the model. Cohen [79] proposes F 2 values of 0.02, 0.15, and 0.35 account for small, medium, and large effect sizes, respectively.
Contrary to other research (e.g., [12,44,48] relationships concerning threat appraisal constructs are not supported (H3, H4, H10, H11). However, this is in line with work by Hanus and Wu [10] and Tsai et al. [49], suggesting PMT is strongly context-dependent as all related work displayed in Figure 1 differ slightly in their contextual application. Section 6.1 delves into other possible reasons for this lack of support.
Besides the model, Section 5.1 demonstrated there is a significant difference in perceived readability between ‘easy’ and ‘hard’ countermeasure texts, as classified by five readability metrics (see Appendix A). The distributions of the indicators for countermeasure readability are highly negatively skewed. This explains why the means of ‘hard’ and ‘easy’ countermeasures do not differ much.
As a result, it can be concluded that readability metric scores of textual readability indeed affect the perceived readability of cybersecurity countermeasure texts. Consequently, if a countermeasure text scores low on readability according to a readability formula it will be perceived as poorly readable, and vice versa.

6.1. Implications and Limitations

The results of this research provide empirical ground for the usage of readability metrics to improve countermeasure readability in cybersecurity assessment applications.
Previous work has shown a strong significant relationship between intentions and actual behavior [50,51]. Additionally, countermeasure readability indirectly positively predicts security intention. Hence, it is worthwhile to implement readability checks to improve security control texts before presenting them to users. These metrics are easily taken advantage of since well-documented open source packages are available [80,81]. Table 5 provides example improvements based on readability metric scores.
The first point of critique one may have is on the analysis of the readability metrics’ effect on perceived readability (CR in this research). As was shown, the distribution of the measured variables is non-normal, by which the use of a t-test could be questioned. After all, t-tests assume normality. However, a paper by Lumley et al. [82] demonstrates that t-tests are valid with sufficiently large sample sizes. They state that “sufficiently large” is under 100. The sample size for comparing the countermeasures texts was 352, 172 for ‘easy’ measures and 180 for ‘hard’ ones. The use of an independent-sample t-test in this situation is therefore justified.
On average, both ‘easy’ and ‘hard’ countermeasures were rated relatively high on readability. Synthesized with the strong relationship between CA and CR, this indicates that the subjects were familiar with security jargon terms and cybersecurity in general. This fits with the fact that part of the sample was taken from a bachelor’s class on information security. This is a plausible cause for the strong negative skew reported in Section 5.1.
Furthermore, this research does not conclude anything about the extent to which readability formulas indicate countermeasure readability (nor readability in general) or how they integrate with the proposed model. That is, readability metrics were not taken into the model, thus refusing to estimate any effect a text’s readability score may have on any of the constructs in the model.
Regarding the proposed model, 9 out of 15 hypotheses are not supported. This could indicate that the sample is not homogeneous. Furthermore, Section 4.2 points out that the sample likely contained a high percentage of bachelor students. Hanel and Vione [83] note that “generalizing from students to the general public can be problematic when personal and attitudinal variables are used”. Though the bootstrap procedure with 5000 iterations takes advantage of the central limit theorem [84], it does not counter poor population representativeness in the original sample.
Another explanation of the low number of supported hypotheses is the operationalization of the concerning variables. That is, the use of a vignette caused some confusion for respondents. Some reported they would have answered differently if they were not asked to imagine themselves as a restaurant owner with several information systems.
Moreover, it is possible that respondents forgot to answer from the context of the given case description. Different interpretations on how to respond to the statements in the survey can lead to opposing relations being measured, leading to great variance without regression between constructs.
This could be the case with H4 and H11. For instance, if someone is unfamiliar with a cyber threat, they might have perceived themselves as being vulnerable to it, since they did not have the chance to respond to it yet (resulting in a negative relation between TA and PV). When the constructs are seen anteceding one another, as PMT was intended, someone who is well aware of a threat can see themselves as being vulnerable to it (resulting in a positive relation between TA and PV).
Likewise for H11, if one perceives himself or herself as being highly vulnerable he or she may employ countermeasures (resulting in a positive relation between PV and SI). On the other hand, people might rate themselves as not vulnerable to a cyber threat, because they have already implemented security controls.
For formative indicators in general, it is important to capture a concept as completely as possible by measuring different dimensions of a construct [61]. Using multiple items to estimate a latent construct allows for stronger construct validity [85]. However, adding reflective indicators or more formative items comes at a cost. Response rates, completion rates, and data quality suffer from increased questionnaire lengths [60,86,87].
This paper aimed to capture protection motivation processes for cyber threats and measures in general, not only malware, for example. Therefore, constructs were surveyed using the same general statements to capture the essence of a construct concerning four cyber threats/measures. This leads to suboptimal construct validity, which explains the low R 2 value for some of the endogenous constructs.
Looking ahead, NLP techniques could be a valuable alternative in assessing countermeasure texts. Countermeasure texts can be short, often containing only a few sentences. Formulas that consider only two or three internal features of a text are inaccurate in these situations. Dell’Orletta et al. [40], speaking of NLP readability assessment, conclude that “assessing the readability of sentences is a complex task, requiring a high number of features, mainly syntactic ones”.
This research recommends readability metrics as an opportunity to improve readability in security applications. However, it acknowledges the metrics’ limitations. Therefore this work promotes investigating NLP techniques to increase readability in countermeasure texts. Extant research already shows NLP’s possibilities and applicability in this respect [88,89,90]. Traditional metrics, on the other hand, are encouraged to be used as a guideline as soon as possible.

7. Conclusions

Stimulating secure behavior is critical in security assessment applications, as human failure in this regard is a primary contributor to cybercrime [9,91].
Work by Alkhurayyif and Weir [13] points to readability metrics for countermeasure text assessment to improve users’ compliance to controls. By analyzing cybersecurity protection motivation through the lens of an extended PMT model, this paper has clarified how countermeasure readability influences security intentions.
A structural equation modeling approach to the analysis of the model (Section 3) showed that countermeasure readability affects security intentions through self-efficacy. The data analysis, together with extant literature (see Table 1), provide support for the proposed theoretical model.
This study affirms and contributes to the current body of knowledge by confirming the model’s usefulness in the cybersecurity context, showing countermeasure readability has its place in forming protection motivation.
The methodological choices concerning the sample and survey were constrained by the pressure to limit questionnaire length, as this leads to lower response rates inter alia [60,87]. Nevertheless, our analysis demonstrated the statistical significance of several key coefficients.
Our results highlight the importance of considering readability metrics for assessing countermeasure texts. The improvement of countermeasure readability is perhaps the most accessible avenue towards influencing security intentions. The future is bright in this regard. The use of novel NLP techniques will facilitate more accurate estimations of readability, opening up further possibilities for stimulating secure behavior [40,88,89,90].

Author Contributions

Conceptualization, T.S., M.v.H., and M.S.; methodology, T.S. and M.v.H.; software, T.S.; validation, M.v.H. and M.S.; formal analysis, T.S.; investigation, T.S. and M.v.H.; data curation, T.S.; writing—original draft preparation, T.S.; writing—review and editing, M.v.H. and M.S.; visualization, T.S.; supervision, M.v.H. and M.S.; project administration, T.S. and M.v.H. All authors have read and agreed to the published version of the manuscript.

Funding

This work was made possible with funding from the European Union’s Horizon 2020 research and innovation program, under grant agreement no. 883588 (GEIGER). The opinions expressed and arguments employed herein do not necessarily reflect the official views of the funding body.

Informed Consent Statement

Informed consent was obtained from all subjects involved in the study.

Data Availability Statement

The data generated by this research are publicly available at: https://github.com/TKForgeron/SEMinR-Analysis-The-Effect-of-Countermeasure-Readability-on-Security-Intentions (accessed on 14 September 2021).

Conflicts of Interest

The funders had no role in the design of the study; in the collection, analyses, or interpretation of data; in the writing of the manuscript, or in the decision to publish the results.

Abbreviations

The following abbreviations are used in this manuscript:
ARIautomated readability index
CAcountermeasure awareness
CLIColeman–Liau index
CRcountermeasure readability
CRDcountermeasure reading disposition
DCNew Dale–Chall readability formula
FKGLFlesch Kincaid grade level
FOGgunning fog score
FREFlesch reading ease
HBMhealth belief model
ISPinformation security policy
MitMman-in-the-middle
NLPnatural language processing
PLSpartial least squares
PMTprotection motivation theory
PSperceived severity
PVperceived vulnerability
RCresponse cost
REresponse efficacy
SBsecurity behavior
SEself-efficacy
SEMstructural equation modeling
SIsecurity intentions
SMEsmall- and medium-sized enterprises
SNsubjective norm
TAthreat awareness
TPBtheory of planned behavior
VIFvariance inflation factor
ZDEzero-day exploit

Appendix A. Questionnaire

Table A1. Overview of all questionnaire items.
Table A1. Overview of all questionnaire items.
Construct ItemSurvey ItemItem Options/Readability ScoreSource(s)
ageHow old are you?Under 18; 18–24; 25–34; 35–44; 45–54; 55–64; 65+
english_level“English is my _____ language”.First; Second; Third; Fourth (or more)
languageWhat is your first language?Open text entry
RS
rs1I can understand academic English texts7-point Likert scale (1 = strongly disagree; 7 = strongly agree)
rs2“My English reading level is roughly equal to or above my first language reading level”.True; False
TAAll variables measuring TA have the same answer options and structure.7-point Likert scale (1 = strongly disagree; 7 = strongly agree)
Definition: MalwareMalware is a term used to describe malicious software, including spyware, ransomware, viruses, and worms. Malware breaches a network through a vulnerability, typically when a user clicks a dangerous link or email attachment that then installs risky software. Cisco Systems [54]
Definition: PhishingPhishing is the practice of sending fraudulent communications that appear to come from a reputable source, usually through email. The goal is to steal sensitive data like credit card and login information or to install malware on the victim’s machine. Phishing is an increasingly common cyber threat. Cisco Systems [54]
Definition: Man-in-the-MiddleMan-in-the-middle (MitM) attacks, also known as eavesdropping attacks, occur when attackers insert themselves into a two-party transaction. Once the attackers interrupt the traffic, they can filter and steal data. Cisco Systems [54]
Definition: Zero-Day ExploitA zero-day exploit is an attack that exploits a previously unknown hardware, firmware, or software vulnerability. Unknown meaning not known by software vendors or security software that relies on finding known patterns or signatures hackers use. Dempsey et al. [92], Mulloy [93]
ta1I am familiar with malware Hanus and Wu [10]
ta2I am familiar with phishing Hanus and Wu [10]
ta3I am familiar with a man-in-the-middle attack Hanus and Wu [10]
ta4I am familiar with a zero-day exploit Hanus and Wu [10]
PSAll variables measuring PS have the same answer options and structure.7-point Likert scale (1 = strongly disagree; 7 = strongly agree)
ps1I think malware is a severe problem Martens et al. [12]
ps2I think phishing is a severe problem Martens et al. [12]
PSAll variables measuring PS have the same answer options and structure.7-point Likert scale (1 = strongly disagree; 7 = strongly agree)
ps3I think a man-in-the-middle attack is a severe problem Martens et al. [12]
ps4I think a zero-day exploit is a severe problem Martens et al. [12]
PVAll variables measuring PV have the same answer options and structure.7-point Likert scale (1 = strongly disagree; 7 = strongly agree)
pv1It is likely that I become a victim of malware Hanus and Wu [10]
pv2It is likely that I become a victim of phishing Hanus and Wu [10]
pv3It is likely that I become a victim of a man-in-the-middle attack Hanus and Wu [10]
pv4It is likely that I become a victim of a zero-day exploit Hanus and Wu [10]
red herringWhat concept is best described by the following description? ____________, also known as eavesdropping attacks, occur when attackers insert themselves into a two-party transaction. Once the attackers interrupt the traffic, they can filter and steal data.Phishing; Malware; Zero-Day Exploit; Man-in-the-Middle Attack
CRDAll variables measuring CRD have the same answer options.7-point Likert scale (1 = strongly disagree; 7 = strongly agree)
crd1I am interested in computer security (countermeasures)
crd2I am motivated to read about computer security countermeasures
CRAll variables measuring CR have the same answer options and structure. The countermeasure definitions’ (‘easy’ or ‘hard’) scores are found to the right of the definition.7-point Likert scale (1 = strongly disagree; 7 = strongly agree)
Measure: Malware (easy)Where possible, make sure that updates are automatically installed. Otherwise, make sure to update all your software to the latest version. Make sure all your connections to the internet (or other networks) go through a firewall. Make sure you have set up an antivirus program that scans your systems for malware. Make sure your important data is regularly backed up in the cloud or another safe place, so coming back from an attack will be easier.FRE = 61.2; FKGL = 8.5; FOG = 11.9; DC = 7.1; CLI = 12.3; ARI = 8.7Swiss Federal Department of Finance [94]
Measure: Malware (hard)Whenever possible, verify updates are automatically being installed. Alternatively, ensure all software packages are updated to their most recent version. Activate the operating system’s integrated firewall before you connect any device to the internet or other networks. Employ a virus protection program that frequently performs full system scans optimized for malicious software detection. Safeguard critical data by planning a regular off-site backup (e.g., cloud or tape backup) of systems, so recovery from cyber attacks will be a less complicated process.FRE = 29.9; FKGL = 12; FOG = 14.4; DC = 10.6; CLI = 17.8; ARI = 11.3Swiss Federal Department of Finance [94]
CRAll variables measuring CR have the same answer options and structure. The countermeasure definitions’ (‘easy’ or ‘hard’) scores are found to the right of the definition.7-point Likert scale (1 = strongly disagree; 7 = strongly agree)
Measure: Phishing (easy)Make sure your systems only allow strong passwords. If it is possible, use two-factor authentication. This gives extra protection against your account being hacked. Never give out personal data on a website you have reached by clicking on a link in an email or text message. No bank will ever send you an email asking that you change your password or confirm your credit card details. Be on guard if you get emails or texts that ask you to take action with consequences when you do not do what they say (loss of money, criminal charges or legal issues, account or card blocking, missed opportunity, misfortune, etc.).FRE = 66.4; FKGL = 8.5; FOG = 10.2; DC = 7.6; CLI = 11.2; ARI = 9.2Swiss Federal Department of Finance [95]
Measure: Phishing (hard)Enforce strong passwords throughout your information systems. Wherever possible, use two-factor authentication. This offers an additional layer of protection to prevent your account from being hacked. Never divulge confidential information (e.g., passwords or credit card details) on websites you have accessed by following a link in an email or text message. Never would a bank or credit card corporation send you an email requesting that you change your password or verify your credit card details. Be skeptical whenever you receive emails that require action from you and threaten you with consequences if you do not follow their insistence (loss of money, criminal charges or legal proceedings, account or card blocking, missed opportunity, misfortune, etc.).FRE = 47; FKGL = 10.3; FOG = 12.7; DC = 8.8; CLI = 16.1; ARI = 11.3Swiss Federal Department of Finance [95]
Measure: MitM (easy)Make sure websites where you give personal info have an HTTPS connection, as shown by the lock icon in or around the address bar in your browser. Never give out personal data over an insecure public Wi-Fi network. Make sure your network is secured with an intrusion detection system.FRE = 61.3; FKGL = 8.8; FOG = 11.5; DC = 7; CLI = 11.3; ARI = 8.6Cisco Systems [54,96], Gontharet [97]
Measure: MitM (hard)Verify the establishment of an HTTPS connection when submitting confidential information to a website, signified by the lock symbol in or around the URL bar in the internet browser. Do not transmit confidential information via an insecure public Wi-Fi network. Ensure security of your local network by deploying an intrusion detection system.FRE = 27.7; FKGL = 13.8; FOG = 17.6; DC = 10.8; CLI = 16; ARI = 12.8Cisco Systems [54,96], Gontharet [97]
Measure: ZDE (easy)Stay up-to-date with the latest patches on all your programs. These patch holes in your security, so the risk of newly found weaknesses being exploited is lower. Create a list of approved applications and limit installations to only these. Try to keep down the number of applications you use, as this reduces the risk of vulnerabilities being found across a wide suite of software. Make sure your computers and networks are being scanned for fishy events by an intrusion detection system.FRE = 61.6; FKGL = 8.8; FOG = 11.5; DC = 7.9; CLI = 12.5; ARI = 9.5Mulloy [93], Finjan [98], Sophos [99]
CRAll variables measuring CR have the same answer options. The countermeasure definitions’ (‘easy’ or ‘hard’) scores are found to the right of the definition.7-point Likert scale (1 = strongly disagree; 7 = strongly agree)
Measure: ZDE (hard)Keep updated with the latest security patches on all your applications. Patches repair the vulnerabilities in software and operating systems, reducing the risk of newly discovered vulnerabilities being exploited. Create an application whitelist and restrict installations to these. Restraining your number of applications reduces the likelihood of being vulnerable to cyberthreats throughout your software packages. Have an intrusion detection system monitor your computers and networks for suspicious activity.FRE = 16.4; FKGL = 14.4; FOG = 19; DC = 9.7; CLI = 22.14; ARI = 15.7Mulloy [93], Finjan [98], Sophos [99]
cr1 (malware)This text is easy to read
cr2 (malware)This text is easy to understand
cr3 (phishing)This text is easy to read
cr4 (phishing)This text is easy to understand
cr5 (MitM)This text is easy to read
cr6 (MitM)This text is easy to understand
cr7 (ZDE)This text is easy to read
cr8 (ZDE)This text is easy to understand
CAAll variables measuring CA have the same answer options and structure.7-point Likert scale (1 = strongly disagree; 7 = strongly agree)
ca1 (malware)I am familiar with the content (terms and concepts) of this text Adapted from Hanus and Wu [10]
ca2 (phishing)I am familiar with the content (terms and concepts) of this text Adapted from Hanus and Wu [10]
ca3 (MitM)I am familiar with the content (terms and concepts) of this text Adapted from Hanus and Wu [10]
ca4 (ZDE)I am familiar with the content (terms and concepts) of this text Adapted from Hanus and Wu [10]
SEAll variables measuring SE have the same answer options.7-point Likert scale (1 = strongly disagree; 7 = strongly agree)
se1 (malware)I feel confident carrying out these countermeasures Adapted from Hanus and Wu [10]
se2 (malware)Carrying out these countermeasures is easy Adapted from
Anderson and Agarwal [55]
se3 (phishing)I feel confident carrying out these countermeasures Adapted from Hanus and Wu [10]
se4 (phishing)Carrying out these countermeasures is easy Adapted from
Anderson and Agarwal [55]
se5 (MitM)I feel confident carrying out these countermeasures Adapted from Hanus and Wu [10]
se6 (MitM)Carrying out these countermeasures is easy Adapted from
Anderson and Agarwal [55]
se7 (ZDE)I feel confident carrying out these countermeasures Adapted from Hanus and Wu [10]
se8 (ZDE)Carrying out these countermeasures is easy Adapted from
Anderson and Agarwal [55]
REAll variables measuring RE have the same answer options and structure.7-point Likert scale (1 = strongly disagree; 7 = strongly agree)
re1Carrying out these countermeasures will protect me against malware Adapted from Martens et al. [12]
re2Carrying out these countermeasures will protect me against phishing Adapted from Martens et al. [12]
re3Carrying out these countermeasures will protect me against a man-in-the-middle attack Adapted from Martens et al. [12]
re4Carrying out these countermeasures will protect me against a zero-day exploit Adapted from Martens et al. [12]
RCAll variables measuring RC have the same answer options and structure.7-point Likert scale (1 = strongly disagree; 7 = strongly agree)
rc1 (malware)Carrying out these countermeasures costs me a lot (e.g., financial or mental effort) Adapted from Hanus and Wu [10]
rc2 (phishing)Carrying out these countermeasures costs me a lot (e.g., financial or mental effort) Adapted from Hanus and Wu [10]
rc3 (MitM)Carrying out these countermeasures costs me a lot (e.g., financial or mental effort) Adapted from Hanus and Wu [10]
rc4 (ZDE)Carrying out these countermeasures costs me a lot (e.g., financial or mental effort) Adapted from Hanus and Wu [10]
SIAll variables measuring CR have the same answer options and structure.7-point Likert scale (1 = strongly disagree; 7 = strongly agree)
si1I will carry out the countermeasures against malware Adapted from Martens et al. [12]
si2I will carry out the countermeasures against phishing Adapted from Martens et al. [12]
si3I will carry out the countermeasures against a man-in-the-middle attack Adapted from Martens et al. [12]
si4I will carry out the countermeasures against a zero-day exploit Adapted from Martens et al. [12]
SNAll variables measuring CR have the same answer options and structure.7-point Likert scale (1 = strongly disagree; 7 = strongly agree)
sn1People I relate to think I should protect myself from malware Adapted from Martens et al. [12]
sn2People I relate to think I should protect myself from phishing Adapted from Martens et al. [12]
sn3People I relate to think I should protect myself from a man-in-the-middle attack Adapted from Martens et al. [12]
sn4People I relate to think I should protect myself from a zero-day exploit Adapted from Martens et al. [12]

Appendix B. Indicator Weights

Figure A1. A complete overview of the (bootstrapped) PLS-SEM model, including all indicator weights. * p < 0.05 ; * * p < 0.01 ; * * * p < 0.001 .
Figure A1. A complete overview of the (bootstrapped) PLS-SEM model, including all indicator weights. * p < 0.05 ; * * p < 0.01 ; * * * p < 0.001 .
Jcp 01 00034 g0a1

Appendix C. Item Correlations

Table A2. Correlations between factors.
Table A2. Correlations between factors.
cr1cr2cr3cr4cr5cr6cr7cr8ca1ca2ca3ca4rs1rs2ps1ps2ps3ps4
cr110.770.60.590.550.50.310.320.680.530.260.160.310.110−0.08−0.12−0.08
cr20.7710.490.630.470.480.250.340.640.440.180.090.190.040.07−0.05−0.030.02
cr30.60.4910.730.470.460.30.280.510.670.280.040.290.16−0.04−0.07−0.06−0.16
cr40.590.630.7310.510.490.350.320.430.670.160.020.250.08−0.05−0.06−0.06−0.16
cr50.550.470.470.5110.820.360.390.450.410.50.270.120.08−0.04−0.1−0.020.14
cr60.50.480.460.490.8210.440.450.430.390.570.30.120.14−0.02−0.07−0.110.11
cr70.310.250.30.350.360.4410.870.30.210.380.570.120.230.020.02−0.120.12
cr80.320.340.280.320.390.450.8710.30.20.350.550.120.11−0.01−0.01−0.120.06
ca10.680.640.510.430.450.430.30.310.590.520.390.350.340.1−0.02−0.030.14
ca20.530.440.670.670.410.390.210.20.5910.460.150.520.230.08−0.03−0.02−0.01
ca30.260.180.280.160.50.570.380.350.520.4610.570.220.320.220.20.190.35
ca40.160.090.040.020.270.30.570.550.390.150.5710.220.35−0.080.010.10.15
rs10.310.190.290.250.120.120.120.120.350.520.220.2210.3100−0.13−0.07
rs20.110.040.160.080.080.140.230.110.340.230.320.350.311−0.010.14−0.080.13
ps100.07−0.04−0.05−0.04−0.020.02−0.010.10.080.22−0.080−0.0110.50.330.32
ps2−0.08−0.05−0.07−0.06−0.1−0.070.02−0.01−0.02−0.030.20.0100.140.510.310.11
ps3−0.12−0.03−0.06−0.06−0.02−0.11−0.12−0.12−0.03−0.020.190.1−0.13−0.080.330.3110.5
ps4−0.080.02−0.16−0.160.140.110.120.060.14−0.010.350.15−0.070.130.320.110.51
pv1−0.24−0.17−0.32−0.24−0.26−0.23−0.22−0.19−0.28−0.35−0.32−0.24−0.31−0.180.240.140.130.02
pv200.02−0.12−0.02−0.1−0.12−0.19−0.15−0.26−0.28−0.29−0.3−0.36−0.220.090.090−0.09
pv3−0.160−0.15−0.12−0.14−0.14−0.2−0.14−0.11−0.26−0.22−0.21−0.39−0.220.090.120.210.18
pv4−0.31−0.21−0.17−0.21−0.1−0.110.02−0.05−0.13−0.2−0.07−0.19−0.35−0.180.220.190.170.37
rc1−0.27−0.2−0.22−0.2−0.15−0.1−0.03−0.02−0.19−0.21−0.050.02−0.110.06−0.090.01−0.020.02
rc2−0.1−0.08−0.25−0.28−0.030.04−0.16−0.15−0.09−0.28−0.010.05−0.190.07−0.0300−0.03
rc3−0.14−0.04−0.1−0.14−0.16−0.25−0.050.02−0.12−0.26−0.3−0.05−0.2−0.07−0.020.090.03−0.14
rc40−0.10.05−0.020.02−0.03−0.19−0.240.1400.09−0.1−0.120.10.030.090.070.06
crd10.040.04−0.04−0.11−0.040.03−0.020.070.14−0.050.260.28−0.050.050.210.120.120.1
crd20.080.080.05−0.030.10.090.080.140.240.110.410.35−0.050.170.150.10.180.22
re10.440.410.310.390.30.290.290.30.310.490.30.290.390.190.0400.11−0.05
re20.210.210.350.320.230.110.280.240.330.50.270.160.390.170.090−0.070.01
re30.160.190.150.120.350.30.160.150.260.340.390.320.170.150.080.070.150.31
re40.050.050.140.20.160.120.120.110.090.230.210.13−0.040.14−0.05−0.060.080
rfs1−0.11−0.18−0.06−0.16−0.01−0.060.020.03−0.13−0.030.020.100.08−0.1300.110.13
rfs20.1−0.1−0.06−0.11−0.02−0.08−0.03−0.08−0.01−0.08−0.060.090.02−0.01−0.3−0.09−0.17−0.14
rfs3−0.030.080.160.11−0.02−0.07−0.1−0.0400.040.09−0.030.020.1−0.050.050.06−0.06
rfs40.08−0.13−0.08−0.130.070.020.110.01−0.03−0.10.130.21−0.020.17−0.150.03−0.070.02
se10.60.510.470.360.340.370.260.270.610.430.330.380.250.280.070.060.05−0.08
se20.410.450.210.270.320.290.130.170.450.150.080.230.080.20.0900.110
se30.420.340.470.450.370.330.120.130.480.640.370.130.40.180.110.07−0.05−0.05
se40.370.380.460.590.320.230.320.30.30.420.130.080.190.05−0.090.050.08−0.06
se50.210.10.220.080.340.510.410.360.310.240.590.390.110.27−0.04−0.05−0.020.16
se60.30.270.350.270.470.550.190.160.290.270.430.1−0.120.1−0.01−0.140.040.21
se70.240.150.170.130.270.30.60.610.310.170.440.730.10.22−0.07−0.040.090.11
se80.150.210.070.140.220.190.440.530.080.020.20.48−0.080.01−0.02−0.020.090.17
si10.220.220.170.170.160.20.120.120.270.260.250.250.090.150.230.10.14−0.03
si20.140.140.250.250.290.240.210.230.180.30.250.20.230.060.080.04−0.01−0.04
si30.120.020.06−0.050.230.290.20.160.170.250.560.390.160.160.120.030.290.31
si4−0.050.02−0.030.030.130.150.310.320.020.040.330.34−0.030.060.040.030.190.14
sn100.040.090.010.160.190.150.10.190.20.350.210.090.140.040.010.120.21
sn2−0.05−0.070.150.110.170.140.050.010.070.20.290.10.060.05−0.050.170.130.09
sn3−0.070.02−0.01−0.120.050.130.110.140.060.130.330.19−0.0200.05−0.010.070.24
sn4−0.21−0.1−0.22−0.24−0.13−0.09−0.03−0.03−0.06−0.030.240.13−0.12−0.120.110.190.360.28
ta10.20.120.220.090.050.170.240.230.410.210.440.410.060.250.210.090.020.06
ta20.170.070.110.030.110.120.190.170.340.230.460.420.250.310.220.32−0.010.04
ta30.07−0.010.060.060.140.170.360.310.280.160.430.420.120.330.180.220.070.29
ta40.150.010.160.090.120.20.310.210.290.20.40.420.140.290.090.06−0.020.18
pv1pv2pv3pv4rc1rc2rc3rc4crd1crd2re1re2re3re4rfs1rfs2rfs3rfs4
cr1−0.240−0.16−0.31−0.27−0.1−0.1400.040.080.440.210.160.05−0.110.1−0.030.08
cr2−0.170.020−0.21−0.2−0.08−0.04−0.10.040.080.410.210.190.05−0.18−0.10.08−0.13
cr3−0.32−0.12−0.15−0.17−0.22−0.25−0.10.05−0.040.050.310.350.150.14−0.06−0.060.16−0.08
cr4−0.24−0.02−0.12−0.21−0.2−0.28−0.14−0.02−0.11−0.030.390.320.120.2−0.16−0.110.11−0.13
cr5−0.26−0.1−0.14−0.1−0.15−0.03−0.160.02−0.040.10.30.230.350.16−0.01−0.02−0.020.07
cr6−0.23−0.12−0.14−0.11−0.10.04−0.25−0.030.030.090.290.110.30.12−0.06−0.08−0.070.02
cr7−0.22−0.19−0.20.02−0.03−0.16−0.05−0.19−0.020.080.290.280.160.120.02−0.03−0.10.11
cr8−0.19−0.15−0.14−0.05−0.02−0.150.02−0.240.070.140.30.240.150.110.03−0.08−0.040.01
ca1−0.28−0.26−0.11−0.13−0.19−0.09−0.120.140.140.240.310.330.260.09−0.13−0.010−0.03
ca2−0.35−0.28−0.26−0.2−0.21−0.28−0.260−0.050.110.490.50.340.23−0.03−0.080.04−0.1
ca3−0.32−0.29−0.22−0.07−0.05−0.01−0.30.090.260.410.30.270.390.210.02−0.060.090.13
ca4−0.24−0.3−0.21−0.190.020.05−0.05−0.10.280.350.290.160.320.130.10.09−0.030.21
rs1−0.31−0.36−0.39−0.35−0.11−0.19−0.2−0.12−0.05−0.050.390.390.17−0.0400.020.02−0.02
rs2−0.18−0.22−0.22−0.180.060.07−0.070.10.050.170.190.170.150.140.08−0.010.10.17
ps10.240.090.090.22−0.09−0.03−0.020.030.210.150.040.090.08−0.05−0.13−0.3−0.05−0.15
ps20.140.090.120.190.0100.090.090.120.1000.07−0.060−0.090.050.03
ps30.1300.210.17−0.0200.030.070.120.180.11−0.070.150.080.11−0.170.06−0.07
ps40.02−0.090.180.370.02−0.03−0.140.060.10.22−0.050.010.3100.13−0.14−0.060.02
pv110.620.420.390.040.170.070.010.140.04−0.15−0.29−0.15−0.010.040.040.02−0.24
pv20.6210.240.13−0.150.090.02−0.120.140.01−0.12−0.31−0.23−0.19−0.110.16−0.01−0.18
pv30.420.2410.480.080.080.060.130.06−0.03−0.14−0.22−0.150−0.0400.03−0.09
pv40.390.130.4810.040.020.040.140.070.05−0.23−0.040.06−0.080.1−0.04−0.15−0.11
rc10.04−0.150.080.0410.450.390.31−0.08−0.11−0.12−0.090.10.01−0.050.010.08−0.02
rc20.170.090.080.020.4510.40.170.170.07−0.03−0.160.180.04−0.120.1−0.070.05
rc30.070.020.060.040.390.410.220.02−0.06−0.23−0.15−0.130−0.020.060.020.15
rc40.01−0.120.130.140.310.170.2210.09−0.05−0.24−0.14−0.040.09−0.020.020.080.04
crd10.140.140.060.07−0.080.170.020.0910.74−0.08−0.110.020−0.020.040.030.07
crd20.040.01−0.030.05−0.110.07−0.06−0.050.7410.080.040.090.130.01−0.020.090.11
re1−0.15−0.12−0.14−0.23−0.12−0.03−0.23−0.24−0.080.0810.620.480.270.130.10.07−0.18
re2−0.29−0.31−0.22−0.04−0.09−0.16−0.15−0.14−0.110.040.6210.480.210.11−0.070.07−0.18
re3−0.15−0.23−0.150.060.10.18−0.13−0.040.020.090.480.4810.340.27−0.010−0.04
re4−0.01−0.190−0.080.010.0400.0900.130.270.210.3410.230.020.280.05
rfs10.04−0.11−0.040.1−0.05−0.12−0.02−0.02−0.020.010.130.110.270.2310.180.110.02
rfs20.040.160−0.040.010.10.060.020.04−0.020.1−0.07−0.010.020.1810.160.07
rfs30.02−0.010.03−0.150.08−0.070.020.080.030.090.070.0700.280.110.1610
rfs4−0.24−0.18−0.09−0.11−0.020.050.150.040.070.11−0.18−0.18−0.040.050.020.0701
se1−0.11−0.03−0.09−0.24−0.31−0.04−0.08−0.040.210.290.470.180.210.090.030.160.050
se20.010.020.05−0.13−0.44−0.04−0.02−0.030.030.160.270.10.080.13−0.01−0.03−0.020.08
se3−0.15−0.16−0.22−0.09−0.23−0.37−0.170.020.060.210.310.430.180.150.03−0.050.08−0.13
se4−0.31−0.1−0.13−0.1−0.27−0.57−0.08−0.02−0.19−0.060.240.3500.070.05−0.020−0.09
se5−0.15−0.1−0.120.01−0.090−0.33−0.110.220.290.220.170.220.170.140.03−0.020.04
se6−0.22−0.190.030.07−0.08−0.02−0.34−0.0600.160.130.130.290.220.0800.04−0.01
se7−0.17−0.22−0.11−0.180.090.090.05−0.260.180.320.310.140.270.310.140.130.060.2
se8−0.14−0.16−0.04−0.110.020.090.11−0.400.170.270.20.30.290.08−0.040.070.12
si10.10.01−0.07−0.1−0.37−0.07−0.12−0.080.190.370.370.090.050.170.120.020.1−0.07
si2−0.05−0.17−0.18−0.03−0.32−0.35−0.13−0.140.050.210.220.330.120.140.26−0.040.17−0.11
si3−0.14−0.14−0.14−0.03−0.12−0.02−0.36−0.210.270.40.310.210.370.130.260.03−0.060.01
si40.10.01−0.040.02−0.140.07−0.01−0.360.210.380.290.110.160.320.14−0.020.130.02
sn1−0.22−0.3−0.080−0.21−0.05−0.1700.120.250.240.20.280.210.30.010.160.02
sn2−0.29−0.29−0.2−0.05−0.12−0.23−0.060.09−0.040.150.040.170.180.150.25−0.060.230.09
sn3−0.12−0.23−0.10−0.080.03−0.07−0.010.240.280.070.080.260.230.37−0.050.130.03
sn40.03−0.130.080.17−0.060.03−0.01−0.020.140.260.050.010.220.240.26−0.080.170.04
ta10.030.04−0.080.01−0.090.07−0.110.050.450.370.120.050.080.02−0.240.10.11−0.04
ta2−0.04−0.08−0.22−0.08−0.030.03−0.040.110.350.330.090.110.140.03−0.130.080.010.06
ta3−0.04−0.11−0.270.09−0.020.01−0.02−0.010.380.350.050.050.270.010.090.140.040.11
ta4−0.05−0.04−0.20.05−0.030.03−0.01−0.030.280.290.10.070.2−0.050.040.170.070.25
se1se2se3se4se5se6se7se8si1si2si3si4sn1sn2sn3sn4ta1ta2ta3ta4
cr10.60.410.420.370.210.30.240.150.220.140.12−0.050−0.05−0.07−0.210.20.170.070.15
cr20.510.450.340.380.10.270.150.210.220.140.020.020.04−0.070.02−0.10.120.07−0.010.01
cr30.470.210.470.460.220.350.170.070.170.250.06−0.030.090.15−0.01−0.220.220.110.060.16
cr40.360.270.450.590.080.270.130.140.170.25−0.050.030.010.11−0.12−0.240.090.030.060.09
cr50.340.320.370.320.340.470.270.220.160.290.230.130.160.170.05−0.130.050.110.140.12
cr60.370.290.330.230.510.550.30.190.20.240.290.150.190.140.13−0.090.170.120.170.2
cr70.260.130.120.320.410.190.60.440.120.210.20.310.150.050.11−0.030.240.190.360.31
cr80.270.170.130.30.360.160.610.530.120.230.160.320.10.010.14−0.030.230.170.310.21
ca10.610.450.480.30.310.290.310.080.270.180.170.020.190.070.06−0.060.410.340.280.29
ca20.430.150.640.420.240.270.170.020.260.30.250.040.20.20.13−0.030.210.230.160.2
ca30.330.080.370.130.590.430.440.20.250.250.560.330.350.290.330.240.440.460.430.4
ca40.380.230.130.080.390.10.730.480.250.20.390.340.210.10.190.130.410.420.420.42
rs10.250.080.40.190.11−0.120.1−0.080.090.230.16−0.030.090.06−0.02−0.120.060.250.120.14
rs20.280.20.180.050.270.10.220.010.150.060.160.060.140.050−0.120.250.310.330.29
ps10.070.090.11−0.09−0.04−0.01−0.07−0.020.230.080.120.040.04−0.050.050.110.210.220.180.09
ps20.0600.070.05−0.05−0.14−0.04−0.020.10.040.030.030.010.17−0.010.190.090.320.220.06
ps30.050.11−0.050.08−0.020.040.090.090.14−0.010.290.190.120.130.070.360.02−0.010.07−0.02
ps4−0.080−0.05−0.060.160.210.110.17−0.03−0.040.310.140.210.090.240.280.060.040.290.18
pv1−0.110.01−0.15−0.31−0.15−0.22−0.17−0.140.1−0.05−0.140.1−0.22−0.29−0.120.030.03−0.04−0.04−0.05
pv2−0.030.02−0.16−0.1−0.1−0.19−0.22−0.160.01−0.17−0.140.01−0.3−0.29−0.23−0.130.04−0.08−0.11−0.04
pv3−0.090.05−0.22−0.13−0.120.03−0.11−0.04−0.07−0.18−0.14−0.04−0.08−0.2−0.10.08−0.08−0.22−0.27−0.2
pv4−0.24−0.13−0.09−0.10.010.07−0.18−0.11−0.1−0.03−0.030.020−0.0500.170.01−0.080.090.05
rc1−0.31−0.44−0.23−0.27−0.09−0.080.090.02−0.37−0.32−0.12−0.14−0.21−0.12−0.08−0.06−0.09−0.03−0.02−0.03
rc2−0.04−0.04−0.37−0.570−0.020.090.09−0.07−0.35−0.020.07−0.05−0.230.030.030.070.030.010.03
rc3−0.08−0.02−0.17−0.08−0.33−0.340.050.11−0.12−0.13−0.36−0.01−0.17−0.06−0.07−0.01−0.11−0.04−0.02−0.01
rc4−0.04−0.030.02−0.02−0.11−0.06−0.26−0.4−0.08−0.14−0.21−0.3600.09−0.01−0.020.050.11−0.01−0.03
crd10.210.030.06−0.190.2200.1800.190.050.270.210.12−0.040.240.140.450.350.380.28
crd20.290.160.21−0.060.290.160.320.170.370.210.40.380.250.150.280.260.370.330.350.29
re10.470.270.310.240.220.130.310.270.370.220.310.290.240.040.070.050.120.090.050.1
re20.180.10.430.350.170.130.140.20.090.330.210.110.20.170.080.010.050.110.050.07
re30.210.080.1800.220.290.270.30.050.120.370.160.280.180.260.220.080.140.270.2
re40.090.130.150.070.170.220.310.290.170.140.130.320.210.150.230.240.020.030.01−0.05
rfs10.03−0.010.030.050.140.080.140.080.120.260.260.140.30.250.370.26−0.24−0.130.090.04
rfs20.16−0.03−0.05−0.020.0300.13−0.040.02−0.040.03−0.020.01−0.06−0.05−0.080.10.080.140.17
rfs30.05−0.020.080−0.020.040.060.070.10.17−0.060.130.160.230.130.170.110.010.040.07
rfs400.08−0.13−0.090.04−0.010.20.12−0.07−0.110.010.020.020.090.030.04−0.040.060.110.25
se110.650.420.310.40.270.440.150.590.30.310.110.280.10.110.060.390.270.280.24
se20.6510.20.290.120.190.20.180.550.330.080.080.150.04−0.1−0.070.140.050.030
se30.420.210.530.270.240.07−0.050.330.590.31−0.020.140.310.080.050.210.210.130.23
se40.310.290.5310.050.220.080.160.140.480.09−0.020.040.25−0.07−0.08−0.060.030.020.04
se50.40.120.270.0510.590.480.150.230.250.680.240.250.120.320.120.290.180.290.24
se60.270.190.240.220.5910.290.260.10.260.490.090.150.090.18−0.020.11−0.010.110.11
se70.440.20.070.080.480.2910.650.260.170.420.480.180.010.230.160.290.220.390.33
se80.150.18−0.050.160.150.260.6510.130.150.20.420.050.010.180.10.10.050.120.05
si10.590.550.330.140.230.10.260.1310.510.370.360.50.250.270.270.240.170.190.16
si20.30.330.590.480.250.260.170.150.5110.430.230.330.390.160.1500.050.150.13
si30.310.080.310.090.680.490.420.20.370.4310.370.370.230.440.340.140.080.290.27
si40.110.08−0.02−0.020.240.090.480.420.360.230.3710.320.120.240.470.20.090.380.33
sn10.280.150.140.040.250.150.180.050.50.330.370.3210.650.650.570.130.030.250.19
sn20.10.040.310.250.120.090.010.010.250.390.230.120.6510.480.530.010.070.140.05
sn30.11−0.10.08−0.070.320.180.230.180.270.160.440.240.650.4810.590.060.070.270.08
sn40.06−0.070.05−0.080.12−0.020.160.10.270.150.340.470.570.530.5910.130.040.270.16
ta10.390.140.21−0.060.290.110.290.10.2400.140.20.130.010.060.1310.650.520.5
ta20.270.050.210.030.18−0.010.220.050.170.050.080.090.030.070.070.040.6510.560.45
ta30.280.030.130.020.290.110.390.120.190.150.290.380.250.140.270.270.520.5610.76
ta40.2400.230.040.240.110.330.050.160.130.270.330.190.050.080.160.50.450.761

Appendix D. Code Used for Analysis

The code used for the SEM analysis can be found at the following GitHub page: https://github.com/TKForgeron/SEMinR-Analysis-The-Effect-of-Countermeasure-Readability-on-Security-Intentions (accessed on 14 September 2021).

References

  1. Kemp, S.; Hootsuite; We Are Social. Digital 2021 July Global Statshot Report. Available online: https://datareportal.com/reports/digital-2021-july-global-statshot (accessed on 17 August 2021).
  2. Agostino, D.; Arnaboldi, M.; Lema, M.D. New development: COVID-19 as an accelerator of digital transformation in public service delivery. Public Money Manag. 2020, 41, 69–72. [Google Scholar] [CrossRef]
  3. ENISA. Top Ten Cyber Hygiene Tips for SMEs during COVID-19 Pandemic. Available online: https://www.enisa.europa.eu/news/enisa-news/top-ten-cyber-hygiene-tips-for-smes-during-covid-19-pandemic (accessed on 24 May 2021).
  4. Lida, J. Digital Transformation vs COVID-19: The Case of Japan. Digit. Law J. 2020, 1, 8–16. [Google Scholar] [CrossRef]
  5. Soto-Acosta, P. COVID-19 Pandemic: Shifting Digital Transformation to a High-Speed Gear. Inf. Syst. Manag. 2020, 37, 260–266. [Google Scholar] [CrossRef]
  6. Smith, Z.; Lostri, E.; Lewis, J. The Hidden Costs of Cybercrime; Technical Report; McAfee Inc.: San Jose, CA, USA, 2020. [Google Scholar]
  7. Heidt, M.; Gerlach, J.P.; Buxmann, P. Investigating the Security Divide between SME and Large Companies: How SME Characteristics Influence Organizational IT Security Investments. Inf. Syst. Front. 2019, 21, 1285–1305. [Google Scholar] [CrossRef]
  8. Van Haastrecht, M.; Yigit Ozkan, B.; Brinkhuis, M.; Spruit, M. Respite for SMEs: A Systematic Review of Socio-Technical Cybersecurity Metrics. Appl. Sci. 2021, 11, 6909. [Google Scholar] [CrossRef]
  9. Holt, T.; Bossler, A. Cybercrime in Progress, 1st ed.; Routledge: Abingdon, UK, 2015. [Google Scholar] [CrossRef]
  10. Hanus, B.; Wu, Y. Impact of Users’ Security Awareness on Desktop Security Behavior: A Protection Motivation Theory Perspective. Inf. Syst. Manag. 2015, 33, 2–16. [Google Scholar] [CrossRef]
  11. Ifinedo, P. Understanding information systems security policy compliance: An integration of the theory of planned behavior and the protection motivation theory. Comput. Secur. 2012, 31, 83–95. [Google Scholar] [CrossRef]
  12. Martens, M.; De Wolf, R.; De Marez, L. Investigating and comparing the predictors of the intention towards taking security measures against malware, scams and cybercrime in general. Comput. Hum. Behav. 2019, 92, 139–150. [Google Scholar] [CrossRef]
  13. Alkhurayyif, Y.; Weir, G.R.S. Readability as a basis for information security policy assessment. In Proceedings of the 2017 Seventh International Conference on Emerging Security Technologies (EST), Canterbury, UK, 6–8 September 2017; pp. 114–121. [Google Scholar] [CrossRef] [Green Version]
  14. Alkhurayyif, Y.; Weir, G.R.S. Using Sequential Exploratory Mixed Methods Design to Explore Readability of ISPs. In Proceedings of the 2018 International Conference on Computing, Electronics Communications Engineering (iCCECE), Southend, UK, 16–17 August 2018; pp. 123–127. [Google Scholar] [CrossRef]
  15. Hameed, M.A.; Arachchilage, N.A.G. The role of self-efficacy on the adoption of information systems security innovations: A meta-analysis assessment. Pers. Ubiquitous Comput. 2021, 25, 911–925. [Google Scholar] [CrossRef]
  16. Hong, Y.; Furnell, S. Understanding cybersecurity behavioral habits: Insights from situational support. J. Inf. Secur. Appl. 2021, 57, 102710. [Google Scholar] [CrossRef]
  17. Vrhovec, S.; Mihelič, A. Redefining threat appraisals of organizational insiders and exploring the moderating role of fear in cyberattack protection motivation. Comput. Secur. 2021, 106, 1–22. [Google Scholar] [CrossRef]
  18. Wood, R.; Bandura, A. Impact of conceptions of ability on self-regulatory mechanisms and complex decision making. J. Personal. Soc. Psychol. 1989, 56, 407–415. [Google Scholar] [CrossRef]
  19. Bandura, A.; Jourden, F.J. Self-regulatory mechanisms governing the impact of social comparison on complex decision making. J. Personal. Soc. Psychol. 1991, 60, 941–951. [Google Scholar] [CrossRef]
  20. Stajkovic, A.D.; Luthans, F. Social cognitive theory and self-efficacy: Going beyond traditional motivational and behavioral approaches. Organ. Dyn. 1998, 26, 62–74. [Google Scholar] [CrossRef]
  21. Bandura, A. Social Foundations of Thought and Action; Prentice Hall: Upper Saddle River, NJ, USA, 1986. [Google Scholar]
  22. Bandura, A. Self-efficacy: Toward a unifying theory of behavioral change. Psychol. Rev. 1977, 84, 191–215. [Google Scholar] [CrossRef]
  23. Rogers, R.W. A Protection Motivation Theory of Fear Appeals and Attitude Change. J. Psychol. 1975, 91, 93–114. [Google Scholar] [CrossRef]
  24. Gagné, M.; Deci, E.L. Self-determination theory and work motivation. J. Organ. Behav. 2005, 26, 331–362. [Google Scholar] [CrossRef] [Green Version]
  25. Champion, V.; Skinner, C. The Health Belief Model. In Health Behavior and Health Education: Theory, Research, and Practice, 4th ed.; Jossey-Bass: San Francisco, CA, USA, 2008; pp. 45–65. [Google Scholar]
  26. Claar, C. The Adoption of Computer Security: An Analysis of Home Personal Computer User Behavior Using the Health Belief Model. Ph.D. Thesis, Utah State University, Logan, UT, USA, 2011. [Google Scholar]
  27. Ng, B.Y.; Kankanhalli, A.; Xu, Y.C. Studying users’ computer security behavior: A health belief perspective. Decis. Support Syst. 2009, 46, 815–825. [Google Scholar] [CrossRef]
  28. Bauer, S.; Bernroider, E.W. The Effects of Awareness Programs on Information Security in Banks: The Roles of Protection Motivation and Monitoring; Lecture Notes in Computer Science; Springer Publishing: New York, NY, USA, 2015; pp. 154–164. [Google Scholar] [CrossRef]
  29. Sommestad, T.; Karlzén, H.; Hallberg, J. A Meta-Analysis of Studies on Protection Motivation Theory and Information Security Behaviour. Int. J. Inf. Secur. Priv. 2015, 9, 26–46. [Google Scholar] [CrossRef] [Green Version]
  30. Milne, S.; Sheeran, P.; Orbell, S. Prediction and Intervention in Health-Related Behavior: A Meta-Analytic Review of Protection Motivation Theory. J. Appl. Soc. Psychol. 2000, 30, 106–143. [Google Scholar] [CrossRef]
  31. Ajzen, I. The theory of planned behavior. Organ. Behav. Hum. Decis. Process. 1991, 50, 179–211. [Google Scholar] [CrossRef]
  32. Fishbein, M.; Ajzen, I. Belief, Attitude, Intention and Behavior: An Introduction to Theory and Research (Addison-Wesley Series in Social Psychology); Addison-Wesley: Boston, MA, USA, 1975. [Google Scholar]
  33. Ajzen, I.; Madden, T.J. Prediction of goal-directed behavior: Attitudes, intentions, and perceived behavioral control. J. Exp. Soc. Psychol. 1986, 22, 453–474. [Google Scholar] [CrossRef]
  34. Richards, J.; Schmidt, R. Longman Dictionary of Language Teaching and Applied Linguistics, 4th ed.; Taylor & Francis: Abingdon, UK, 2015. [Google Scholar]
  35. DuBay, W. Smart Language: Readers, Readability, and the Grading of Text; BookSurge Publishing: North Charleston, SC, USA, 2007. [Google Scholar]
  36. Dale, E.; Chall, J.S. The Concept of Readability. Elem. Engl. 1949, 26, 19–26. [Google Scholar]
  37. Klare, G.R. The Measurement of Readability; Amsterdam University Press: Amsterdam, The Netherlands, 1963. [Google Scholar]
  38. Calonia, J. What Is Readability? Available online: https://www.grammarly.com/blog/readability/ (accessed on 24 May 2021).
  39. Hargis, G.; Carey, M.; Hernandez, A.K.; Hughes, P.; Longo, D.; Rouiller, S.; Wilde, E. Developing Quality Technical Information: A Handbook for Writers and Editors, 2nd ed.; IBM Press: Indianapolis, IN, USA, 2004. [Google Scholar]
  40. Dell’Orletta, F.; Wieling, M.; Venturi, G.; Cimino, A.; Montemagni, S. Assessing the Readability of Sentences: Which Corpora and Features? In Proceedings of the Ninth Workshop on Innovative Use of NLP for Building Educational Applications, Association for Computational Linguistics (ACL), Baltimore, MD, USA, 26 June 2015; pp. 163–173. [Google Scholar] [CrossRef]
  41. Campbell, G.; Weir, G. Matching readers to texts with the Strathclyde readability measure. In ICT in the Analysis, Teaching and Learning of Languages; Preprints of the ICTATLL Workshop 2006; Strathprints: Glasgow, UK, 2006. [Google Scholar]
  42. Chapin, D.; Akridge, S. How can security be measured? Inf. Syst. Control J. 2005, 2, 43–47. [Google Scholar]
  43. Van Oosten, P.; Tanghe, D.; Hoste, V. Towards an improved methodology for automated readability prediction. In Proceedings of the 7th Conference on International Language Resources and Evaluation (LREC 2010), European Language Resources Association (ELRA), Valetta, Malta, 19–21 May 2010; pp. 775–782. [Google Scholar]
  44. Chenoweth, T.; Minch, R.; Gattiker, T. Application of Protection Motivation Theory to Adoption of Protective Technologies. In Proceedings of the 2009 42nd Hawaii International Conference on System Sciences, Waikoloa, HI, USA, 5–8 January 2009; pp. 1–10. [Google Scholar] [CrossRef]
  45. Dang-Pham, D.; Pittayachawan, S. Comparing intention to avoid malware across contexts in a BYOD-enabled Australian university: A Protection Motivation Theory approach. Comput. Secur. 2015, 48, 281–297. [Google Scholar] [CrossRef]
  46. Gurung, A.; Luo, X.; Liao, Q. Consumer motivations in taking action against spyware: An empirical investigation. Inf. Manag. Comput. Secur. 2009, 17, 276–289. [Google Scholar] [CrossRef] [Green Version]
  47. Lee, Y.; Larsen, K.R. Threat or coping appraisal: Determinants of SMB executives’ decision to adopt anti-malware software. Eur. J. Inf. Syst. 2009, 18, 177–187. [Google Scholar] [CrossRef]
  48. Meso, P.; Ding, Y.; Xu, S. Applying Protection Motivation Theory to Information Security Training for College Students. J. Inf. Priv. Secur. 2013, 9, 47–67. [Google Scholar] [CrossRef]
  49. Tsai, H.y.S.; Jiang, M.; Alhabash, S.; LaRose, R.; Rifon, N.J.; Cotten, S.R. Understanding online safety behaviors: A protection motivation theory perspective. Comput. Secur. 2016, 59, 138–150. [Google Scholar] [CrossRef] [Green Version]
  50. Laukkanen, T. Consumer adoption versus rejection decisions in seemingly similar service innovations: The case of the Internet and mobile banking. J. Bus. Res. 2016, 69, 2432–2439. [Google Scholar] [CrossRef]
  51. Yousafzai, S.Y.; Foxall, G.R.; Pallister, J.G. Explaining Internet Banking Behavior: Theory of Reasoned Action, Theory of Planned Behavior, or Technology Acceptance Model? J. Appl. Soc. Psychol. 2010, 40, 1172–1202. [Google Scholar] [CrossRef]
  52. Woon, I.; Tan, G.; Low, R. A Protection Motivation Theory Approach to Home Wireless Security; Association for Information Systems: Atlanta, GA, USA, 2005. [Google Scholar]
  53. Wason, K.D.; Polonsky, M.J.; Hyman, M.R. Designing Vignette Studies in Marketing. Australas. Mark. J. 2002, 10, 41–58. [Google Scholar] [CrossRef] [Green Version]
  54. Cisco Systems. What Are the Most Common Cyber Attacks? Available online: https://www.cisco.com/c/en/us/products/security/common-cyberattacks.html (accessed on 19 February 2021).
  55. Anderson, C.; Agarwal, R. Practicing Safe Computing: A Multimethod Empirical Examination of Home Computer User Security Behavioral Intentions. MIS Q. 2010, 34, 613–643. [Google Scholar] [CrossRef] [Green Version]
  56. Vagias, W. Likert-Type Scale Response Anchors; Technical Report; Clemson University: Clemson, SC, USA, 2006. [Google Scholar]
  57. Liu, Y.; Doucette, W.R.; Farris, K.B. Perceived difficulty and self-efficacy in the factor structure of perceived behavioral control to seek drug information from physicians and pharmacists. Res. Soc. Adm. Pharm. 2007, 3, 145–159. [Google Scholar] [CrossRef] [PubMed]
  58. My Byline Media. Dale-Chall Readability Calculator. Available online: https://readabilityformulas.com/free-dale-chall-test.php (accessed on 8 July 2021).
  59. WebFX. Readable. Available online: https://www.webfx.com/tools/read-able/ (accessed on 24 May 2021).
  60. Harrison, C. Tip Sheet on Question Wording. Available online: https://psr.iq.harvard.edu/files/psr/files/PSRQuestionnaireTipSheet_0.pdf (accessed on 24 May 2021).
  61. Hair, J.; Hult, T.; Ringle, C.; Sarstedt, M. A Primer on Partial Least Squares Structural Equation Modeling (PLS-SEM), 2nd ed.; SAGE Publications: Thousand Oaks, CA, USA, 2017. [Google Scholar]
  62. Ray, S.; Danks, N.; Valdez, A.; Estrada, J.; Uanhoro, J.; Nakayama, J.; Koyan, L.; Burbach, L.; Bejar, A.; Adler, S. SEMinR (2.1.0). Available online: https://cran.r-project.org/web/packages/seminr/ (accessed on 8 July 2021).
  63. Diamantopoulos, A. The error term in formative measurement models: Interpretation and modeling implications. J. Model. Manag. 2006, 1, 7–17. [Google Scholar] [CrossRef]
  64. Hair, J.F.; Sarstedt, M.; Ringle, C.M.; Mena, J.A. An assessment of the use of partial least squares structural equation modeling in marketing research. J. Acad. Mark. Sci. 2011, 40, 414–433. [Google Scholar] [CrossRef]
  65. Hanafiah, M. Formative Vs. Reflective Measurement Model: Guidelines for Structural Equation Modeling Research. Int. J. Anal. Appl. 2020, 18, 876–889. [Google Scholar] [CrossRef]
  66. Edwards, J.R.; Bagozzi, R.P. On the nature and direction of relationships between constructs and measures. Psychol. Methods 2000, 5, 155–174. [Google Scholar] [CrossRef]
  67. Petter, S.; Straub, D.; Rai, A. Specifying Formative Constructs in Information Systems Research. MIS Q. 2007, 31, 623. [Google Scholar] [CrossRef] [Green Version]
  68. Ramayah, T.; Cheah, J.; Chuah, F.; Ting, H.; Memon, M. Partial Least Squares Structural Equation Modeling (PLS-SEM) Using SmartPLS 3.0: An Updated Guide and Practical Guide to Statistical Analysis, 2nd ed.; Pearson: London, UK, 2018. [Google Scholar]
  69. Henseler, J.; Dijkstra, T.K.; Sarstedt, M.; Ringle, C.M.; Diamantopoulos, A.; Straub, D.W.; Ketchen, D.J.; Hair, J.F.; Hult, G.T.M.; Calantone, R.J. Common Beliefs and Reality About PLS. Organ. Res. Methods 2014, 17, 182–209. [Google Scholar] [CrossRef] [Green Version]
  70. Roberts, N.; Thatcher, J. Conceptualizing and testing formative constructs. Database Adv. Inf. Syst. 2009, 40, 9–39. [Google Scholar] [CrossRef]
  71. Marakas, G.; Johnson, R.; Clay, P. The Evolving Nature of the Computer Self-Efficacy Construct: An Empirical Investigation of Measurement Construction, Validity, Reliability and Stability Over Time. J. Assoc. Inf. Syst. 2007, 8, 16–46. [Google Scholar] [CrossRef]
  72. Trochim, W.; Donnelly, J. The Research Methods Knowledge Base, 3rd ed.; Atomic Dog: Cincinnati, OH, USA, 2006. [Google Scholar]
  73. Chin, W. The partial least squares approach for structural equation modeling. In Modern Methods for Business Research; Lawrence Erlbaum Associates Publishers: Abingdon, UK, 1998; pp. 295–336. [Google Scholar]
  74. Keith, T. Multiple Regression and Beyond, 3rd ed.; Taylor & Francis: Abingdon, UK, 2019. [Google Scholar] [CrossRef]
  75. Kenny, D. Correlation and Causality; Wiley: Hoboken, NJ, USA, 1979. [Google Scholar]
  76. Becker, J. Interpreting Path Coefficients. Available online: https://forum.smartpls.com/viewtopic.php?t=16088 (accessed on 8 July 2021).
  77. Johnston, A.; Warkentin, M. Fear Appeals and Information Security Behaviors: An Empirical Study. MIS Q. 2010, 34, 549–566. [Google Scholar] [CrossRef]
  78. Rhee, H.S.; Kim, C.; Ryu, Y.U. Self-efficacy in information security: Its influence on end users’ information security practice behavior. Comput. Secur. 2009, 28, 816–826. [Google Scholar] [CrossRef]
  79. Cohen, J. Statistical Power Analysis for the Behavioral Sciences, 2nd ed.; Routledge: Abingdon, UK, 1988. [Google Scholar]
  80. Benoit, K.; Watanabe, K.; Wang, H.; Nulty, P.; Obeng, A.; Müller, S.; Matsuo, A. Quanteda: An R package for the quantitative analysis of textual data. J. Open Source Softw. 2018, 3, 774. [Google Scholar] [CrossRef] [Green Version]
  81. DiMascio, C.; Amos, R.; Stevens, M.; Chakraborty, S. Py-Readability-Metrics. Available online: https://github.com/cdimascio/py-readability-metrics (accessed on 8 July 2021).
  82. Lumley, T.; Diehr, P.; Emerson, S.; Chen, L. The Importance of the Normality Assumption in Large Public Health Data Sets. Annu. Rev. Public Health 2002, 23, 151–169. [Google Scholar] [CrossRef]
  83. Hanel, P.H.P.; Vione, K.C. Do Student Samples Provide an Accurate Estimate of the General Public? PLoS ONE 2016, 11, e0168354. [Google Scholar] [CrossRef] [Green Version]
  84. Frost, J. Introduction to Bootstrapping in Statistics with an Example. Available online: https://statisticsbyjim.com/hypothesis-testing/bootstrapping/ (accessed on 8 July 2021).
  85. Wanous, J.P.; Reichers, A.E.; Hudy, M.J. Overall job satisfaction: How good are single-item measures? J. Appl. Psychol. 1997, 82, 247–252. [Google Scholar] [CrossRef]
  86. Cheah, J.H.; Sarstedt, M.; Ringle, C.M.; Ramayah, T.; Ting, H. Convergent validity assessment of formatively measured constructs in PLS-SEM. Int. J. Contemp. Hosp. Manag. 2018, 30, 3192–3210. [Google Scholar] [CrossRef]
  87. Drolet, A.L.; Morrison, D.G. Do We Really Need Multiple-Item Measures in Service Research? J. Serv. Res. 2001, 3, 196–204. [Google Scholar] [CrossRef]
  88. Crossley, S.A.; Skalicky, S.; Dascalu, M.; McNamara, D.S.; Kyle, K. Predicting Text Comprehension, Processing, and Familiarity in Adult Readers: New Approaches to Readability Formulas. Discourse Process. 2017, 54, 340–359. [Google Scholar] [CrossRef]
  89. Curto, P.; Mamede, N.; Baptista, J. Automatic Text Difficulty Classifier—Assisting the Selection of Adequate Reading Materials for European Portuguese Teaching; SCITEPRESS—Science and and Technology Publications: Setúbal, Portugal, 2015; pp. 36–44. [Google Scholar] [CrossRef]
  90. Nadeem, F.; Ostendorf, M. Estimating Linguistic Complexity for Science Texts. In Proceedings of the Thirteenth Workshop on Innovative Use of NLP for Building Educational Applications, Association for Computational Linguistics (ACL), New Orleans, LA, USA, 5 June 2018; pp. 45–55. [Google Scholar] [CrossRef]
  91. Gratian, M.; Bandi, S.; Cukier, M.; Dykstra, J.; Ginther, A. Correlating human traits and cyber security behavior intentions. Comput. Secur. 2018, 73, 345–358. [Google Scholar] [CrossRef]
  92. Dempsey, K.; Eavy, P.; Goren, N.; Moore, G. Automation Support for Security Control Assessments; Technical Report NISTIR 8011; National Institute of Standards and Technology (NIST): Gaithersburg, MD, USA, 2018. [Google Scholar] [CrossRef]
  93. Mulloy, E. Zero-Day Vulnerabilities and Zero-Day Attacks. Available online: https://www.sdsolutionsllc.com/zero-day-vulnerabilities-and-zero-day-attacks/ (accessed on 24 May 2021).
  94. Swiss Federal Department of Finance. Malware. Available online: https://www.ncsc.admin.ch/ncsc/en/home/cyberbedrohungen/malware.html (accessed on 24 May 2021).
  95. Swiss Federal Department of Finance. Phishing. Available online: https://www.ncsc.admin.ch/ncsc/en/home/cyberbedrohungen/phishing.html (accessed on 24 May 2021).
  96. Cisco Systems. Cisco IOS Firewall Intrusion Detection System. Available online: https://newsroom.cisco.com/dlls/IOSIDSDS.pdf (accessed on 24 May 2021).
  97. Gontharet, F. Man-in-The-Middle Attacks & Countermeasures Analysis. Master’s Thesis, Abertay University, Dundee, UK, 2015. [Google Scholar] [CrossRef]
  98. Finjan. What Are Zero-Day Threats and How to Guard against Them? Available online: https://blog.finjan.com/zero-day-threats/ (accessed on 24 May 2021).
  99. Sophos. Zero-Day Threats: Guarding against the Unknown Enemy. Available online: https://www.sophos.com/en-us/security-news-trends/security-trends/zeroday-threats.aspx (accessed on 24 May 2021).
Figure 1. Protection motivation theory applied to desktop security behavior. Redrawn from Hanus and Wu [10].
Figure 1. Protection motivation theory applied to desktop security behavior. Redrawn from Hanus and Wu [10].
Jcp 01 00034 g001
Figure 2. Proposed conceptual framework. An extended PMT model applied to a cybersecurity context based on Hanus and Wu [10].
Figure 2. Proposed conceptual framework. An extended PMT model applied to a cybersecurity context based on Hanus and Wu [10].
Jcp 01 00034 g002
Figure 3. The research model results. Note: * p < 0.05 ; * * p < 0.01 ; * * * p < 0.001 ; n s —not significant.
Figure 3. The research model results. Note: * p < 0.05 ; * * p < 0.01 ; * * * p < 0.001 ; n s —not significant.
Jcp 01 00034 g003
Table 1. List of hypotheses this paper investigates.
Table 1. List of hypotheses this paper investigates.
IndexHypothesisSource(s)
H1Countermeasure reading disposition positively affects countermeasure readability[35]
H2Countermeasure awareness positively affects countermeasure readability[35]
H3Threat awareness is a positive predictor of perceived severity[10,12]
H4Threat awareness is a positive predictor of perceived vulnerability[48]
H5Countermeasure readability is a positive predictor of self-efficacyProposed
H6Countermeasure readability is a negative predictor of response costProposed
H7Countermeasure awareness is a positive predictor of self-efficacy[10,12]
H8Countermeasure awareness is a negative predictor of response cost[10]
H9Countermeasure awareness is a positive predictor of response efficacy[10,12]
H10Perceived severity is a positive predictor of security intentions[28,44,45,52]
H11Perceived vulnerability is a positive predictor of security intentions[44]
H12Self-efficacy is a positive predictor of security intentions[10,28,45,52]
H13Response cost is a negative predictor of security intentions[44,45,48,49,52]
H14Response efficacy is a positive predictor of security intentions[10,28,44,52]
H15Subjective norm is a positive predictor of security intentions[12,49]
Table 2. Correlations of formative indicators. Note that correlation is a bidirectional relationship.
Table 2. Correlations of formative indicators. Note that correlation is a bidirectional relationship.
ConstructRelationshipCorrelation
Countermeasure reading dispositioncrd1 crd20.739
Countermeasure readabilitycr1 cr20.773
Countermeasure readabilitycr3 cr40.733
Countermeasure readabilitycr5 cr60.818
Countermeasure readabilitycr7 cr80.869
Self-efficacyse1 se20.654
Self-efficacyse3 se40.532
Self-efficacyse5 se60.592
Self-efficacyse7 se80.649
Table 3. t-Test results comparing readability metrics with perceived readability and corresponding descriptive statistics.
Table 3. t-Test results comparing readability metrics with perceived readability and corresponding descriptive statistics.
This Text Is Easy to ReadThis Text Is Easy to Understand
M5.47 (‘hard’)5.95 (‘easy’)5.36 (‘hard’)5.84 (‘easy’)
S D 1.29 (‘hard’)1.06 (‘easy’)1.33 (‘hard’)1.17 (‘easy’)
d f 350350
t3.93.6
p<0.001<0.001
Skewness−1.28−1.19
Kurtosis1.400.84
Table 4. Overview of PLS-SEM results of structural model analysis.
Table 4. Overview of PLS-SEM results of structural model analysis.
HypothesisPath CoefficientT Stat. F 2 2.5%CI97.5%CISupported?
H1: CRD CR−0.074−0.6710.020−0.2230.205No
H2: TA PS0.4401.386−0.4910.2400.706Yes
H3: TA PV−0.392−1.235−0.6140.1810.487No
H4: CR SE0.3221.8920.0470.1380.719No
H5: CR RC−0.142−0.522−0.7140.0150.372Yes
H6: CA CR0.75810.0470.6111.1840.899No
H7: CA SE0.4872.7640.0710.2230.770Yes
H8: CA RC−0.201−0.743−0.7030.0330.410No
H9: CA RE0.5472.9280.0800.4260.760Yes
H10: PS SI−0.021−0.139−0.257−0.0050.343No
H11: PV SI−0.073−0.685−0.223−0.0080.206No
H12: SE SI0.5753.5630.1920.1900.794Yes
H13: RC SI−0.096−0.803−0.3400.0070.129No
H14: RE SI−0.036−0.277−0.210−0.0140.297No
H15: SN SI0.2962.3080.0420.1790.542Yes
Table 5. Example countermeasure readability improvements. The gray rows contain the more readable countermeasures.
Table 5. Example countermeasure readability improvements. The gray rows contain the more readable countermeasures.
ThreatCountermeasureMetric Scores
Malware  Whenever possible, verify updates are automatically being installed. Alternatively, ensure all software packages are updated to their most recent version.
 Activate the operating system’s integrated firewall before you connect any device to the internet or other networks.
 Employ a virus protection program that frequently performs full system scans optimized for malicious software detection.
 Safeguard critical data by planning a regular off-site backup (e.g., cloud or tape backup) of systems, so recovery from cyber attacks will be a less complicated process.
FRE = 29.9 FKGL = 12.0 FOG = 14.4 DC = 10.6 CLI = 17.8 ARI = 11.3
Malware Where possible, make sure that updates are automatically installed. Otherwise, make sure to update all your software to the latest version.
 Make sure all your connections to the internet (or other networks) go through a firewall.
 Make sure you have set up an antivirus program that scans your systems for malware.
 Make sure your important data is regularly backed up in the cloud or another safe place, so coming back from an attack will be easier.
FRE = 61.2 FKGL = 8.5 FOG = 11.9 DC = 7.1 CLI = 12.3 ARI = 8.7
MitMVerify the establishment of an HTTPS connection when submitting confidential information to a website, signified by the lock symbol in or around the URL bar in the internet browser.
 Do not transmit confidential information via an insecure public Wi-Fi network.
 Ensure security of your local network by deploying an intrusion detection system.
FRE = 27.7 FKGL = 13.8 FOG = 17.6 DC = 10.8 CLI = 16.0 ARI = 12.8
MitMMake sure websites where you give personal info have an HTTPS connection as shown by the lock icon in or around the address bar in your browser.
 Never give out personal data over an insecure public Wi-Fi network.
 Make sure your network is secured with an intrusion detection system.
FRE = 61.3 FKGL = 8.8 FOG = 11.5 DC = 7.0 CLI = 11.3 ARI = 8.6
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Smit, T.; van Haastrecht, M.; Spruit, M. The Effect of Countermeasure Readability on Security Intentions. J. Cybersecur. Priv. 2021, 1, 675-703. https://doi.org/10.3390/jcp1040034

AMA Style

Smit T, van Haastrecht M, Spruit M. The Effect of Countermeasure Readability on Security Intentions. Journal of Cybersecurity and Privacy. 2021; 1(4):675-703. https://doi.org/10.3390/jcp1040034

Chicago/Turabian Style

Smit, Tim, Max van Haastrecht, and Marco Spruit. 2021. "The Effect of Countermeasure Readability on Security Intentions" Journal of Cybersecurity and Privacy 1, no. 4: 675-703. https://doi.org/10.3390/jcp1040034

Article Metrics

Back to TopTop