Cyber hygiene: The concept, its measure, and its initial tests
Section snippets
Defining cyber hygiene
Cyber hygiene draws from the concept of personal hygiene from the public health literature. In a major report examining cyber hygiene practices across various nations, the European Union Agency for Network and Information Security (ENISA) stated that “cyber hygiene should be viewed in the same manner as personal hygiene and, once properly integrated into an organization will be simple daily routines, good behaviors and occasional checkups to make sure the organizations online health is in
Operational definition of cyber hygiene
When it comes to personal hygiene, individuals do not need to understand disease transmission in order to enact it. For instance, people do not need to know how disease transmission occurs in order to know to cover their mouths when sneezing. This is because understanding the specifics of how various diseases are transmitted is far too complex and unnecessary for most users who need to simply be aware of the need to enact the hygiene practice.
Furthermore, from a public health point of view,
Concept mapping
Concept mapping is a mixed-method, statistical approach for measuring and understanding complex, multi-faceted phenomena [13]. The methodology has been applied in business, urban planning, and healthcare research for visualizing the conceptual relationship between different constructs, empirically developing their measures, and studying complex phenomenon [13,14,22,23]. The overall approach borrows from the traditional Likert scale development approach for the development of items lists, but
Overall discussion
The research derived a conceptual definition of cyber hygiene and, using a series of studies, empirically developed the first-ever Cyber Hygiene Inventory (CHI) measuring general Internet user cyber hygiene. The final 18 items, encompassing five dimensions of cyber hygiene, measure users' cognitive associations between different online actions and the extent to which the individual is aware of them.
The research makes the following three major contributions to the science of cyber security.
Arun Vishwanath, Ph.D., MBA, is leading expert on the “people problems” of cyber security. He is an alumnus of the Berkman Klein Center at Harvard University and has held faculty appointments at Indiana University, Bloomington, and the University at Buffalo.Arun has authored close to fifty peer-reviewed research papers on the science of cyber security and has contributed opinion pieces on CNN, The Washington Post, and other media. He has also been quoted in leading outlets such as Wired
References (38)
An introduction to concept mapping for planning and evaluation
Eval. Prog. Plan.
(1989)- et al.
The use of concept mapping for scale development and validation in evaluation
Eval. Prog. Plan.
(2007) - et al.
Analysis of end user security behaviors
Comput. Secur.
(2005) - et al.
Studying users' computer security behavior: a health belief perspective
Decis. Support. Syst.
(2009) - et al.
The impact of electronic medical record systems on outpatient workflows: a longitudinal evaluation of its workflow effects
Int. J. Med. Inform.
(2010) - et al.
Internet self-efficacy and electronic service acceptance
Decis. Support. Syst.
(2004) - et al.
Effects of training on Internet self-efficacy and computer user attitudes
Comput. Hum. Behav.
(2002) - et al.
Examining the influence of online reviews on consumers' decision-making: a heuristic–systematic model
Decis. Support. Syst.
(2014) - Armerding, T. (2016, October 13). The OPM Breach Report: A Long Time Coming. CSO. Retrieved from...
Inside the cyberattack that shocked the US government
Obama's cyber legacy: He did (almost) everything right and it still turned out wrong
Critical cybersecurity hygiene: patching the enterprise
#SaferInternet4EU campaign [Brochure]
Cited by (45)
Ethical principles shaping values-based cybersecurity decision-making
2024, Computers and SecurityCyber hygiene concepts for nursing education
2023, Nurse Education TodayCyber hygiene practices across cultures: A cross cultural study of the us and saudi arabia based information systems users
2023, Procedia Computer ScienceMeasuring cyber secure behavior of elementary and high school students in the Netherlands
2022, Computers and EducationCitation Excerpt :However, there is no clear definition of this term in academic research (Vishwanath et al., 2020). The present research is based on an adapted version of the definition of Vishwanath et al. (2020, ): Cyber secure behavior concerns “the cyber security practices that online consumers should adopt to protect the safety and integrity of their personal information and their employer's information on their internet-enabled devices from being compromised in a cyber-attack”. Cyber security is a broad concept.
Net valence analysis of iris recognition technology-based FinTech
2024, Financial Innovation
Arun Vishwanath, Ph.D., MBA, is leading expert on the “people problems” of cyber security. He is an alumnus of the Berkman Klein Center at Harvard University and has held faculty appointments at Indiana University, Bloomington, and the University at Buffalo.Arun has authored close to fifty peer-reviewed research papers on the science of cyber security and has contributed opinion pieces on CNN, The Washington Post, and other media. He has also been quoted in leading outlets such as Wired Magazine, USA Today, Politico, Scientific American, Chicago Tribune, and others.