Predicting Cybersecurity Incidents via Self-Reported Behavioral and Psychological Indicators: A Stratified Logistic Regression Approach
Abstract
1. Introduction
2. Literature Review
2.1. Behavioral-Cognitive Domains of Cyber Risk
2.2. Self-Reported Cybersecurity Incidents: Typology and Prior Research
2.3. Predictive Modeling in Cybersecurity Research
3. Methodology
3.1. Participants and Procedure
- Data Collection Challenges in Cybersecurity Research
- Two-Phase Recruitment Strategy
- Phase 1: Pilot Sample (N = 197)
- Phase 2: Prolific Sample (5 Rounds, Total N = 256 Cleaned)
- Round 1 (N = 6 cleaned): Trial Deployment
- Round 2 (N = 130 cleaned): Main Data Collection Launch
- Round 3 (N = 40 cleaned): Country and Education Balancing
- Round 4 (N = 40 cleaned): Occupational Layer Expansion (STEM/IT)
- Round 5 (N = 40 cleaned): Sectoral Balancing (Education)
3.2. Survey Design and Item Construction
3.2.1. Item Development and Theoretical Alignment
3.2.2. Demographic and Work-Style Variables
3.2.3. Incident Outcome Variables
- Mild incidents: INC1–INC3 (e.g., account lockout, suspicious login alerts, password resets)
- Serious incidents: INC4–INC6 (e.g., financial loss, impersonation, ransomware/device failure)
- AtLeastOneMild: Respondent reported at least one mild incident (INC1, INC2, or INC3),
- AtLeastTwoMild: Respondent reported two or more mild incidents,
- AllThreeMild: Respondent reported all three mild incidents,
- AtLeastOneSerious: Respondent reported at least one serious incident (INC4, INC5, or INC6),
- AtLeastTwoSerious: Respondent reported two or more serious incidents,
- AllThreeSerious: Respondent reported all three serious incidents.
3.3. Predictive Modeling Strategy
4. Results
4.1. Internal Consistency and Dimensionality of Domain Items
- Work–Life Blurring (WLB): Two Latent Dimensions
- Factor 1 reflected mental and temporal interference, including work encroaching on personal time or space, such as WLB3 (work tasks interrupt personal time), WLB6_R (difficulty maintaining separation), WLB8 (checking work emails during personal time), WLB10 (mental detachment difficulties), and WLB4 (blended digital identity).
- Factor 2 captured platform and device overlap, including the use of shared tools and accounts across work and personal domains, as in WLB2 (checking personal accounts on work devices), WLB5 (using work platforms for personal tasks), WLB7 (shared platforms), WLB9 (shared physical space), and WLB1 (interchangeable accounts).
- Risk Rationalization (RR): Conceptual Refinement Improves Structure
- Cybersecurity Behavior (CB): Behavioral Diversity Drives Factor Split
- Factor 1 captured credential-related risks, including password reuse (CB2), skipping software security checks (CB3), and underestimating personal responsibility for account protection (CB6).
- Factor 2 reflected proactive and protective behaviors, such as creating backups (CB4), using two-factor authentication (CB1), storing passwords in a password manager (CB5), and regularly checking for threats (CB7).
- Personality (P): Multi-Trait Structure Confirmed
- Openness (P1, P2): Interest in technology and innovation.
- Conscientiousness (P3, P4): Attention to detail, organization.
- Extraversion (P5, P6): Social engagement.
- Agreeableness (P7, P8): Conflict avoidance, empathy.
- Neuroticism (P9, P10): Anxiety and control concerns.
4.2. Model Results—All Data
4.3. Model Results—Layered Models
4.3.1. Education Layer
4.3.2. IT and Technology Layer
4.3.3. Country-Specific Layers: Hungary, UK, and USA
4.3.4. Specific Items of the Domains as Illustration
4.4. Post Hoc Evaluation: Individual-Level Predictors and Threshold Performance
4.4.1. Inclusion of Categorical Variables
- AUC increased from 0.810 to 0.884.
- 10-fold AUC improved from 0.676 to 0.789.
- 10-fold deviance R2 rose from 0.00% to 9.20%.
- Domain Stability and Item Variation
- Interaction Effects and Contextual Nuance
- WLB4 × Gender (D2): WLB4, (“My personal and professional digital lives are intertwined”) was a strong positive predictor overall. However, the negative interaction for men (−1.69, p = 0.034) indicates that this risk factor is more predictive for women and may be weaker or non-significant in male respondents.
- WLB9 × Age (D1): WLB9, (“My work and personal activities often take place in the same physical space”) became a significant risk factor only among younger individuals (interaction = +0.83, p = 0.050), possibly due to their more fluid work–life boundaries and domestic work setups.
- CB6 × Age (D1): CB6, (“I could probably do more to protect my online accounts”) was not significant overall but became a negative predictor among older users (−0.90, p = 0.078), suggesting that self-perceived vulnerability predicts actual risk more clearly in this group.
- P10 × Age (D1): P10, (“I’m worried about losing control of my data”) had a protective effect overall, but the interaction term (+0.77, p = 0.071) suggests that younger users may not translate this concern into protective action, diluting its effect.
4.4.2. Optimal Probability Threshold Selection for Classification
- Defining a Positive Event in Cybersecurity Risk Prediction
- Classification Metrics and Threshold Sensitivity
- True Positives (TP): Cases correctly predicted as having experienced a cybersecurity incident.
- True Negatives (TN): Cases correctly predicted as not having experienced an incident.
- False Positives (FP): Cases incorrectly predicted as positive.
- False Negatives (FN): Cases incorrectly predicted as negative.
- Precision (Positive Predictive Value): TP/(TP + FP)
- Recall (Sensitivity or True Positive Rate): TP/(TP + FN)
- Specificity (True Negative Rate): TN/(TN + FP)
- F1 Score: 2 * (Precision * Recall)/(Precision + Recall)
- Youden’s J Statistic: Sensitivity + Specificity − 1
- Accuracy = (TP + TN)/(TP + FP + TN + FN)
- ROC Curves and Threshold-Agnostic Evaluation
- Error Asymmetry in Cybersecurity Risk Prediction
- Toward Informed Threshold Selection
- -
- Maximum Youden’s J Statistic: A balance between sensitivity and specificity.
- -
- Maximum F1 Score: Best for rare-event detection when precision and recall must be balanced.
- -
- High Recall value: Trying to avoid the most dangerous situations.
- The Youden’s J and F1 Score thresholds (both at 0.47) offer a balanced trade-off, catching ~75% of real incidents with moderate false alarms.
- The High Recall threshold (0.17) catches 95.4% of true incidents but misclassifies many safe users as risky (68 false positives vs. only 9 true negatives).
5. Discussion
5.1. Summary of Findings
- AtLeastOneMild improved to a Good classification (10-fold AUC = 0.832; 10-fold deviance R2 = 17.98%), becoming the most robust model overall.
- AtLeastTwoMild also achieved Good performance (10-fold AUC = 0.770; 10-fold deviance R2 = 14.75%).
5.2. Interpretation and Practical Implications
5.2.1. Why Layered Models Outperform General Models
5.2.2. What Incident Outcomes Are Viable for Modeling
- -
- Event count thresholds: At least 10–20 positive cases per model, with a recommended 10:1 or greater case-to-predictor ratio for basic logistic regression.
- -
- Outcome reliability: Composites that combine multiple similar items (e.g., AtLeastTwoMild) generally perform better than single-item outcomes, due to increased signal strength.
- -
- Actionability: Outcomes used for modeling should have practical relevance for intervention or monitoring.
5.2.3. When to Use Contextual or Demographic Variables or to Optimize Classification Thresholds
- -
- They do not violate any ethical rule,
- -
- After base models have been trained and cross-validated,
- -
- In layers with sufficient sample size and event count to prevent overfitting,
- -
- When the case-to-variable ratio exceeds 10:1, or when stepwise regularization is used to manage redundancy.
- -
- Fairness audit variables (e.g., checking if model performance differs by gender),
- -
- Personalization enrichments (e.g., adapting alert thresholds based on age or device-sharing),
- -
- Exploratory factors for hypothesis generation, not primary model drivers.
5.2.4. Threshold Selection and the Risk of Overfitting
- -
- Using cross-validated Youden’s J or F1 score to identify balanced thresholds,
- -
- Visualizing ROC and DET curves to understand trade-offs under different operating points,
- -
- Calibrating thresholds per outcome and layer, rather than applying a universal cutoff,
- -
- Monitoring model performance over time to detect threshold drift as digital behaviors change.
5.2.5. Model Deployment in Organizational Settings
- -
- Clear documentation of scoring logic,
- -
- Minimum event and sample size thresholds,
- -
- Options for employee opt-in or feedback,
- -
- Routine fairness checks across demographic groups.
5.3. Limitations and Future Work
5.3.1. Rare Event Limitations
5.3.2. Generalization Risks in Small Subgroups
5.3.3. Biases from Self-Report and Convenience Sampling
5.3.4. Future Research Directions
6. Conclusions
Funding
Institutional Review Board Statement
Informed Consent Statement
Data Availability Statement
Conflicts of Interest
Appendix A
Item ID | Question Text | Domain | Response Options |
---|---|---|---|
D1 | What is your age range? | Demographics | Under 18; 18–24; 25–34; 35–44; 45–54; 55–64; 65 or older |
D2 | What is your gender? | Demographics | Male; Female; Prefer not to say |
D3 | What is your highest level of education? | Demographics | High school; Some college; Bachelor’s degree; Master’s degree; Doctorate |
D4 | Which field do you work in? | Demographics | IT/Technology; Education; Healthcare; Finance/Business; Other |
D5 | In which country do you currently reside? | Demographics | Open text |
JR1 | What is your job type? | Work Style | Company employee; Freelancer/Contractor; Academic/Research; Student; Other |
JR2 | Is remote work an option for you? | Work Style | Yes; No |
JR3 | Are you required or expected to perform any work-related tasks using your personal devices? | Work Style | Yes; No |
WLB1 | I use my work and personal accounts interchangeably throughout the day. | Work–Life Blurring | 1–5 Likert scale: Not at all typical of me—Completely typical of me |
WLB2 | I check personal accounts for social media or other apps using my work computer or work phone. | Work–Life Blurring | 1–5 Likert scale: Not at all typical of me—Completely typical of me |
WLB3 | Work tasks often interrupt my personal time. | Work–Life Blurring | 1–5 Likert scale: Not at all typical of me—Completely typical of me |
WLB4 | My personal and professional digital lives are intertwined. | Work–Life Blurring | 1–5 Likert scale: Not at all typical of me—Completely typical of me |
WLB5 | I often use work-related platforms to manage personal tasks. | Work–Life Blurring | 1–5 Likert scale: Not at all typical of me—Completely typical of me |
WLB6_R | I strictly separate my work and personal activities. (R) | Work–Life Blurring | 1–5 Likert scale: Not at all typical of me—Completely typical of me |
WLB7 | I use the same online platforms for both work and personal purposes, such as Google, Microsoft Teams, or Zoom. | Work–Life Blurring | 1–5 Likert scale: Not at all typical of me—Completely typical of me |
WLB8 | I check work emails while doing personal things. | Work–Life Blurring | 1–5 Likert scale: Not at all typical of me—Completely typical of me |
WLB9 | My work and personal activities often take place in the same physical space. | Work–Life Blurring | 1–5 Likert scale: Not at all typical of me—Completely typical of me |
WLB10 | It is hard to mentally disconnect from work during my free time. | Work–Life Blurring | 1–5 Likert scale: Not at all typical of me—Completely typical of me |
RR1 | Sometimes sharing passwords with coworkers can save time. | Risk Rationalization | 1–5 Likert scale: Not at all typical of me—Completely typical of me |
RR2 | Sometimes I ignore security threats if they interrupt my work. | Risk Rationalization | 1–5 Likert scale: Not at all typical of me—Completely typical of me |
RR3 | Sometimes I feel that certain cybersecurity rules don’t really apply to me. | Risk Rationalization | 1–5 Likert scale: Not at all typical of me—Completely typical of me |
RR4 | Sometimes I take security risks because others around me do the same. | Risk Rationalization | 1–5 Likert scale: Not at all typical of me—Completely typical of me |
RR5 | Time pressure makes me more likely to overlook security procedures. | Risk Rationalization | 1–5 Likert scale: Not at all typical of me—Completely typical of me |
RR6 | Following every security prompt sometimes feels like it slows down important work. | Risk Rationalization | 1–5 Likert scale: Not at all typical of me—Completely typical of me |
RR7_R | I believe it is my responsibility to recognize serious threats before relying on IT. (R) | Risk Rationalization | 1–5 Likert scale: Not at all typical of me—Completely typical of me |
RR8 | Most shortcuts I take online feel harmless and unlikely to cause real problems. | Risk Rationalization | 1–5 Likert scale: Not at all typical of me—Completely typical of me |
CB1 | I use two-factor authentication when it’s available. | Cybersecurity Behavior | 1–5 Likert scale: Not at all typical of me—Completely typical of me |
CB2_R | I use the same password on multiple sites. (R) | Cybersecurity Behavior | 1–5 Likert scale: Not at all typical of me—Completely typical of me |
CB3_R | I sometimes skip software security checks. (R) | Cybersecurity Behavior | 1–5 Likert scale: Not at all typical of me—Completely typical of me |
CB4 | I always create backups of my important files. | Cybersecurity Behavior | 1–5 Likert scale: Not at all typical of me—Completely typical of me |
CB5 | I store passwords in a password manager. | Cybersecurity Behavior | 1–5 Likert scale: Not at all typical of me—Completely typical of me |
CB6_R | I could probably do more to protect my online accounts. (R) | Cybersecurity Behavior | 1–5 Likert scale: Not at all typical of me—Completely typical of me |
CB7 | I regularly check my accounts or devices for potential security issues. | Cybersecurity Behavior | 1–5 Likert scale: Not at all typical of me—Completely typical of me |
DL1 | I am comfortable using various digital platforms. | Digital Literacy | 1–5 Likert scale: Not at all typical of me—Completely typical of me |
DL2 | I am confident in spotting suspicious links in emails. | Digital Literacy | 1–5 Likert scale: Not at all typical of me—Completely typical of me |
DL3 | I can recognize when a website or login page may be fake. | Digital Literacy | 1–5 Likert scale: Not at all typical of me—Completely typical of me |
DL4 | I help others fix issues with digital tools. | Digital Literacy | 1–5 Likert scale: Not at all typical of me—Completely typical of me |
DL5 | I adjust privacy settings on new apps easily. | Digital Literacy | 1–5 Likert scale: Not at all typical of me—Completely typical of me |
DL6 | I can solve common tech problems on my own. | Digital Literacy | 1–5 Likert scale: Not at all typical of me—Completely typical of me |
DL7_R | New tech stresses me out. (R) | Digital Literacy | 1–5 Likert scale: Not at all typical of me—Completely typical of me |
P1 | I’m curious about how tech works. | Personality Traits | 1–5 Likert scale: Not at all typical of me—Completely typical of me |
P2 | I enjoy trying new digital tools. | Personality Traits | 1–5 Likert scale: Not at all typical of me—Completely typical of me |
P3 | I pay attention to details in tasks. | Personality Traits | 1–5 Likert scale: Not at all typical of me—Completely typical of me |
P4 | I keep my digital life organized. | Personality Traits | 1–5 Likert scale: Not at all typical of me—Completely typical of me |
P5 | I participate in online communities. | Personality Traits | 1–5 Likert scale: Not at all typical of me—Completely typical of me |
P6 | I frequently post or share on social media. | Personality Traits | 1–5 Likert scale: Not at all typical of me—Completely typical of me |
P7 | I avoid conflict in online discussions. | Personality Traits | 1–5 Likert scale: Not at all typical of me—Completely typical of me |
P8 | I value others’ digital privacy like my own. | Personality Traits | 1–5 Likert scale: Not at all typical of me—Completely typical of me |
P9 | It makes me anxious to go off-plan. | Personality Traits | 1–5 Likert scale: Not at all typical of me—Completely typical of me |
P10 | I’m worried about losing control of my data. | Personality Traits | 1–5 Likert scale: Not at all typical of me—Completely typical of me |
INC1 | Have you ever personally experienced a cybersecurity-related problem (e.g., virus, account breach, account lockout, unauthorized access)? | Incident Outcomes | Yes; No; Not sure/Don’t know |
INC2 | Have you ever received a notification from a service (e.g., email provider, bank, company) about suspicious login activity? | Incident Outcomes | Yes; No; Not sure/Don’t know |
INC3 | Have you ever had to reset your password due to a suspected security issue? | Incident Outcomes | Yes; No; Not sure/Don’t know |
INC4 | Have you ever lost money or access to a paid service due to a cybersecurity issue? | Incident Outcomes | Yes; No; Not sure/Don’t know |
INC5 | Has someone ever used your personal or work account without your permission due to a cybersecurity incident? | Incident Outcomes | Yes; No; Not sure/Don’t know |
INC6 | Has a cybersecurity problem ever caused your computer or other device to stop working properly? | Incident Outcomes | Yes; No; Not sure/Don’t know |
References
- Barlette, Y.; Jaouen, A.; Baillette, P. Bring Your Own Device (BYOD) as reversed IT adoption: Insights into managers’ coping strategies. Int. J. Inf. Manag. 2021, 56, 102212. [Google Scholar] [CrossRef]
- Borkovich, D.J.; Skovira, R.J. Working from home: Cybersecurity in the age of COVID-19. Issues Inf. Syst. 2020, 21, 234–246. [Google Scholar] [CrossRef]
- Hasan, S.; Ali, M.; Kurnia, S.; Thurasamy, R. Evaluating the cyber security readiness of organizations and its influence on performance. J. Inf. Secur. Appl. 2021, 58, 102726. [Google Scholar] [CrossRef]
- Pollini, A.; Callari, T.C.; Tedeschi, A.; Ruscio, D.; Save, L.; Chiarugi, F.; Guerri, D. Leveraging human factors in cybersecurity: An integrated methodological approach. Cogn. Technol. Work. 2022, 24, 371–390. [Google Scholar] [CrossRef] [PubMed]
- Dalal, R.S.; Howard, D.J.; Bennett, R.J.; Posey, C.; Zaccaro, S.J.; Brummel, B.J. Organizational science and cybersecurity: Abundant opportunities for research at the interface. J. Bus. Psychol. 2022, 37, 1–29. [Google Scholar] [CrossRef] [PubMed]
- Zimmermann, V.; Renaud, K. Moving from a ‘human-as-problem” to a ‘human-as-solution” cybersecurity mindset. Int. J. Human-Computer Stud. 2019, 131, 169–187. [Google Scholar] [CrossRef]
- Diesch, R.; Pfaff, M.; Krcmar, H. A comprehensive model of information security factors for decision-makers. Comput. Secur. 2020, 92, 101747. [Google Scholar] [CrossRef]
- Glaspie, H.W.; Karwowski, W. Human factors in information security culture: A literature review. In Advances in Human Factors in Cybersecurity; Kantola, J., Barath, T., Nazir, S., Andre, T., Eds.; Springer: Berlin/Heidelberg, Germany, 2018; pp. 269–280. [Google Scholar] [CrossRef]
- Derks, D.; van Mierlo, H.; Schmitz, E.B. A diary study on work-related smartphone use, psychological detachment and exhaustion: Examining the role of the perceived segmentation norm. J. Occup. Health Psychol. 2014, 19, 74–84. [Google Scholar] [CrossRef]
- Kossek, E.E.; Ruderman, M.N.; Braddy, P.W.; Hannum, K.M. Work–nonwork boundary management profiles: A person-centered approach. J. Vocat. Behav. 2012, 81, 112–128. [Google Scholar] [CrossRef]
- Thilagavathy, S.; Geetha, S.N. Work-life balance—A systematic review. Vilakshan-XIMB J. Manag. 2023, 20, 258–276. [Google Scholar] [CrossRef]
- McCormac, A.; Zwaans, T.; Parsons, K.; Calic, D.; Butavicius, M.; Pattinson, M. Individual differences and Information Security Awareness. Comput. Hum. Behav. 2017, 69, 151–156. [Google Scholar] [CrossRef]
- Siponen, M.; Soliman, W.; Topalli, V.; Vestman, T. Reconsidering neutralization techniques in behavioral cyber-security as cybersecurity hygiene discounting. SSRN 2024. [Google Scholar] [CrossRef]
- Baltuttis, D.; Teubner, T.; Adam, M.T. A typology of cybersecurity behavior among knowledge workers. Comput. Secur. 2024, 140, 103741. [Google Scholar] [CrossRef]
- Redmiles, E.M.; Kross, S.; Mazurek, M.L. How I learned to be secure: A census-representative survey of security advice sources and behavior. In Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, Vienna, Austria, 24–28 October 2016; pp. 666–677. [Google Scholar] [CrossRef]
- Lahcen, R.A.M.; Caulkins, B.; Mohapatra, R.; Kumar, M. Review and insight on the behavioral aspects of cybersecurity. Cybersecurity 2020, 3, 10. [Google Scholar] [CrossRef]
- Guan, T.; Chang, S.; Deng, Y.; Xue, F.; Wang, C.; Jia, X. Oriented SAR Ship Detection Based on Edge Deformable Convolution and Point Set Representation. Remote Sens. 2025, 17, 1612. [Google Scholar] [CrossRef]
- Ashforth, B.E.; Kreiner, G.E.; Fugate, M. All in a Day’S Work: Boundaries and Micro Role Transitions. Acad. Manag. Rev. 2000, 25, 472–491. [Google Scholar] [CrossRef]
- Voydanoff, P.; Nippert-Eng, C.E. Home and Work: Negotiating Boundaries through Everyday Life. Contemp. Sociol. A J. Rev. 1996, 27, 153. [Google Scholar] [CrossRef]
- Mazmanian, M.; Orlikowski, W.J.; Yates, J. The Autonomy Paradox: The Implications of Mobile Email Devices for Knowledge Professionals. Organ. Sci. 2013, 24, 1337–1357. [Google Scholar] [CrossRef]
- Wajcman, J.; Rose, E.; Brown, J.E.; Bittman, M. Enacting virtual connections between work and home. J. Sociol. 2010, 46, 257–275. [Google Scholar] [CrossRef]
- Singh, R.; Aggarwal, S.; Sahni, S. A Systematic Literature Review of Work-Life Balance Using ADO Model. FIIB Bus. Rev. 2022, 12, 243–258. [Google Scholar] [CrossRef]
- Bandura, A. Moral Disengagement in the Perpetration of Inhumanities. Pers. Soc. Psychol. Rev. 1999, 3, 193–209. [Google Scholar] [CrossRef]
- Willison, R.; Warkentin, M.; Johnston, A.C. Examining employee computer abuse intentions: Insights from justice, deterrence and neutralization perspectives. Inf. Syst. J. 2018, 28, 266–293. [Google Scholar] [CrossRef]
- Cheng, L.; Li, W.; Zhai, Q.; Smyth, R. Understanding personal use of the Internet at work: An integrated model of neutralization techniques and general deterrence theory. Comput. Hum. Behav. 2014, 38, 220–228. [Google Scholar] [CrossRef]
- Posey, C.; Bennett, R.J.; Roberts, T.L. Understanding the mindset of the abusive insider: An examination of insiders’ causal reasoning following internal security changes. Comput. Secur. 2011, 30, 486–497. [Google Scholar] [CrossRef]
- Siponen, M.; Vance, A. Neutralization: New Insights into the Problem of Employee Information Systems Security Policy Violations. MIS Q. 2010, 34, 487. [Google Scholar] [CrossRef]
- Mohammed, Y.; Warkentin, M.; Nehme, A.; Beshah, T. Testing a comprehensive model of employee IS misuse in a developing economy context. J. Knowl. Manag. 2025, 29, 1974–2017. [Google Scholar] [CrossRef]
- Hadlington, L. Employees Attitude towards Cyber Security and Risky Online Behaviours: An Empirical Assessment in the United Kingdom. Int. J. Cyber Criminol. 2018, 12, 269–281. [Google Scholar] [CrossRef]
- Pfleeger, S.L.; Sasse, M.A.; Furnham, A. From Weakest Link to Security Hero: Transforming Staff Security Behavior. J. Homel. Secur. Emerg. Manag. 2014, 11, 489–510. [Google Scholar] [CrossRef]
- Vance, A.; Siponen, M.; Pahnila, S. Motivating IS security compliance: Insights from Habit and Protection Motivation Theory. Inf. Manag. 2012, 49, 190–198. [Google Scholar] [CrossRef]
- Bognár, L.; Bottyán, L. Evaluating Online Security Behavior: Development and Validation of a Personal Cybersecurity Awareness Scale for University Students. Educ. Sci. 2024, 14, 588. [Google Scholar] [CrossRef]
- Bulgurcu, B.; Cavusoglu, H.; Benbasat, I. Information Security Policy Compliance: An Empirical Study of Rationality-Based Beliefs and Information Security Awareness. MIS Q. 2010, 34, 523. [Google Scholar] [CrossRef]
- Ng, B.-Y.; Kankanhalli, A.; Xu, Y. Studying users’ computer security behavior: A health belief perspective. Decis. Support Syst. 2009, 46, 815–825. [Google Scholar] [CrossRef]
- Zwilling, M.; Klien, G.; Lesjak, D.; Wiechetek, Ł.; Cetin, F.; Basim, H.N. Cyber Security Awareness, Knowledge and Behavior: A Comparative Study. J. Comput. Inf. Syst. 2020, 62, 82–97. [Google Scholar] [CrossRef]
- Tran-Truong, P.T.; Pham, M.Q.; Son, H.X.; Nguyen, D.L.; Nguyen, M.B.; Tran, K.L.; Van, L.C.; Le, K.T.; Vo, K.H.; Kim, N.N.; et al. A systematic review of multi-factor authentication in digital payment systems: NIST standards alignment and industry implementation analysis. J. Syst. Arch. 2025, 162, 103402. [Google Scholar] [CrossRef]
- Radwan, R.; Zejnilovic, S. Password Reuse Is Rampant: Nearly Half of Observed User Logins Are Compromised. Cloudflare Blog. Available online: https://blog.cloudflare.com/password-reuse-rampant-half-user-logins-compromised (accessed on 26 August 2025).
- Blanton, S. 50+ Password Statistics & Trends to Know in JumpCloud. Available online: https://jumpcloud.com/blog/password-statistics-trends (accessed on 26 August 2025).
- Gilster, P. Digital Literacy; Wiley Computer Pub: Hoboken, NJ, USA, 1997. [Google Scholar]
- DiMaggio, P.; Hargittai, E. From the ‘Digital Divide’ to ‘Digital Inequality’: Studying Internet Use as Penetration Increases; Arts and Cultural Policy Studies Working Paper Series; Princeton University Center: Princeton, NJ, USA, 2001; Volume 15, pp. 1–23. [Google Scholar]
- Hargittai, E. Survey Measures of Web-Oriented Digital Literacy. Soc. Sci. Comput. Rev. 2005, 23, 371–379. [Google Scholar] [CrossRef]
- Park, Y.J. Digital Literacy and Privacy Behavior Online. Commun. Res. 2011, 40, 215–236. [Google Scholar] [CrossRef]
- van Deursen, A.J.; van Dijk, J.A. The digital divide shifts to differences in usage. New Media Soc. 2014, 16, 507–526. [Google Scholar] [CrossRef]
- Ramadhany, A.F.; Damayanti, N.E.; Rahmania, L.A.; Inawati. Digital literacy as a cyber crime defense and prevention strategy. In Proceedings of the 9th International Seminar of Research Month 2024, Surabaya, Indonesia, 15–16 October 2024; NST Proceedings: Malang, Indonesia, 2025; pp. 778–785. [Google Scholar] [CrossRef]
- Phan, B.T.; Do, P.H.; Le, D.Q. The impact of digital literacy on personal information security: Evidence from Vietnam. In Proceedings of the International Conference on Emerging Challenges: Sustainable Strategies in the Data-driven Economy (ICECH 2024), Thanh Hoa, Vietnam, 1–2 November 2024; Atlantis Press: Cambridge, MA, USA, 2025; pp. 475–489. [Google Scholar] [CrossRef]
- Ismaeel, S. The impact of digital literacy on cybercrime awareness, victimization, and prevention measures: A study of cyberbullying in Saudi Arabia. Pak. J. Criminol. 2025, 17, 77–96. [Google Scholar]
- McCrae, R.R.; Costa, P.T. A five-factor theory of personality. In Handbook of Personality: Theory and Research, 2nd ed.; Pervin, L.A., John, O.P., Eds.; Guilford Press: New York, NY, USA, 1999; pp. 139–153. [Google Scholar]
- Gratian, M.; Bandi, S.; Cukier, M.; Dykstra, J.; Ginther, A. Correlating human traits and cyber security behavior intentions. Comput. Secur. 2018, 73, 345–358. [Google Scholar] [CrossRef]
- Hadlington, L. Human factors in cybersecurity; examining the link between Internet addiction, impulsivity, attitudes towards cybersecurity, and risky cybersecurity behaviours. Heliyon 2017, 3, e00346. [Google Scholar] [CrossRef]
- Junglas, I.A.; Johnson, N.A.; Spitzmüller, C. Personality traits and concern for privacy: An empirical study in the context of location-based services. Eur. J. Inf. Syst. 2008, 17, 387–402. [Google Scholar] [CrossRef]
- Li, H.; Sarathy, R.; Xu, H. The role of affect and cognition on online consumers’ decision to disclose personal information to unfamiliar online vendors. Decis. Support Syst. 2011, 51, 434–445. [Google Scholar] [CrossRef]
- Shappie, A.T.; Dawson, C.A.; Debb, S.M. Personality as a predictor of cybersecurity behavior. Psychol. Popul. Media 2020, 9, 475–480. [Google Scholar] [CrossRef]
- Halevi, T.; Lewis, J.; Memon, N. A closer look at the self-reported behaviors of users on social networks. arXiv 2013, arXiv:1301.7643. Available online: https://arxiv.org/abs/1301.7643 (accessed on 26 August 2025).
- Buil-Gil, D.; Kemp, S.; Kuenzel, S.; Coventry, L.; Zakhary, S.; Tilley, D.; Nicholson, J. The digital harms of smart home devices: A systematic literature review. Comput. Hum. Behav. 2023, 145, 107770. [Google Scholar] [CrossRef]
- Wash, R.; Cooper, M.M. Who provides phishing training? Facts, stories, and people like me. In Proceedings of the 2018 ACM CHI Conference on Human Factors in Computing Systems (CHI ’18), Montreal, QC, Canada, 31 October 2018; pp. 1–12. [Google Scholar] [CrossRef]
- Conard, C.F. Quantifying the Severity of a Cybersecurity Incident for Incident Reporting. Master’s Thesis, Massachusetts Institute of Technology, Cambridge, MA, USA, 2024. [Google Scholar]
- Hanus, B.; Wu, Y. Impact of Users’ Security Awareness on Desktop Security Behavior: A Protection Motivation Theory Perspective. Inf. Syst. Manag. 2016, 33, 2–16. [Google Scholar] [CrossRef]
- de Bruin, M. Individual and Contextual Variables of Cyber Security Behaviour. Master’s Thesis, University of London, London, UK, 2022. Available online: https://arxiv.org/abs/2405.16215 (accessed on 26 August 2025).
- Khaliq, S.; Tariq, Z.U.A.; Masood, A. Role of user and entity behavior analytics in detecting insider attacks. In Proceedings of the 2020 International Conference on Cyber Warfare and Security (ICCWS), Norfolk, VA, USA, 12–13 March 2020; IEEE: Princeton, NJ, USA, 2020; pp. 1–6. [Google Scholar] [CrossRef]
- Danish, M. Enhancing cyber security through predictive analytics: Real-time threat detection and response. arXiv 2024, arXiv:2407.10864. [Google Scholar]
- Palan, S.; Schitter, C. Prolific.ac—A subject pool for online experiments. J. Behav. Exp. Finance 2018, 17, 22–27. [Google Scholar] [CrossRef]
- Brier, G.W. Verification of forecasts expressed in terms of probability. Mon. Weather. Rev. 1950, 78, 1–3. [Google Scholar] [CrossRef]
- Rasool, A.; Aslam, S.; Hussain, N.; Imtiaz, S.; Riaz, W. nBERT: Harnessing NLP for Emotion Recognition in Psychotherapy to Transform Mental Health Care. Information 2025, 16, 301. [Google Scholar] [CrossRef]
Layers | Category | Number of Responses |
---|---|---|
Age Group | 18–24 | 68 |
25–34 | 100 | |
35–44 | 103 | |
45–54 | 121 | |
55–64 | 44 | |
65 or older | 17 | |
Gender | Female | 220 |
Male | 233 | |
Education Level | High school | 92 |
Some college | 74 | |
Bachelor’s degree | 160 | |
Master’s degree | 103 | |
Doctorate | 24 | |
Employment Sector | Education | 104 |
Finance/Business | 48 | |
Healthcare | 26 | |
IT/Technology | 133 | |
Other | 142 | |
Employment Status | Academic/Research | 27 |
Company employee | 284 | |
Freelancer/Contractor | 58 | |
Student | 50 | |
Other | 34 | |
Country of Residence | Germany | 40 |
Hungary | 142 | |
Ireland | 10 | |
Romania | 36 | |
The Netherlands | 13 | |
UK | 86 | |
USA | 103 | |
Other (Austria, Australia, Brazil, Malta, Spain, UAE) | 23 |
Metric | Threshold for Concern | Impact on Category |
---|---|---|
Minimum Events/Non-events | <10 events or <10 non-events | Automatically classified as Weak |
10-fold AUC | <0.68 → Weak ≥0.74 → Good | Directly influences category |
10-fold Deviance R2 | <3% → Weak ≥7.5% → Good | Directly influences category |
AUC Drop | >0.10 (in-sample AUC—10-fold AUC) | Triggers downgrade to Weak |
R2 Drop Ratio (10-fold R2—in-sample R2)/in-sample R2 | >0.65 | Downgrade one step (e.g., Strong → Moderate) |
Domain | Cronbach’s Alpha | No. of Factors (EFA) | Remark |
---|---|---|---|
Work–Life Blurring (WLB) | 0.829 | 2 | High reliability; multidimensionality |
Risk Rationalization (RR) | 0.758 | 1 (excluding RR7_R) | Acceptable reliability; RR7_R forms a distinct normative factor |
Digital Literacy (DL) | 0.823 | 1 | High reliability and unidimensional structure |
Cybersecurity Behavior (CB) | 0.630 | 2 | Low reliability; distinct behavioral subdimensions |
Personality (P) | 0.611 | 5 | Low reliability; reflects multiple psychological traits |
(a) | |||||||
Model | Events/Non-Events | AUC | 10-Fold AUC | Deviance R2% | 10-Fold Deviance R2% | Domains | Category |
INC1 | 268/185 | 0.623 | 0.573 | 3.63 | 0.74 | CB, DL, P, WLB | Weak |
INC2 | 355/98 | 0.736 | 0.691 | 12.04 | 7.61 | CB, P, RR, WLB | Moderate |
INC3 | 207/246 | 0.725 | 0.671 | 8.39 | 3.66 | CB, DL, P, RR, WLB | Weak |
AtLeastOneMild | 421/32 | 0.839 | 0.759 | 19.45 | 7.77 | CB, DL, P, RR, WLB | Moderate |
AtLeastTwoMild | 288/165 | 0.745 | 0.704 | 13.33 | 8.2 | CB, DL, P, RR, WLB | Moderate |
AllThreeMild | 121/332 | 0.684 | 0.644 | 7.62 | 4.2 | CB, P, RR, WLB | Weak |
INC4 | 112/341 | 0.694 | 0.633 | 7.34 | 1.53 | CB, P, RR, WLB | Weak |
INC5 | 84/369 | 0.662 | 0.609 | 4.5 | 0.7 | CB, P, RR | Weak |
INC6 | 156/297 | 0.721 | 0.658 | 10.46 | 3.25 | CB, DL, P, RR | Weak |
AtLeastOneSerious | 202/251 | 0.632 | 0.586 | 3.87 | 1.12 | CB, DL, P, RR, WLB | Weak |
AtLeastTwoSerious | 100/353 | 0.68 | 0.65 | 6.0 | 3.46 | P, RR | Weak |
AllThreeSerious | 13/403 | 0.864 | 0.829 | 21.73 | 15.75 | CB, DL, RR | Good |
(b) | |||||||
Model | Events/Non-Events | AUC | 10-Fold AUC | Deviance R2% | 10-Fold Deviance R2% | Domains | Category |
INC1 | 182/129 | 0.702 | 0.653 | 7.21 | 4.53 | CB, DL, P, WLB | Weak |
INC2 | 254/57 | 0.810 | 0.711 | 16.06 | 4.70 | CB, P, RR, WLB | Weak |
INC3 | 282/29 | 0.839 | 0.738 | 21.14 | 4.90 | CB, P, RR, WLB | Weak |
AtLeastOneMild | 294/17 | 0.899 | 0.832 | 34.28 | 17.98 | CB, DL, P, WLB | Good |
AtLeastTwoMild | 266/45 | 0.816 | 0.770 | 22.85 | 14.75 | CB, P, WLB | Good |
AllThreeMild | 158/153 | 0.739 | 0.672 | 12.88 | 4.97 | CB, P, RR, WLB | Weak |
INC4 | 55/251 | 0.740 | 0.704 | 11.80 | 7.15 | CB, DL, P, RR | Moderate |
INC5 | 51/255 | 0.757 | 0.699 | 13.55 | 6.35 | CB, DL, P, RR, WLB | Weak |
INC6 | 76/230 | 0.705 | 0.673 | 9.55 | 6.02 | CB, DL, P, RR, WLB | Weak |
AtLeastOneSerious | 130/176 | 0.686 | 0.6404 | 7.82 | 3.03 | CB, DL, RR, WLB | Weak |
AtLeastTwoSerious | 40/266 | 0.807 | 0.7236 | 21.28 | 7.74 | CB, DL, P, RR, WLB | Moderate |
AllThreeSerious | 12/294 | 0.958 | 0.875 | 49.44 | 4.24 | CB, DL, P, RR, WLB | Weak |
Model | Events/Non-Events | AUC | 10-Fold AUC | Deviance R2 | 10-Fold Deviance R2 | Domains | Category |
---|---|---|---|---|---|---|---|
INC1 | 56/48 | 0.818 | 0.747 | 24.63 | 9.72 | WLB, RR, CB, DL, P | Good |
INC2 | 84/20 | 0.884 | 0.820 | 37.95 | 19.43 | WLB, RR, CB, DL, P | Good |
INC3 | 87/17 | 0.904 | 0.798 | 44.64 | 12.8 | WLB, RR, CB, DL, P | Weak |
AtLeastOneMild | 94/10 | 0.987 | 0.963 | 72.18 | 3.81 | RR, P | Weak |
AtLeastTwoMild | 85/19 | 0.865 | 0.774 | 35.3 | 10.97 | RR, CB, DL, P | Moderate |
AllThreeMild | 48/56 | 0.761 | 0.662 | 17.24 | 2.71 | WLB, RR, CB, P | Weak |
INC4 | 15/77 | 0.986 | 0.851 | 76.42 | 0.0 | RR, CB, DL, P | Weak |
INC5 | 9/83 | 0.907 | 0.736 | 44.87 | 0.0 | RR, CB, P | Weak |
INC6 | 21/71 | 0.795 | 0.767 | 19.92 | 14.12 | RR, CB, P | Good |
AtLeastOneSerious | 38/54 | 0.869 | 0.771 | 35.56 | 10.95 | WLB, RR, CB, DL | Moderate |
AtLeastTwoSerious | 7/85 | 0.829 | 0.791 | 16.93 | 9.98 | RR | Weak |
AllThreeSerious | 0/92 | nan | nan | nan | nan | – | Weak |
Model | Events/Non-Events | AUC | 10-Fold AUC | Deviance R2 | 10-Fold Deviance R2 | Domains | Category |
---|---|---|---|---|---|---|---|
INC1 | 91/42 | 0.801 | 0.688 | 23.74 | 0.14 | WLB, RR, CB, DL, P | Weak |
INC2 | 104/29 | 0.865 | 0.781 | 31.95 | 13.11 | WLB, RR, CB, P | Good |
INC3 | 120/13 | 0.778 | 0.690 | 14.98 | 4.99 | RR, P | Moderate |
AtLeastOneMild | 128/5 | 0.885 | 0.722 | 28.49 | 0.0 | WLB, RR, CB | Weak |
AtLeastTwoMild | 116/17 | 0.884 | 0.800 | 35.88 | 15.83 | WLB, RR, P | Good |
AllThreeMild | 71/62 | 0.830 | 0.748 | 26.14 | 12.7 | WLB, RR, CB, DL, P | Good |
INC4 | 20/104 | 0.826 | 0.740 | 22.82 | 4.98 | WLB, RR, CB, DL, P | Moderate |
INC5 | 24/100 | 0.812 | 0.76 | 23.46 | 12.65 | WLB, RR, CB, P | Good |
INC6 | 30/94 | 0.813 | 0.736 | 25.37 | 9.41 | RR, CB, DL, P | Moderate |
AtLeastOneSerious | 50/74 | 0.810 | 0.676 | 23.76 | 0.0 | WLB, RR, CB, DL, P | Weak |
AtLeastTwoSerious | 17/107 | 0.845 | 0.776 | 29.66 | 10.49 | RR, DL, P | Good |
AllThreeSerious | 7/117 | 0.964 | 0.837 | 53.82 | 0.0 | WLB, RR, CB, P | Weak |
Model | Events/Non-Events | AUC | 10-Fold AUC | Deviance R2 | 10-Fold Deviance R2 | Domains | Category |
---|---|---|---|---|---|---|---|
INC1 | 86/56 | 0.759 | 0.680 | 17.97 | 6.11 | WLB, RR, CB, DL, P | Moderate |
INC2 | 101/41 | 0.789 | 0.706 | 21.25 | 7.43 | WLB, RR, CB, DL, P | Moderate |
INC3 | 110/32 | 0.769 | 0.710 | 16.53 | 7.23 | RR, CB, DL, P | Moderate |
AtLeastOneMild | 127/15 | 0.744 | 0.647 | 12.59 | 1.61 | WLB, DL, P | Weak |
AtLeastTwoMild | 105/37 | 0.718 | 0.623 | 9.16 | 0.0 | RR, CB, DL, P | Weak |
AllThreeMild | 65/77 | 0.749 | 0.693 | 13.13 | 5.93 | WLB, RR, CB, DL, P | Moderate |
INC4 | 17/93 | 0.823 | 0.704 | 26.79 | 3.78 | WLB, RR, CB, DL | Moderate |
INC5 | 8/102 | 0.921 | 0.726 | 44.65 | 0.0 | WLB, CB, P | Weak |
INC6 | 25/85 | 0.906 | 0.793 | 37.7 | 4.96 | WLB, RR, CB, DL, P | Moderate |
AtLeastOneSerious | 39/71 | 0.763 | 0.664 | 15.94 | 1.99 | WLB, CB, DL, P | Weak |
AtLeastTwoSerious | 10/100 | 0.976 | 0.848 | 65.91 | 0.0 | WLB, RR, CB, DL, P | Weak |
AllThreeSerious | 1/109 | nan | nan | nan | nan | – | Weak |
Model | Events/Non-Events | AUC | 10-Fold AUC | Deviance R2 | 10-Fold Deviance R2 | Domains | Category |
---|---|---|---|---|---|---|---|
INC1 | 38/48 | 0.896 | 0.815 | 41.86 | 18.22 | WLB, RR, P | Moderate |
INC2 | 64/22 | 0.817 | 0.775 | 20.54 | 7.3 | WLB, P | Moderate |
INC3 | 76/10 | 0.939 | 0.827 | 48.34 | 10.14 | WLB, P | Weak |
AtLeastOneMild | 78/8 | 0.963 | 0.884 | 61.21 | 0.0 | WLB, RR, P | Weak |
AtLeastTwoMild | 69/17 | 0.981 | 0.930 | 72.22 | 12.38 | WLB, RR, CB, DL, P | Moderate |
AllThreeMild | 31/55 | 0.920 | 0.832 | 49.61 | 21.64 | WLB, RR, CB, DL, P | Moderate |
INC4 | 13/73 | 0.790 | 0.669 | 20.98 | 0.0 | RR, CB, DL | Weak |
INC5 | 6/80 | 0.932 | 0.863 | 41.06 | 12.47 | DL, P | Weak |
INC6 | 17/69 | 0.808 | 0.737 | 21.76 | 12.04 | WLB, RR, DL | Moderate |
AtLeastOneSerious | 27/59 | 0.700 | 0.655 | 9.56 | 4.23 | WLB, RR, DL | Weak |
AtLeastTwoSerious | 8/78 | 0.977 | 0.667 | 66.27 | 0.0 | WLB, RR, CB, DL | Weak |
AllThreeSerious | 1/85 | nan | nan | nan | nan | nan | Weak |
Model | Events/Non-Events | AUC | 10-Fold AUC | Deviance R2 | 10-Fold deviance R2 | Domains | Category |
---|---|---|---|---|---|---|---|
INC1 | 69/34 | 0.743 | 0.700 | 14.79 | 8.76 | WLB, RR, DL | Moderate |
INC2 | 91/12 | 0.845 | 0.774 | 27.71 | 11.46 | WLB, RR, DL | Moderate |
INC3 | 96/7 | 0.877 | 0.758 | 36.35 | 0.0 | WLB, CB, DL | Weak |
AtLeastOneMild | 99/4 | 0.940 | 0.746 | 50.45 | 0.0 | WLB, DL | Weak |
AtLeastTwoMild | 92/11 | 0.986 | 0.951 | 69.7 | 19.53 | WLB, RR, CB, DL, P | Moderate |
AllThreeMild | 65/38 | 0.755 | 0.690 | 16.93 | 5.39 | WLB, CB, DL | Moderate |
INC4 | 24/78 | 0.767 | 0.711 | 15.25 | 7.52 | WLB, RR, P | Moderate |
INC5 | 21/81 | 0.739 | 0.671 | 13.34 | 5.25 | RR | Weak |
INC6 | 34/68 | 0.838 | 0.758 | 24.74 | 9.06 | WLB, RR, CB, DL, P | Moderate |
AtLeastOneSerious | 53/49 | 0.799 | 0.740 | 21.23 | 10.25 | WLB, RR, P | Moderate |
AtLeastTwoSerious | 18/84 | 0.913 | 0.812 | 38.18 | 9.94 | RR, CB, DL, P | Weak |
AllThreeSerious | 8/94 | 0.902 | 0.807 | 37.88 | 7.54 | WLB, RR, CB, P | Weak |
Model/Layer | Item Codes |
---|---|
All Data | CB1, CB3, DL7, P10, P4, P7, RR7, WLB4, WLB10 |
Education Layer | CB5, DL1, DL4, DL5, DL7, P1, P4, P9, RR2, RR4 |
Hungary Layer | CB3, DL6, P4, RR4 |
IT Layer | CB6, DL2, P7, RR2, RR3, RR6, RR7, WLB5, WLB6, WLB8, WLB10 |
UK Layer | CB6, CB7, DL2, DL3, P8, RR4, WLB4, WLB8, WLB9, WLB10 |
USA Layer | CB6, DL7, P7, RR2, RR6, WLB8 |
Model Type | AUC | Deviance R2 | 10-Fold AUC | 10-Fold Deviance R2% | Included Predictors | Model Classification |
---|---|---|---|---|---|---|
Without Categorical Variables | 0.81 | 23.76 | 0.676 | 0 | WLB6, WLB7, WLB9, RR6, RR8, CB1, CB3, DL1, DL2, DL5, DL6, P5 | Weak |
With Categorical Variables | 0.8841 | 39.19 | 0.789 | 9.2 | WLB4, WLB9, RR2, RR6, CB1, CB6, DL5, DL6, P5, P7, P10, D1, D2, WLB4 × D2, WLB9 × D1, CB6 × D1, P10 × D1 | Moderate-to-Strong |
Criterion | Threshold | TP | FP | TN | FN | Precision | Recall | Specificity |
---|---|---|---|---|---|---|---|---|
Youden J | 0.47 | 49 | 22 | 55 | 16 | 0.69 | 0.754 | 0.714 |
F1 Score | 0.47 | 49 | 22 | 55 | 16 | 0.69 | 0.754 | 0.714 |
High Recall | 0.17 | 62 | 68 | 9 | 3 | 0.477 | 0.954 | 0.117 |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2025 by the author. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Bognár, L. Predicting Cybersecurity Incidents via Self-Reported Behavioral and Psychological Indicators: A Stratified Logistic Regression Approach. J. Cybersecur. Priv. 2025, 5, 67. https://doi.org/10.3390/jcp5030067
Bognár L. Predicting Cybersecurity Incidents via Self-Reported Behavioral and Psychological Indicators: A Stratified Logistic Regression Approach. Journal of Cybersecurity and Privacy. 2025; 5(3):67. https://doi.org/10.3390/jcp5030067
Chicago/Turabian StyleBognár, László. 2025. "Predicting Cybersecurity Incidents via Self-Reported Behavioral and Psychological Indicators: A Stratified Logistic Regression Approach" Journal of Cybersecurity and Privacy 5, no. 3: 67. https://doi.org/10.3390/jcp5030067
APA StyleBognár, L. (2025). Predicting Cybersecurity Incidents via Self-Reported Behavioral and Psychological Indicators: A Stratified Logistic Regression Approach. Journal of Cybersecurity and Privacy, 5(3), 67. https://doi.org/10.3390/jcp5030067