Measuring the Human Factor in Information Security and Privacy Marc J. Dupuis University of Washington marcjd@uw.edu Robert E. Crossler Mississippi State University rob.crossler@msstate.edu Barbara Endicott-Popovsky University of Washington endicott@uw.edu Abstract In this paper, we describe the development and validation of three survey instruments designed to measure the human factor in information security and privacy. These instruments are intended to measure the extent to which people engage in the responses necessary to mitigate three different information security and privacy threats: computer performance compromise, personal information compromise, and loss of data and files. This paper makes a significant contribution by providing validated survey instruments that can be used by other researchers in the future. The instruments may be used in combination with various theoretical approaches, such as Protection Motivation Theory. Likewise, researchers may opt to use one, two, or all three survey instruments, depending on the particular needs of the research question(s) being addressed. Response pattern statistics are also provided along with suggestions for how the instruments may be used. 1. Introduction Understanding the information security and privacy behavior of home users is a complex task that requires careful planning and a thoughtful approach. One could simply develop a list of best practices related to information security and privacy behaviors and assume that those who engage in more of these practices have superior information security and privacy behavior compared to those who do not. However, this approach ultimately does not take into account the context of the behavior. This may not be critical in all research that examines the information security and privacy behaviors of home users [1], but in the current research it is considered important given the different motivations that may come into play in response to varying threats. Therefore, the approach employed here examines three significant information security and privacy threats to home users and the responses necessary to mitigate these threats. The use of threat response pairs is an effective way to account for varying contexts and the approach employed here is similar to the one used by Crossler and Bélanger [2] in their examination of the responses necessary to protect one from the threat of losing data and files. This involves first identifying a threat and then determining the response(s) necessary to mitigate the threat. For example, one of the responses necessary to mitigate the threat of losing one’s data and files may be keeping current backups of data. Following the general guidelines from Churchill [3] and Straub [4], three new survey instruments were developed to assess the responses necessary to protect individuals from three different information security and privacy threats: loss of data and files, personal information compromise, and computer performance compromise. These three threats were chosen based on their potential to negatively impact the three primary areas of concern for information security and privacy: confidentiality, integrity, and availability [5][9]. The development of these three new survey instruments included an extensive literature review, convening an expert panel review, pre-testing the resulting instruments, pilot testing the revised instruments, and finally administration of the main study with slight revisions made from the pilot study. The remainder of this article discusses an important distinction between behavioral intention and self- reported behavior, describes the process employed, outcomes, and associated statistical analyses, followed by some recommended uses of these new instruments. We start with a discussion on using self-reported behavior rather than behavioral intentions. 2. Behavioral Intention vs. Self-Reports of Behavior This study used information on an individual’s reported behavior rather than behavioral intentions. Although most of the theories that have been used to understand behavior within the information systems domain include a behavioral intention construct that acts as the main determinant of behavior (Ajzen, 1985; Fishbein & Ajzen, 1975; Rogers, 1975; Triandis, 1977), it may not be the most appropriate way to 2016 49th Hawaii International Conference on System Sciences 1530-1605/16 $31.00 © 2016 IEEE DOI 10.1109/HICSS.2016.459 3675 2016 49th Hawaii International Conference on System Sciences 1530-1605/16 $31.00 © 2016 IEEE DOI 10.1109/HICSS.2016.459 3676