You are on page 1of 8

Computers & Security 118 (2022) 102732

Contents lists available at ScienceDirect

Computers & Security


journal homepage: www.elsevier.com/locate/cose

The self-assessed information security skills of the Finnish population:


A regression analysis
Maiju Kyytsönen∗, Jonna Ikonen, Anna-Mari Aalto, Tuulikki Vehko
Finnish Institute for Health and Welfare, P.O. Box 30, Helsinki FI-00271, Finland

a r t i c l e i n f o a b s t r a c t

Article history: Instead of traditional services, citizens are increasingly being offered e-services, which require informa-
Received 29 November 2021 tion security skills. However, the majority of research on information security skills has been conducted
Revised 1 March 2022
in homogenous groups of people. The purpose of this study was to describe self-assessed information
Accepted 16 April 2022
security skills of the population of Finland and factors associated with the skills. A population survey
Available online 20 April 2022
covering inhabitants aged 20 and upwards was conducted from September 2020 to February 2021. The
Keywords: cross-sectional dataset was weighted (n = 6023) to ensure it represented the population. Descriptive
Information security statistics were used to establish an initial understanding. Then a regression analysis was conducted to
Cybersecurity identify the variables that were associated with information security skills. The results demonstrate that
Data protection 78% of the respondents assessed their information security skills as good. There was a strong positive
Data privacy association between Internet skills and information security skills. Other factors that demonstrated a sta-
Skills
tistically significant association were age, level of education, financial situation, e-service use, information
Logistic regression analysis
Population survey
security concerns, functional health deficits, and major depression. Even though the majority of people
were confident in their information security skills in the online environment, there was evidence of a
skills gap that affected people in all age groups, more often senior citizens. The findings of this study
increase our understanding of information security skills at the population level. The results can be used
to identify groups who are not confident in their information security skills and for designing safer e-
services and education or guidelines on information security.
© 2022 The Authors. Published by Elsevier Ltd.
This is an open access article under the CC BY license (http://creativecommons.org/licenses/by/4.0/)

Introduction destruction, or damage (European Parliament and Council of Eu-


ropean Union, 2016). Unfortunately, not all e- services fulfil these
Digital services, both public and private, have spread across dif- requirements. For example, a mobile health app analysis revealed
ferent sectors. For example, in Finland the Internet is often used that a large proportion of the analyzed apps failed to protect the
for bank services (87% of the population), sending, or checking users’ sensitive health information from inappropriate usage, pro-
emails (87%) and reading news (85%) (Official Statistics of Fin- cessing, or disclosure to third parties (Papapgeorgiou et al., 2018).
land, 2020). Additionally, healthcare providers are increasingly of- These shortcomings stress the importance of e-service users eval-
fering e-services instead of traditional services. In 2020 as much uating the service provider’s trustworthiness and whether to share
as 64 percent of the population had used Finland’s national medi- personal information on the platform.
cal record service for the citizens (My Kanta Pages) and every fifth Information security has been defined as protection of informa-
had met a healthcare or social welfare professional online during tion assets against threats and vulnerabilities (von Solms & van
the past 12 months (Kyytsönen et al., 2021). The use of these e- Niekerk, 2013). Horne et al. (2016) have further suggested that
services generates data, which calls for confidentiality, integrity, information security is the act of people consciously or subcon-
and availability of the generated data. The European Union’s Gen- sciously creating resources from information and applying con-
eral Data Protection Regulation demands that data is processed in a trols to avoid facing threats. The protective measures tailored to
lawful, fair, and transparent manner and that it is protected from individual or organizational needs are a key element in securing
unauthorized and unlawful processing as well as accidental loss, sustainable information resources (Horne et al., 2016). The con-
cept of information security is not essentially related to infor-
mation and communication technology (von Solms & van Niek-

Corresponding author. erk, 2013), but in practice it is commonly used in Internet research
E-mail address: maiju.kyytsonen@thl.fi (M. Kyytsönen).

https://doi.org/10.1016/j.cose.2022.102732
0167-4048/© 2022 The Authors. Published by Elsevier Ltd. This is an open access article under the CC BY license (http://creativecommons.org/licenses/by/4.0/)
M. Kyytsönen, J. Ikonen, A.-M. Aalto et al. Computers & Security 118 (2022) 102732

(Kruger & Kearney, 2006; Pattinson et al., 2015; Öğütçü et al., 2016; ity of people believe that companies control the use of their per-
McCormac et al., 2017; Jaeger & Eckhardt, 2021). sonal information (Pleger et al., 2021) and many lack the necessary
In the context of cybercrime, different stakeholders can have skills to execute data protection measures (Baruh & Popescu, 2017).
various crime-related roles as human related factors are hyper- For example, 34% of respondents in an online study did not know
connected, occurring through diverse interactions in both the phys- if they had used private mode in their browser and 18% had never
ical and cyber environment (Islam et al., 2019). According to X- refrained from visiting a website (Boerman et al., 2018). In Fin-
Force Threat Intelligence Index, healthcare sector was the seventh land, 40% of smartphone users had not changed their application
most attacked industry in 2020, rising three places from 2019 settings to restrict access to personal data (Official Statistics of
(Singleton, 2021). In the healthcare sector, cyber threats have been Finland, 2020). Many social media users were also not aware of
divided into three categories, which are attacks exploiting IT infras- how their data is being collected and used or that their social
tructure vulnerabilities, ransomware attacks and attacks exploiting network affects algorithms of targeted advertising (Hinds et al.,
human vulnerability (Nifakos et al., 2021). Consequently, the real- 2020). Social media users’ perceptions of risk have been shown
ization of safe e-services requires safe design and maintenance of to be highest in the subarea of information sharing. Precautions
the services, but also information security skills (ISS) from the ser- are most often taken regarding phone number and email address,
vice users. but at the same time over tenth of the participants were unaware
A systematic review in the domain of healthcare recognized re- whether they had protected the information (van Schaik et al.,
sisting social engineering attacks as a key element in securing pa- 2018).
tient information (Nifakos et al., 2021). One form of social engi- Privacy behavior has been shown to strongly correlate with In-
neering attack is phishing, where efforts are made to manipulate ternet skills (Büchi et al., 2017) and familiarity with computers if
a person to disclose personal information, for example via email the end-user is aware of a potential threat (Pattinson et al., 2012).
(Jaeger & Eckhardt, 2021). Trust is an important factor of infor- Basic computer skills have also been recognized to contribute to
mation security (Henshel et al., 2015), which should especially be ISS (Rajivan et al., 2017). All in all, measuring skills related to
considered in the context of healthcare e-service use. The review information security in digital environments has been argued to
underlined the importance of providing standardized cybersecu- be hard, e.g. because of uneven skills profiles (Giboney et al.,
rity training to healthcare professionals, but also drew attention to 2016). An experimental study on phishing emails observed that
social media platforms, where personal data is sometimes shared when participants were informed about the study theme, they per-
without sufficient reflection and necessary privacy settings making formed better compared to participants who were not informed.
social media users vulnerable to cyberattacks (Nifakos et al., 2021). The study further demonstrated that the personality traits of ex-
traversion and openness were associated with better performance
Background among not-informed participants. (Pattinson et al., 2012.)
Both security behavior and privacy concerns are affected by
Information security behavior the country of origin (van Bavel et al., 2019; Pleger et al., 2021).
However, the effects of gender on information security awareness
Data protection is generally valued by the public (Noor, 2020; are inconsistent (Boerman et al., 2018; McCormac et al., 2017;
Pleger et al., 2021) whereas collection, usage and sharing of per- Gerber et al., 2018; Gratian et al., 2018). A higher confidence level
sonal information online are seen as problematic (Boerman et al., seems to decrease caution, when assessing if an email is legiti-
2018). For example, targeted advertising based on personal in- mate or phishing (Canfield et al., 2016). A high education level in-
formation has been described as creepy (Hinds et al., 2020) and creases information security awareness (Ögütçü et al., 2016) and a
breaches of data protection as disturbing (Noor, 2020). Less than low education level seems to negatively correlate with privacy be-
five per cent of people use the Internet in a carefree way and havior (Boerman et al., 2018). Prior studies on Internet use have
do not have many privacy concerns (Kruikemeier et al., 2020). shown that a higher income level leads to better Internet accessi-
Yet some studies suggest that perceived susceptibility to online bility (Hargittai et al., 2019; Ojo et al., 2019).
privacy threats does not significantly influence protective behav- Some behavioral studies suggest that older people navigate
ior (Boerman et al., 2018) or use of social media (Baruh et al., more safely online (van Bavel et al., 2019; Pattinson et al., 2015)
2017). On average, online privacy is protected rarely or occasion- and are more aware of information security (McCormac et al.,
ally (Boerman et al., 2018). 2017), while one study presented no significant correlation be-
Valuing data privacy yet acting in a way which does not ensure tween age and privacy behavior (Boerman et al., 2018). A study on
it, is called the privacy paradox (Gerber et al., 2018). According to a students’ online behavior concluded that students act in a riskier
literature review, higher privacy concerns were able to explain 17% way, which is explained on one hand by young people using tech-
of taking privacy protective measures (Baruh et al., 2017). There nology more often and on the other hand by their lack of negative
is also evidence that risk-averse and cautious people adapt their experiences due to their younger age (Ögütçü et al., 2016). A con-
behavior more often to protect their data privacy (Baruh et al., nection between experience with phishing and information secu-
2017; van Bavel et al., 2019; Kruikemeier et al., 2020) and have rity awareness has been established (Jaeger & Eckhardt, 2021).
a higher level of information security awareness (McCormac et al.,
2017). Being aware of contextual clues has also previously been ob- Information security research
served to correlate with successfully identifying a phishing web-
site (Egelman et al., 2016). Reasons for behaving in an ostensibly Even though digital citizenship requires ISS (Masur, 2020), little
conflicting manner may be due to the observed benefits outweigh- is known about ISS at the population level. Previous research has
ing the risks (Kokolakis, 2017; Gerber et al., 2018) or because the targeted narrow groups (Kruger & Kearney, 2006; Pattinson et al.,
available measures are not believed to be effective (Boerman et al., 2015; Ögütçü et al., 2016; McCormac et al., 2017; Gratian et al.,
2018). 2018; Hinds et al., 2020), for example participants have been re-
cruited from a university (Gratian et al., 2018; Hinds et al., 2020) or
Information security skills and factors associated with the skills employment has been set an inclusion criterion (McCormac et al.,
2017). Other studies have been conducted online or certain
The data privacy regulations are centred on individual privacy online activities have been mandatory in order to participate
literacy and self-management (Baruh & Popescu, 2017). Yet major- (Smit et al., 2014; Pattinson et al., 2015; McCormac et al., 2017;

2
M. Kyytsönen, J. Ikonen, A.-M. Aalto et al. Computers & Security 118 (2022) 102732

Boerman et al., 2018; van Schaik et al., 2018; van Bavel et al., Table 1
Demographic profile of the respondents (digi-module).
2019; Hinds et al., 2020; Kruikemeier et al., 2020; Pleger et al.,
2021). 95% confidence
In Finland 19% of the population feel that they need help in interval
using healthcare and social welfare e-services (Kyytsönen et al., Respondent group % lower upper
2021). At the same time, ISS need to be updated regularly. There- Sex (n = 6,034)
fore, it can be argued that ISS are essential for a broad group, and male 46 44.0 47.8
it is important to conduct research which acknowledges that. This female 54 52.2 56.0
study aims to research ISS that can protect Internet users form cy- Age (n = 6,034)
20–54 55 52.9 56.5
bercrimes, for example hacking, phishing or scams. The object is
55–74 32 30.9 34.1
to describe the level of self-assessed ISS in Finland and to identify >74 13 12.1 13.5
the variables that are associated with the skills. Education level (n = 5,874)
low 42 40.1 44.0
middle 32 30.1 33.6
high 26 24.5 27.8
Materials and methods Employment status (n = 5,967)
working 47 45.3 49.2
The study was conducted as part of The National FinSote Sur- retired (incl. part-time pension) 35 33.6 36.8
vey, which was carried out by the Finnish Institute for Health unemployed or laid off 5 4.4 6.5
other 12 10.8 13.8
and Welfare from September 2020 to February 2021. The sur-
E-service use (n = 6,034)
vey covered health, well-being and service use among the Finnish independently 81 80.1 82.5
adult population aged 20 to 99. The data was collected by a self- with aid/ someone else uses it on their behalf 6 5.1 6.5
administered mail and online questionnaire that was available in does not use 13 11.9 14.0
Finnish, English, Swedish and Russian.
The cross-sectional main FinSote survey was sent to a repre-
sentative sample (n = 61,600) and an additional digi-module for a Age (register data), sex (register data), length of education, In-
sub sample (n = 13,200). The digi-module contained more detailed ternet skills and information security concerns were included in
questions about the necessary skills in navigating in digital envi- the analysis as they have been identified as potential predictors
ronments and the use of e-services in social welfare and healthcare of ISS (Ögütçü et al., 2016; Baruh et al., 2017; Büchi et al., 2017;
sectors. The sampling method was a stratified random sampling Gerber et al., 2018; Boerman et al., 2018; van Bavel et al., 2019;
design with 22 strata, one for every wellbeing services county in Kruikemeier et al., 2020). The use of the Internet for e-services
Finland. In every wellbeing services county, the sample size was was also analyzed to establish the skills’ usefulness. Financial dif-
280 0 (20 0 0 in age group 20–74-year-olds and 800 in age group ficulties were examined based on prior studies on Internet use
over 75-year-olds). In the digi-module the sample size was 600 in (Hargittai et al., 2019; Ojo et al., 2019). Two variables were selected
every wellbeing services county (400 in age group 20–74-year-olds so that the study could better acknowledge the heterogenous user
and 200 in age group over 75-year-olds) (Parikka et al., 2021). The group of e-services, especially eHealth services. The first variable
main survey was answered by 28,199 respondents and the addi- was major depression, which has previously been shown to asso-
tional digi-module by 6034 respondents corresponding to response ciate with subjective cognition (Srisurapanont et al., 2017; Serra-
rates of 46.4 and 46.5%, respectively. Over-coverage, e.g. invited re- Blasco et al., 2019). The second variable was ‘functional health
spondent had died, has been removed from these response rates. deficit’, which was added to the model since Internet use has been
The dependent variable and internet skills statements were asked reported rarer among people with health conditions (Wang et al.,
in the digi-module, while all other variables were included in the 2011) and since severe disease has been shown to affect a person’s
main survey. ability to use eHealth technology (Witry et al., 2018). Background
It has been recommended to measure ISS with perception- information of the respondents included age in years, sex, em-
based actions (Rajivan et al., 2017) and security behavior with ployment status, education and use of the Internet for e-services
questions that are appropriate for the respondents (Becker et al., (Table 1).
2017). The dependent variable consisted of two statements con- The education level (low, middle, high) variable was based
structed for the survey, where the respondents were asked to as- on the question “How many years altogether have you attended
sess their ISS: (1) I can recognize risks related to information secu- school or studied full time? Including primary and comprehensive
rity (e.g., using the same password in several places) and (2) I can school. ____ years.” The respondents were first divided into 10-year
recognize attempts at fraud (e.g., unexpected emails about winning age groups by gender. After this, terciles of years of education were
the lottery or attempts to collect money disguised as investment calculated in each group and the educational level was defined us-
advice). The used examples were formulated based on typical sit- ing those terciles as cut points. A sum variable measuring financial
uations that internet users come across. A five-point Likert-scale difficulties was constructed from three statements, where at least
was used (completely agree, somewhat agree, neither agree nor one option was selected: have you within the past 12 months ever
disagree, somewhat disagree, and strongly disagree). Before includ- feared that you will run out of food before you can get money to
ing the statements in the survey, they were evaluated by two infor- buy more, been unable to buy medicines or not visited a doctor
mation security experts and 14 research experts as well as seven because you did not have any money (yes/no).
citizens aged 29–88. The generic Internet skills were measured using six validated
Since past studies have concentrated on selected groups or nar- Internet skill statements (completely agree–strongly disagree) pro-
row sections of information security, for example ISS at a uni- posed by van Deursen and others (2016). Two of the statements
versity, the study opted for a more open approach, which has were converted from negative to positive based on feedback from
also been recommended for the study theme (Lebek et al., 2014; the pilot study (n = 7). The statements of ISS and Internet skills
Jeong et al., 2019; Islam et al., 2019). In consequence, the selection formed two sum variables. ISS were considered good if the respon-
of independent variables for this study aimed to recognize possible dent agreed with the two statements. The Internet skill sum vari-
groups that view their ISS level as poor and need help in navigat- able was constructed by summing up the six Internet skill state-
ing digital environments. ments (a 5-point Likert scale) and dividing them by six. If the score

3
M. Kyytsönen, J. Ikonen, A.-M. Aalto et al. Computers & Security 118 (2022) 102732

Fig. 1. Percentage of respondents by age group whose self-assessed information se- Fig. 2. Percentage of respondents in different age groups grouped according to their
curity skills are good (n = 6023) and 95% confidence intervals of the estimates. attitude towards information security concerns and 95% confidence intervals of the
estimates.

Table 2
was two or less, the skill level was considered good (1= completely Wald tests for the multiple logistic regression analysis of self-assessed infor-
agree, 5 = strongly disagree). All missing values in the skill state- mation security skills.
ments were coded as disagree based on assumptions made from P-value (Wald P-value (Wald
the data and to avoid producing overly optimistic results. The sum test), Model 1 test), Model 2
variables’ reliability was tested with a Cronbach’s alpha test. The Age in years <0.001 <0.001
score of the ISS was 0.90 and the Internet skills 0.96. Since a score Sex 0.604 -
of 0.70 or more was considered acceptable, the analyzed values in- Education level <0.001 0.001
dicated a high level of internal consistency (Taber, 2018). Employment status 0.232 -
Self-assessed financial situation 0.031 0.040
Information security concerns were asked using a five-point
Internet skills <0.001 <0.001
Likert scale (completely agree–strongly disagree) as follows: I Information security concerns 0.037 0.047
am concerned about information security when it comes to my Use of e-services <0.001 <0.001
personal details. Respondents were asked about their functional Functional health deficit 0.003 0.006
health deficits in one question: Are you limited because of a health Major depression (MHI-5) 0.034 0.035

problem in activities people usually do (severely limited/limited


but not severely/not limited at all)? Experiencing symptoms of
82.2–84.6%) and risks related to information security (80%, CI 79.1–
major depression was measured using the five-question Mental
81.8%). There was no statistically significant difference between
Health Inventory (MHI-5), which has been successfully used to
men and women (adjusted f-test p = 0.278). Those who assessed
identify people with depressive symptoms. People who received 52
their ISS as good, had studied on average for 14.4 years (CI 14.3–
points or more were considered to showcase symptoms of major
14.6), while those who assessed their skills as poor had on average
depression. (Yamazaki et al., 2005; Cuijpers et al., 2009.)
studied 11.1 years (CI 10.8–11.4).
To enhance the population representation of the collected Fin-
The older age groups assessed their ISS to be systemati-
Sote data, weights (age, sex, marital status, education, residential
cally poorer than those of a younger age group (adjusted f-test
area, and language) were used in the analyses. An inverse probabil-
p = <0.001) (Fig. 1). 90% (CI 89.5–91.4%) of those who reported
ity weighting (IPW) method was selected to account the effects of
good ISS had good Internet skills, while 20% (CI 16.5–23.0%) of
missing data. The model was selected using Bayesian information
those who did not have good ISS, had good Internet skills.
criterion. The associations of independent variables with ISS were
Being concerned about information security when using e-
first examined in a univariate analysis using an adjusted f-test,
services varied between different age groups (adjusted f-test
which is an adaption of Chi-Square-statistics meant for analyzing
p = <0.001). Those aged 20–54 seemed to be less concerned when
differences between groups with statistical weights. Next, a mul-
compared to older age groups (Fig. 2). The same phenomenon was
tiple binary logistic regression analysis was employed to examine
present among those with good ISS: 41% (CI 37.8–45.2%) of over
the relationship of independent variables accounting for all signifi-
74-year-olds and 40% (CI 37.0–42.9%) of 55–74-year-olds with good
cant independent variables simultaneously. First, multiple indepen-
ISS experienced information security concerns, while the percent-
dent variables were added to the model. Then the variables were
age was 30 (CI 27.3–33.3%) in the age group 20–54 (adjusted f-test
reduced to achieve a model with optimal explanatory power using
p = <0.001).
a Wald test. A variance inflation factor (VIF) was used to measure
The logistic regression analysis was done in two phases. In the
the multicollinearity of the variables. The values were between
first model a Wald test indicated that sex and employment status
1.13–1.88. A value of 1 would have indicated no multicollinearity,
were not statistically significant factors for ISS (Table 2). Therefore,
but values lower than five were still acceptable (Daoud, 2017). The
another regression model was constructed without the variables
results were presented as odds ratios (OR) and their 95% confi-
(Tables 2 and 3).
dence intervals (CI). The data was processed in IBM SPSS Statistics
The logistic regression analysis indicated that age in years, ed-
27 (Table 1, Figs. 1 and 2) and R 3.6.3 and the survey 4.0 package
ucation level, financial difficulties, good Internet skills, having no
(logistic regression analysis).
information security concerns, not using e-services independently,
suffering from functional health deficits and experiencing severe
Results symptoms of depression were associated with self-assessed ISS
(Table 3). ISS were most strongly associated with having good In-
The respondents’ sociodemographic profile is presented in ternet skills. A high education level was also positively associated
Table 1. with ISS. Negative associations were found between ISS and age,
The majority (78%, CI 76.9–79.7%) of the respondents thought experiencing financial difficulties, not using e-services indepen-
they were both capable of recognizing attempts at fraud (83%, CI dently, or altogether, suffering from functional health deficits and

4
M. Kyytsönen, J. Ikonen, A.-M. Aalto et al. Computers & Security 118 (2022) 102732

Table 3
Odds ratios and their 95% confidence intervals for determinants of information security skills (logistic regression analysis) and VIF-values for
the variables (Model 2).

OR 95% CI p-value VIF

Lower Upper

Age in years 1.87


Continuous variable 0.98 0.97 0.99 <0.001
Education group 1.23
Low ref∗
Middle 1.29 0.97 1.73 0.083
High 1.86 1.36 2.56 <0.001
Financial difficulties 1.30
Yes 0.64 0.42 0.98 0.040
No ref∗
Good Internet skills 1.88
Yes 12.69 9.06 17.77 <0.001
No ref∗
Information security concerns 1.64
Completely agree ref∗
Somewhat agree 1.33 0.88 2.01 0.170
Neither agree nor disagree 0.86 0.56 1.32 0.488
Somewhat disagree 1.18 0.7 1.99 0.535
Completely disagree 1.45 0.92 2.27 0.106
Use of e-services 1.57
Yes, independently ref∗
Yes, with help or someone 0.64 0.45 0.91 0.013
else uses them for me
No 0.44 0.32 0.61 <0.001
Functional health deficit 1.13
Yes 0.69 0.53 0.9 0.006
No ref∗
Major depression (MHI-5) 1.28
Yes 0.63 0.41 0.97 0.035
No ref∗

reference category

experiencing severe symptoms of depression. Even though the neg- of age can outline the fact that all age groups include skilled
ative association between age and ISS may seem minor, age does users.
play a significant role, since each year makes the association more Other factors that were positively associated with ISS were a
considerable. Views on experiencing information security concerns high level of education and having no information security con-
produced conflicting associations, but the most substantial associ- cerns. A high education level has been shown to associate posi-
ation was a positive association between ISS and not having any tively with ISS previously (Ögütçü et al., 2016). It is possible that
information security concerns at all. highly educated people receive guidance on working in online en-
vironments more often compared to those with a low education
Discussion level. Completely disagreeing with being concerned about data se-
curity was positively associated with ISS. On the other hand, some-
The aim of the study was to describe the level of self-assessed what agreeing with having information security concerns was also
ISS in the Finnish general population aged 20 years and upwards positively associated with ISS, which demonstrates that the under-
and to identify the variables that are associated with the skills. The lying elements behind the associations are more complex than first
results demonstrated that the majority of the Finnish population appears. A prior systematic review has concluded that privacy con-
were confident in their ISS, which is in line with the assessment cerns are above all explained by situational factors and the web-
that Finland is a leading country when it comes to digitalization site’s reputation (Gerber et al., 2018), which were beyond the scope
(European Commission, 2020). The level of self-assessed ISS seems of this study but might explain the results to some extent.
to decrease systematically with age. However, the regression anal- Negative associations were discovered between ISS and finan-
ysis shed a different light on the matter as it indicated that ISS cial difficulties, not using e-services independently, suffering from
were most strongly associated with good Internet skills, whereas functional health deficits and experiencing severe symptoms of de-
age demonstrated a more moderate association. pression. Financial difficulties have previously been shown to af-
This work contributed to the research of information security fect Internet use due to less accessibility (Hargittai et al., 2019;
in the areas of demographics, security concerns, state of health, Ojo et al., 2019), which could also be the foundational reason for
and e-service use. Previously, Internet skills, computer skills and the negative association between ISS and financial difficulties. The
familiarity with computers have been demonstrated to be associ- negative association between ISS and not using e-services indepen-
ated with privacy protective behavior (Büchi et al, 2017; Pattison dently, or at all, could indicate that the individuals have a lesser
et al., 2012) and ISS (Rajivan et al., 2017). These finding are in line need for ISS. On the other hand, ISS have previously been shown
with our results and a prior study that demonstrated that being to reduce risks of privacy loss (Büchi et al., 2017), which outlines
aware of contextual clues, which calls for experience, can help in the importance of ISS even for infrequent users of e-services.
detecting a phishing website (Egelman et al., 2016). Prior studies Interesting findings included the independent negative associa-
have described age as a significant factor for information security tions between ISS and suffering from functional health deficits and
behavior and awareness, but the studies have not included Inter- experiencing severe symptoms of depression. A severe disease has
net skills in their analyses (McCormac et al., 2017; Pattinson et al., earlier been shown to affect technology use (Witry et al., 2018). It
2015; van Bavel et al., 2019). Measuring Internet skills on top has also been suggested that clinical depression predicts subjective

5
M. Kyytsönen, J. Ikonen, A.-M. Aalto et al. Computers & Security 118 (2022) 102732

cognitive dysfunction, which does not however correlate with ob- The study had both strengths and limitations. Because the study
jective dysfunction (Srisurapanont et al., 2017; Serra-Blasco et al., sample was a national survey covering a wide array of topics, it
2019). Additionally, it has previously been observed that higher was not possible to measure ISS with more than two statements.
confidence levels may lead to inclination towards treating emails It was also decided to measure the skills using subjective self-
as legitimate (Canfield et al., 2016). Therefore, it is possible that evaluation, instead of studying past behavior, for example. Even
a severe depression does not affect information security behavior though there is scepticism towards self-evaluation, it has been sug-
negatively but causes depressed people to assess their skills from gested that self-reported security behavior can be accurate espe-
a more negative standpoint. However, this study cannot answer cially on more salient measures taken, e.g. installing an ad-blocker
whether the association would have been found even if ISS had versus making sure it is running in the background (Wash et al.,
been measured objectively. The in-depth understanding of the as- 2017). The constructed statements underwent a multifaceted ap-
sociation would require a more detailed research frame. praisal, which enhances their relevance. Afterwards, the internal
The relevance of sex as a predictor has previously produced consistency of the instrument was established with a Cronbach’s
conflicting results (Boerman et al., 2018; McCormac et al., 2017; Alpha test.
Gerber et al., 2018; Gratian et al., 2018). In this study, it was The study sample represented Finland’s population and possi-
not a statistically significant factor for ISS, which might be re- ble deviations in the data caused by non-respondents were further
lated to the relatively good state of gender equality in the study corrected with weights. However, other factors, not accounted in
country (ranked second in a country comparison of 156 coun- the survey, may have affected to the decision not to participate in
tries) (World Economic Forum, 2021). The employment status was the study, which cannot be resolved by weighting. The selected
another statistically insignificant variable. Older adults have been weighting method (inverse probability weighting) has neverthe-
shown to benefit from social support when it comes to digi- less been found to improve the accuracy of studies made on the
tal skills. The support is often received from family members Finnish population (Härkänen et al., 2014). The results represent
(Tsai et al., 2017) and therefore, the absence of social support from Finland’s population and because the country of origin has been
the workplace might not be a decisive factor for pensioners. shown to influence findings on the theme (van Bavel et al., 2019;
Corresponding to previous findings (McCormac et al., 2017), the Pleger et al., 2021), they cannot directly be generalized to other
older age groups (55–74 and >74) seemed to be concerned about populations. Causal connections cannot be evaluated based on the
information security more often when compared to 20–54-year- cross-sectional data.
olds. Moreover, it has previously been observed that fear, caused In the future, similar studies on self-assessed ISS that cover a
by perceived phishing, provokes motivation for protective behav- heterogenous population should be conducted in other countries.
ior (Jaeger & Eckhardt, 2021). In this light, the lack of informa- It is important to draw an overall picture of how people find their
tion security concerns especially in the age group of 20–54-year- own capabilities at a time when crucial services are increasingly
olds is alarming. The lack of information security concerns associ- being shifted online. There is also a need for deepening the under-
ated positively with good ISS, of which both were more common standing of how a person’s own conception of their ISS correlates
among 20–54-year-olds. This might indicate that having confidence with privacy behavior. Regardless of the approach, it would be im-
in one’s own ISS dispels the concerns that one might have over in- portant to include Internet skills as an independent variable.
formation security.
Many have already suggested that providing education on data
Conclusions
protection could improve citizens’ standing (Pleger et al., 2021;
Masur, 2020; Gerber et al., 2018). Since attitudes play a part in ac-
The paper reported results of a study on self-assessed ISS based
tual behavior (Ajzen, 1991) and because younger people especially
on a representative sample of the Finnish population. The main
seemed to experience less information security concerns, provid-
findings of the study were that majority of people assessed their
ing education on information security for the younger population
ISS to be good, and that above all, ISS were positively associated
appears appropriate. Additionally, trust is a crucial factor in ISS
with Internet skills. Therefore, providing education on general In-
(Henshel et al., 2015) and as the older age groups (55–74 and 75–
ternet skills might also lead to better ISS. People aged 20–54 were
99) seem on average to have more information security concerns
more often confident in their ISS and less concerned about infor-
and a lower level of ISS, also they should be offered support for
mation security when compared to over 54-year-olds. The differ-
enhancing their ISS. Otherwise, poor skills could act as a barrier for
ence between age groups in terms of experiencing information se-
e-service use. The educational interventions should include help in
curity concerns was also present among those, who assessed their
assessing one’s own abilities to detect cyber-attacks and in under-
ISS to be good.
standing the consequences of the attacks (Pattinson et al., 2012).
An interesting new finding was that experiencing severe symp-
Ideally citizens should not be the target of security breaches,
toms of depression and suffering from functional health deficits
and they should have a greater self-determination over their per-
were negatively associated with ISS. These findings highlight the
sonal information (Masur, 2020). At the same time, it has been de-
fact that since people are increasingly directed towards e-services,
tected that most people do not protect their online privacy very
the users of e-services form a more heterogenous group than be-
actively (Boerman et al., 2018; Official Statistics of Finland, 2020),
fore. For example, patients with multiple morbidities or suffering
which might partially be due to the fact that for a regular internet
from functional health deficits use e-health services that process
user, the necessary information security measures are not always
their highly sensitive health data. In the future, support for data
evident (Wash et al., 2017; van Schaik et al., 2018; Boerman et al.,
protection should be offered proactively. The results of this study
2018; Hinds et al., 2020). As one solution, well-designed security
can be used to recognize the groups that are most in need of
warnings and coping messages have been offered, since they have
support. The findings can also be used, when designing safer e-
been shown to improve protective behavior (Pattinson et al., 2012;
services and education or guidelines on information security.
Gerber et al., 2018; Boerman et al., 2018; van Bavel et al., 2019;
Jaeger & Eckhardt, 2021). Since the majority of the Finnish popu-
lation are confident in their ISS, introducing motivational functions Funding
could help people to advance from just the observation of informa-
tion security threats to taking (pro)active measures to strengthen This work was supported by Finnish Institute for Health and
information security. Welfare and The Ministry of Social Affairs and Health (Finland):

6
M. Kyytsönen, J. Ikonen, A.-M. Aalto et al. Computers & Security 118 (2022) 102732

Monitoring and assessment of social welfare and health care infor- Bhuiyan, M.Z.A., De Capitani di Vimercati, S., Ren, Y. (Eds.), Dependability in
mation system services, contract 002/OHO/EMR/2019, project num- Sensor, Cloud, and Big Data Systems and Applications. DependSys 2019. Com-
munications in Computer and Information Science. Springer, Singapore, p. 1123.
ber 414919001. doi:10.1007/978- 981- 15- 1304- 6_22.
Jaeger, L., Eckhardt, A., 2021. Eyes wide open: the role of situational information
Declaration of Competing Interest security awareness for security-related behaviour. Inform. Syst. J. 31 (3), 429–
472. doi:10.1111/isj.12317.
Jeong, J., Mihelcic, J., Oliver, G., Rudolph, C., 2019. Towards an improved understand-
The authors declared no conflict of interest. ing of human factors in cybersecurity. In: Proceedings of the IEEE 5th Interna-
tional Conference on Collaboration and Internet Computing (CIC), pp. 338–345.
Kokolakis, S., 2017. Privacy attitudes and privacy behaviour: a review of current
CRediT authorship contribution statement research on the privacy paradox phenomenon. Comput. Secur. 64, 122–134.
doi:10.1016/j.cose.2015.07.002.
Maiju Kyytsönen: Conceptualization, Methodology, Formal Kruger, H.A., Kearney, W.D., 2006. A prototype for assessing information security
awareness. Comput. Secur. 25 (4), 289–296. doi:10.1016/j.cose.20 06.02.0 08.
analysis, Writing – original draft, Visualization, Project adminis-
Kruikemeier, S., Boerman, S.C., Bol, N., 2020. Breaching the contract? Using social
tration. Jonna Ikonen: Data curation, Formal analysis, Writing – contract theory to explain individuals’ online behaviour to safeguard privacy.
review & editing. Anna-Mari Aalto: Conceptualization, Methodol- Med. Psychol. 23 (2), 269–292. doi:10.1080/15213269.2019.1598434.
Kyytsönen, M., Aalto, A., & Vehko, T. (2021). Social and health care online ser-
ogy, Writing – review & editing. Tuulikki Vehko: Conceptualiza-
vice use in 2020–2021: experiences of the population (English abstract).
tion, Methodology, Writing – review & editing. Finnish Institute for Health and Welfare, report 7/2021, http://urn.fi/URN:ISBN:
978- 952- 343- 680- 0
References Lebek, B., Uffen, J., Neumann, M., Hohler, B., Breitner, M.H., 2014. Information secu-
rity awareness and behavior: a theory-based literature review. Manag. Res. Rev.
Ajzen, I., 1991. The theory of planned behaviour. Organ. Behav. Hum. Decis. Process. 37 (12), 1049–1092. doi:10.1108/MRR- 04- 2013- 0085.
50 (2), 179–211. doi:10.1016/0749- 5978(91)90020- T. Masur, P., 2020. How online privacy literacy supports self-data protection and self-
Baruh, L., Popescu, M., 2017. Big data analytics and the limits of privacy self- determination in the age of information. Med. Commun. 8 (2), 258–269. doi:10.
management. New Med. Soc. 19 (4), 579–596. doi:10.1177/1461444815614001. 17645/mac.v8i2.2855.
Baruh, L., Secinti, E., Cemalcilar, Z., 2017. Online privacy concerns and privacy man- McCormac, A., Zwaans, T., Parsons, K., Calic, D., Butavicius, M., Pattinson, M., 2017.
agement: a meta-analytical review. J. Commun. 67 (1), 26–53. doi:10.1111/jcom. Individual differences and information security awareness. Comput. Hum. Be-
12276. hav. 69, 151–156. doi:10.1016/j.chb.2016.11.065.
Becker, I., Parkin, S. & Sasse, A.M. (2017). Measuring the success of {Context-Aware} Nifakos, S., Chandramouli, K., Nikolaou, C.K., Papachristou, P., Koch, S., Panaousis, E.,
security behaviour surveys. USENIX Association, The LASER Workshop: Learn- Bonacina, S., 2021. Influence of human factors on cyber security within health-
ing from Authoritative Security Experiment Results (LASER 2017), 77-86. https: care organisations: a systematic review. Sensors 21 (15), 5119. doi:10.3390/
//www.usenix.org/conference/laser2017/presentation/becker s21155119.
Boerman, S.C., Kruikemeier, S., Zuiderveen Borgesius, F.J., 2018. Exploring motiva- Noor, M.U., 2020. Indonesian millennial awareness to privacy and personal data
tions for online privacy protection behaviour: insights from panel data. Com- protection on the internet. DESIDOC J. Libr. Inf. Technol. 40 (2), 83–88. doi:10.
mun. Res., 0 09365021880 0915 doi:10.1177/0 09365021880 0915. 14429/djlit.40.2.14969.
Büchi, M., Just, N., Latzer, M., 2017. Caring is not enough: the importance of internet Official Statistics of Finland. (2020). Use of information and communications tech-
skills for online privacy protection. Information. Commun. Soc. 20 (8), 1261– nology by individuals. Statistics Finland, statistical report. Retrieved 13.9., 2021,
1278. doi:10.1080/1369118X.2016.1229001. http://www.stat.fi/til/sutivi/index_en.html
Canfield, C.I., Fischhoff, B., Davis, A., 2016. Quantifying phishing susceptibility for Öğütçü, G., Testik, Ö.M., Chouseinoglou, O., 2016. Analysis of personal information
detection and behaviour decisions. Hum. Factors 58 (8), 1158–1172. doi:10.1177/ security behaviour and awareness. Comput. Secur. 56, 83–93. doi:10.1016/j.cose.
0018720816665025. 2015.10.002.
Cuijpers, P., Smits, N., Donker, T., Ten Have, M., de Graaf, R., 2009. Screening for Ojo, A.O., Arasanmi, C.N., Raman, M., Tan, C.N.L., 2019. Ability, motivation, opportu-
mood and anxiety disorders with the five-item, the three-item, and the two- nity and sociodemographic determinants of Internet usage in Malaysia. Inf. Dev.
item mental health inventory. Psychiatry Res. 168 (3), 250–255. doi:10.1016/j. 35 (5), 819–830. doi:10.1177/0266666918804859.
psychres.2008.05.012. Papageorgiou, A., Strigkos, M., Politou, E., Alepis, E., Solanas, A., Patsakis, C., 2018.
Daoud, J.I., 2017. Multicollinearity and regression analysis. J. Phys. Conf. Ser. 949, Security and privacy analysis of mobile health applications: the alarming state
012009. doi:10.1088/1742-6596/949/1/012009. of practice. IEEE Access 6, 9390–9403. doi:10.1109/ACCESS.2018.2799522.
Egelman, S., Harbach, M., Peer, E., 2016. Behaviour ever follows intention? A vali- Parikka, S., Koskela, T., Ikonen, J., & Hedman, L. (2021). The adult population’s well-
dation of the security behaviour intentions scale (SeBIS). Association for com- being, health and services – FinSote 2020, regional differences in the service
puting machinery. In: Proceedings of the CHI Conference on Human Factors in experiences and well-being of adults. Finnish Institute for Health and Welfare,
Computing Systems, pp. 5257–5261. doi:10.1145/2858036.2858265. statistical report 16/2021, http://urn.fi/URN:NBN:fi-fe2021052731871
European Commission. (2020). Digital economy and society index (DESI) 2020. The- Pattinson, M., Butavicius, M., Parsons, K., McCormac, A., Calic, D., 2015. Factors that
matic chapter. European Commission, report. influence information security behaviour: an Australian web-based study. In:
European Parliament and Council of European Union 2016. (2016). General Data Pro- Tryfonas, T., Askoxylakis, I. (Eds.), Human Aspects of Information Security, Pri-
tection Regulation 2016/679. vacy, and Trust. HAS 2015. Lecture Notes in Computer Science. Springer, Cham
Gerber, N., Gerber, P., Volkamer, M., 2018. Explaining the privacy paradox: a system- vol 9190 doi:10.1007/978- 3- 319- 20376- 8_21.
atic review of literature investigating privacy attitude and behaviour. Comput. Pattinson, M., Jerram, C., Parsons, K., McCormac, A., Butavicius, M., 2012. Why do
Secur. 77, 226–261. doi:10.1016/j.cose.2018.04.002. some people manage phishing e-mails better than others? Inform. Manag. Com-
Giboney, J.S., Proudfoot, J.G., Goel, S., Valacich, J.S., 2016. The security expertise as- put. Secur. 20 (1), 18–28. doi:10.1108/09685221211219173.
sessment measure (SEAM): developing a scale for hacker expertise. Comput. Se- Pleger, L.E., Guirguis, K., Mertes, A., 2021. Making public concerns tangible: an em-
cur. 60, 37–51. doi:10.1016/j.cose.2016.04.001. pirical study of German and UK citizens’ perception of data protection and data
Gratian, M., Bandi, S., Cukier, M., Dykstra, J., Ginther, A., 2018. Correlating human security. Comput. Hum. Behav. 122, 106830. doi:10.1016/j.chb.2021.106830.
traits and cyber security behaviour intentions. Comput. Secur. 73, 345–358. Rajivan, P., Moriano, P., Kelley, T., Camp, L.J., 2017. Factors in an end user secu-
doi:10.1016/j.cose.2017.11.015. rity expertise instrument. Inform. Comput. Secur. 25 (2), 190–205. doi:10.1108/
Hargittai, E., Piper, A.M., Morris, M.R., 2019. From internet access to internet skills: ICS- 04- 2017- 0020.
digital inequality among older adults. Univers. Access Inform. Soc. 18 (4), 881– Serra-Blasco, M., Torres, I.J., Vicent-Gil, M., Goldberg, X., Navarra-Ventura, G.,
890. doi:10.1007/s10209- 018- 0617- 5. Aguilar, E., et al., 2019. Discrepancy between objective and subjective cogni-
Henshel, D., Cains, M.G., Hoffman, B., Kelley, T., 2015. Trust as a human factor in tion in major depressive disorder. Eur. Neuropsychopharmacol. 29 (1), 46–56.
holistic cyber security risk assessment. Procedia Manuf. 3, 1117–1124. doi:10. doi:10.1016/j.euroneuro.2018.11.1104.
1016/j.promfg.2015.07.186. Singleton, C. (2021). X-force threat intelligence index 2021. IBM Corporation, report.
Hinds, J., Williams, E.J., Joinson, A.N., 2020. It would not happen to me”: privacy https://www.ibm.com/downloads/cas/M1X3B7QG
concerns and perspectives following the Cambridge analytica scandal. Int. J. Smit, E.G., Van Noort, G., Voorveld, H.A.M., 2014. Understanding online behavioural
Hum. Comput. Stud. 143 (2), 102498. doi:10.1016/j.ijhcs.2020.102498. advertising: user knowledge, privacy concerns and online coping behaviour in
Horne, C., Ahmad, A., Maynard, S., 2016. A theory on information security. In: Pro- Europe. Comput. Hum. Behav. 32, 15–22. doi:10.1016/j.chb.2013.11.008.
ceedings of the Australasian Conference on Information Systems. Wollongong, Srisurapanont, M., Suttajit, S., Eurviriyanukul, K., Varnado, P., 2017. Discrepancy be-
Australia. tween objective and subjective cognition in adults with major depressive disor-
Härkänen, T., Kaikkonen, R., Virtala, E., Koskinen, S., 2014. Inverse probability der. Sci. Rep. 7, 3901. doi:10.1038/s41598- 017- 04353- w.
weighting and doubly robust methods in correcting the effects of non-response Taber, K.S., 2018. The use of Cronbach’s alpha when developing and reporting re-
in the reimbursed medication and self-reported turnout estimates in the ATH search instruments in science education. Res. Sci. Educ. 48, 1273–1296. doi:10.
survey. BMC Public Health 14, 1150. doi:10.1186/1471- 2458- 14- 1150, 1150. 1007/s11165-016-9602-2.
Islam, T., Becker, I., Posner, R., Ekblom, M., McGuire, M., Borrion, H., Li, S., Tsai, H.S., Shillair, R., Cotten, S.R., 2017. Social support and “playing around”: an ex-
2019. A socio-technical and co-evolutionary framework for reducing human- amination of how older adults acquire digital literacy with tablet computers. J.
related risks in cyber security and cybercrime ecosystems. In: Wang, G., Appl. Gerontol. 36 (1), 29–55. doi:10.1177/0733464815609440.

7
M. Kyytsönen, J. Ikonen, A.-M. Aalto et al. Computers & Security 118 (2022) 102732

Yamazaki, S., Fukuhara, S., Green, J., 2005. Usefulness of five-item and three- experiences of electronic health record and client information systems. She is cur-
item mental health inventories to screen for depressive symptoms in the gen- rently working in a project “Monitoring and assessment of social welfare and health
eral population of Japan. Health Qual. Life Outcomes 3 (1), 48. doi:10.1186/ care information system services”.
1477- 7525- 3- 48.
van Bavel, R., Rodríguez-Priego, N., Vila, J., Briggs, P., 2019. Using protection motiva- Jonna Ikonen (MSc, University of Eastern Finland, 2017) is a statistical researcher
tion theory in the design of nudges to improve online security behaviour. Int. J. in Finnish Institute for Health and Welfare. Her work has mainly focussed on health
Hum. Comput. Stud. 123, 29–39. doi:10.1016/j.ijhcs.2018.11.003. and well-being data analysis from different data sources. She is currently working
van Deursen, A.J.A.M., Helsper, E.J., Eynon, R., 2016. Development and validation of as a statistical researcher in Evaluation and foresight -team in Population Health
the internet skills scale (ISS). Inform. Commun. Soc. 19 (6), 804–823. doi:10. -unit, mainly concentrating on FinSote and KOTT studies. FinSote is the national
1080/1369118X.2015.1078834. Finnish survey of health, well-being and service use and KOTT is the national
van Schaik, P., Jansen, J., Onibokun, J., Camp, J., Kusev, P., 2018. Security and pri- Finnish Student Health and Wellbeing Survey.
vacy in online social networking: risk perceptions and precautionary behaviour.
Comput. Hum. Behav. 78, 283–297. doi:10.1016/j.chb.2017.10.007.
von Solms, R., van Niekerk, J., 2013. From information security to cyber security. Anna-Mari Aalto (Adjunct professor, University of Helsinki, 2005; Ph.D, University
Comput. Secur. 38, 97–102. doi:10.1016/j.cose.2013.04.004. of Helsinki, 1999) is a chief expert and a team leader in Finnish Institute for Health
Wang, J., Bennett, K., Probst, J., 2011. Subdividing the digital divide: differences in and Welfare. She has been researching a variety of topics, in the recent years con-
internet access and use among rural residents with medical limitations. J. Med. centrating on the Finnish health system, patient experiences, health related quality
Internet Res. 13 (1), e25. doi:10.2196/jmir.1534. of life and validation of indicators. Nowadays, she also acts as a service system ex-
Wash, R., Rader, E., Fennell, C., 2017. Can people self-report security accurately? pert in the project group of a population survey (FinSote) and takes part in the
Agreement between self-report and behavioural measures. Association for com- national working group that aims to draft a reform for the elderly persons’ service
puting machinery. In: Proceedings of the CHI Conference on Human Factors in package.
Computing Systems, pp. 2228–2232. doi:10.1145/3025453.3025911.
Witry, M., Comellas, A., Simmering, J., Polgreen, P., 2018. The association between Tuulikki Vehko (Ph.D, University of Tampere, 2014) is a research manager at
technology use and health status in a chronic obstructive pulmonary disease Finnish Institute for Health and Welfare. Currently she leads a national project
cohort: multi-method study. J. Med. Internet Res. 20 (4), e125. doi:10.2196/jmir. “Monitoring and assessment of social welfare and health care information system
9382. services”. The aim of the project is to produce monitoring information that sup-
World Economic Forum (2021). Global Gender Gap Report 2021. Insight report. ports national planning and steering of information system services as well as ser-
https://www3.weforum.org/docs/WEF_GGGR_2021.pdf vice providers of social and health care sector. Her research field is health service
research and the research methods she uses cover both qualitative (focus group in-
Maiju Kyytsönen (MHSc, University of Oulu, 2019) is a researcher in Finnish Insti- terviews and vignette studies) and quantitative (survey studies and registered based
tute for Health and Welfare. Her research mainly focusses on citizens’ experiences studies) methods.
of social and healthcare e-service use and on health and social care professionals’

You might also like