{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,24]],"date-time":"2026-04-24T06:52:50Z","timestamp":1777013570157,"version":"3.51.4"},"reference-count":64,"publisher":"Emerald","issue":"5","license":[{"start":{"date-parts":[[2021,7,8]],"date-time":"2021-07-08T00:00:00Z","timestamp":1625702400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.emerald.com\/insight\/site-policies"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["ICS"],"published-print":{"date-parts":[[2021,11,12]]},"abstract":"<jats:sec>\n<jats:title content-type=\"abstract-subheading\">Purpose<\/jats:title>\n<jats:p>Information technology users often fail to adopt necessary security and privacy measures, leading to increased risk of cybercrimes. There has been limited research on how demographic differences influence information security behaviour and understanding this could be important in identifying users who may be more likely to have poor information security behaviour. This study aims to investigate whether there are any gender differences in security and privacy behaviours and perceptions, to identify potential differences that may have implications for protecting users\u2019 privacy and securing their devices, software and data.<\/jats:p>\n<\/jats:sec>\n<jats:sec>\n<jats:title content-type=\"abstract-subheading\">Design\/methodology\/approach<\/jats:title>\n<jats:p>This paper addresses this research gap by investigating security behaviours and perceptions in the following two studies: one focussing on information security and one on information privacy. Data was collected in both studies using anonymous online surveys.<\/jats:p>\n<\/jats:sec>\n<jats:sec>\n<jats:title content-type=\"abstract-subheading\">Findings<\/jats:title>\n<jats:p>This study finds significant differences between men and women in over 40% of the security and privacy behaviours considered, suggesting that overall levels of both are significantly lower for women than for men, with behaviours that require more technical skill being adopted less by female users. Furthermore, individual perceptions exhibited some gender differences.<\/jats:p>\n<\/jats:sec>\n<jats:sec>\n<jats:title content-type=\"abstract-subheading\">Originality\/value<\/jats:title>\n<jats:p>This research suggests that potential gender differences in some security and privacy behaviours and perceptions should be taken into account when designing information security education, training and awareness initiatives for both organisations and the broader community. This study also provides a strong foundation to explore information security individual differences more deeply.<\/jats:p>\n<\/jats:sec>","DOI":"10.1108\/ics-07-2020-0125","type":"journal-article","created":{"date-parts":[[2021,7,7]],"date-time":"2021-07-07T05:56:53Z","timestamp":1625637413000},"page":"850-865","source":"Crossref","is-referenced-by-count":29,"title":["Exploring potential gender differences in information security and privacy"],"prefix":"10.1108","volume":"29","author":[{"given":"Tanya","family":"McGill","sequence":"first","affiliation":[]},{"given":"Nik","family":"Thompson","sequence":"additional","affiliation":[]}],"member":"140","published-online":{"date-parts":[[2021,7,8]]},"reference":[{"key":"key2021111012415788800_ref001","doi-asserted-by":"crossref","unstructured":"Accenture Security and Ponemon Institute (2019), \u201cThe cost of cybercrime\u201d, available at: www.accenture.com\/us-en\/insights\/security\/cost-cybercrime-study (accessed 11 June 2019).","DOI":"10.1016\/S1353-4858(19)30032-7"},{"issue":"3","key":"key2021111012415788800_ref002","doi-asserted-by":"crossref","first-page":"701","DOI":"10.1007\/s11257-019-09236-5","article-title":"Exploring user behavioral data for adaptive cybersecurity","volume":"29","year":"2019","journal-title":"User Modeling and User-Adapted Interaction"},{"issue":"3","key":"key2021111012415788800_ref003","doi-asserted-by":"crossref","first-page":"306","DOI":"10.1108\/ICS-03-2018-0037","article-title":"Identifying and predicting the factors affecting end-users\u2019 risk-taking behavior","volume":"26","year":"2018","journal-title":"Information and Computer Security"},{"key":"key2021111012415788800_ref004","article-title":"Exploring the adoption of physical security controls in smartphones","volume-title":"Proceedings of the International Conference on Human Aspects of Information Security, Privacy, and Trust","year":"2015"},{"key":"key2021111012415788800_ref005","unstructured":"American Association of University Women (1994), \u201cShortchanging girls, shortchanging America: executive summary: a nationwide poll that assesses self-esteem, educational experiences, interest in math and science, and career aspirations of girls and boys ages 9-15\u201d, available at: www.aauw.org\/files\/shortchanging-girls-shortchanging-america-executive-summmary.pdf (accessed 15 January 2020)."},{"issue":"3","key":"key2021111012415788800_ref006","doi-asserted-by":"crossref","first-page":"613","DOI":"10.2307\/25750694","article-title":"Practicing safe computing: a multimethod empirical examination of home computer user security behavioural intentions","volume":"34","year":"2010","journal-title":"MIS Quarterly"},{"key":"key2021111012415788800_ref007","doi-asserted-by":"crossref","first-page":"437","DOI":"10.1016\/j.chb.2016.12.040","article-title":"Gender difference and employees' cybersecurity behaviors","volume":"69","year":"2017","journal-title":"Computers in Human Behavior"},{"issue":"1","key":"key2021111012415788800_ref008","doi-asserted-by":"crossref","first-page":"21","DOI":"10.1089\/cpb.2005.8.21","article-title":"Gender and information and communication technologies (ICT) anxiety: male self-assurance and female hesitation","volume":"8","year":"2005","journal-title":"CyberPsychology and Behavior"},{"issue":"5","key":"key2021111012415788800_ref009","doi-asserted-by":"crossref","first-page":"593","DOI":"10.1108\/ICS-03-2017-0009","article-title":"Spear phishing in organisations explained","volume":"25","year":"2017","journal-title":"Information and Computer Security"},{"issue":"2","key":"key2021111012415788800_ref010","doi-asserted-by":"crossref","first-page":"147","DOI":"10.2190\/H7E1-XMM7-GU9B-3HWR","article-title":"Gender differences in self-efficacy and attitudes toward computers","volume":"12","year":"1995","journal-title":"Journal of Educational Computing Research"},{"key":"key2021111012415788800_ref011","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.compedu.2016.11.003","article-title":"Gender and attitudes toward technology use: a meta-analysis","volume":"105","year":"2017","journal-title":"Computers and Education"},{"issue":"1","key":"key2021111012415788800_ref012","doi-asserted-by":"crossref","first-page":"205","DOI":"10.25300\/MISQ\/2016\/40.1.09","article-title":"Individuals' internet security perceptions and behaviors: polycontextual contrasts between the United States and China","volume":"40","year":"2016","journal-title":"MIS Quarterly"},{"key":"key2021111012415788800_ref013","doi-asserted-by":"crossref","first-page":"42","DOI":"10.1016\/j.chb.2017.12.001","article-title":"The role of privacy fatigue in online privacy behavior","volume":"81","year":"2018","journal-title":"Computers in Human Behavior"},{"issue":"2","key":"key2021111012415788800_ref014","doi-asserted-by":"crossref","first-page":"178","DOI":"10.1080\/0144929X.2016.1212091","article-title":"Exploring the relative impact of biological sex and masculinity\u2013femininity values on information technology use","volume":"36","year":"2017","journal-title":"Behaviour and Information Technology"},{"issue":"7","key":"key2021111012415788800_ref015","doi-asserted-by":"crossref","first-page":"768","DOI":"10.1016\/S0148-2963(02)00363-6","article-title":"Gender differences in the perceived risk of buying online and the effects of receiving a site recommendation","volume":"57","year":"2004","journal-title":"Journal of Business Research"},{"key":"key2021111012415788800_ref016","doi-asserted-by":"crossref","first-page":"345","DOI":"10.1016\/j.cose.2017.11.015","article-title":"Correlating human traits and cyber security behavior intentions","volume":"73","year":"2018","journal-title":"Computers and Security"},{"key":"key2021111012415788800_ref017","volume-title":"A Primer on Partial Least Squares Structural Equation Modeling (PLS-SEM)","year":"2014"},{"issue":"1","key":"key2021111012415788800_ref018","doi-asserted-by":"crossref","first-page":"93","DOI":"10.1080\/07421222.1992.11517949","article-title":"The influence of individual differences on skill in end-user computing","volume":"9","year":"1992","journal-title":"Journal of Management Information Systems"},{"key":"key2021111012415788800_ref019","article-title":"Are men more technology-oriented than women? The role of gender on the development of general computer self-efficacy of college students","year":"2009"},{"key":"key2021111012415788800_ref020","volume-title":"SPSS Explained","year":"2004"},{"issue":"1-2","key":"key2021111012415788800_ref021","doi-asserted-by":"crossref","first-page":"46","DOI":"10.1080\/00208825.1983.11656358","article-title":"National cultures in four dimensions: a research-based theory of cultural differences among nations","volume":"13","year":"1983","journal-title":"International Studies of Management and Organization"},{"issue":"2","key":"key2021111012415788800_ref022","doi-asserted-by":"crossref","first-page":"28","DOI":"10.1080\/15252019.2010.10722168","article-title":"Gender differences in privacy-related measures for young adult facebook users","volume":"10","year":"2010","journal-title":"Journal of Interactive Advertising"},{"issue":"1","key":"key2021111012415788800_ref023","doi-asserted-by":"crossref","first-page":"83","DOI":"10.1016\/j.cose.2011.10.007","article-title":"Understanding information systems security policy compliance: an integration of the theory of planned behavior and the protection motivation theory","volume":"31","year":"2012","journal-title":"Computers and Security"},{"issue":"10","key":"key2021111012415788800_ref024","doi-asserted-by":"crossref","first-page":"94","DOI":"10.1145\/1290958.1290968","article-title":"Social phishing","volume":"50","year":"2007","journal-title":"Communications of the ACM"},{"key":"key2021111012415788800_ref025","article-title":"Privacy concerns and acceptance of government surveillance in Australia","year":"2018"},{"issue":"1","key":"key2021111012415788800_ref026","first-page":"93","article-title":"Consumer concerns for healthcare information privacy: a comparison of US and Canadian perspectives","volume":"12","year":"2009","journal-title":"Research in Healthcare Financial Management"},{"issue":"3","key":"key2021111012415788800_ref027","doi-asserted-by":"crossref","first-page":"71","DOI":"10.1145\/1325555.1325569","article-title":"Promoting personal responsibility for internet safety","volume":"51","year":"2008","journal-title":"Communications of the ACM"},{"issue":"7","key":"key2021111012415788800_ref028","doi-asserted-by":"crossref","first-page":"394","DOI":"10.17705\/1jais.00232","article-title":"Understanding security behaviors in personal computer usage: a threat avoidance perspective","volume":"11","year":"2010","journal-title":"Journal of the Association for Information Systems"},{"key":"key2021111012415788800_ref029","doi-asserted-by":"crossref","first-page":"45","DOI":"10.1016\/j.ijinfomgt.2019.05.004","article-title":"Examining gender differences in people\u2019s information-sharing decisions on social networking sites","volume":"50","year":"2020","journal-title":"International Journal of Information Management"},{"key":"key2021111012415788800_ref030","article-title":"The influence of human factors on vulnerability to information security breaches","year":"2010"},{"key":"key2021111012415788800_ref031","doi-asserted-by":"crossref","first-page":"151","DOI":"10.1016\/j.chb.2016.11.065","article-title":"Individual differences and information security awareness","volume":"69","year":"2017","journal-title":"Computers in Human Behavior"},{"issue":"11","key":"key2021111012415788800_ref032","doi-asserted-by":"crossref","first-page":"1111","DOI":"10.1080\/0144929X.2017.1352028","article-title":"Old risks, new challenges: exploring differences in security between home computer and mobile device use","volume":"36","year":"2017","journal-title":"Behaviour and Information Technology"},{"key":"key2021111012415788800_ref033","article-title":"Gender differences in information security perceptions and behaviour","year":"2018"},{"key":"key2021111012415788800_ref034","doi-asserted-by":"crossref","first-page":"32","DOI":"10.1016\/j.chb.2018.01.028","article-title":"The impact of information security threat awareness on privacy-protective behaviors","volume":"83","year":"2018","journal-title":"Computers in Human Behavior"},{"issue":"3","key":"key2021111012415788800_ref035","doi-asserted-by":"crossref","first-page":"449","DOI":"10.1111\/j.1745-6606.2009.01148.x","article-title":"Toward an understanding of the online consumer\u2019s risky behavior and protection practices","volume":"43","year":"2009","journal-title":"Journal of Consumer Affairs"},{"issue":"6","key":"key2021111012415788800_ref036","doi-asserted-by":"crossref","first-page":"2366","DOI":"10.1016\/j.chb.2012.07.008","article-title":"Information privacy concerns, antecedents and privacy measure use in social networking sites: evidence from Malaysia","volume":"28","year":"2012","journal-title":"Computers in Human Behavior"},{"issue":"1","key":"key2021111012415788800_ref037","first-page":"147","article-title":"Short-term and long-term effects of fear appeals in improving compliance with password guidelines","volume":"41","year":"2018","journal-title":"Communications of the Association for Information Systems"},{"issue":"1","key":"key2021111012415788800_ref038","doi-asserted-by":"crossref","first-page":"101","DOI":"10.1037\/1089-2699.6.1.101","article-title":"Harvesting implicit group attitudes and beliefs from a demonstration web site","volume":"6","year":"2002","journal-title":"Group Dynamics: Theory, Research, and Practice"},{"key":"key2021111012415788800_ref039","volume-title":"Psychometric Theory","year":"1978"},{"key":"key2021111012415788800_ref040","doi-asserted-by":"crossref","first-page":"296","DOI":"10.1016\/j.chb.2014.05.041","article-title":"Understanding privacy knowledge and skill in mobile communication","volume":"38","year":"2014","journal-title":"Computers in Human Behavior"},{"issue":"1","key":"key2021111012415788800_ref041","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1108\/ICS-01-2019-0022","article-title":"Matching training to individual learning styles improves information security awareness","volume":"28","year":"2019","journal-title":"Information and Computer Security"},{"key":"key2021111012415788800_ref042","article-title":"Factors that influence information security behavior: an australian web-based study","volume-title":"Proceedings of the International Conference on Human Aspects of Information Security, Privacy, and Trust","year":"2015"},{"key":"key2021111012415788800_ref043","unstructured":"Ponemon Institute (2018), \u201c2018 Cost of data breach study: global overview\u201d, available at: https:\/\/securityintelligence.com\/series\/ponemon-institute-cost-of-a-data-breach-2018\/ (accessed July 2020)."},{"issue":"4","key":"key2021111012415788800_ref044","doi-asserted-by":"crossref","first-page":"757","DOI":"10.2307\/25750704","article-title":"Improving employees' compliance through information systems security training: an action research study","volume":"34","year":"2010","journal-title":"MIS Quarterly"},{"issue":"2","key":"key2021111012415788800_ref045","doi-asserted-by":"crossref","first-page":"190","DOI":"10.1108\/ICS-04-2017-0020","article-title":"Factors in an end user security expertise instrument","volume":"25","year":"2017","journal-title":"Information and Computer Security"},{"key":"key2021111012415788800_ref046","doi-asserted-by":"crossref","first-page":"90","DOI":"10.1016\/j.cose.2014.03.004","article-title":"Information security knowledge sharing in organizations: investigating the effect of behavioral information security governance and national culture","volume":"43","year":"2014","journal-title":"Computers and Security"},{"issue":"3","key":"key2021111012415788800_ref047","doi-asserted-by":"crossref","first-page":"122","DOI":"10.1023\/A:1011902718709","article-title":"Transforming the \u2018weakest link\u2019 \u2013 a human\/computer interaction approach to usable and effective security","volume":"19","year":"2001","journal-title":"BT Technology Journal"},{"issue":"2","key":"key2021111012415788800_ref048","doi-asserted-by":"crossref","first-page":"293","DOI":"10.1108\/ICS-04-2019-0041","article-title":"Cybersecurity behaviour of smartphone users in India: an empirical analysis","volume":"28","year":"2020","journal-title":"Information and Computer Security"},{"key":"key2021111012415788800_ref049","unstructured":"Shelton, M., Rainie, L., Madden, M., Anderson, M., Duggan, M., Perrin, A. and Page, D. (2015), \u201cAmericans\u2019 privacy strategies Post-Snowden\u201d, available at: www.pewinternet.org\/2015\/03\/16\/americans-privacy-strategies-post-snowden\/ (accessed 15 Mar 2019)."},{"key":"key2021111012415788800_ref050","article-title":"Who falls for phish?: a demographic analysis of phishing susceptibility and effectiveness of interventions","volume-title":"Proceedings of the SIGCHI Conference on Human Factors in Computing Systems","year":"2010"},{"issue":"2","key":"key2021111012415788800_ref051","doi-asserted-by":"crossref","first-page":"217","DOI":"10.1016\/j.im.2013.08.006","article-title":"Employees\u2019 adherence to information security policies: an exploratory field study","volume":"51","year":"2014","journal-title":"Information and Management"},{"issue":"2","key":"key2021111012415788800_ref052","doi-asserted-by":"crossref","first-page":"167","DOI":"10.2307\/249477","article-title":"Information privacy: measuring individual's concerns about organizational practices","volume":"20","year":"1996","journal-title":"MIS Quarterly"},{"issue":"2","key":"key2021111012415788800_ref053","doi-asserted-by":"crossref","first-page":"144","DOI":"10.1287\/isre.6.2.144","article-title":"Understanding information technology usage: a test of competing models","volume":"6","year":"1995","journal-title":"Information Systems Research"},{"key":"key2021111012415788800_ref054","unstructured":"The Harris Poll (2019), \u201cCyber safety insights report United States (US) results\u201d, available at: www.symantec.com\/content\/dam\/symantec\/docs\/about\/2018-norton-lifelock-cyber-safety-insights-report-us-results-en.pdf (accessed 15 July 2019)."},{"key":"key2021111012415788800_ref055","article-title":"Who are you talking about? Contrasting determinants of online disclosure about self or others","year":"2020","journal-title":"Information Technology and People"},{"key":"key2021111012415788800_ref057","doi-asserted-by":"crossref","first-page":"376","DOI":"10.1016\/j.cose.2017.07.003","article-title":"Security begins at home\u201d: determinants of home computer and mobile device security behavior","volume":"70","year":"2017","journal-title":"Computers and Security"},{"issue":"9","key":"key2021111012415788800_ref056","doi-asserted-by":"crossref","first-page":"1129","DOI":"10.1002\/asi.24372","article-title":"Cultural factors and the role of privacy concerns in acceptance of government surveillance","volume":"71","year":"2020","journal-title":"Journal of the Association for Information Science and Technology"},{"issue":"1","key":"key2021111012415788800_ref058","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1080\/17437199.2014.922895","article-title":"Reasoned versus reactive prediction of behaviour: a meta-analysis of the prototype willingness model","volume":"10","year":"2016","journal-title":"Health Psychology Review"},{"key":"key2021111012415788800_ref059","doi-asserted-by":"crossref","first-page":"138","DOI":"10.1016\/j.cose.2016.02.009","article-title":"Understanding online safety behaviors: a protection motivation theory perspective","volume":"59","year":"2016","journal-title":"Computers and Security"},{"issue":"4","key":"key2021111012415788800_ref060","doi-asserted-by":"crossref","first-page":"506","DOI":"10.1016\/j.im.2015.03.002","article-title":"Learning to cope with information security risks regarding mobile device loss or theft: an empirical examination","volume":"52","year":"2015","journal-title":"Information and Management"},{"issue":"1","key":"key2021111012415788800_ref061","doi-asserted-by":"crossref","first-page":"115","DOI":"10.2307\/3250981","article-title":"Why don't men ever stop to ask for directions? Gender, social influence, and their role in technology acceptance and usage behavior","volume":"24","year":"2000","journal-title":"MIS Quarterly"},{"issue":"7\/8","key":"key2021111012415788800_ref062","first-page":"515","article-title":"Gender roles, computer attitudes, and dyadic computer interaction performance in college students","volume":"29","year":"1993","journal-title":"Sex Roles"},{"key":"key2021111012415788800_ref063","article-title":"A protection motivation theory approach to home wireless security","year":"2005"},{"issue":"6","key":"key2021111012415788800_ref064","doi-asserted-by":"crossref","first-page":"2799","DOI":"10.1016\/j.chb.2008.04.005","article-title":"Security lapses and the omission of information security measures: a threat control model and empirical test","volume":"24","year":"2008","journal-title":"Computers in Human Behavior"}],"container-title":["Information &amp; Computer Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/ICS-07-2020-0125\/full\/xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/ICS-07-2020-0125\/full\/html","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,25]],"date-time":"2025-07-25T01:23:04Z","timestamp":1753406584000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.emerald.com\/ics\/article\/29\/5\/850-865\/105732"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,7,8]]},"references-count":64,"journal-issue":{"issue":"5","published-online":{"date-parts":[[2021,7,8]]},"published-print":{"date-parts":[[2021,11,12]]}},"alternative-id":["10.1108\/ICS-07-2020-0125"],"URL":"https:\/\/doi.org\/10.1108\/ics-07-2020-0125","relation":{},"ISSN":["2056-4961","2056-4961"],"issn-type":[{"value":"2056-4961","type":"print"},{"value":"2056-4961","type":"print"}],"subject":[],"published":{"date-parts":[[2021,7,8]]}}}