This page has only limited features, please log in for full access.
Business disruption from cyberattacks is a growing concern, yet cyberinsurance uptake remains low. Using an online behavioural economics experiment with 4800 participants across four EU countries, this study tests a predictive model of cyberinsurance adoption, incorporating elements of Protection Motivation Theory (PMT) and the Theory of Planned Behaviour (TPB) as well as factors in relation to risk propensity and price. During the experiment, participants were given the opportunity to purchase different cybersecurity measures and cyberinsurance products before performing an online task. Participants likelihood of suffering a cyberattack was dependent upon their adoption of cybersecurity measures and their behaviour during the online task. The consequences of any attack were dependent upon the participants insurance decisions. Structural equation modelling was applied and the model was further developed to include elements of the wider security ecosystem. The final model shows that all TPB factors, and response efficacy from the PMT, positively predicted adoption of premium cyberinsurance. Interestingly, adoption of cybersecurity measures was associated with safer behaviour online, contrary to concerns of “moral hazard”. The findings highlight the need to consider the larger cybersecurity ecosystem when designing interventions to increase adoption of cyberinsurance and/or promote more secure online behaviour.
Dawn Branley-Bell; Yolanda Gómez; Lynne Coventry; José Vila; Pam Briggs. Developing and Validating a Behavioural Model of Cyberinsurance Adoption. Sustainability 2021, 13, 9528 .
AMA StyleDawn Branley-Bell, Yolanda Gómez, Lynne Coventry, José Vila, Pam Briggs. Developing and Validating a Behavioural Model of Cyberinsurance Adoption. Sustainability. 2021; 13 (17):9528.
Chicago/Turabian StyleDawn Branley-Bell; Yolanda Gómez; Lynne Coventry; José Vila; Pam Briggs. 2021. "Developing and Validating a Behavioural Model of Cyberinsurance Adoption." Sustainability 13, no. 17: 9528.
Aim Understanding COVID-19 risk perceptions and their impact on behaviour can improve the effectiveness of public health strategies. Prior evidence suggests that, when people perceive uncontrollable risks to their health, they are less likely to engage in healthful behaviour. This article aims to understand the extent to which COVID-19 is perceived as an uncontrollable risk, and to assess whether this perceived risk is associated with health behaviour. Subject and methods We surveyed a nationally representative sample of 496 participants during the first UK lockdown. We assessed perceptions of COVID-19-related risk, self-reported adherence to infection control measures recommended by the UK Government, and general health behaviours. We predicted that increased perceived extrinsic mortality risk (the portion of mortality risk perceived to be uncontrollable) would disincentivise healthy behaviour. Results Perceived threat to life was the most consistent predictor of reported adherence to infection control measures. Perceived extrinsic mortality risk was found to have increased due to the pandemic, and was associated with lower reported adherence to Government advice on diet, physical activity, and smoking. Conclusions Our findings suggest that health messages that highlight threat to life may be effective in increasing adherence to infection control, but may also lead to a reduction in health-promoting behaviours. We suggest that messages that highlight threat to life should be accompanied by statements of efficacy. Further, messages evoking feelings of concern for others may be effective in promoting compliance with anti-infection measures, without the potential for the unwelcome side-effect of discouraging healthy behaviour.
Richard Brown; Lynne Coventry; Gillian Pepper. COVID-19: the relationship between perceptions of risk and behaviours during lockdown. Journal of Public Health 2021, 1 -11.
AMA StyleRichard Brown, Lynne Coventry, Gillian Pepper. COVID-19: the relationship between perceptions of risk and behaviours during lockdown. Journal of Public Health. 2021; ():1-11.
Chicago/Turabian StyleRichard Brown; Lynne Coventry; Gillian Pepper. 2021. "COVID-19: the relationship between perceptions of risk and behaviours during lockdown." Journal of Public Health , no. : 1-11.
Artificial intelligence (AI) is increasingly being integrated into different areas of our lives. AI has the potential to increase productivity and relieve workload on staff in high-pressure jobs such as healthcare. However, most AI healthcare tools have failed. For AI to be effective, it is vital that users can understand how the system is processing data. Explainable AI (XAI) moves away from the traditional ‘black box’ approach, aiming to make the processes behind the system more transparent. This experimental study uses real healthcare data – and combines a computer science and psychological approach – to investigate user trust and understanding of three popular XAI algorithms (Decision Trees, Logistic Regression and Neural Networks). The results question the contribution of understanding towards user trust; Suggesting that understanding and explainability are not the only factors contributing to trust in AI. Users also show biases in trust and understanding – with a particular bias towards malignant results. This raises important issues around how humans can be encouraged to make more accurate judgements when using XAI systems. These findings have implications in relation to ethics, future XAI design, healthcare and further research.
Dawn Branley-Bell; Rebecca Whitworth; Lynne Coventry. User Trust and Understanding of Explainable AI: Exploring Algorithm Visualisations and User Biases. Transactions on Petri Nets and Other Models of Concurrency XV 2020, 382 -399.
AMA StyleDawn Branley-Bell, Rebecca Whitworth, Lynne Coventry. User Trust and Understanding of Explainable AI: Exploring Algorithm Visualisations and User Biases. Transactions on Petri Nets and Other Models of Concurrency XV. 2020; ():382-399.
Chicago/Turabian StyleDawn Branley-Bell; Rebecca Whitworth; Lynne Coventry. 2020. "User Trust and Understanding of Explainable AI: Exploring Algorithm Visualisations and User Biases." Transactions on Petri Nets and Other Models of Concurrency XV , no. : 382-399.
There are increasing concerns relating to cybersecurity of healthcare data and medical devices. Cybersecurity in this sector is particularly important given the criticality of healthcare systems, the impacts of a breach or cyberattack (including in the worst instance, potential physical harm to patients) and the value of healthcare data to criminals. Technology design is important for cybersecurity, but it is also necessary to understand the insecure behaviours prevalent within healthcare. It is vital to identify the drivers behind these behaviours, i.e., why staff may engage in insecure behaviour including their goals and motivations and/or perceived barriers preventing secure behaviour. To achieve this, in-depth interviews with 50 staff were conducted at three healthcare sites, across three countries (Ireland, Italy and Greece). A range of seven insecure behaviours were reported: Poor computer and user account security; Unsafe e-mail use; Use of USBs and personal devices; Remote access and home working; Lack of encryption, backups and updates; Use of connected medical devices; and poor physical security. Thematic analysis revealed four key facilitators of insecure behaviour: Lack of awareness and experience, Shadow working processes, Behaviour prioritisation and Environmental appropriateness. The findings suggest three key barriers to security: i) Security perceived as a barrier to productivity and/or patient care; ii) Poor awareness of consequences of behaviour; and iii) a lack of policies and reinforcement of secure behaviour. Implications for future research are presented.
Lynne Coventry; Dawn Branley-Bell; Elizabeth Sillence; Sabina Magalini; Pasquale Mari; Aimilia Magkanaraki; Kalliopi Anastasopoulou. Cyber-Risk in Healthcare: Exploring Facilitators and Barriers to Secure Behaviour. HCI for Cybersecurity, Privacy and Trust 2020, 105 -122.
AMA StyleLynne Coventry, Dawn Branley-Bell, Elizabeth Sillence, Sabina Magalini, Pasquale Mari, Aimilia Magkanaraki, Kalliopi Anastasopoulou. Cyber-Risk in Healthcare: Exploring Facilitators and Barriers to Secure Behaviour. HCI for Cybersecurity, Privacy and Trust. 2020; ():105-122.
Chicago/Turabian StyleLynne Coventry; Dawn Branley-Bell; Elizabeth Sillence; Sabina Magalini; Pasquale Mari; Aimilia Magkanaraki; Kalliopi Anastasopoulou. 2020. "Cyber-Risk in Healthcare: Exploring Facilitators and Barriers to Secure Behaviour." HCI for Cybersecurity, Privacy and Trust , no. : 105-122.
A cross sectional survey examined an extended version of Protection Motivation Theory (PMT) to identify factors that influence employees’ intentions to perform three anti-malware behaviours. 526 employees completed an online survey that measured an employees’ threat (severity and susceptibility) and coping (self-efficacy, response efficacy and response costs) appraisal. The survey also extended PMT to include additional factors of experience, psychological ownership, organizational citizenship and security responsibility. Factors were found to have differing effects on employees’ intentions to engage in anti-malware behaviours indicating the importance of targeted behavioural analyses. Coping appraisal was more predictive of security behaviours than threat appraisal from PMT. Specifically, across all behaviours, response costs were identified as a key factor that may be a barrier to behaviour whereas response efficacy was a key facilitator. Moreover, additional factors contributed unique variance to predicting each anti-malware behaviour. The study highlights the importance of identifying key factors prior to intervention development and demonstrates the benefit of expanding on behavioural theories to account for factors that may be important for security behaviours.
John M. Blythe; Lynne Coventry. Costly but effective: Comparing the factors that influence employee anti-malware behaviours. Computers in Human Behavior 2018, 87, 87 -97.
AMA StyleJohn M. Blythe, Lynne Coventry. Costly but effective: Comparing the factors that influence employee anti-malware behaviours. Computers in Human Behavior. 2018; 87 ():87-97.
Chicago/Turabian StyleJohn M. Blythe; Lynne Coventry. 2018. "Costly but effective: Comparing the factors that influence employee anti-malware behaviours." Computers in Human Behavior 87, no. : 87-97.
Electronic healthcare technology is prevalent around the world and creates huge potential to improve clinical outcomes and transform care delivery. However, there are increasing concerns relating to the security of healthcare data and devices. Increased connectivity to existing computer networks has exposed medical devices to new cybersecurity vulnerabilities. Healthcare is an attractive target for cybercrime for two fundamental reasons: it is a rich source of valuable data and its defences are weak. Cybersecurity breaches include stealing health information and ransomware attacks on hospitals, and could include attacks on implanted medical devices. Breaches can reduce patient trust, cripple health systems and threaten human life. Ultimately, cybersecurity is critical to patient safety, yet has historically been lax. New legislation and regulations are in place to facilitate change. This requires cybersecurity to become an integral part of patient safety. Changes are required to human behaviour, technology and processes as part of a holistic solution.
Lynne Coventry; Dawn Branley. Cybersecurity in healthcare: A narrative review of trends, threats and ways forward. Maturitas 2018, 113, 48 -52.
AMA StyleLynne Coventry, Dawn Branley. Cybersecurity in healthcare: A narrative review of trends, threats and ways forward. Maturitas. 2018; 113 ():48-52.
Chicago/Turabian StyleLynne Coventry; Dawn Branley. 2018. "Cybersecurity in healthcare: A narrative review of trends, threats and ways forward." Maturitas 113, no. : 48-52.
A quantitative empirical online study examined a set of 16 security hazards on the Internet and two comparisons in 436 UK- and US students, measuring perceptions of risk and other risk dimensions. First, perceived risk was highest for identity theft, keylogger, cyber-bullying and social engineering. Second, consistent with existing theory, significant predictors of perceived risk were voluntariness, immediacy, catastrophic potential, dread, severity of consequences and control, as well as Internet experience and frequency of Internet use. Moreover, control was a significant predictor of precautionary behaviour. Methodological implications emphasise the need for non-aggregated analysis and practical implications emphasise risk communication to Internet users.
Paul Van Schaik; Debora Jeske; Joseph Onibokun; Lynne Coventry; Jurjen Jansen; Petko Kusev. Risk perceptions of cyber-security and precautionary behaviour. Computers in Human Behavior 2017, 75, 547 -559.
AMA StylePaul Van Schaik, Debora Jeske, Joseph Onibokun, Lynne Coventry, Jurjen Jansen, Petko Kusev. Risk perceptions of cyber-security and precautionary behaviour. Computers in Human Behavior. 2017; 75 ():547-559.
Chicago/Turabian StylePaul Van Schaik; Debora Jeske; Joseph Onibokun; Lynne Coventry; Jurjen Jansen; Petko Kusev. 2017. "Risk perceptions of cyber-security and precautionary behaviour." Computers in Human Behavior 75, no. : 547-559.
The current paper outlines an exploratory case study in which we examined the extent to which specific communities of Twitter users engaged with the debate about the security threat known as 'Heartbleed' in the first few days after this threat was exposed. The case study explored which professional groups appeared to lead the debate about Heartbleed, the nature of the communication (tweets and retweets), and evidence about behaviour change. Using keywords from the Twitter user profiles, six occupational groups were identified, each of which were likely to have a direct interest in learning about Heartbleed (including legal, financial, entrepreneurial, press, and IT professionals). The groups participated to different degrees in the debate about Heartbleed. This exploratory case study provides an insight into information sharing, potential communities of influence, and points for future research in the absence of a voice of authority in the field of cybersecurity.
Pam Briggs; Lynne Coventry; Debora Jeske; Andrew R. McNeill. Security information sharing via Twitter: 'Heartbleed' as a case study. International Journal of Web Based Communities 2017, 13, 172 .
AMA StylePam Briggs, Lynne Coventry, Debora Jeske, Andrew R. McNeill. Security information sharing via Twitter: 'Heartbleed' as a case study. International Journal of Web Based Communities. 2017; 13 (2):172.
Chicago/Turabian StylePam Briggs; Lynne Coventry; Debora Jeske; Andrew R. McNeill. 2017. "Security information sharing via Twitter: 'Heartbleed' as a case study." International Journal of Web Based Communities 13, no. 2: 172.
The current paper outlines an exploratory case study in which we examined the extent to which specific communities of Twitter users engaged with the debate about the security threat known as 'Heartbleed' in the first few days after this threat was exposed. The case study explored which professional groups appeared to lead the debate about Heartbleed, the nature of the communication (tweets and retweets), and evidence about behaviour change. Using keywords from the Twitter user profiles, six occupational groups were identified, each of which were likely to have a direct interest in learning about Heartbleed (including legal, financial, entrepreneurial, press, and IT professionals). The groups participated to different degrees in the debate about Heartbleed. This exploratory case study provides an insight into information sharing, potential communities of influence, and points for future research in the absence of a voice of authority in the field of cybersecurity.
Debora Jeske; Andrew R. McNeill; Lynne M. Coventry; Pam Briggs. Security information sharing via Twitter: 'Heartbleed' as a case study. International Journal of Web Based Communities 2017, 13, 172 -192.
AMA StyleDebora Jeske, Andrew R. McNeill, Lynne M. Coventry, Pam Briggs. Security information sharing via Twitter: 'Heartbleed' as a case study. International Journal of Web Based Communities. 2017; 13 (2):172-192.
Chicago/Turabian StyleDebora Jeske; Andrew R. McNeill; Lynne M. Coventry; Pam Briggs. 2017. "Security information sharing via Twitter: 'Heartbleed' as a case study." International Journal of Web Based Communities 13, no. 2: 172-192.
Despite their best intentions, people struggle with the realities of privacy protection and will often sacrifice privacy for convenience in their online activities. Individuals show systematic, personality dependent differences in their privacy decision making, which makes it interesting for those who seek to design ‘nudges’ designed to manipulate privacy behaviors. We explore such effects in a cookie decision task. Two hundred and ninety participants were given an incidental website review task that masked the true aim of the study. At the task outset, they were asked whether they wanted to accept a cookie in a message that either contained a social framing ’nudge’ (they were told that either a majority or a minority of users like themselves had accepted the cookie) or contained no information about social norms (control). At the end of the task, participants were asked to complete a range of personality assessments (impulsivity, risk-taking, willingness to self-disclose and sociability). We found social framing to be an effective behavioral nudge, reducing cookie acceptance in the minority social norm condition. Further, we found personality effects such that those scoring highly on risk-taking and impulsivity were significantly more likely to accept the cookie. Finally, we found that the application of a social nudge could attenuate the personality effects of impulsivity and risk-taking. We explore the implications for those working in the privacy-by-design space.
Lynne M. Coventry; Debora Jeske; John M. Blythe; James Turland; Pam Briggs. Personality and Social Framing in Privacy Decision-Making: A Study on Cookie Acceptance. Frontiers in Psychology 2016, 7, 1341 .
AMA StyleLynne M. Coventry, Debora Jeske, John M. Blythe, James Turland, Pam Briggs. Personality and Social Framing in Privacy Decision-Making: A Study on Cookie Acceptance. Frontiers in Psychology. 2016; 7 ():1341.
Chicago/Turabian StyleLynne M. Coventry; Debora Jeske; John M. Blythe; James Turland; Pam Briggs. 2016. "Personality and Social Framing in Privacy Decision-Making: A Study on Cookie Acceptance." Frontiers in Psychology 7, no. : 1341.
Lynne Coventry; Pam Briggs. Mobile Technology for Older Adults: Protector, Motivator or Threat? Transactions on Petri Nets and Other Models of Concurrency XV 2016, 424 -434.
AMA StyleLynne Coventry, Pam Briggs. Mobile Technology for Older Adults: Protector, Motivator or Threat? Transactions on Petri Nets and Other Models of Concurrency XV. 2016; ():424-434.
Chicago/Turabian StyleLynne Coventry; Pam Briggs. 2016. "Mobile Technology for Older Adults: Protector, Motivator or Threat?" Transactions on Petri Nets and Other Models of Concurrency XV , no. : 424-434.
Walker-use among older adults is often avoided because of the stigma of using one. Drawing on the appraisal theory of stress, we argue that stigma associated with walker-use is subject to various cognitive appraisals that affect whether the user sees the walker as stigmatizing and the extent to which they can cope with that stigma. We followed a participatory design approach to involve older adults in the design of an intelligent walker. One of the activities was to conduct focus groups to explore the role of the aesthetic design of the product in acceptance and use of such walkers. Qualitative analysis of these focus groups provides data explaining the ways in which potential users assess stigma and coping resources. We emphasise that while better design of walkers is important, tackling the self-stigma of users and increasing their ability to cope with using one is equally important.
Andrew McNeill; Lynne M. Coventry. An Appraisal-Based Approach to the Stigma of Walker-Use. Transactions on Petri Nets and Other Models of Concurrency XV 2015, 250 -261.
AMA StyleAndrew McNeill, Lynne M. Coventry. An Appraisal-Based Approach to the Stigma of Walker-Use. Transactions on Petri Nets and Other Models of Concurrency XV. 2015; ():250-261.
Chicago/Turabian StyleAndrew McNeill; Lynne M. Coventry. 2015. "An Appraisal-Based Approach to the Stigma of Walker-Use." Transactions on Petri Nets and Other Models of Concurrency XV , no. : 250-261.
Behaviour change is difficult to achieve and there are many models identifying the factors to affect such change but few have been applied in the security domain. This paper discusses the use of serious games to improve the security behaviour of end-users. A new framework, based upon literature findings, is proposed for future game design. The trust and privacy issues related to using serious games for improving security awareness and behaviour are highlighted.
John M. Blythe; Lynne Coventry. Cyber Security Games: A New Line of Risk. Computer Vision 2012, 7522, 600 -603.
AMA StyleJohn M. Blythe, Lynne Coventry. Cyber Security Games: A New Line of Risk. Computer Vision. 2012; 7522 ():600-603.
Chicago/Turabian StyleJohn M. Blythe; Lynne Coventry. 2012. "Cyber Security Games: A New Line of Risk." Computer Vision 7522, no. : 600-603.
David Greathead; Lynne Coventry; Budi Arief; Aad Van Moorsel. Deriving requirements for an online community interaction scheme. CHI '12 Extended Abstracts on Human Factors in Computing Systems 2012, 1 .
AMA StyleDavid Greathead, Lynne Coventry, Budi Arief, Aad Van Moorsel. Deriving requirements for an online community interaction scheme. CHI '12 Extended Abstracts on Human Factors in Computing Systems. 2012; ():1.
Chicago/Turabian StyleDavid Greathead; Lynne Coventry; Budi Arief; Aad Van Moorsel. 2012. "Deriving requirements for an online community interaction scheme." CHI '12 Extended Abstracts on Human Factors in Computing Systems , no. : 1.
Linda Little; Pam Briggs; Lynne M. Coventry. Who knows about me? An analysis of age-related disclosure preferences. 2011, 1 .
AMA StyleLinda Little, Pam Briggs, Lynne M. Coventry. Who knows about me? An analysis of age-related disclosure preferences. . 2011; ():1.
Chicago/Turabian StyleLinda Little; Pam Briggs; Lynne M. Coventry. 2011. "Who knows about me? An analysis of age-related disclosure preferences." , no. : 1.