Research Article
Exploring Age and Gender Differences in ICT Cybersecurity Behaviour
| | Device securement± () | Password generation () | Proactive checking () | Updating () | | Beta | SE | BCa CI | (CI) | | Beta | SE | | | | Beta | SE | | | | Beta | SE | | |
| Age | -.01 | -.18 | .00 | -.02, -.01 | | .01 | .16 | .00 | 4.09 | | .01 | .14 | .00 | 3.51 | | .01 | .16 | .00 | 4.16 | | Gender | .07 | .04 | .08 | -.09, .22 | | -.11 | -.07 | .07 | -1.61 | | -.06 | -.04 | .06 | -.92 | | -.08 | -.05 | .07 | -1.12 | | S. efficacy | .07 | .07 | .05 | -.02, .16 | | .23 | .23 | .04 | 5.38 | | .24 | .29 | .04 | 6.58 | | .32 | .30 | .05 | 7.01 | | Resilience | .12 | .12 | .05 | .03, .21 | .05 (.03, .08) | .13 | .13 | .04 | 3.31 | .13 | .07 | .08 | .03 | 2.02 | .124 | .11 | .11 | .04 | 2.61 | .15 |
|
|
Note: ±2000 bootstrap samples. , , and . |