Research Article
Exploring Age and Gender Differences in ICT Cybersecurity Behaviour
Table 3
Bivariate correlations for each of the variables.
| | | SD | 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 |
| (1) Age | 33.85 | 11.82 | — | | | | | | | | (2) Gender | — | — | .03 | — | | | | | | | (3) S. efficacy | 3.64 | .82 | -.11 | .39 | — | | | | | | (4) Resilience | 3.24 | .85 | .11 | -.12 | .23 | — | | | | | (5) Device securement | 4.06 | .83 | -.18 | -.01 | .10 | .11 | — | | | | (6) Password generation | 3.29 | .82 | .15 | -.17 | .27 | .21 | .20 | — | | | (7) Proactive checking | 3.71 | .69 | .12 | -.16 | .31 | .17 | .19 | .46 | — | | (8) Updating | 3.42 | .87 | .14 | -.17 | .33 | .20 | .18 | .32 | .29 | — |
|
|
|