Research Article
Exploring Age and Gender Differences in ICT Cybersecurity Behaviour
Table 4
Parallel mediation analysis for each of the cybersecurity behaviours. Significant paths are indicated with an asterisk (
).
| | Device securement | Password generation | Proactive checking | Updating | | SE | CI | | SE | CI | | SE | CI | | SE | CI |
| Total effect of age | -.01 | .00 | (-.02, -.01) | .01 | .00 | (.00, .02) | .01 | .00 | (.00, .01) | .01 | .00 | (.00, .02) | Direct effect of age | -.01 | .00 | (-.02, -.01) | .01 | .00 | (.01, .02) | .01 | .00 | (.00, .01) | .01 | .00 | (.01, .02) | Indirect effect via self-efficacy | -.00 | .00 | (-.00, .00) | -.00 | .00 | (-.00, -.00) | -.00 | .00 | (-.00, -.00) | -.00 | .00 | (-00, -.00) | Indirect effect via resilience | .00 | .00 | (.00, .00) | .00 | .00 | (.00, .00) | .00 | .00 | (.00, .00) | .00 | .00 | (.00, .00) |
|
|