Research Article

Exploring Age and Gender Differences in ICT Cybersecurity Behaviour

Table 4

Parallel mediation analysis for each of the cybersecurity behaviours. Significant paths are indicated with an asterisk ().

Device securementPassword generationProactive checkingUpdating
SECISECISECISECI

Total effect of age-.01.00(-.02, -.01).01.00(.00, .02).01.00(.00, .01).01.00(.00, .02)
Direct effect of age-.01.00(-.02, -.01).01.00(.01, .02).01.00(.00, .01).01.00(.01, .02)
Indirect effect via self-efficacy-.00.00(-.00, .00)-.00.00(-.00, -.00)-.00.00(-.00, -.00)-.00.00(-00, -.00)
Indirect effect via resilience.00.00(.00, .00).00.00(.00, .00).00.00(.00, .00).00.00(.00, .00)