Human Risk Management Institute

Factors Shaping Information Security Behavior

Written by Nur Rachmi Latifa | 04 Mar 2026

Information security is no longer solely a technical issue. While firewalls, encryption, and artificial intelligence-based defenses continue to evolve, cyber incidents persist at alarming rates. The common denominator across most breaches is human action. This makes information security behavior—the way individuals act to protect digital assets, a critical focal point in modern cybersecurity strategy. Study highlights that information security behavior is shaped by an interplay of demographic, psychological, and technical factors. Rather than viewing security failures as isolated user mistakes, the study emphasizes that secure or insecure behaviors are the product of deeper human determinants. Understanding these factors is essential for organizations, policymakers, and educators aiming to strengthen cybersecurity resilience.

Understanding Information Security Behavior

Information security behavior refers to the actions individuals take to safeguard digital assets in both personal and organizational contexts. These behaviors typically include:

  • Using strong and unique passwords
  • Enabling multi-factor authentication
  • Identifying and avoiding phishing attempts
  • Complying with organizational security policies
  • Protecting personal and sensitive data

The concept of information security behavior has been widely discussed in cybersecurity research, including “Comprehensive Review of Demographic, Psychological and Technical Factors Shaping Information Security Behaviour in Cyberspace” by Shuting, Rahman, and Hussain (2025), which emphasizes that human behavior remains central to cybersecurity effectiveness. Similarly, Parsons et al. (2014) highlight that everyday user actions—rather than technical failures—often determine whether security controls succeed or fail.

Despite continuous advancements in information security technologies, human behavior is still considered the weakest link in cybersecurity. Shuting et al. (2025) argue that simply distributing security policies or conducting one-off awareness programs is insufficient if deeper behavioral drivers are not addressed. This view aligns with Stewart & Lacey (2012), which criticizes purely technical or information-heavy awareness strategies that overlook behavioral psychology. In essence, secure behavior cannot be achieved through information dissemination alone.

The key insight emerging from this body of research is that information security behavior is not merely about knowledge acquisition. It is shaped by demographic background, psychological traits, and technical capability. McCormac et al. (2017) demonstrate that personality traits significantly influence security compliance, while Haeussinger & Kranz (2013) show that awareness acts as a mediator between individual traits and secure actions. Therefore, strengthening information security requires understanding who users are, how they think, and what skills they possess—not just what they know.

Read: Psychology's Role in Raising Cybersecurity Awareness

Demographic Factors Shaping Information Security Behavior

Demographic characteristics significantly influence information security behavior, including age, gender, education level, and cultural background. Age influences both risk perception and technical proficiency. Younger individuals tend to be more technically skilled and adaptable to new technologies. However, they may engage in riskier online behavior due to overconfidence or habituation to digital environments.

Older individuals are generally more cautious and risk-averse but may struggle with evolving cybersecurity tools due to lower digital literacy. The review by Shuting et al. (2025) indicates that demographic factors can explain between 5% and 23% of variance in cybersecurity behavior intentions, suggesting that age-based customization of security awareness programs is essential. Gender differences are consistently observed in information security behavior.

  • Women often report lower confidence in performing technical security tasks.
  • Men may demonstrate higher engagement in technical security activities but may also display more experimental or risk-taking behavior.

According to Shuting et al. (2025), these differences are often linked to variations in self-efficacy, exposure to cybersecurity training, and societal norms related to technology engagement. Importantly, the issue is not capability, but confidence and opportunity. Organizations that design inclusive and confidence-building security education programs can help reduce this gap and promote balanced participation in cybersecurity practices. Education plays a critical role in shaping information security behavior. Individuals with higher education, especially technical education—demonstrate:

  • Greater cybersecurity awareness
  • Better compliance with security policies
  • Improved risk recognition

Conversely, those without formal or technical education may struggle with even basic practices like secure password management (Shuting et al., 2025). However, education alone is not enough. Institutional support and structured training programs significantly enhance Information Security Awareness (ISA) and strengthen long-term security compliance across diverse user groups.

Psychological Factors Influencing Information Security Behavior

Beyond demographics, psychological characteristics strongly determine security compliance and risk-taking behavior. Research by Shuting et al. (2025) highlights that personality traits and mental states significantly influence how individuals respond to cybersecurity policies. The Five-Factor Model (FFM) of personality provides valuable insights:

  • Conscientiousness → Strong adherence to security policies
  • Emotional stability → Better judgment under stress
  • Agreeableness → Higher likelihood of following rules
  • Impulsiveness and neuroticism → Increased security violations

Individuals high in conscientiousness are more likely to follow structured procedures, while impulsive individuals may ignore warnings for convenience (Shuting et al., 2025). This means security training should not be uniform; it should account for personality-driven behavioral tendencies. Risk perception is another crucial psychological determinant of information security behavior. Behavioral theories such as Protection Motivation Theory (PMT) and the Theory of Planned Behavior (TPB), discussed in Shuting et al. (2025), explain how perceived vulnerability influences security decisions. When individuals:

  • Believe they are vulnerable to cyber threats
  • Believe security measures are effective
  • Feel capable of implementing protection

They are more likely to adopt secure behavior. However, if users perceive security controls as inconvenient or unnecessary, they may bypass them—even if they understand the risks. This highlights the importance of aligning security controls with user motivation and perceived usability. Cognitive load and mental health also significantly impact information security behavior. The review by Shuting et al. (2025) emphasizes that psychological well-being is directly linked to security compliance.

  • Stress and anxiety can reduce attention to detail.
  • Cognitive overload increases susceptibility to phishing.
  • Decision fatigue may result in insecure shortcuts.

When employees experience high stress levels or cognitive strain, their ability to make secure decisions declines. Organizations that ignore employee stress and workload factors may unintentionally increase cybersecurity risk, reinforcing the need to integrate psychological considerations into security awareness and compliance programs.

Technical Proficiency and Security Behavior

Technical knowledge is one of the strongest predictors of information security behavior, but it presents a paradox. According to Shuting et al. (2025), technical proficiency enhances users’ ability to recognize and respond to cyber threats. Individuals with strong technical proficiency:

  • Detect phishing more effectively
  • Configure security tools properly
  • Follow advanced security practices

However, overconfidence in technical abilities can lead to complacency (Shuting et al., 2025). Users who believe they are “too skilled” to fall victim may ignore warnings or bypass protective mechanisms. Thus, technical competence must be paired with humility and continuous awareness, as expertise alone does not automatically translate into secure behavior.

In this context, Information Security Awareness (ISA) is repeatedly identified as a major predictor of compliance, serving as the bridge between technical knowledge and consistent security practices. The review emphasizes that awareness mediates the relationship between knowledge and actual secure behavior (Shuting et al., 2025). Security awareness programs are effective when they:

  • Align with user cognitive attributes
  • Include hands-on training
  • Provide ongoing reinforcement

Static awareness campaigns are insufficient. Continuous and adaptive education is required to ensure long-term compliance and behavior change.

The Integrated Model: Demographic + Psychological + Technical Factors

One of the most important contributions of the review by Shuting et al. (2025) is its integrated framework. Rather than treating demographic, psychological, and technical variables separately, the study presents a conceptual model connecting all three domains. Information security behavior is shaped by:

Technical Factors

  • Cybersecurity infrastructure
  • Security awareness
  • Information security education
  • Privacy by Design implementation

Psychological Factors

  • Risk-taking behaviors
  • Personality traits
  • Motivation
  • Cognitive biases

Demographic Factors

  • Age
  • Gender
  • Education
  • Cultural context

This integrated approach demonstrates that improving information security requires a multi-layered strategy that simultaneously addresses capability, motivation, and contextual influences.

Information Security Behavior and Privacy by Design

Privacy by Design (PbD) integrates privacy protections into systems from the outset. However, the effectiveness of PbD depends heavily on the behavior of system designers and engineers (Shuting et al., 2025). Even well-designed privacy frameworks rely on individuals to implement them properly. Adoption of PbD is influenced by:

  • Technical competence
  • Organizational support
  • Effort expectancy
  • Cultural background

Without structured guidelines and training, even technically capable engineers may fail to apply PbD principles consistently. This highlights how information security behavior directly impacts system-level security architecture and long-term privacy protection.

Risk-Taking Behavior in Cybersecurity

Risk-taking tendencies are strongly linked to cybersecurity outcomes. The review by Shuting et al. (2025) explains that psychological predispositions and perceived control influence security decisions. Individuals with:

  • High IT skills may overestimate their ability to manage threats.
  • Low perceived vulnerability may ignore warnings.
  • Impulsive decision styles may prioritize convenience over security.

Conversely, individuals with strong process memory and positive reinforcement for secure actions develop habitual secure behavior (Shuting et al., 2025). Security behavior becomes automatic when reinforced consistently, emphasizing the importance of ongoing feedback and behavioral reinforcement mechanisms.

Equity and Information Security

Information security is also an equity issue. Shuting et al. (2025) highlight that socioeconomic and demographic disparities influence access to cybersecurity resources and digital literacy. Socioeconomic status affects:

  • Access to secure devices
  • Availability of cybersecurity education
  • Access to security tools

Lower-income users may rely on outdated devices or public networks, increasing vulnerability, which makes it even more critical that equitable cybersecurity policies ensure:

  • Affordable security tools
  • Public cybersecurity literacy programs
  • Inclusive training initiatives

Without equity-focused strategies, security gaps will persist across demographic groups and weaken overall cybersecurity resilience (Shuting et al., 2025).

Gender Differences and Confidence Gaps

Gender differences in information security behavior often stem from confidence rather than competence. The review by Shuting et al. (2025) explains that social norms and representation in technology sectors influence engagement levels.

Women may:

  • Report lower self-efficacy in handling threats
  • Engage less in advanced security configurations

Men may:

  • Experiment more with security tools
  • Take more technical risks

These differences are shaped by societal expectations and unequal exposure to technical environments (Shuting et al., 2025). Encouraging diversity in cybersecurity education and workforce participation can reduce behavioral disparities and promote more balanced information security behavior across genders.

Practical Implications for Organizations

To improve information security behavior, organizations must adopt a structured and human-centered approach that addresses demographic, psychological, and technical dimensions simultaneously. The following practical steps can help translate research insights into actionable strategies.

Customize Training

Organizations should design security training that reflects the diversity of their workforce. This includes developing age-specific modules, implementing gender-sensitive confidence-building programs, and adapting materials based on education levels. Tailored training increases relevance, improves engagement, and enhances long-term security compliance.

Incorporate Behavioral Science

Security programs should leverage behavioral science principles to influence daily habits. Organizations can use nudges to encourage secure actions, apply gamification to increase motivation, and provide real-time feedback to reinforce positive behavior. These approaches help transform security from a compliance obligation into an embedded routine.

Strengthen Technical Foundations

Secure behavior is easier when systems are usable. Organizations must ensure security tools are user-friendly, simplify security procedures, and avoid overly complex policies that encourage workarounds. When security controls align with workflow efficiency, compliance naturally increases.

Address Psychological Well-Being

Cybersecurity performance declines under stress and cognitive overload. Organizations should reduce unnecessary complexity, integrate mental health considerations into security culture, and encourage reporting of incidents without fear of punishment. A psychologically safe environment strengthens both vigilance and accountability.

Promote Equity

Security resilience requires inclusive access to knowledge and tools. Organizations should provide accessible training, offer affordable or company-supported security tools, and actively close digital literacy gaps across different employee groups. Equity-driven strategies ensure that all users can participate in secure digital practices.

By implementing these integrated measures, organizations can move beyond surface-level awareness and build a sustainable culture of strong information security behavior.

Read: The Human Factor Behind Online Banking Security Risks

Conclusion

Information security behavior is shaped by the dynamic interaction of demographic characteristics, psychological traits, and technical competence, not by chance or technology alone. Factors such as age, gender, and education influence awareness and compliance, while personality traits, impulsivity, and perceived vulnerability shape decision-making patterns. Although technical proficiency strengthens security practices, it can also create overconfidence if not balanced with continuous awareness. Therefore, effective cybersecurity strategies must address human behavior at its core, integrating technology, psychology, and demographics to build a truly resilient digital society.