1 Introduction
The popularity of smart home devices has increased so dramatically over the past decade that consumer households are now bristling with smart fridges, app-based video doorbells, smart heating systems, smart ambient lighting, all of which often interconnected through voice-activated assistants [
72]. Despite their wide range of functions, one can define smart homes as residences “equipped with a high-tech network, linking sensors and domestic devices, appliances, and features that can be remotely monitored, accessed or controlled, and provide services that respond to the needs of its inhabitants” [
7]. The rapid adoption of smart home devices is accompanied by increasingly voiced privacy concerns [
33,
55,
132], and high profile security incidents [
52,
88,
124]. Studies found that even if users express concerns and low disclosure attitudes, their security behaviors do not always correspond respectively, a phenomenon known as privacy paradox [
68,
89]. This is exacerbated by privacy compromising default settings and dark patterns [
82] that capitalize on the instinctive trust of consumers [
133] or that of other people involved in the use of such devices [
128].
Facilitating self-efficacy, which is the belief about one’s own ability to enact certain skills [
11], is a psychological solution to improve security behaviors that is promoted by decades of extensive research in HCI [
28,
41,
100]. Self-efficacy is formed by motivational, cognitive, emotional, and choice-related mechanisms [
11,
13], allowing for multiple pathways to strengthen users’ self-efficacy beliefs, e.g., via interface designs that are scaleable across the consumer population [
131]. It is a concept that is per definition subjective (i.e. latent) without an obvious behavioral counterpart. As such, self-efficacy cannot be measured directly like one would measure manifest behavior, e.g. setting a password, keystrokes, etc., simply by the fact that the self-appraisal of one’s ability in those behaviors is not equivalent to the actual performance. Rather, as proposed by Social Cognitive Theory (SCT) [
10,
14,
15], self-efficacy has reciprocal effects on behaviors and socio-structural factors (see Figure
1). Accordingly, self-efficacy significantly impacts a person’s interests, behavioral choices, endurance when faced with obstacles (such as high user burden [
114]), and ultimately selected or constructed environments [
11,
13]. Notably, self-efficacy is not a generalized characteristic, but a context specific belief [
11].
While there is arguably some similarity between certain individual smart home devices and, for example, smartphones, there are other important differences that make smart home environments unique: (a) smart homes are complex, remotely networked ecosystems of multicomponent IT devices [
116]; (b) they involve simultaneous use, multiple co-existing user roles, and are frequently not limited to one consumer with different rights and needs associated [
59,
128]; (c) the high level of automation in smart homes might lead to perceptions of devices’ agency [
64,
95] with various important effects and (para)social mechanisms [
99], e.g., over(-calibrated) trust in security default settings; and (d) smart homes collect diverse types of sensitive data in remarkable abundance with dramatic consequences for users in case of a breach [
4,
27]. The combination of all these aspects distinguishes smart homes as a unique domain of technology interaction, and it is conceivable that lay users treat smart home devices differently than other technology. Therefore, we specifically define cybersecurity self-efficacy in smart homes as the belief in one’s capability to control information processed by smart home devices and systems against unauthorized disclosure, modification, loss, or destruction.
Considering the impact of cybersecurity self-efficacy on security behaviors in various other IT domains (medical information systems [
110], organisational data [
48], software design [
5], personal data [
37]), it is presumed to also affect security behaviors of smart home owners [
86]. Interventions designed to increase users’ cybersecurity self-efficacy in smart homes could be arranged to feasibly reach the entire heterogeneous user base. The question of the success of self-efficacy interventions demands a well validated instrument to assess differences in smart home owners’ cybersecurity self-efficacy beliefs. Existing assessment methods routinely rely on ad-hoc scales about some abstract or generalized experience of self-efficacy not specific to a particular class of devices, task, or skill [
18]. This could cause problems on two levels: (a) self-efficacy beliefs are domain-specific, i.e., a person may report different self-efficacy strengths for more abstract and more specific contexts [
14]; additionally (b) ad-hoc scales could lead to low replicability due to lack of validity information, increase the heterogeneity of findings in the field, show limited generalizability, and add to potential jingle-jangle fallacies [
47]. The jingle fallacy is the false assumption that two similarly named scales measure the same trait, while the jangle fallacy is the false assumption that differently named scales actually measure dissimilar traits. Both fallacies can obfuscate the valid, empirical relationships between factors of interest [
76,
126]. Having a validated psychodiagnostic scale of cybersecurity self-efficacy beliefs would enable meaningful insights and foster consensus on human factors in cybersecurity.
Here, we therefore report the development and validation of the Cybersecurity Self-Efficacy in Smart Homes (CySESH) scale across five studies. In three pilot studies (Ns = 5, 23, and 82), we generated an item pool and established its content validity and comprehensibility. In the two main studies (Ns = 166 and 971), we examined the scale’s psychometrics, including reliability and validity characteristics. Reliability results showed excellent coefficients, and we report robust evidence of convergent as well as discriminant validity. The final scale consists of 12 items that can be adopted for user or field studies. CySESH could become an important tool to assess the effectiveness of interventions targeted to improve self-efficacy, implement usable interfaces to assist cybersecurity tasks, and support evidence-based decision making regarding policy measures to sustainably improve security and privacy in the home environment at scale.
6 Discussion
The final Cybersecurity Self-Efficacy in Smart Homes (CySESH) scale consists of 12 items that unidimensionally measure the domain-specific self-efficacy beliefs of users. Through five studies, we designed and validated its items to ensure the scale’s psychodiagnostic quality. Reliability coefficients demonstrated excellent measurement precision. This was indicated by the consistent performance of smart home users across CySESH items and the extent to which all items reflected the same latent construct. In addition to the content validity offered by diverse experts in the pilot studies, construct validity was substantiated via correlational analyses. CySESH showed the expected relationship trends with other established psychological traits (i.e., self-efficacy in information security, outcome expectation, self-esteem, and optimism), which confirmed its distinctness. By following state-of-the-art test construction and open science processes, we hope that CySESH serves researchers and practitioners as a meaningful evaluation tool.
6.1 Limitations and Future Work
A valid instrument is merely the requirement for robust evidence. Long-term observations using CySESH, ideally including replications [
46], will be needed to reach more clarity of other validity aspects. One validity aspect future work should consider are differences between self-efficacy beliefs and the corresponding skills or proficiency [
125], which we did not assess. Meta-analytic work from other areas suggest a medium-sized correlation between job experience and self-efficacy [
66]. Future validation should assess whether our validity benchmarks can be replicated with a population including highly experienced IT professionals. Depending on the view of the criterion [
36], the question of domain-specificity [
8,
9,
11] could be addressed within further content validation [
2]. In our work, we did not emphasize domain-specific self-efficacy differences between smart home use and smart home cybersecurity use, given that there is related evidence on the difference in those two domains of functioning (for example, smartphones [
20], online social networks [
113], smart thermostats [
73]). However, demonstrating CySESH’s distinct applicability to smart home use activities would certainly provide additional content validation.
With regard to generalizability, we have to limit our conclusions to characteristics of a convenience sample recruited from Prolific as well as English speaking cultures. The sample was not strictly stratified analogous to representative census data, which would have prevented the gender imbalance. Our study only used participants that specifically reported owning a smart-home device as we could pre-select such persons through Prolific. At the time, Prolific had a user base that was skewed towards women [
29], and so was our sample. This should not imply that women own more smart home devices than men. We do not expect the observed gender effects of
βmale = 0.28 to impact the validity of our measurement as our study is in line with the current body of evidence for gender differences in self-efficacy, which further interact with cultural differences: Halevi et al. [
56] reported a large gender difference in self-efficacy in the USA. Other single-region studies found varying results from zero difference between genders in a US-American study [
84] over small differences in South Africa [
123] to medium sized differences in an US-American [
3] and Malay sample [
43]. Across those studies, differences were always due to higher scores for males, despite some samples showing female overrepresentation. Considering these works, and since 87.5% of our participants reported their country of residence as UK or US, it is not surprising to detect a significant gender effect. However, it leaves future work to investigate gender-specific questions with more well-suited samples than ours.
We also do not expect our significant age effect of
βage = −0.017 to impact validity, as it is very small in magnitude. An effect should be evaluated not only by its significance (i.e. difference from zero) but also by its relevance in terms of magnitude, i.e. it should have a meaningful influence on the outcome [
71]. We argue that our age effect does not satisfy the second criterion based on its magnitude. Keeping in mind that the underlying regression including every demographic factor only could explain 5.1% of variance in CySESH scores and our high sample size likely was the only factor that enabled detection of this very small effect, we argue that the age effect is not large enough to imply generalizability problems.
Given the promising results from our validation studies, it would also be informative to replicate findings of the current literature – which mostly rely on ad-hoc developed scales [
18] – in order to introduce CySESH as a standardized measure among them. We plan to develop a short form (i.e., maximize the test economy) that benefits the large-scale CySESH use necessary for this endeavor. To allow for continued application, it will be inevitable to revise the items’ wording as needed, e.g., in case of future changes in smart home security and privacy standards or user interactions.
6.2 Considerations for Using CySESH
To reinforce objectivity of research that uses CySESH, we give final guidelines for using CySESH. The instructions for participants, response format, and items are publicly accessible on the OSF (file link:
CySESH scale final version). Middle values can be interpreted as the most frequent and - consequently - represent medium self-efficacy strength. Extreme values, on grounds of standard deviation, reflect participants who either have a strong (high values) or weak (low values) belief in their capability to control information processed by smart home devices and systems against unauthorized disclosure, modification, loss, or destruction.
Using CySESH can be a valuable method to evaluate human factors of cybersecurity in smart homes. First, we suggest CySESH be used in empirical HCI studies. Given its lightweight application, CySESH can be used to pre-screen study participants to ensure specific sampling distributions for self-efficacy manifestations. Researchers might take special interest in evaluating the time-stability of self-efficacy beliefs. Regardless, it will be crucial to assess CySESH’s predictive validity for security behaviors. Practitioners can use this information to strategically support those users who are more likely to engage in future behaviors that compromise their smart home security and privacy. Here, we suggest to use CySESH as an assessment tool implemented in technological wizards or commissioning assistants. Developing interfaces that match the user’s individual level of self-efficacy with the appropriate measures may contribute to genuine usable security. Lastly, CySESH can inform policy makers about the status quo of the people’s digital sovereignty when included into census data surveys. Prevalent user profiles with a heightened risk of cybersecurity or privacy issues could be identified. Significant consumer protection measures may follow to acknowledge certain risk groups.
Understanding CySESH as a useful foundation of cybersecurity self-efficacy measurement can also inspire important methodological and substantive work in this domain. Children and adolescents, for example, increasingly become consumers of technologies with specific security and privacy vulnerabilities, either actively (e.g., by using personal devices such as as smart phones) or passively (e.g., by living in a smart home equipped with devices installed by their parents). Similarly, elderly people may face an increase of connected technology in their own homes or care facilities with supportive or medical functions. Understanding such population-specific use patterns and attitudes is important to predict security risks and implement measures to minimize them, but at the same time requires theory-driven modifications to validated measurements of relevant constructs, such as CySESH.
6.3 Conclusion
In this paper, we present the validation of the Cybersecurity Self-Efficacy in Smart Homes scale. Research and its practical implications for secure user behaviors are limited by the ability to measure important latent constructs, such as self-efficacy. Across five qualitative and quantitative studies, we developed a 12-item scale that measures cybersecurity self-efficacy in smart homes. The scale is a publicly accessible, lightweight, domain-specific assessment tool with use cases for researchers, HCI practitioners, and policy makers. An objective, reliable, and valid scale benefits the reduction of bias and error. Further, it facilitates replicability and generalizability of research. We provide a methodological contribution to the standardization of this emerging IT security and privacy research field that will allow for meaningful research consensus and the informed design of interfaces to support cybersecurity self-efficacy.