A Big-Five Personality Traits
Definitions of Big-Five personality traits are provided in Table
A1.
B Additional Statistics
Here we present additional statistics from our data. Table
B1 provides descriptive statistics for victims’ feelings after ransomware attack, and Table
B2 shows descriptive statistics for behaviour changes post-ransomware victimisation.
C Consent Form
Please read the information below, and if you agree, please tick the box to indicate that you understand and consent.
1. I confirm I have read and understand the information sheet for the above study. I have had the opportunity to consider the information, ask questions and have had these answered satisfactorily.
2. I understand that my participation is voluntary and that I am free to withdraw at any time before completing the study without giving any reason.
3. I understand that this study is run as an anonymous survey, where no personally identifiable information is sought by the investigators. I give permission for members of the research team, identified on the information sheet, to have access to my responses. Please also note that for free text responses, we may include direct quotes in any publications or reports arising from this research.
4. I agree to take part in the above research project.
\(\bigcirc\) I agree to the 4 points mentioned above, and consent to participate in this study.
\(\bigcirc\) I do not consent. I do not want to participate in this study.
D Questions Related to Personality Traits
Note: All the questions within this subset have the same five options for their answer:
\(\bigcirc\) 1 \(\bigcirc\) 2 \(\bigcirc\) 3 \(\bigcirc\) 4 \(\bigcirc\) 5
The purpose of these 50 questions was to collect Likert scale data that can be used to determine the participants’ personality type. These are standard questions, adapted from IPIP [
14].
1. Am the life of the party.
2. Feel little concern for others.
3. Am always prepared.
4. Get stressed out easily.
5. Have a rich vocabulary.
6. Don’t talk a lot.
7. Am interested in people.
8. Leave my belongings around.
9. Am relaxed most of the time.
10. Have difficulty understanding abstract ideas.
11. Feel comfortable around people.
12. Insult people.
13. Pay attention to details.
14. Worry about things.
15. Have a vivid imagination.
16. Keep in the background.
17. Sympathize with others’ feelings.
18. Make a mess of things.
19. Seldom feel blue.
20. Am not interested in abstract ideas.
21. Start conversations.
22. Am not interested in other people’s problems.
23. Get chores done right away.
24. Am easily disturbed.
25. Have excellent ideas.
26. Have little to say.
27. Have a soft heart.
28. Often forget to put things back in their proper place.
29. Get upset easily.
30. Do not have a good imagination.
31. Talk to a lot of different people at parties.
32. Am not really interested in others.
33. Like order.
34. Change my mood a lot.
35. Am quick to understand things.
36. Don’t like to draw attention to myself.
37. Take time out for others.
38. Shirk my duties.
39. Have frequent mood swings.
40. Use difficult words.
41. Don’t mind being the center of attention.
42. Feel others’ emotions.
43. Follow a schedule.
44. Get irritated easily.
45. Spend time reflecting on things.
46. Am quiet around strangers.
47. Make people feel at ease.
48. Am exacting in my work.
49. Often feel blue.
50. Am full of ideas.
E Questions Related to the Experience of Being A Ransomware Victim
Note: Questions 53–56 within this subset were only asked to ransomware victims.
52. Have you ever been a victim of a ransomware attack? Ransomware is a type of malicious software, or malware, that denies access to a computer system or data until a ransom is paid.
\(\bigcirc\) Yes \(\bigcirc\) No
53. When did the (most recent) attack take place?
\(\bigcirc\) Within the past 3 months
\(\bigcirc\) 4–6 months ago
\(\bigcirc\) 7–9 months ago
\(\bigcirc\) 10–12 months ago
\(\bigcirc\) More than a year ago
54. Did you pay the ransom?
\(\bigcirc\) Yes \(\bigcirc\) No
55. Did you recover your files?
\(\bigcirc\) Yes \(\bigcirc\) No
56. Did you report or talked about the attack to anyone? (Please tick all that apply)
\(\square\) Friend or family member
\(\square\) Action Fraud helpline
F Questions Related to the Feeling After Ransomware Victimisation
Note: All the questions within this subset have the same five options for their answer:
\(\bigcirc\) 1 - not present
\(\bigcirc\) 3 - moderate
\(\bigcirc\) 5 - very high level
The purpose of these questions was to collect Likert scale data regarding the range of feelings that the participants experienced after becoming victim of a ransomware attack.
57. Anxiety
58. Sadness
59. Fear
60. Anger
61. Embarrassment
62. Shame
63. Paranoia
64. Regret
65. Depression
66. Sleeplessness
67. Vulnerability
68. Distress
69. Nervousness
70. Isolation
71. Lacking in confidence
G Questions Related to Changes in Security Behaviour After Victimisation
Note: Questions 76–92 within this subset have the same five options for their answer:
\(\bigcirc\) 6 - increased
The purpose of these questions was to collect Likert scale data regarding any changes in cybersecurity-related online activities, ranging from “completely stopped” to “increased” after ransomware victimisation.
73. After the ransomware attack, on average, how often do you back up your important data?
\(\bigcirc\) Several times a week
\(\bigcirc\) About once a week
\(\bigcirc\) About once a month
\(\bigcirc\) A few times a year
\(\bigcirc\) About once a year or less frequently
74. How often did you back up your important data before the ransomware attack occurred?
\(\bigcirc\) Several times a week
\(\bigcirc\) About once a week
\(\bigcirc\) About once a month
\(\bigcirc\) A few times a year
\(\bigcirc\) About once a year or less frequently
75. After the ransomware attack occurred, what measures have you taken to improve your online security? (Please tick all that apply)
\(\square\) Use up to date anti-virus software
\(\square\) More careful when opening links from emails
\(\square\) Use a firewall
\(\square\) Use a different password for different sites
\(\square\) Change passwords regularly
\(\square\) Limiting the use of USB sticks
\(\square\) Reduce online banking
\(\square\) Reduce online shopping
76. Searching for information using search engines (Google, Wikipedia, etc.)
77. Sending/reading emails.
78. Sending instant messages (SMS, iMessage, Facebook messenger, WhatsApp, etc.)
79. Browsing social media (Facebook, Instagram, Twitter, etc.)
80. Watching online videos or movies (outside of your social media feeds)
81. Looking at photos or images (outside of your social media feeds)
82. Using the camera on any of your devices to take photos or record videos.
83. Sharing your photos (including posting to social media or sending via messaging apps).
84. Sharing your videos (including posting to social media, sending via messaging apps or video-calling).
85. Listening to music (including Spotify, Apple Music, or MP3s that you downloaded).
86. Browsing or posting to an online forum.
87. Online banking.
88. Working on your own website or creating your own content to post online (outside of social media).
89. Using file sharing or cloud syncing software (e.g., Dropbox, OneDrive, BitTorrent, etc.)
90. Coding or writing software.
91. Using software to cover your tracks online (i.e., used privacy enhancing features such as incognito mode, using Tor or a webcam cover).
92. Downloading/installing software or other files from an online source.
94. After the attack, to what extent do you feel at risk from cybercrime?
\(\bigcirc\) I don’t feel at risk, it won’t happen to me.
\(\bigcirc\) I don’t feel at risk, I didn’t think about it.
\(\bigcirc\) I don’t feel at risk, but it could happen to me.
\(\bigcirc\) I feel at risk, I’m careful online.
\(\bigcirc\) I feel at risk, I’m very careful online.
\(\bigcirc\) I feel the risk is unbearably high.
95. To what extent did you feel at risk from cybercrime before the attack?
\(\bigcirc\) I didn’t feel at risk, I thought it won’t happen to me.
\(\bigcirc\) I didn’t feel at risk, I didn’t think about it.
\(\bigcirc\) I didn’t feel at risk, but I thought it could happen to me.
\(\bigcirc\) I felt at risk, I was careful online.
\(\bigcirc\) I felt at risk, I was very careful online.
\(\bigcirc\) I felt the risk was unbearably high.
96. Have you received any training on computer security (either through work, school, or other venues)?
\(\bigcirc\) Yes \(\bigcirc\) No
97. Did you receive the training on computer security before the ransomware attack?
\(\bigcirc\) Yes \(\bigcirc\) No
H Questions About Experience with Other Cybercrime Victimisation
Note: Question 99 within this subset were only asked to who had responded positively to question 98.
98. Have you ever been the victim of any other types of online crime?
\(\bigcirc\) Yes \(\bigcirc\) No
99. Please give details about the type(s) of online crime you were a victim of. Tick all that apply:
\(\square\) ONLINE FRAUD: Had any of your online accounts accessed by someone (without your consent).
\(\square\) ONLINE FRAUD: You have noticed unauthorised online transactions on any of your bank accounts.
\(\square\) ONLINE FRAUD: You were tricked into buying goods, software or services online that turned out to be fake or counterfeit.
\(\square\) ONLINE FRAUD: You have been tricked into sending money to someone you met online.
\(\square\) ONLINE FRAUD: You have been tricked into sending goods or services to someone online without adequate compensation.
\(\square\) CYBERSTALKING OR ONLINE HARASSMENT: Someone said something to you privately online in order to make you feel bad or scared.
\(\square\) CYBERSTALKING OR ONLINE HARASSMENT: Someone posted something about you publicly online in order to make you feel bad or scared.
\(\square\) CYBERSTALKING OR ONLINE HARASSMENT: Someone revealed sexual images, videos or details of you online without your consent.
\(\square\) DATA HACK: Someone intentionally locked you out of any of your devices or disabled access to your data remotely.
\(\square\) DATA HACK: Your files have been copied, modified or deleted without your permission.
\(\square\) ONLINE EXTORTION (OR ATTEMPTED): You have been asked to provide a payment in order to prevent sexual images, videos or details being posted online (or used against you in some other way).
\(\square\) ONLINE EXTORTION (OR ATTEMPTED): You have been asked to provide a payment in order to prevent other stolen data or files being posted online (or used against you in some other way).
I Demographics Questions
100. Please select your age group:
\(\bigcirc\) 18–24 years old
\(\bigcirc\) 25–34 years old
\(\bigcirc\) 35–44 years old
\(\bigcirc\) 45–54 years old
\(\bigcirc\) 55–64 years old
101. Please select your gender:
102. Please select your employment status:
\(\bigcirc\) Employed part time (up to 34 hours per week)
\(\bigcirc\) Employed full time (35 or more hours per week)
\(\bigcirc\) Self-employed
103. Please select the highest degree you have completed:
\(\bigcirc\) GCSE or equivalent
\(\bigcirc\) A-levels or equivalent
\(\bigcirc\) Undergraduate degree
\(\bigcirc\) Postgraduate degree
\(\bigcirc\) Professional qualification
104. Please select your region:
\(\bigcirc\) Greater London
\(\bigcirc\) West Midlands
\(\bigcirc\) Yorkshire and the Humber
\(\bigcirc\) East of England
\(\bigcirc\) East Midlands
\(\bigcirc\) Northern Ireland
105. Please select the type of settlement you live in:
\(\bigcirc\) Suburban community
\(\bigcirc\) City or urban community
\(\bigcirc\) Rural community
J Attention Check Questions
Note: These three questions were scattered within the questionnaire—the number in front of each question indicates the position of that question within the questionnaire. These questions served as a validation tool to ensure that the participants paid attention to the questions being asked while filling in the questionnaire online. Any failure in correctly completing all of these “attention check questions” would result in the corresponding participant’s data being excluded from the dataset.
51. It is important that you pay attention to this study. Please tick “disagree.”
\(\bigcirc\) 1 - disagree
72. It is important that you pay attention to this study. Please tick “very high level.”
\(\bigcirc\) 1 - not present
\(\bigcirc\) 3 - moderate
\(\bigcirc\) 5 - very high level
93. Parity check. For the parity check please select option 1, “completely stopped.”
\(\bigcirc\) 6 - increased
References
[1]
Budi Arief, Andy Periam, Orcun Cetin, and Julio C. Hernandez-Castro. 2020. Using eyetracker to find ways to mitigate ransomware. In Proceedings of the 6th International Conference on Information Systems Security and Privacy (ICISSP’20). 448–456.
[4]
Raymond B. Cattell. 1947. Confirmation and clarification of primary personality factors. Psychometrika 12, 3 (1947), 197–220.
[5]
Open Science Collaboration. 2015. Estimating the reproducibility of psychological science. Science 349, 6251 (2015), aac4716.
[6]
Lena Y. Connolly and David S. Wall. 2019. The rise of crypto-ransomware in a changing cybercrime landscape: Taxonomising countermeasures. Comput. Secur. 87 (2019), 101568.
[7]
Burak Filiz, Budi Arief, Orcun Cetin, and Julio Hernandez-Castro. 2021. On the effectiveness of ransomware decryption tools. Comput. Secur. 111 (2021), 102469.
[9]
Lewis R. Goldberg. 1992. The development of markers for the Big-Five factor structure. Psychol. Assess. 4, 1 (1992), 26–42.
[10]
Lewis R. Goldberg. 1993. The structure of phenotypic personality traits. Am. Psychol. 48, 1 (1993), 26–34.
[11]
L. J. Hadlington. 2017. Exploring the Psychological Mechanisms Used in Ransomware Splash Screens. Technical Report.
[12]
Nathan W. Hudson and R. Chris Fraley. 2015. Volitional personality trait change: Can people choose to change their personality traits? J. Pers. Soc. Psychol. 109, 3 (2015), 490–507.
[13]
Gavin Hull, Henna John, and Budi Arief. 2019. Ransomware deployment methods and analysis: Views from a predictive model and human responses. Crime Sci. 8, 1 (2019), 1–22.
[15]
Oliver P. John, Laura P. Naumann, and Christopher J. Soto. 2008. Paradigm shift to the integrative Big Five trait taxonomy: History, measurement, and conceptual issues. In Handbook of Personality: Theory and Research (3rd ed.), Oliver P. John, Richard W. Robins, and Lawrence A. Pervin (Eds.). The Guilford Press, New York, NY, 114–158.
[16]
Helen S. Jones, John N. Towse, Nicholas Race, and Timothy Harrison. 2019. Email fraud: The search for psychological predictors of susceptibility. PLoS ONE 14, 1 (2019), e0209684.
[18]
Pablo López-Aguilar and Agusti Solanas. 2021. Human susceptibility to phishing attacks based on personality traits: The role of neuroticism. In Retrieved from IEEE 45th Annual Computers, Software, and Applications Conference (COMPSAC’21). IEEE, 1363–1368.
[20]
Timothy McIntosh, A. S. M. Kayes, Yi-Ping Phoebe Chen, Alex Ng, and Paul Watters. 2021. Ransomware mitigation in the modern era: A comprehensive review, research challenges, and future directions. ACM Comput. Surv. 54, 9 (2021), 1–36.
[21]
Per Håkon Meland, Yara Fareed Fahmy Bayoumy, and Guttorm Sindre. 2020. The Ransomware-as-a-Service economy within the darknet. Comput. Secur. 92 (2020), 101762.
[24]
Alexander Newman, Yuen Lam Bavik, Matthew Mount, and Bo Shao. 2021. Data collection via online platforms: Challenges and recommendations for future research. Appl. Psychol. 70, 3 (2021), 1380–1402.
[25]
Anna-Marie Ortloff, Maike Vossen, and Christian Tiefenau. 2021. Replicating a study of ransomware in Germany. In Proceedings of the European Symposium on Usable Security. 151–164.
[27]
Stefan Palan and Christian Schitter. 2018. Prolific.ac—A subject pool for online experiments. J. Behav. Exp. Finan. 17 (2018), 22–27.
[28]
Eyal Peer, Laura Brandimarte, Sonam Samat, and Alessandro Acquisti. 2017. Beyond the turk: Alternative platforms for crowdsourcing behavioral research. J. Exp. Soc. Psychol. 70 (2017), 153–163.
[29]
Jamie Pont, Osama Abu Oun, Calvin Brierley, Budi Arief, and Julio Hernandez-Castro. 2019. A roadmap for improving the impact of anti-ransomware research. In Nordic Conference on Secure IT Systems. Springer, 137–154.
[30]
Robert A. Power and Michael Pluess. 2015. Heritability estimates of the Big Five personality traits based on common genetic variants. Transl. Psychiatr. 5, 7 (2015), e604–e604.
[33]
Peter J. Rentfrow, Markus Jokela, and Michael E. Lamb. 2015. Regional personality differences in Great Britain. PLoS ONE 10, 3 (2015), e0122245.
[34]
Ronny Richardson and Max M. North. 2017. Ransomware: Evolution, mitigation and prevention. Int. Manage. Rev. 13, 1 (2017), 10–21.
[36]
Jule Specht, Boris Egloff, and Stefan C. Schmukle. 2011. Stability and change of personality across the life course: the impact of age and major life events on mean-level and rank-order stability of the Big Five. J. Pers. Soc. Psychol. 101, 4 (2011), 862–882.
[37]
Sanjay Srivastava, Oliver P. John, Samuel D. Gosling, and Jeff Potter. 2003. Development of personality in early and middle adulthood: Set like plaster or persistent change? J. Pers. Soc. Psychol. 84, 5 (2003), 1041–1053.
[39]
Jason Thomas and Gordon Galligher. 2018. Improving backup system evaluations in information security risk assessments to combat ransomware. Comput. Inf. Sci. 11, 1 (2018), 14–25.
[41]
Steve G. A. Van de Weijer and E. Rutger Leukfeldt. 2017. Big five personality traits of cybercrime victims. Cyberpsychol. Behav. Soc. Netw. 20, 7 (2017), 407–412.
[42]
Karl van der Schyff, Stephen Flowerday, and Paul Benjamin Lowry. 2020. Information privacy behavior in the use of Facebook apps: A personality-based vulnerability assessment. Heliyon 6, 8 (2020), e04714.
[43]
Yagiz Yilmaz, Orcun Cetin, Budi Arief, and Julio Hernandez-Castro. 2021. Investigating the impact of ransomware splash screens. J. Inf. Secur. Appl. 61 (2021), 102934.
[44]
Adam Young and Moti Yung. 1996. Cryptovirology: Extortion-based security threats and countermeasures. In Proceedings of the IEEE Symposium on Security and Privacy. IEEE, 129–140.