+1 Recommend
1 collections
      • Record: found
      • Abstract: found
      • Conference Proceedings: found
      Is Open Access

      Age and gender as independent risk factors for malware victimisation


      , ,

      Electronic Visualisation and the Arts (EVA 2017) (EVA)

      Electronic Visualisation and the Arts

      11 – 13 July 2017

      Human factor, Computer security, Malware, Field study



            This paper presents the results of an empirical study we designed to investigate the independent effect of age and gender as potential risk factors for malware victimisation. Using data collected from Microsoft’s Windows Defender on a sample of three million devices running Windows 10, we found that both age and gender are contributing factors for malware victimisation. Men, and young men in particular, were more likely to encounter malware than women, and younger users were more at risk of encountering malware than their older counterparts. However, our findings suggest that the effect of age and gender is not constant across different types of malware. We also discuss potential causes and implications of these age and gender differences in malware victimisation.


            Author and article information

            URI : www.polymtl.ca
            URI : www.polymtl.ca
            URI : www.appesteem.com
            July 2017
            July 2017
            : 1-14
            [0001]École Polytechnique de Montréal
            [0002]AppEsteem Corporation
            © Lévesque et al. Published by BCS Learning and Development. Proceedings of British HCI 2017 – Digital Make-Believe, Sunderland, UK.

            This work is licensed under a Creative Commons Attribution 4.0 Unported License. To view a copy of this license, visit http://creativecommons.org/licenses/by/4.0/

            Electronic Visualisation and the Arts (EVA 2017)
            London, UK
            11 – 13 July 2017
            Electronic Workshops in Computing (eWiC)
            Electronic Visualisation and the Arts
            Product Information: 1477-9358BCS Learning & Development
            Self URI (journal page): https://ewic.bcs.org/
            Electronic Workshops in Computing


            1. 2015 Microsoft Security Intelligence Report January-June 2015

            2. 2013 An Investigation of Women’s and Men ’s Perceptions and Meanings Associated with Food Risks. Springer Science & Business Media

            3. 2009 On-line activities, guardianship, and malware infection: An examination of routine activities theory International Journal of Cyber Criminology 3 1 400

            4. 1999 Gender differences in risk taking: A meta-analysis Psychological bulletin 125 3 367

            5. 2014 On the effectiveness of risk prediction based on users browsing behavior Proceedings of the 9th ACM symposium on Information, computer and communications security 171 182 ACM

            6. 2008 Analysis of computer infection risk factors based on customer network usage Second International Conference on Emerging Security Information, Systems and Technologies (SECURWARE’08) 317 325

            7. 2011 Individual risk attitudes: Measurement, determinants, and behavioral consequences Journal of the European Economic Association 9 3 522 550

            8. 2005 Individual risk attitudes: New evidence from a large, representative, experimentally-validated survey Social Science Research Network

            9. 2015 The myth of the average user: Improving privacy and security systems through individualization Proceedings of the 2015 New Security Paradigms Workshop 16 28 ACM

            10. 2009 Explaining gender difference in bicycling behavior Transportation Research Record: Journal of the Transportation Research Board 2125 16 25

            11. 2009 Affective and deliberative processes in risky choice: age differences in risk taking in the columbia card task Journal of Experimental Psychology: Learning, Memory, and Cognition 35 3 709

            12. 2012 Who does what on the web: A large-scale study of browsing behavior ICWSM.

            13. 2007 Email end users and spam: relations of gender and age group to attitudes and actions Computers in Human Behavior 23 1 318 332

            14. 2006 Gender differences in risk assessment: why do women take fewer risks than men? Judgment and Decision Making 1 1 48.

            15. 2007 What risks do people perceive in everyday life? A perspective gained from the experience sampling method (esm) Risk Analysis 27 6 1427 1439

            16. 2007 Demographic prediction based on user's browsing behavior Proceedings of the 16th international conference on World Wide Web 151 160 ACM

            17. 2007 Social phishing Communications of the ACM 50 10 94 100

            18. 2004 Beyond a trait view of risk taking: A domain-specific scale measuring risk perceptions, expected benefits, and perceived-risk attitudes in german-speaking populations Polish Psychological Bulletin 35 153 172

            19. 2012 Gender, internet experience, internet identification, and internet anxiety: a ten-year followup Cyberpsychology, Behavior, and Social Networking 15 7 370 372

            20. 2009 School of phish: a real-world evaluation of anti-phishing training Proceedings of the 5th Symposium on Usable Privacy and Security, 3 ACM

            21. 2014 Risk prediction of malware victimization based on user behavior Malicious and Unwanted Software: The Americas (MALWARE), 2014 9th International Conference on, 128 134 IEEE

            22. 2013 A clinical study of risk factors related to malware infections Proceedings of the 2013 ACM SIGSAC Conference on Computer & Communications Security 97 108 ACM

            23. 2016 October Are they real? Real-life comparative tests of anti-virus products 26th Virus Bulletin International Conference 25 33

            24. 2006 A review of decision-making processes: Weighing the risks and benefits of aging When I’m 64 145 145 173

            25. 2008 All your iframes point to us USENIX Security Symposium 1 16

            26. 2017 Microsoft Privacy Statement https://privacy.microsoft.com/en-gb/privacystatement

            27. 2011 Cybercrime victimization: An examination of individual and situational level factors International Journal of Cyber Criminology 5 1 773 793

            28. 2017 Dissecting spear phishing emails for older vs young adults: On the interplay of weapons of influence and life domains in predicting susceptibility to phishing Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems 6412 6424 ACM

            29. et al 2007 The ghost in the browser: Analysis of web-based malware HotBots 7 4 4

            30. 2013 Online routines and identity theft victimization further expanding routine activity theory beyond direct-contact offenses Journal of Research in Crime and Delinquency 50 2 216 238

            31. 2013 Risk-taking differences across the adult life span: a question of age and domain The Journals of Gerontology Series B: Psychological Sciences and Social Sciences, gbt081

            32. 2010 Who falls for phish? A demographic analysis of phishing susceptibility and effectiveness of interventions ACM Conference on Human Factors in Computing Systems (CHI) 373 382

            33. 2011 Malvertising-exploiting web advertising Computer Fraud & Security 2011 4 11 16

            34. 2001 Demographic and motivation variables associated with internet usage activities Internet Research 11 2 125 137

            35. 2011 The less you know, the more you are afraid of? A survey on risk perceptions of investment products Journal of Behavioral Finance 12 1 9 19

            36. 2002 A domain-specific risk-attitude scale: Measuring risk perceptions and risk behaviors Journal of behavioral decision making 15 4 263 290

            37. 2015 Understanding malvertising through ad-injecting browser extensions Proceedings of the 24th International Conference on World Wide Web 1286 1295 International World Wide Web Conferences Steering Committee

            38. 2014 An epidemiological study of malware encounters in a large enterprise Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 1117 1130 ACM


            Comment on this article