Methodology Summary

COMMUNICATIONS SECURITY ESTABLISHMENT OH BEHAVE- THE ANNUAL CYBER SECURITY AND BEHAVIORS STUDY 2022

PREPARED BY: ELEMENTAL DATA COLLECTION
POR Number: 013-22
PSPC Contract Number:2L165-230160
Call up number: CW2235377
Award Date: 2022-06-21
Delivery Date: August 2022
Fieldwork Dates: 2022-07-15 to 2022-07-19

PREPARED FOR: COMMUNICATIONS SECURITY ESTABLISHMENT

Ce rapport est aussi disponible en français.

For more information on this report, please contact Communications Security Establishment at: media@cse-cst.gc.ca


Table of Contents


Introduction

The Communication Security Establishment (CSE) commissioned Elemental Data Collection to conduct quantitative research to assess the perceptions of Canadians towards the security attitudes and behaviours of the general population. Online interviews were collected from July 15, 2022, to July 19, 2022, with a sample of 1,000 Canadians, 18 years of age and older.

The following sections outline the methodology used to conduct the study, including the research objectives, sample design and data collection procedures.

1.1 Background

Oh, Behave! The Annual Cybersecurity Behaviors and Attitudes Report is an annual research report series that aims to better understand and share insights into people’s security attitudes and behaviors. Previously conducted in the U.S. and U.K., a Canadian survey component is being added for the 2022 survey. This report sheds light on one of the most important aspects of cyber risk - the human factor. This study concentrated on a core cybersecurity behavior:

  • Creating and managing passwords / Applying Multi-Factor Authentication (MFA)
  • Installing the latest updates / Checking message legitimacy
  • Recognizing and reporting phishing / Backing up data
  • 1.2 Research Objectives

    Using an online survey, CSE wanted to assess the perceptions of Canadians on their security attitudes and behaviours. From the research, the CSE is looking to inform Canadians on the current state of cyber security across the country and to also be able to tailor and support future policy and communication activities of the Canadian Centre for Cyber Security. As well the data will be used to bolster the “Get Cyber Safe” public awareness campaign to continue to raise awareness of cyber security.

    1.3 Contract Value

    The total contract value of this research was $19,100.00, excluding HST.

    1.4 Political Neutrality Certification

    I hereby certify as a Representative of Elemental Data Collection that the deliverables fully comply with the Government of Canada political neutrality requirements outlined in the Communications Policy of the Government of Canada and Procedures for Planning and Contracting Public Opinion Research. Specifically, the deliverables do not include information on electoral voting intentions, political party preferences, standings with the electorate, or ratings of the performance of a political party or its leaders.
    Darcy Zwetko
    Partner
    Elemental Data Collection Inc.
    dzwetko@elementaldci.com
    August 9, 2022.

    Methodological Summary

    2.1 Survey Methodology

    An online survey was conducted with a proportionate stratified sample of 1,000 Canadians, 18 years of age and older. Based on a sample of this size, the overall results are expected to provide results accurate to within ±3.1%, 19 times out of 20 (adjusted to consider sample stratification). Details regarding the methodology are outlined below.

    2.2 Sample Design and Selection

    Quotas were set to ensure that the wave of the study would have completes across the country that would allow the CSE to analysis the data on both a national and regional level. The sample frame was geographically proportionate to align the regional results.

    Strata Completed Interviews Margin of Error (%)
    Atlantic provinces 75 ±11.3
    Quebec 230 ±6.5
    Ontario 380 ±5.0
    Prairies 75 ±11.3
    Alberta 105 ±9.6
    British Columbia 135 ±8.4
    Total 1,000 ±3.1

    Based on a sample of this size, the results can be considered accurate to within ±3.1%, 19 times out of 20.

    2.3 Fieldwork

    The online survey was administered to 1,000 respondents, from July 15th to July 19th, 2022, using computer assisted web interviewing (CAWI) technology. The data collection was carried out by Elemental Data Collection in Ottawa, Ontario. Interviews were conducted in the respondent’s official language of choice. Quotas were set to ensure that the study would target completes proportionate to the stratified regions. The average length of time required to complete an interview was 13.1 minutes.

    The sponsorship of the study was kept blind to enhance the ability to reduce bias in the study. All survey respondents were informed that participation is voluntary, and that information collected is protected under the authority of privacy legislation.

    2.4 Response Rate

    In total, 13,000 Canadian respondents were approached. The overall response rate for this survey was 10.6%. This is consistent with typical response rates for online surveys of the general public 18+ conducted over this length of field period. The table below presents the detailed information.

    Online Disposition Table  
    Total 13,000
    Unresolved (U) 11,092
    In-scope - Non-responding (IS) 525
    Termination 203
    Refusal 322
    In-scope - Responding units (R) 1,383
    Completed Interview 1,000
    Quota Full 383
    Response Rate 10.6%

    The response rates were calculated using the formula: R=R/(U+IS+R).

    2.5 Data Analysis

    Weighting adjustments were applied to the survey data to ensure that the results were representative of the Canadian population aged 18 years of age and older. Specifically, the survey results were weighted by region, gender, and age according to the most recent Statistics Canada census of the population.

    The following table presents a breakdown of actual and weighted completions by regional strata.

    Strata Unweighted Sample Size Weighted Sample Size
    Atlantic provinces 75 68
    Quebec 230 236
    Ontario 380 383
    Prairies 75 666
    Alberta 105 110
    British Columbia 135 137
    Total 1,000 1,000

    2.6 Non-response Analysis

    A non-response analysis was conducted to assess the potential for non-response bias. Non-response is the result of a unit of the sample not participating in the survey—either refusing to take part in the survey (a refusal) or not being reached during the data collection period (non-contact). Non-response results in biases in the survey sample when there are differences between respondents and non-respondents.

    To undertake the analysis for this survey, the unweighted sample distribution by gender, age, household income, employment status and level of education was compared to the actual population (based on 2016 Census figures from Statistics Canada).

    Survey Sample (Unweighted) Population (Census 2016) % diff (+/-) Survey Sample (weighted)
    18-34 10.83% 27.36% -16.53% 27.42%
    35-54 31.46% 34.07% -2.61% 34.10%
    55+ 57.71% 38.57% 19.14% 38.48%
    Male 49.24% 48.58% 0.66% 48.45%
    Female 50.76% 51.42% -0.66% 51.55%
    No certificate, degree, or diploma 5.08% 11.50% -6.42% 5.25%
    High school certificate or equivalent 22.15% 23.70% -1.55% 20.90%
    Apprenticeship or trades certificate or diploma 24.09% 33.20% -9.11% 22.17%
    University degree, certificate, or diploma 48.68% 31.60% 17.08% 51.68%

    As is typically found with online surveys in Canada, the final sample over-represents those with higher levels of education. Also consistent with most surveys of the general public, age is a source of sample bias in the survey. As the table indicates, younger Canadians are under-represented and older Canadians are over-represented in the survey sample. The survey results were weighted to address these variations, as well as the sample design for the survey, which was regionally proportionate. Weighting serves to reduce bias should it be present, but not to eliminate it completely. It is very unlikely that this small sampling bias introduced any meaningful bias to the survey results.

    2.7 Data Weighting

    In order to ensure that the final survey sample was proportional the current distribution of the Canadian public, the data required a weighting factor to be included. Elemental employed a process called sample balancing (also known as RIM weighting) to ensure that we could adjust the weighting factor to accurately reflect the geographical, gender and age breakouts of the current population distribution.

    2.8 Survey Instruments

    Q1 How actively do you use the internet?

    Few times per month

    Once a week

    Few times per week

    A few times a day

    I am always connected

    Q2 What is your current employment status?

    I work full-time (including self-employment)

    I work part-time (including self-employment)

    I am a student (not working)

    I am a student, but I also work

    I am retired

    I am unemployed

    I do not work due to my disability

    I am a homemaker

    Q3 How much do you agree with the following statements about cybersecurity?

    Please rate your responses on a scale from 1 (strongly disagree) to 10 (strongly agree).

    Note survey providers: RANDOMIZE statements & Place headers half way through the survey to remind people which is SD and SA (as with smaller screens they will have to scroll up)

    In this section we will ask you about your views and attitudes towards cybersecurity. Please respond to each question as accurately as you can.

    I find it easy to be secure when I am online.

    Most information on how to stay secure online is confusing.

    It is expensive to fully protect myself online.

    I am unlikely to be a target of cyber crime.

    By staying secure online, I can help protect others from cyber attacks.

    Family members rely on me to keep them secure online.

    Falling victim to cybercrime is something that worries me.

    Losing money over the internet is unavoidable these days.

    Having personal details stolen over the internet is unavoidable these days.

    I presume my devices are automatically secure.

    I often feel overwhelmed by information and, as a result, minimize my actions online.

    I do not see the point of trying to protect myself more as my information is already online.

    Q4 How much do you rely on other people for help (e.g. friends or family) to perform the following things?

    Please rate your responses on a scale from 1 (not reliant at all) to 10 (fully reliant).

    Note survey providers: RANDOMIZE statements

    Getting advice and information on how to be secure online.

    Creating online accounts.

    Checking or adding security settings on my device (e.g. PIN or applying Multi-Factor Authentication).

    Checking, updating or installing the latest software.

    Password recoveries (i.e. if you cannot access your online accounts).

    Backing up data (e.g. files and photos).

    Helping you to spot potential scams or phishing emails.

    Display This Question: If Q2 = I work full-time (including self-employment) Or Q2 = I work part-time (including self-employment) Or Q2 = I am a student, but I also work

    Note survey providers: Questions Q5 and Q6 should appear in moving boxes that people can rank from ‘most’ to ‘least’

    Q5 In your view, whose main responsibility is to protect your workplace’s online information?

    Please drag, drop and order the items below from 1 (“holds top responsibility”) to 7 (“least responsible”).

    Please note that your workplace might not have an IT or security department, please assume that these would exist and order them accordingly.

    Please rank from 1 (“holds top responsibility”) to 7 (“least responsible”)

    The government’s

    The organization's I work for

    The technology industry’s

    My internet service provider’s

    My workplace’s Information Technology (IT) department’s

    My workplace’s security department’s

    Mine

    To be shown to all participants (no logic):

    Q6 In your view, who is most responsible for protecting your online information?

    Please drag, drop and order the items below from 1 (“holds top responsibility”) to 7 (“least responsible”).

    Please rank from 1 (“holds top responsibility”) to 7 (“least responsible”).

    The government

    The app/platform I use

    The technology industry

    My internet service provider

    The company (employer)

    My family

    Me

    End of Block: Opinion on CS

    Start of Block: General Cybersecurity

    Q7 How do you feel about cybersecurity?

    Please rate these statements from 1 (strongly disagree) to 10 (strongly agree).

    I feel that staying secure online is...

    A priority

    Frustrating

    Intimidating

    Achievable

    Not possible

    Under my control

    Q8 What impact does the media/news have on your views towards cybersecurity?

    Please rate these statements from 1 (strongly disagree) to 10 (strongly agree).

    They make me scared about my online security.

    They make online security seem complicated.

    Q9 How confident are you in your ability to identify a phishing email or a malicious link?

    1 Not at all confident

    2

    3

    4

    5

    6

    7

    8

    9

    10 Very Confident

    Q10 In your opinion, how much do you know about protecting yourself from harmful cyber activity?

    Please rate your understanding of the following cybersecurity behaviors from:

    1 (I know nothing about this behavior) to 10 (I know a great deal about this behavior)

    Note survey providers: RANDOMIZE statements

    Using multi-factor authentication.

    Identifying phishing emails.

    Saving passwords using a password manager.

    Installing the latest software and app updates.

    Using a strong and unique password.

    Backing up data.

    Checking emails, texts and social media messages to see whether they are genuine.

    Section Header In this section, we will ask you about your experiences of cybercrime. Please respond to each question as accurately as you can.

    Q11 Have you ever personally lost money or data due to harmful online activity (e.g. phishing)?

    Note to provider: Please add a hover box with the following definition of harmful online activity:

    “Cyber criminals trick people into providing information or installing dangerous software in order to steal money or data from them. This is often done via fake emails that appear to be from trusted senders, encouraging people to click malicious links or open malicious attachments (i.e.phishing).”

    No

    Yes

    Display This Question: If Q11 = Yes

    Q12 Did you report this to anyone?
    If you have lost money/data more than once, please think about the most recent time this happened...

    No

    Yes

    Display This Question: If Q12 = Yes

    Q13 Who did you report it to?
    If you have lost money/data more than once, please think about the most recent time this happened...

    Please select all that apply

    Note to provider: multiple option choice

    My bank/credit card company/online payment company.

    My network/phone/broadband or software provider.

    The designated person or department at my work/place of education.

    The police or another government agency or organization.

    My email or online search provider (e.g. Google).

    My online security provider (e.g. Norton, Kaspersky).

    To the service/application provider(s) where I lost money/data.

    I told my family who then took action on my behalf.

    Display This Question: If Q12 = Yes

    Q14 What is the main reason why you reported it?
    If you have lost money/data more than once, please think about the most recent time this happened...

    Note to provider: single option choice

    It is important to notify the relevant authorities so this does not happen to me or other people.

    I wanted to take action to get my money back.

    I wanted the cyber criminals to be caught.

    Display This Question: If Q12 = Yes

    Q15 Did you find the reporting process easy to do?
    If you have lost money/data more than once, please think about the most recent time this happened...

    Note to provider: single option choice

    Yes, I knew how and to whom to report it to.

    Yes, even though I did not know how to do it, it was easy to find out.

    No, it was not easy to do, but I eventually managed to report it.

    Display This Question: If Q12 = No

    Q16 What is the main reason you did not report it?
    If you have lost money/data more than once, please think about the most recent time this happened...

    Note to provider: single option choice

    I did not have the time.

    I did not know who to report it to.

    I did not know how to report it.

    The process was too much effort.

    There was no point as no action would have been taken.

    I forgot.

    I was too ashamed.

    I did not have to, it was reported to me (e.g. by my bank).

    Q17 Have you ever been a victim of online cyberbullying?

    Note to provider: Please add a hover box with the following definition of cyberbullying:

    “Cyberbullying takes place over digital devices. It includes sending, posting, or sharing negative, harmful, false, or mean content about someone else. It can include sharing personal or private information about someone else causing embarrassment or humiliation.”

    No

    Yes

    Display This Question: If Q17 = Yes

    Q18 Did you report it to anyone?
    If you have been a victim of cyberbullying more than once, please think about the most recent time this happened...

    No

    Yes

    Display This Question: If Q18 = No

    Q19 What is the main reason why you did not report it?
    If you have been a victim of cyberbullying more than once, please think about the most recent time this happened...

    Note to provider: single option choice

    I did not have the time.

    I did not know who to report it to.

    I did not know how to report it.

    The process was too much effort.

    There was no point as no action would have been taken.

    I just forgot.

    I was too ashamed to have fallen as a victim.

    I did not have to, someone reported it on my behalf.

    Display This Question: If Q18 = Yes

    Q20 Who did you report it to?
    If you have been a victim of cyberbullying more than once, please think about the most recent time this happened...

    Note to provider: multiple option choice

    The police or another government agency or organization.

    My network/phone/broadband or software provider.

    The designated person or department at my work/place of education.

    My email or online search provider (e.g. Google).

    My online security provider (e.g. Norton, Kaspersky).

    To the service/application provider (e.g. Instagram, Twitter).

    I told my family who then took action on my behalf.

    Display This Question: If Q18 = Yes

    Q21 What is the main reason why you reported it?
    If you have been a victim of cyberbullying more than once, please think about the most recent time this happened...

    Note to provider: single option choice

    It is important to notify the relevant authorities so this does not happen to me or other people.

    I wanted to take action to stop it from happening.

    I wanted the cyber bully to be caught.

    Display This Question: If Q18 = Yes

    Q22 Did you find the reporting process easy to do?
    If you have been a victim of cyberbullying more than once, please think about the most recent time this happened...

    Note to provider: single option choice

    Yes, I knew how and to whom to report it to.

    Yes, even though I did not know how to do it, it was easy to find out.

    No, it was not easy to do, but I eventually managed to report it.

    Q23 Have you ever been a victim of an online romance scam?

    Note to provider: Please add a hover box with the following definition of a romance scam:

    “A romance scam is when scammers adopt a fake online identity to create an illusion of a romantic or close relationship to manipulate and/or steal from the victim. They often use highly emotive requests for money claiming they need emergency medical care, or to pay for transport costs to visit the victim if they are overseas.”

    No

    Yes

    Display This Question: If Q23 = Yes

    Q24 Did you report it to anyone?
    If you have been a victim of an online romance scam more than once, please think about the most recent time this happened...

    No

    Yes

    Display This Question: If Q24 = Yes

    Q25 Who did you report it to?
    If you have been a victim of an online romance scam more than once, please think about the most recent time this happened...

    Note to provider: multiple option choice

    The police or another government agency or organization.

    My network/phone/broadband or software provider.

    The designated person or department at my work/place of education.

    My email or online search provider (e.g. Google).

    My online security provider (e.g. Norton, Kaspersky).

    To the service/application provider (e.g. the dating website/Instagram/Facebook).

    I told my family who then took action on my behalf.

    Display This Question: If Q24 = Yes

    Q26 What is the main reason why you reported it?
    If you have been a victim of an online romance scam more than once, please think about the most recent time this happened...

    Note to provider: single option choice

    It is important to notify the relevant authorities so this does not happen to me or other people.

    I wanted to take action to stop it from happening.

    I wanted the scammer to be caught.

    Display This Question: If Q24 = Yes

    Q27 Did you find the reporting process easy to do?
    If you have been a victim of an online romance scam more than once, please think about the most recent time this happened...

    Note to provider: single option choice

    Yes, I knew how and to whom to report it to.

    Yes, even though I did not know how to do it, it was easy to find out.

    No, it was not easy to do, but I eventually managed to report it.

    Display This Question: If Q24 = No

    Q28 What is the main reason you did not report it?
    If you have been a victim of an online romance scam more than once, please think about the most recent time this happened...

    Note to provider: single option choice

    I did not have the time.

    I did not know who to report it to.

    I did not know how to report it.

    The process was too much effort (not bothered).

    There was no point as no action would have been taken.

    I just forgot.

    I was too ashamed to have fallen as a victim.

    The amount of money lost was too small.

    I did not have to, it was reported to me (e.g. by the police).

    Q29 Have you ever been a victim of identity theft?

    Note to provider: Please add a hover box with the following definition of identity theft:

    “Identity theft is when scammers access enough information about someone’s identity (e.g. name, date of birth, current or previous addresses) to obtain goods or services by deception, such as by opening a bank account or obtaining a credit card or loan.”

    No

    Yes

    Display This Question: If Q29 = Yes

    Q30 Did you report it to anyone?
    If you have been a victim of identity theft more than once, please think about the most recent time this happened...

    No

    Yes

    Display This Question: If Q30 = Yes

    Q31 Who did you report it to?
    If you have been a victim of identity theft more than once, please think about the most recent time this happened...

    Note to provider: multiple option choice

    My bank/credit card company/online payment company.

    My network/phone/broadband or software provider.

    The designated person or department at my work/place of education.

    The police or another government agency or organization.

    My email or online search provider (e.g. Google).

    My online security provider (e.g. Norton, Kaspersky).

    To the service/application provider(s) where my identity was fraudulently used.

    I told my family who then took action on my behalf.

    Display This Question: If Q30 = Yes

    Q32 What is the main reason why you reported it?
    If you have been a victim of identity theft more than once, please think about the most recent time this happened...

    Note to provider: single option choice

    It is important to notify the relevant authorities so this does not happen to me or other people.

    I wanted to take action to get my money back.

    I wanted the identity thief to be caught.

    Display This Question: If Q30 = Yes

    Q33 Did you find the reporting process easy to do?
    if you have been a victim of identity theft more than once, please think about the most recent time this happened...

    Note to provider: single option choice

    Yes, I knew how and to whom to report it to.

    Yes, even though I did not know how to do it, it was easy to find out.

    No, it was not easy to do, but I eventually managed to report it.

    Display This Question: If Q30 = No

    Q34 What is the main reason why you did not report it?
    If you have been a victim of identity theft more than once, please think about the most recent time this happened...

    Note to provider: single option choice

    I did not have the time.

    I did not know who to report it to.

    I did not know how to report it.

    The process was too much effort (not bothered).

    There was no point as no action would have been taken.

    I just forgot.

    I was too ashamed to have fallen as a victim.

    The amount of money lost was too small.

    I did not have to, it was reported to me (e.g. by my bank).

    Note to provider: Section Header

    Cybersecurity training

    In this section, we will ask you about your experiences of cybersecurity training. Please respond to each question as accurately as you can.

    Q35 Do you have access to cybersecurity advice or training (e.g. at work, school or library)?

    Note to provider: single option choice

    No

    Yes, I have and I have used it.

    Yes, I have, but I do not use it.

    Display This Question: If Q35 = Yes, I have and I have used it

    Q36 Where did you access the training?

    Note to provider: single option choice

    At home/the library

    At work/my place of education

    All of the above

    Display This Question: If Q35 = Yes, I have and I have used it

    Q37 Are you required to complete mandatory training at work/your place of education?

    No

    Yes

    Display This Question: If Q37 = Yes

    Q38 How often are you required to complete it?

    Note to provider: single option choice

    Once a year.

    More than once a year.

    When something goes wrong or something bad happens.

    Both at regular intervals AND when something goes wrong or something bad happens.

    Display This Question: If Q35 = Yes, I have and I have used it

    Q39 How were the training course(s) delivered?

    Please tick all that apply.

    Note to provider: multiple option choice

    One-off individual learning course (online or in person).

    One-off group learning course (online or in person).

    Over a period of time on an individual learning course (online or in person).

    Over a period of time on a group learning course (online or in person).

    Display This Question: If Q35 = Yes, I have and I have used it

    Q40 When you attended the training course(s) what did you learn about cybersecurity?

    Please tick all that apply.  

    Note to provider: multiple option choice

    Using Multi-Factor Authentication (MFA).

    Identifying phishing emails.

    Saving passwords using a password manager.

    Installing the latest software and app updates.

    Using a strong and separate password.

    Backing up data.

    Checking emails, texts, or social media messages, to see whether they are genuine.

    I do not remember.

    Display This Question: If Q35 = Yes, I have and I have used it

    Q41 When you attended training course(s) how did it influence your security behaviors?

    Please tick all that apply.

    Note to provider: multiple option choice

    I started using Multi-Factor Authentication.

    I became better at recognising phishing emails.

    I started saving passwords using a password manager.

    I started saving passwords to a web browser (e.g. Google).

    I started regularly installing the latest software and app updates.

    I started using strong and separate password(s).

    I back up my data.

    I am now checking all messages (emails, texts, and social media) to see whether they are genuine even if sent by someone known to me.

    I did not change any of my online security behaviors.

    Display This Question: If Q35 = Yes, I have and I have used it And Q36 = At home/the library OR Q36 = All of the above

    Q42 You mentioned you attended training at home/at the library. How useful did you find the training provided to you?
    How useful did you find the training at home/the library?

    1 Not very useful

    2

    3

    4

    5

    6

    7

    8

    9

    10 Very useful

    Display This Question: If Q35 = Yes, I have and I have used it And Q36 = At work/my place of education OR Q36 = All of the above

    Q43 You mentioned you attended training at work/your place of education. How useful did you find the training provided to you?
    How useful did you find the training at work?

    1 Not very useful

    2

    3

    4

    5

    6

    7

    8

    9

    10 Very useful

    Display This Question: If Q35 = Yes, I have, but I do not use it

    Q44 What is the main reason you did not use the opportunity to attend the training course?

    Note to provider: single option choice

    I did not have time.

    I do not think that training will reduce my risk of being a victim of cybercrime.

    Cybersecurity is not important to me.

    I would not gain anything by completing the course.

    I already knew enough about cybersecurity.

    I was not able to access the course (online or in person).

    Display This Question: If Q44 = I was not able to access the course (online or in person)

    Q45 What stopped you from accessing the course? Please choose the main reason. 

    Note to provider: single option choice

    I was unable to access the course site due to my disability.

    The course site was too far away for me to access.

    I do not understand how online courses work.

    I could not afford to access the course.

    I could not access the course as I had work or childcare commitments.

    Note to provider: Section Header

    Cybersecurity behaviors 

    In this section, we will ask you more questions about the security behaviors
    Please respond to each question as accurately as you can.

    Q46 Overall, how many sensitive online accounts that hold personal information do you have?

    Note to provider: single option choice

    Note to provider: Please add a hover box with the following definition Online accounts holding details of your identity, address and bank cards (e.g. payment-related sites, social media accounts and work accounts) 

    Not sure, I lost count.

    20 or more online accounts.

    10-19 online accounts.

    5-9 online accounts.

    2-4 online accounts.

    I only have one online account.

    Display This Question: If Q46 = Not sure, I lost count Or Q46 = 20 or more online accounts Or Q46 = 10-19 online accounts Or Q46 = 5-9 online accounts Or Q46 = 2-4 online accounts

    Q47 How often do you use unique/separate passwords for your important online accounts (e.g. payment-related sites, social media accounts and work accounts)?

    Note to provider: single option choice

    All of the time (100%)

    The majority of the time (75%)

    Half of the time (50%)

    Some of the time (25%)

    None of the time (0%)

    Display This Question: If Q47 = None of the time (0%) Or Q47 = Some of the time (25%)

    Q48 You mentioned that you rarely, if not at all, use unique/separate passwords for your online accounts.  

    Note to provider: single option choice

    What is the main reason you do not do this?

    It is too time consuming to create them.

    They are difficult to remember.

    It requires too much effort.

    I do not know how to create them.

    I only use them for accounts where I want increased security.

    I only use them when I want to have a private password.

    Display This Question: If Q46 = I only have one online account

    Q49 How often do you change this password?

    Note to provider: single option choice

    Never

    I do not change it, unless I have to

    Every few months

    Yearly

    Less than yearly

    Display This Question: If Q46 = Not sure, I lost count Or Q46 = 20 or more online accounts Or Q46 = 10-19 online accounts Or Q46 = 5-9 online accounts Or Q46 = 2-4 online accounts

    Q50 How often do you tend to change your passwords?

    Note to provider: single option choice

    Never

    I do not change them, unless I have to

    Every few months

    Yearly

    Less than yearly

    I change some of them more often than others

    Display This Question: If Q49 = I do not change it, unless I have to Or Q49 = Every few months Or Q49 = Yearly Or If Q50 = I do not change them, unless I have to Or Q50 = Every few months Or Q50 = Yearly Or Q50 = I change some of them more often than others

    Q51 What action do you most often take when changing your password(s)?

    Note to provider: single option choice

    I change a character or two on my existing password (e.g. Password1! to Password2?).

    I change a word or two (e.g. Butterfly1! to Seagull1!).

    I change my password to something completely different.

    I use passwords suggested by websites or applications (e.g. Google or stand-alone password manager).

    I create a new passphrase (e.g. by using three random words).

    Q52 Do you tend to create password(s) that include references to personal information (e.g. names, dates and addresses)?

    No

    Yes

    Q53 Do you tend to create password(s) that are  made up from a single dictionary word or name, which you have replaced some characters with numbers or symbols (e.g. p@ssw0rd, Jon@th4n, h0us3plant)?

    No

    Yes

    Q54 How long are the password(s) you usually create?

    Note to provider: single option choice

    Under 6 characters

    7-8 characters

    9-11 characters

    Over 12 characters

    Q55 How often do you install the latest updates and software when notified that they are available?

    Note to provider: single option choice

    Never

    Rarely

    Sometimes

    Very often

    Always

    Display This Question: If Q55 = Never Or Q55 = Rarely

    Q56 Please let us know why you do not update your devices

    Note to provider: single option choice

    They take too long and it is dIifficult to find the right time to update.

    They often interfere with my other software or applications.

    My devices are set to auto updates, so I do not need to run any updates myself.

    My devices and applications work fine, I do not need to update them.

    I do not know how.

    Display This Question: If Q55 = Never Or Q55 = Rarely

    Q57 You mentioned that you never or rarely install software updates.

    Please rate your agreement with the following statements:
    "I would install the latest updates and software to my devices, but..."

    Note survey providers: RANDOMIZE statements

    1 Strongly Disagree

    2

    3

    4

    5

    6

    7

    8

    9

    10 Strongly Agree

    ...I have no understanding of how to do this.

    ...I have no confidence in my ability to update my devices.

    ...I do not have the time to check for the latest updates.

    ...I do not think it is necessary to install updates if my device works as it is.

    ...updating devices and installing software will not stop cybercriminals.

    ...I have to pay for them, I cannot afford them.

    ...there is little benefit in updating them.

    ...I do not trust the latest updates and software.

    ...as far as I know, no one else does this and they are fine.

    Display This Question: If Q55 = Always Or Q55 = Very often Or Q55 = Sometimes

    Q58 When do you install updates on your devices?

    Note to provider: single option choice

    I have turned on automatic updates.

    After clicking on ‘remind me later’ a few times.

    Whenever I am away from my device or during the night.

    Q59 Have you ever heard of Multi-Factor Authentication (MFA)?

    Note to provider: Please add a hover box with the following definition : Also, known as Two-Factor Authentication (2FA). Both add an extra layer of security to verify a user's identity. Biometrics, security keys, or a unique, one-time code through an app on your mobile device are examples of using 2FA/MFA.

    No

    Yes

    Display This Question: If Q59 = Yes

    Q60 Have you ever applied Multi-Factor Authentication to any of your online accounts holding personal information (e.g. email or payment-related website)?

    No

    Yes

    Display This Question: If Q60 = Yes

    Q61 Are you still using Multi-Factor Authentication?

    No

    Yes

    Display This Question: If Q61 = No

    Q62 What is the main reason you stopped using Multi-Factor Authentication (MFA)?

    Note to provider: single option choice

    It took too long.

    I do not carry my phone with me all the time to be able to verify.

    It logged me out of my accounts too many times.

    I kept forgetting my verification code(s).

    I did not see MFA adding any extra protection.

    Display This Question: If Q59 = Yes And Q60 = No Or If Q59 = Yes And Q61 = No

    Q63 You mentioned that you do not or have stopped using Multi-Factor Authentication (MFA)?.

    Please rate your agreement with the following statements:
    I would use MFA, but..."

    Note survey providers: RANDOMIZE statements

    1 Strongly Disagree

    2

    3

    4

    5

    6

    7

    8

    9

    10 Strongly Agree

    ...I have no understanding of how to use MFA.

    ... I have no confidence in my ability to use MFA.

    ...I do not have the time to use MFA.

    ...I do not think it is necessary to use MFA if my device works as it should do.

    ...MFA is too expensive.

    ...Using MFA will not stop cybercriminals.

    ...There is no or little benefit for me to use MFA.

    ...I do not trust MFA software.

    ...As far as I know, no one else uses this and they are fine.

    Q64 How often do you check a message (e.g. emails, texts, or social media messages) is genuine before clicking any links or responding to it?

    Note to provider: single option choice

    Never

    Rarely

    Sometimes

    Very often

    Always

    I do not know how to do this

    This Question: If Q64 = Sometimes Or Q64 = Very often Or Q64 = Always

    Q65 What is the first action you take to make sure a message is genuine?

    Note to provider: single option choice

    I check the sender’s email address (e.g. ‘From’ line).

    I check for unexpected content in the email text.

    I hover over the links in the email to check the real destination.

    Q66 If someone you know sends you an unusual message with links, how often do you reach out to the person to ask about it before clicking the link?

    Note to provider: single option choice

    Never

    Rarely

    Sometimes

    Very often

    Always

    Q67  Do you report any phishing emails by hitting the ‘spam’ or 'report phishing' button?

    Note to provider: single option choice

    Never

    Rarely

    Sometimes

    Very often

    Always

    I do not know how to do this

    Display This Question: If Q67 = Never Or Q67 = Rarely

    Q68 You mentioned that you never or rarely report phishing emails.

    Please rate your agreement with the following statements:
    "I would report phishing emails, but..."

    Note survey providers: RANDOMIZE statements

    1 Strongly Disagree

    2

    3

    4

    5

    6

    7

    8

    9

    10 Strongly  Agree

    ...I have no understanding of how to report unusual (phishing) emails.

    ...I have no confidence in my ability to correctly report  phishing messages.

    ...I do not have the time to report every single phishing and spam message.

    ...I do not think it is necessary to report phishing or spam as nothing ever happens when I do.

    ...I have reported phishing, but I still get spam messages.

    ...Reporting phishing/spam emails has little effect on stopping cybercriminals.

    ...There is no or little benefit to me to report them.

    ...As far as I know, no one else does this and they are fine.

    ...I do not trust phishing reporting software.

    Q69 How often do you save your passwords in the browser (e.g. Google or Firefox) when prompted?

    Note to provider: single option choice

    Never

    Rarely

    Sometimes

    Very often

    Always

    I do not know how to do this

    Q70 Have you ever downloaded a stand-alone password manager application?

    No

    Yes

    Display This Question: If Q70 = Yes

    Q71 Are you still using a password manager?

    No

    Yes

    Display This Question: If Q71 = No

    Q72 What is the main reason you have stopped using the password manager

    Note to provider: single option choice

    It required too much effort.

    I do not trust the password manager.

    I could not access my password manager from other devices.

    It was too expensive to keep up.

    I kept forgetting my password manager’s password.

    I do not see how a password manager adds any value.

    It was hard to get into the habit of using it .

    Display This Question: If Q72 = I do not trust the password manager

    Q73 Please tell us why you do not trust a password manager?

    Display This Question: If Q70 = Yes And Q71 = No Or If Q70 = No

    Q74 You mentioned that you either stopped using a password manager or do not use one at all.

    Please rate your agreement with the following statements:
    "I would use a password manager, but..."

    Note survey providers: RANDOMIZE statements

    1 Strongly Disagree

    2

    3

    4

    5

    6

    7

    8

    9

    10 Strongly Agree

    ...I have no understanding of how to use it.

    ...I have no confidence in my ability to use it.

    ...I do not have the time to add all my passwords into it.

    ...I do not know which password manager to use.

    ...I do not think it is necessary to use a password manager as it is not required.

    ...Using a password manager will not stop cybercriminals.

    ...I cannot afford to buy a password manager.

    ...There is no or little benefit to me to using a password manager.

    ...I do not trust password managers.

    ...As far as I know, no one else uses one and they are fine.

    Display This Question: If Q46 = Not sure, I lost count Or Q46 = 20 or more online accounts Or Q46 = 10-19 online accounts Or Q46 = 5-9 online accounts Or Q46 = 2-4 online accounts

    Q75 What is your preferred method of remembering multiple passwords?

    Note to provider: single option choice

    I write them down in a notebook.

    I write them down in a document on my computer (electronic format).

    I store them in my phone.

    I store them in my email.

    I just remember them (without writing them down).

    I save passwords in the browser.

    I use a password manager application.

    Q76 How often do you back up your most important data?

    Note to provider: Please add a hover box with the following definition Backing up is the process of copying data for recovery in case the original data is lost or corrupted.

    Note to provider: single option choice

    Never

    Rarely

    Sometimes

    Very often

    Always/my device automatically backs up my data to a cloud service

    I do not know how to do this

    Display This Question: If Q76 = Never Or Q76 = Rarely

    Q77 You mentioned that you rarely or never back up your data.

    Please rate your agreement with the following statements:
    "I would back up my data (e.g. to an external hard drive or to a cloud) but..."

    Note survey providers: RANDOMIZE statements

    1 Strongly Disagree

    2

    3

    4

    5

    6

    7

    8

    9

    10 Strongly Agree

    ...I have no understanding of how to do it.

    ...I have no confidence in my ability to set this up.

    ...I do not have the time to back up everything.

    ...I do not know which cloud service to use.

    ...I do not think it is necessary to back up my data.

    ...Backing up my data will not stop cybercriminals.

    ...I cannot afford to buy an external hard drive or subscribe to a cloud service.

    ...There is no or little benefit to me in backing up my data.

    ...I do not trust any cloud service back-ups.

    ......As far as I know, no one else does this and they are fine.

    Note to provider: Section Header

    Demographic information

    In this final section, we will ask you to fill out some information about yourself. Please respond to each question as honestly and accurately as you can.

    Q78 How old are you?

    Q79 What is your gender?

    Male

    Female

    Non-binary

    Prefer not to say

    Prefer to self-describe:

    Q80 Which country do you currently reside in?

    United Kingdom

    United States

    Canada

    Australia

    New Zealand

    Other

    Q81 What is your highest level of qualification?

    Some school/high school credit, no diploma or qualification

    Primary/secondary education (e.g. GCSEs/A-levels/High School Diploma/GED)

    Trade, technical or vocational training (e.g. BTEC/HND/NVQ Diploma/CTE qualification)

    ndergraduate degree (e.g. Associates/Bachelors)

    Postgraduate degree (e.g. Masters/PhD)

    Professional degree (e.g. MD/DDS/JD)