SOLUTION: A research firm conducted a survey to determine the mean amount Americans spend on coffee during a week. They found the distribution of weekly spending followed the normal dist

A research firm conducted a survey to determine the mean amount steady smokers spend on cigarettes d

Question: A research firm conducted a survey to determine the mean amount steady smokers spend on cigarettes during a week. A sample of 49 steady smokers revealed that \(\bar{X}\) = $20 and s = $5.

a. What is the point estimate of the population mean? Explain what it indicates.

b. Using the 95 percent level of confidence, determine the confidence interval for \(\bar{X}\). Explain what it indicates.

a research firm conducted a survey to determine

∴ Other downloads you may be interested in ∴

Confidence Intervals

log in to your account

Reset password.

Have a language expert improve your writing

Run a free plagiarism check in 10 minutes, generate accurate citations for free.

  • Knowledge Base

Methodology

  • Survey Research | Definition, Examples & Methods

Survey Research | Definition, Examples & Methods

Published on August 20, 2019 by Shona McCombes . Revised on June 22, 2023.

Survey research means collecting information about a group of people by asking them questions and analyzing the results. To conduct an effective survey, follow these six steps:

  • Determine who will participate in the survey
  • Decide the type of survey (mail, online, or in-person)
  • Design the survey questions and layout
  • Distribute the survey
  • Analyze the responses
  • Write up the results

Surveys are a flexible method of data collection that can be used in many different types of research .

Table of contents

What are surveys used for, step 1: define the population and sample, step 2: decide on the type of survey, step 3: design the survey questions, step 4: distribute the survey and collect responses, step 5: analyze the survey results, step 6: write up the survey results, other interesting articles, frequently asked questions about surveys.

Surveys are used as a method of gathering data in many different fields. They are a good choice when you want to find out about the characteristics, preferences, opinions, or beliefs of a group of people.

Common uses of survey research include:

  • Social research : investigating the experiences and characteristics of different social groups
  • Market research : finding out what customers think about products, services, and companies
  • Health research : collecting data from patients about symptoms and treatments
  • Politics : measuring public opinion about parties and policies
  • Psychology : researching personality traits, preferences and behaviours

Surveys can be used in both cross-sectional studies , where you collect data just once, and in longitudinal studies , where you survey the same sample several times over an extended period.

Prevent plagiarism. Run a free check.

Before you start conducting survey research, you should already have a clear research question that defines what you want to find out. Based on this question, you need to determine exactly who you will target to participate in the survey.

Populations

The target population is the specific group of people that you want to find out about. This group can be very broad or relatively narrow. For example:

  • The population of Brazil
  • US college students
  • Second-generation immigrants in the Netherlands
  • Customers of a specific company aged 18-24
  • British transgender women over the age of 50

Your survey should aim to produce results that can be generalized to the whole population. That means you need to carefully define exactly who you want to draw conclusions about.

Several common research biases can arise if your survey is not generalizable, particularly sampling bias and selection bias . The presence of these biases have serious repercussions for the validity of your results.

It’s rarely possible to survey the entire population of your research – it would be very difficult to get a response from every person in Brazil or every college student in the US. Instead, you will usually survey a sample from the population.

The sample size depends on how big the population is. You can use an online sample calculator to work out how many responses you need.

There are many sampling methods that allow you to generalize to broad populations. In general, though, the sample should aim to be representative of the population as a whole. The larger and more representative your sample, the more valid your conclusions. Again, beware of various types of sampling bias as you design your sample, particularly self-selection bias , nonresponse bias , undercoverage bias , and survivorship bias .

There are two main types of survey:

  • A questionnaire , where a list of questions is distributed by mail, online or in person, and respondents fill it out themselves.
  • An interview , where the researcher asks a set of questions by phone or in person and records the responses.

Which type you choose depends on the sample size and location, as well as the focus of the research.

Questionnaires

Sending out a paper survey by mail is a common method of gathering demographic information (for example, in a government census of the population).

  • You can easily access a large sample.
  • You have some control over who is included in the sample (e.g. residents of a specific region).
  • The response rate is often low, and at risk for biases like self-selection bias .

Online surveys are a popular choice for students doing dissertation research , due to the low cost and flexibility of this method. There are many online tools available for constructing surveys, such as SurveyMonkey and Google Forms .

  • You can quickly access a large sample without constraints on time or location.
  • The data is easy to process and analyze.
  • The anonymity and accessibility of online surveys mean you have less control over who responds, which can lead to biases like self-selection bias .

If your research focuses on a specific location, you can distribute a written questionnaire to be completed by respondents on the spot. For example, you could approach the customers of a shopping mall or ask all students to complete a questionnaire at the end of a class.

  • You can screen respondents to make sure only people in the target population are included in the sample.
  • You can collect time- and location-specific data (e.g. the opinions of a store’s weekday customers).
  • The sample size will be smaller, so this method is less suitable for collecting data on broad populations and is at risk for sampling bias .

Oral interviews are a useful method for smaller sample sizes. They allow you to gather more in-depth information on people’s opinions and preferences. You can conduct interviews by phone or in person.

  • You have personal contact with respondents, so you know exactly who will be included in the sample in advance.
  • You can clarify questions and ask for follow-up information when necessary.
  • The lack of anonymity may cause respondents to answer less honestly, and there is more risk of researcher bias.

Like questionnaires, interviews can be used to collect quantitative data: the researcher records each response as a category or rating and statistically analyzes the results. But they are more commonly used to collect qualitative data : the interviewees’ full responses are transcribed and analyzed individually to gain a richer understanding of their opinions and feelings.

Next, you need to decide which questions you will ask and how you will ask them. It’s important to consider:

  • The type of questions
  • The content of the questions
  • The phrasing of the questions
  • The ordering and layout of the survey

Open-ended vs closed-ended questions

There are two main forms of survey questions: open-ended and closed-ended. Many surveys use a combination of both.

Closed-ended questions give the respondent a predetermined set of answers to choose from. A closed-ended question can include:

  • A binary answer (e.g. yes/no or agree/disagree )
  • A scale (e.g. a Likert scale with five points ranging from strongly agree to strongly disagree )
  • A list of options with a single answer possible (e.g. age categories)
  • A list of options with multiple answers possible (e.g. leisure interests)

Closed-ended questions are best for quantitative research . They provide you with numerical data that can be statistically analyzed to find patterns, trends, and correlations .

Open-ended questions are best for qualitative research. This type of question has no predetermined answers to choose from. Instead, the respondent answers in their own words.

Open questions are most common in interviews, but you can also use them in questionnaires. They are often useful as follow-up questions to ask for more detailed explanations of responses to the closed questions.

The content of the survey questions

To ensure the validity and reliability of your results, you need to carefully consider each question in the survey. All questions should be narrowly focused with enough context for the respondent to answer accurately. Avoid questions that are not directly relevant to the survey’s purpose.

When constructing closed-ended questions, ensure that the options cover all possibilities. If you include a list of options that isn’t exhaustive, you can add an “other” field.

Phrasing the survey questions

In terms of language, the survey questions should be as clear and precise as possible. Tailor the questions to your target population, keeping in mind their level of knowledge of the topic. Avoid jargon or industry-specific terminology.

Survey questions are at risk for biases like social desirability bias , the Hawthorne effect , or demand characteristics . It’s critical to use language that respondents will easily understand, and avoid words with vague or ambiguous meanings. Make sure your questions are phrased neutrally, with no indication that you’d prefer a particular answer or emotion.

Ordering the survey questions

The questions should be arranged in a logical order. Start with easy, non-sensitive, closed-ended questions that will encourage the respondent to continue.

If the survey covers several different topics or themes, group together related questions. You can divide a questionnaire into sections to help respondents understand what is being asked in each part.

If a question refers back to or depends on the answer to a previous question, they should be placed directly next to one another.

Here's why students love Scribbr's proofreading services

Discover proofreading & editing

Before you start, create a clear plan for where, when, how, and with whom you will conduct the survey. Determine in advance how many responses you require and how you will gain access to the sample.

When you are satisfied that you have created a strong research design suitable for answering your research questions, you can conduct the survey through your method of choice – by mail, online, or in person.

There are many methods of analyzing the results of your survey. First you have to process the data, usually with the help of a computer program to sort all the responses. You should also clean the data by removing incomplete or incorrectly completed responses.

If you asked open-ended questions, you will have to code the responses by assigning labels to each response and organizing them into categories or themes. You can also use more qualitative methods, such as thematic analysis , which is especially suitable for analyzing interviews.

Statistical analysis is usually conducted using programs like SPSS or Stata. The same set of survey data can be subject to many analyses.

Finally, when you have collected and analyzed all the necessary data, you will write it up as part of your thesis, dissertation , or research paper .

In the methodology section, you describe exactly how you conducted the survey. You should explain the types of questions you used, the sampling method, when and where the survey took place, and the response rate. You can include the full questionnaire as an appendix and refer to it in the text if relevant.

Then introduce the analysis by describing how you prepared the data and the statistical methods you used to analyze it. In the results section, you summarize the key results from your analysis.

In the discussion and conclusion , you give your explanations and interpretations of these results, answer your research question, and reflect on the implications and limitations of the research.

If you want to know more about statistics , methodology , or research bias , make sure to check out some of our other articles with explanations and examples.

  • Student’s  t -distribution
  • Normal distribution
  • Null and Alternative Hypotheses
  • Chi square tests
  • Confidence interval
  • Quartiles & Quantiles
  • Cluster sampling
  • Stratified sampling
  • Data cleansing
  • Reproducibility vs Replicability
  • Peer review
  • Prospective cohort study

Research bias

  • Implicit bias
  • Cognitive bias
  • Placebo effect
  • Hawthorne effect
  • Hindsight bias
  • Affect heuristic
  • Social desirability bias

A questionnaire is a data collection tool or instrument, while a survey is an overarching research method that involves collecting and analyzing data from people using questionnaires.

A Likert scale is a rating scale that quantitatively assesses opinions, attitudes, or behaviors. It is made up of 4 or more questions that measure a single attitude or trait when response scores are combined.

To use a Likert scale in a survey , you present participants with Likert-type questions or statements, and a continuum of items, usually with 5 or 7 possible responses, to capture their degree of agreement.

Individual Likert-type questions are generally considered ordinal data , because the items have clear rank order, but don’t have an even distribution.

Overall Likert scale scores are sometimes treated as interval data. These scores are considered to have directionality and even spacing between them.

The type of data determines what statistical tests you should use to analyze your data.

The priorities of a research design can vary depending on the field, but you usually have to specify:

  • Your research questions and/or hypotheses
  • Your overall approach (e.g., qualitative or quantitative )
  • The type of design you’re using (e.g., a survey , experiment , or case study )
  • Your sampling methods or criteria for selecting subjects
  • Your data collection methods (e.g., questionnaires , observations)
  • Your data collection procedures (e.g., operationalization , timing and data management)
  • Your data analysis methods (e.g., statistical tests  or thematic analysis )

Cite this Scribbr article

If you want to cite this source, you can copy and paste the citation or click the “Cite this Scribbr article” button to automatically add the citation to our free Citation Generator.

McCombes, S. (2023, June 22). Survey Research | Definition, Examples & Methods. Scribbr. Retrieved August 21, 2024, from https://www.scribbr.com/methodology/survey-research/

Is this article helpful?

Shona McCombes

Shona McCombes

Other students also liked, qualitative vs. quantitative research | differences, examples & methods, questionnaire design | methods, question types & examples, what is a likert scale | guide & examples, "i thought ai proofreading was useless but..".

I've been using Scribbr for years now and I know it's a service that won't disappoint. It does a good job spotting mistakes”

Information

  • Author Services

Initiatives

You are accessing a machine-readable page. In order to be human-readable, please install an RSS reader.

All articles published by MDPI are made immediately available worldwide under an open access license. No special permission is required to reuse all or part of the article published by MDPI, including figures and tables. For articles published under an open access Creative Common CC BY license, any part of the article may be reused without permission provided that the original article is clearly cited. For more information, please refer to https://www.mdpi.com/openaccess .

Feature papers represent the most advanced research with significant potential for high impact in the field. A Feature Paper should be a substantial original Article that involves several techniques or approaches, provides an outlook for future research directions and describes possible research applications.

Feature papers are submitted upon individual invitation or recommendation by the scientific editors and must receive positive feedback from the reviewers.

Editor’s Choice articles are based on recommendations by the scientific editors of MDPI journals from around the world. Editors select a small number of articles recently published in the journal that they believe will be particularly interesting to readers, or important in the respective research area. The aim is to provide a snapshot of some of the most exciting work published in the various research areas of the journal.

Original Submission Date Received: .

  • Active Journals
  • Find a Journal
  • Proceedings Series
  • For Authors
  • For Reviewers
  • For Editors
  • For Librarians
  • For Publishers
  • For Societies
  • For Conference Organizers
  • Open Access Policy
  • Institutional Open Access Program
  • Special Issues Guidelines
  • Editorial Process
  • Research and Publication Ethics
  • Article Processing Charges
  • Testimonials
  • Preprints.org
  • SciProfiles
  • Encyclopedia

information-logo

Article Menu

a research firm conducted a survey to determine

  • Subscribe SciFeed
  • Recommended Articles
  • Google Scholar
  • on Google Scholar
  • Table of Contents

Find support for a specific problem in the support section of our website.

Please let us know what you think of our products and services.

Visit our dedicated information section to learn more about MDPI.

JSmol Viewer

Information security awareness in the insurance sector: cognitive and internal factors and combined recommendations.

a research firm conducted a survey to determine

1. Introduction

2. literature review, 2.1. information security behavior, 2.2. from information security behavior to awareness, 2.3. information security awareness, 2.4. proposition development & research model, 2.4.1. negative experience, 2.4.2. seta program, 2.4.3. infosec goals, 2.4.4. security complexity, 2.4.5. seta design, 3. materials and methods, 3.1. data analysis, 3.2. reliability & validity, 4.1. descriptive statistics, 4.1.1. malware experience, 4.1.2. phishing experience, 4.1.3. measurement item statistics, 4.2. reliability & validity of results, 4.3. inferential statistics, 4.3.1. proposition results, 4.3.2. additional separate regressions per group, 4.3.3. additional mean comparisons of isa per group, 5. discussion, 5.1. key findings, 5.2. isa and findings in relation to sa, 5.3. research limitations, 5.4. implications for theory, 5.5. implications for practice, 5.6. future research directions, 6. conclusions.

  • Research Constructs & Method: Five explaining constructs have been incorporated in the research to answer the research question, and their direct relationship with ISA has been tested by means of weighted regression analyses. The constructs are Negative Experience, SETA Program, InfoSec Goals, Security Complexity, and SETA Design.
  • Impact of constructs on ISA: ∘ InfoSec Goals: Have a positive impact on ISA, demonstrating that employees with a strong commitment to information security are more aware. ∘ SETA Program: Has a positive impact on ISA by providing necessary education and training. ∘ Security Complexity: Has a negative impact on ISA, indicating that higher complexity in security measures can decrease awareness and increase cognitive overload.
  • Significant Insights: Security Complexity emerged as the most significant factor, followed by InfoSec Goals and SETA Program, aligning with the three levels of ISA within the SA framework.
  • Group Analyses: ∘ Additional group analyses and separate regressions have been conducted with the help of two group perspectives, (1) IT and non-IT employees and (2) managers and non-managers. ∘ The separate regressions held a stricter significance level, demonstrating that Security Complexity has a significant contribution for each group. ∘ Mean comparisons did not yield notable findings in ISA per group.

Author Contributions

Institutional review board statement, informed consent statement, data availability statement, acknowledgments, conflicts of interest.

StudyINSTINDENVTECHTheoretical Lens/Angle to Explain AwarenessObservation
[ ] XX Social Learning Theory-
[ ]XXX Combines elements of general deterrence theory and social psychology-
[ ]X X Relational Awareness-
[ ]XX Innovation Diffusion Theory-
[ ] X XSituation AwarenessExperimental, phishing context. Personality trait integration.
[ ]X Leadership StylesConsistent results: leadership positively influences ISA
[ ]XX Theory of Planned Behavior
[ ]X Social Learning TheoryEducational information and channels positively influence ISA
[ ]X Theory of Reasoned Action
[ ]X Organizational and security culture-
[ ] X Big Five Personality Traits ModelConsistent and similar results in demographic factors
[ ] X
[ ] X Demographic differences
[ ] X Collectivism-
[ ] XX Demographic attributes and socioeconomic resources-
SETACOMPNEGGOALSETADISA
SETA Program--
Security Complexity (COMP)−0.102--
Negative Experience (NEG)0.1520.152--
InfoSec Goals (GOAL)0.568 **−0.1120.160 *--
SETA Design (SETAD)0.661 **0.0400.1000.453 **--
Information Security Awareness (ISA)0.402 **−0.493 **0.0450.550 **0.184 *--
Coefficients
ModelCollinearity Statistics
ToleranceVIF
1SETA0.4602.172
Complexity0.9301.075
Negative Experience0.9371.068
InfoSec Goals0.6541.529
SETA Design0.5401.852

Appendix D. Convergent & Discriminant Validity

AVECOMPGOALISASETASETAD
COMP0.568
GOAL0.858−0.145
ISA0.658−0.4950.607
SETA0.579−0.2860.5820.53
SETAD0.601−0.0120.4680.2590.557

Appendix E. Harman’s Single Factor Test Results

Total Variance Explained
ComponentInitial Eigenvalues Extraction Sums of Squared Loadings
Total% of VarianceCumulative %Total% of VarianceCumulative %
17.20232.73832.7387.20232.73832.738
23.64616.57149.309
31.6777.62556.933
41.1345.15562.088
51.0444.74566.833
69124.14470.977
77663.48374.460
86863.11977.579
96472.94180.520
105842.65583.175
115552.52185.696
124652.11587.811
134321.96289.773
143871.75891.532
153581.62993.161
163071.39694.557
173061.39295.949
182391.08497.033
1921597898.012
2019689098.902
2116072899.629
2282371100.000
Extraction Method: Principal Component Analysis.
TermDefinitionReference
Cybersecurity“Prevention of damage to, protection of, and restoration of computers, electronic communications systems, electronic communications
services, wire communication, and electronic communication, including information contained therein, to ensure its availability, integrity, authentication, confidentiality, and nonrepudiation”.
[ ]
Cyber resilience“Cyber resilience refers to the ability to continuously deliver the
intended outcome despite adverse cyber events.”
[ ] (p. 2)
Information security“The protection of information, which is an asset, from possible harm resulting from various threats and vulnerabilities”.[ ] (p. 4)
Information security policies (ISPs)Information security policies are formalized documents that outline the rules and guidelines for protecting an organization’s information and technology resources. These policies aim to ensure that employees understand their roles and responsibilities in maintaining the security of the organization’s information systems.[ ]
Information systems“Information systems are interrelated components working together to collect, process, store, and disseminate information to support decision making, coordination, control, analysis, and visualization in an organization.”[ ] (p. 44)
  • Admass, W.S.; Munaye, Y.Y.; Diro, A. Cyber security: State of the art, challenges and future directions. Cyber Secur. Appl. 2023 , 2 , 100031. [ Google Scholar ] [ CrossRef ]
  • Thakur, M. Cyber Security Threats and Countermeasures in Digital Age. J. Appl. Sci. Educ. (JASE) 2024 , 4 , 1–20. [ Google Scholar ]
  • Gartner. Top Trends in Cybersecurity for 2024 ; Gartner: Stamford, CT, USA, 2024; Available online: https://www.gartner.com/en/cybersecurity/trends/cybersecurity-trends (accessed on 23 June 2024).
  • Borkovich, D.; Skovira, R. Working from Home: Cybersecurity in the Age of Covid-19. Issues Inf. Syst. 2020 , 21 , 234–246. [ Google Scholar ] [ CrossRef ]
  • Weil, T.; Murugesan, S. IT risk and resilience—Cybersecurity response to COVID-19. IT Prof. 2020 , 22 , 4–10. [ Google Scholar ] [ CrossRef ]
  • Saleous, H.; Ismail, M.; AlDaajeh, S.H.; Madathil, N.; Alrabaee, S.; Choo, K.K.R.; Al-Qirim, N. COVID-19 pandemic and the cyberthreat landscape: Research challenges and opportunities. Digit. Commun. Netw. 2023 , 9 , 211–222. [ Google Scholar ]
  • Gartner. Top Trends in Cybersecurity 2022 ; Gartner: Stamford, CT, USA, 2022. [ Google Scholar ]
  • Almansoori, A.; Al-Emran, M.; Shaalan, K. Exploring the Frontiers of Cybersecurity Behaviour: A Systematic Review of Studies and Theories. Appl. Sci. 2023 , 13 , 5700. [ Google Scholar ] [ CrossRef ]
  • Bowen, B.M.; Devarajan, R.; Stolfo, S. Measuring the human factor of cyber security. In Proceedings of the 2011 IEEE International Conference on Technologies for Homeland Security (HST), Waltham, MA, USA, 15–17 November 2011; pp. 230–235. [ Google Scholar ]
  • Onumo, A.; Ullah-Awan, I.; Cullen, A. Assessing the moderating effect of security technologies on employees compliance with cybersecurity control procedures. ACM Trans. Manag. Inf. Syst. 2021 , 12 , 11. [ Google Scholar ] [ CrossRef ]
  • Jeong, C.Y.; Lee, S.Y.T.; Lim, J.H. Information security breaches and IT security investments: Impacts on competitors. Inf. Manag. 2019 , 56 , 681–695. [ Google Scholar ]
  • Alsharida, R.A.; Al-rimy, B.A.S.; Al-Emran, M.; Zainal, A. A systematic review of multi perspectives on human cybersecurity behaviour. Technol. Soc. 2023 , 73 , 102258. [ Google Scholar ]
  • Cram, W.A.; D’Arcy, J. ‘What a waste of time’: An examination of cybersecurity legitimacy. Inf. Syst. J. 2023 , 33 , 1396–1422. [ Google Scholar ]
  • Baltuttis, D.; Teubner, T.; Adam, M.T. A typology of cybersecurity behaviour among knowledge workers. Comput. Secur. 2024 , 140 , 103741. [ Google Scholar ]
  • Siponen, M.T. A conceptual foundation for organizational information security awareness. Inf. Manag. Comput. Secur. 2000 , 8 , 31–41. [ Google Scholar ] [ CrossRef ]
  • Wang, W.; Harrou, F.; Bouyeddou, B.; Senouci, S.M.; Sun, Y. Cyber-attacks detection in industrial systems using artificial intelligence-driven methods. Int. J. Crit. Infrastruct. Prot. 2022 , 38 , 100542. [ Google Scholar ]
  • Alyami, A.; Sammon, D.; Neville, K.; Mahony, C. Critical success factors for Security Education, Training and Awareness (SETA) programme effectiveness: An empirical comparison of practitioner perspectives. Inf. Comput. Secur. 2024 , 32 , 53–73. [ Google Scholar ]
  • Aldawood, S.; Skinner, G. Reviewing Cyber Security Social Engineering Training and Awareness Programs—Pitfalls and Ongoing Issues. Future Internet 2019 , 11 , 73. [ Google Scholar ] [ CrossRef ]
  • Hwang, I.; Wakefield, R.; Kim, S.; Kim, T. Security Awareness: The First Step in Information Security Compliance Behaviour. J. Comput. Inf. Syst. 2021 , 61 , 345–356. [ Google Scholar ] [ CrossRef ]
  • Kannelønning, I.H.; Katsikas, S.K. A systematic literature review of how cybersecurity-related behaviour has been assessed. Inf. Comput. Secur. 2023 , 31 , 463–477. [ Google Scholar ]
  • Gulyás, A.; Kiss, A. Impact of Cyber-Attacks on the Financial Institutions. Procedia Comput. Sci. 2023 , 219 , 84–90. [ Google Scholar ] [ CrossRef ]
  • Kuraku, D.S.; Kalla, D.; Smith, N.; Samaah, F. Safeguarding FinTech: Elevating Employee Cybersecurity Awareness in Financial Sector. Int. J. Appl. Inf. Syst. (IJAIS) 2023 , 12 , 43–47. [ Google Scholar ]
  • Rohan, R.; Pal, D.; Hautamäki, J.; Funilkul, S.; Chutimaskul, W.; Thapliyal, H. A systematic literature review of cybersecurity scales assessing information security awareness. Heliyon 2023 , 9 , e08671. [ Google Scholar ] [ CrossRef ]
  • Donalds, B.; Barclay, S. Beyond Technical Measures: A Value-Focused Thinking Appraisal of Strategic Drivers in Improving Information Security Policy Compliance. Eur. J. Inf. Syst. 2021 , 31 , 58–73. [ Google Scholar ] [ CrossRef ]
  • Bulgurcu, B.; Cavusoglu, H.; Benbasat, I. Information security policy compliance: An empirical study of rationality-based beliefs and information security awareness. MIS Q. 2010 , 34 , 523–548. [ Google Scholar ]
  • Chen, Y.; Galletta, D.F.; Lowry, P.B.; Luo, X.R.; Moody, G.D.; Willison, R. Understanding Inconsistent Employee Compliance with Information Security Policies through the Lens of the Extended Parallel Process Model. Inf. Syst. Res. 2021 , 32 , 1043–1065. [ Google Scholar ] [ CrossRef ]
  • Fertig, T.; Schütz, A.E.; Weber, K. Current Issues of Metrics for Information Security Awareness. In Proceedings of the 28th European Conference on Information Systems (ECIS), An AIS Conference, Online, 15–17 June 2020. [ Google Scholar ]
  • Schuetz, S.W.; Lowry, P.B.; Pienta, D.A. The effectiveness of abstract versus concrete fear appeals in information security. J. Manag. Inf. Syst. 2020 , 37 , 723–757. [ Google Scholar ] [ CrossRef ]
  • Ng, K.C.; Zhang, X.; Thong, J.Y.L.; Tam, K.Y. Protecting against threats to information security: An attitudinal ambivalence perspective. J. Manag. Inf. Syst. 2021 , 38 , 732–764. [ Google Scholar ] [ CrossRef ]
  • Cram, W.A.; D’Arcy, J.; Proudfoot, J.G. Seeing the Forest and the Trees: A Meta-Analysis of the Antecedents to Information Security Policy Compliance. MIS Q. 2019 , 43 , 525–554. [ Google Scholar ] [ CrossRef ]
  • Dhillon, G.; Smith, K.; Dissanayaka, I. Information systems security research agenda: Exploring the gap between research and practice. J. Strateg. Inf. Syst. 2021 , 30 , 101693. [ Google Scholar ] [ CrossRef ]
  • Ko, A.; Tarján, G.; Mitev, A. Information security awareness maturity: Conceptual and practical aspects in Hungarian organizations. Inf. Technol. People 2023 , 36 , 174–195. [ Google Scholar ]
  • Li, W.; Leung, A.; Yue, W. Where is IT in Information Security? The Interrelationship among IT Investment, Security Awareness, and Data Breaches. MIS Q. 2023 , 47 , 317–342. [ Google Scholar ] [ CrossRef ]
  • Alahmari, A.; Renaud, K.; Omoronyia, I. Moving Beyond Cyber Security Awareness and Training to Engendering Security Knowledge Sharing. Inf. Syst. E-Bus. Manag. 2023 , 21 , 123–158. [ Google Scholar ] [ CrossRef ]
  • Ahlan, A.R.; Lubis, M.; Lubis, A.R. Information Security Awareness at the Knowledge-Based Institution: Its Antecedents and Measures. Procedia Comput. Sci. 2015 , 72 , 361–373. [ Google Scholar ] [ CrossRef ]
  • Haeussinger, F.; Kranz, J. Antecedents of employees’ information security awareness: Review, synthesis, and directions for future research. In Proceedings of the 25th European Conference on Information Systems (ECIS), Guimarães, Portugal, 5–10 June 2017; pp. 1–20. [ Google Scholar ]
  • Humaidi, N.; Balakrishnan, V. Leadership styles and information security compliance behaviour: The mediator effect of information security awareness. Int. J. Inf. Educ. Technol. 2015 , 5 , 311. [ Google Scholar ]
  • Al-Omari, A.; El-Gayar, O.; Deokar, A. Information security policy compliance: The role of information security awareness. In Proceedings of the Eighteenth Americas Conference on Information Systems, Seattle, WA, USA, 9–12 August 2012; pp. 1–10. [ Google Scholar ]
  • Al-Omari, A.; El-Gayar, O.; Deokar, A. Security policy compliance: User acceptance perspective. In Proceedings of the 2012 45th Hawaii International Conference on System Sciences, Maui, HI, USA, 4–7 January 2012; pp. 1–10. [ Google Scholar ]
  • D’Arcy, J.; Hovav, A.; Galletta, D. User awareness of security countermeasures and its impact on information systems misuse: A deterrence approach. Inf. Syst. Res. 2009 , 20 , 79–98. [ Google Scholar ]
  • Guzman, I.R.; Galvez, S.M.; Stanton, J.M.; Stam, K.R. Information Security Awareness and Information Security Practices of Internet Users in Bolivia: A Socio-Cognitive View. RELCASI 2014 , 6 , 2. [ Google Scholar ]
  • Jaeger, L.; Eckhardt, A. Eyes wide open: The role of situational information security awareness for security-related behaviour. Inf. Syst. J. 2021 , 31 , 429–472. [ Google Scholar ]
  • Liu, C.; Wang, N.; Liang, H. Motivating information security policy compliance: The critical role of supervisor-subordinate guanxi and organizational commitment. Int. J. Inf. Manag. 2020 , 54 , 102152. [ Google Scholar ]
  • Alanazi, M.; Freeman, M.; Tootell, H. Exploring the factors that influence the cybersecurity behaviors of young adults. J. Comput. Hum. Behav. 2022 , 136 , 107376. [ Google Scholar ] [ CrossRef ]
  • Wiley, J.; McCormac, A.; Calic, D. More Than the Individual: Examining the Relationship Between Culture and Information Security Awareness. Comput. Secur. 2020 , 88 , 101640. [ Google Scholar ] [ CrossRef ]
  • Hitchings, J. Deficiencies of the traditional approach to information security and the requirements for a new methodology. Comput. Secur. 1995 , 14 , 377–383. [ Google Scholar ] [ CrossRef ]
  • Crossler, R.E.; Johnston, A.C.; Lowry, P.B.; Hu, Q.; Warkentin, M.; Baskerville, R. Future directions for behavioural information security research. Comput. Secur. 2013 , 32 , 90–101. [ Google Scholar ] [ CrossRef ]
  • Hanus, B.; Windsor, J.C.; Wu, Y. Definition and multidimensionality of security awareness: Close encounters of the second order. ACM SIGMIS Database DATABASE Adv. Inf. Syst. 2018 , 49 , 103–133. [ Google Scholar ] [ CrossRef ]
  • Maalem Lahcen, R.A.; Caulkins, B.; Mohapatra, R.; Kumar, M. Review and insight on the behavioural aspects of cybersecurity. Cybersecurity 2020 , 3 , 10. [ Google Scholar ] [ CrossRef ]
  • Stanton, J.M.; Stam, K.R.; Mastrangelo, P.M.; Jolton, J.A. Behavioral information security: An overview, results, and research agenda. Hum. Comput. Interact. Manag. Inf. Syst. 2015 , 12 , 276–294. [ Google Scholar ]
  • Chan, R.Y. K Woon, I.; Kankanhalli, A. Perceptions of Information Security in the Workplace: Linking Information Security Climate to Compliant Behavior. J. Inf. Priv. Secur. 2005 , 1 , 18–41. [ Google Scholar ] [ CrossRef ]
  • Johnston, A.C.; Wech, B.; Jack, E.; Beavers, M. Reigning in the Remote Employee: Applying Social Learning Theory to Explain Information Security Policy Compliance Attitudes. In Proceedings of the AMCIS 2010, 15–18 August; p. 493.
  • Duzenci, D.; Kitapci, H.; Gok, M.S. The Role of Decision-Making Styles in Shaping Cybersecurity Compliance Behavior. Appl. Sci. 2023 , 13 , 8731. [ Google Scholar ] [ CrossRef ]
  • Warkentin, M.; Johnston, A.C.; Shropshire, J. The influence of the informal social learning environment in information security awareness programs. Eur. J. Inf. Syst. 2011 , 20 , 259–272. [ Google Scholar ] [ CrossRef ]
  • Chua, H.N.; Chua, S.F.; Low,, Y.C.; Chang, Y. Impact of Employees’ Demographic Characteristics on the Awareness and Compliance of Information Security Policy in Organizations. Telematics Inf. 2018 , 35 , 1770–1780. [ Google Scholar ] [ CrossRef ]
  • Luo, X.R.; Li, H.; Hu, Q.; Xu, H. Why Individual Employees Commit Malicious Computer Abuse: A Routine Activity Theory Perspective. J. Assoc. Inf. Syst. 2020 , 21. [ Google Scholar ] [ CrossRef ]
  • Shah, P.; Agarwal, A. Cyber Suraksha: A Card Game for Smartphone Security Awareness. Inf. Comput. Secur. 2023 , 31 , 576–600. [ Google Scholar ] [ CrossRef ]
  • Choi, H.; Park, S.; Kang, J. Enhancing Participatory Security Culture in Public Institutions: An Analysis of Organizational Employees’ Security Threat Recognition Processes. IEEE Access 2024 , 12 , 47543–47558. [ Google Scholar ] [ CrossRef ]
  • Lebek, B.; Uffen, J.; Breitner, M.H.; Neumann, M.; Hohler, B. Employees’ Information Security Awareness and Behavior: A Literature Review. In Proceedings of the 2013 46th Hawaii International Conference on System Sciences, Wailea, HI, USA, 7-10 January 2013; pp. 2978–2987. [ Google Scholar ] [ CrossRef ]
  • Rocha Flores, W.; Ekstedt, M. Shaping intention to resist social engineering through transformational leadership, information security culture and awareness. Comput. Secur. 2016 , 59 , 26–44. [ Google Scholar ] [ CrossRef ]
  • Moody, G.D.; Siponen, M.; Pahnila, S. Toward a Unified Model of Information Security Policy Compliance. MIS Q. 2018 , 42 , 285–312. [ Google Scholar ] [ CrossRef ]
  • Hutchinson, G.; Ophoff, J. A descriptive review and classification of organizational information security awareness research. In Proceedings of the 18th International Information Security Conference 2019, Johannesburg, South Africa, 15 August 2019. [ Google Scholar ]
  • Grassegger, T.; Nedbal, D. The role of employees’ information security awareness on the intention to resist social engineering. Procedia Comput. Sci. 2021 , 181 , 59–66. [ Google Scholar ]
  • Jaeger, L.; Eckhardt, A. Making cues salient: The Role of Security Awareness in shaping Threat and Coping Appraisals. In Proceedings of the 25th European Conference on Information Systems (ECIS) 2017, Guimarães, Portugal, 5–10 June 2017; pp. 2525–2535, ISBN 978-0-9915567-0-0. Available online: https://aisel.aisnet.org/ecis2017_rip/5 (accessed on 14 August 2024).
  • Torten, R.; Reaiche, C.; Boyle, S. The Impact of Security Awareness on Information Technology Professionals’ Behavior. Comput. Secur. 2018 , 79 , 68–79. [ Google Scholar ] [ CrossRef ]
  • Li, L.; He, W.; Xu, L.; Ash, I.; Anwar, M.; Yuan, X. Investigating the impact of cybersecurity policy awareness on employees’ cybersecurity behaviour. Int. J. Inf. Manag. 2019 , 45 , 13–24. [ Google Scholar ]
  • Hu, S.; Hsu, C.; Zhou, Z. Security Education, Training, and Awareness Programs: Literature Review. J. Comput. Inf. Syst. 2021 , 62 , 752–764. [ Google Scholar ] [ CrossRef ]
  • Bandura, A.; Walters, R.H. Social Learning Theory ; Englewood Cliffs: Prentice Hall, NJ, USA, 1977; Volume 1. [ Google Scholar ]
  • Zainal, N.C.; Puad, M.; Sani, N. Moderating Effect of Self-Efficacy in the Relationship Between Knowledge, Attitude and Environment Behavior of Cybersecurity Awareness. Asian Social Science. 2022 , 18 , 1–55. [ Google Scholar ]
  • Ormond, D.; Warkentin, M.; Crossler, R.E. Integrating Cognition with an Affective Lens to Better Understand Information Security Policy Compliance. J. Assoc. Inf. Syst. 2019 , 20. [ Google Scholar ] [ CrossRef ]
  • Jensen, M.L.; Durcikova, A.; Wright, R.T. Using susceptibility claims to motivate behaviour change in IT security. Eur. J. Inf. Syst. 2021 , 30 , 27–45. [ Google Scholar ] [ CrossRef ]
  • Park, E.H.; Kim, J.; Wiles, L. The Role of Collectivism and Moderating Effect of IT Proficiency on Intention to Disclose Protected Health Information. Inf. Technol. Manag. 2023 , 24 , 177–193. [ Google Scholar ] [ CrossRef ]
  • Shaw, R.S.; Chen, C.C.; Harris, A.L.; Huang, H. The Impact of Information Richness on Information Security Awareness Training Effectiveness. Comput. Educ. 2009 , 52 , 92–100. [ Google Scholar ] [ CrossRef ]
  • Lebek, B.; Uffen, J.; Neumann, M.; Hohler, B.; Breitner, M.H. Information security awareness and behaviour: A theory-based literature review. Manag. Res. Rev. 2014 , 37 , 256–276. [ Google Scholar ] [ CrossRef ]
  • Endsley, M.R. Toward a theory of situation awareness in dynamic systems. J. Hum. Factors Ergon. Soc. 1995 , 37 , 32–64. [ Google Scholar ] [ CrossRef ]
  • Stubbings, L.; Chaboyer, W.; McMurray, A. Nurses’ use of situation awareness in decision-making: An integrative review. J. Adv. Nurs. 2012 , 68 , 1443–1453. [ Google Scholar ]
  • Franke, U.; Brynielsson, J. Cyber situational awareness–a systematic review of the literature. Comput. Secur. 2014 , 46 , 18–31. [ Google Scholar ] [ CrossRef ]
  • Renaud, J.; Ophoff, J. A cyber situational awareness model to predict the implementation of cyber security controls and precautions by SMEs. Organizational Cybersecurity Journal: Practice, Process and People. Organ. Cybersecur. J. Pract. Process People 2021 . [ Google Scholar ] [ CrossRef ]
  • Tianfield, H. Towards integrating a task allocation mechanism into a cyber security situation awareness system. In Proceedings of the Cyber and Information Security Research Conference (CISRC) 2016, Oak Ridge, TN, USA, 5–7 April 2016; pp. 60–66. [ Google Scholar ]
  • Alshboul, Y.; Streff, K. Beyond cybersecurity awareness: Antecedents and satisfaction. In Proceedings of the 2017 International Conference on Software and e-Business, Hong Kong, China, 28–30 December 2017. [ Google Scholar ]
  • Jaeger, L. Information security awareness: Literature review and integrative framework. In Proceedings of the 51st Hawaii International Conference on System Sciences, Hilton Waikoloa Village, HI, USA, 3–6 January 2018; pp. 4703–4712. [ Google Scholar ]
  • Bauer, S.; Bernroider, E.W. From information security awareness to reasoned compliant action: Analyzing information security policy compliance in a large banking organization. ACM SIGMIS Database DATABASE Adv. Inf. Syst. 2017 , 48 , 44–68. [ Google Scholar ]
  • McCormac, A.; Zwaans, T.; Parsons, K.; Calic, D.; Butavicius, M.; Pattinson, M. Individual differences and Information Security Awareness. Comput. Hum. Behav. 2017 , 69 , 151–156. [ Google Scholar ] [ CrossRef ]
  • van der Schyff, S.; Flowerday, S.V. Proposing a user-centric and context-aware conceptual model for enhancing cybersecurity behaviour. Behav. Inf. Technol. 2021 , 40 , 354–369. [ Google Scholar ]
  • Lyon, G. Informational inequality: The role of resources and attributes in information security awareness. Inf. Comput. Secur. 2024 , 32 , 197–217. [ Google Scholar ]
  • Tsohou, A.; Karyda, M.; Kokolakis, S. Analyzing the role of cognitive and cultural biases in the internalization of information security policies: Recommendations for information security awareness programs. Comput. Secur. 2015 , 52 , 128–141. [ Google Scholar ] [ CrossRef ]
  • Endsley, M.R. Design and evaluation for situation awareness enhancement. In Proceedings of the Human Factors Society Annual Meeting ; Sage Publications: Los Angeles, CA, USA, 1988. [ Google Scholar ]
  • Kovačević, A.; Putnik, N.; Tošković, O. Factors related to cyber security behaviour. IEEE Access 2020 , 8 , 125140–125148. [ Google Scholar ] [ CrossRef ]
  • Frank, M.; Kohn, M. Understanding Extra-Role Security Behaviors: An Integration of the Self-Determination Theory and Construal Level Theory. Computers & Security 2023 , 132 , 103386. [ Google Scholar ] [ CrossRef ]
  • Peltier, T.R. Information Security Policies, Procedures, and Standards: Guidelines for Effective Information Security Management ; CRC Press: Boca Raton, FL, USA, 2005. [ Google Scholar ]
  • Amankwa, E.; Loock, M.; Kritzinger, E. A conceptual analysis of information security education, information security training and information security awareness definitions. In Proceedings of the 9th International Conference for Internet Technology and Secured Transactions (ICITST-2014), London, UK, 8–10 December 2014. [ Google Scholar ]
  • Tsohou, A.; Kokolakis, S.; Karyda, M. Understanding information security awareness: A systematic literature review. Comput. Secur. 2015 , 49 , 8–27. [ Google Scholar ] [ CrossRef ]
  • Eminağaoğlu, M.; Uçar, E.; Eren, Ş. The positive outcomes of information security awareness training in companies—A case study. Inf. Secur. Tech. Rep. 2009 , 14 , 223–229. [ Google Scholar ] [ CrossRef ]
  • Kweon, E.; Lee, H.; Chai, S.; Yoo, K. The Utility of Information Security Training and Education on Cybersecurity Incidents: An empirical evidence. Inf. Syst. Front. 2021 , 23 , 361–373. [ Google Scholar ] [ CrossRef ]
  • Sikolia, D.; Biros, D.; Zhang, T. How Effective Are SETA Programs Anyway: Learning and Forgetting in Security Awareness Training. J. Cybersecurity Educ. Res. Pract. 2023 , 2023. [ Google Scholar ] [ CrossRef ]
  • Alkhazi, B.; Alshaikh, M.; Alkhezi, S.; Labbaci, H. Assessment of the impact of information security awareness training methods on knowledge, attitude, and behaviour. IEEE Access 2022 , 10 , 132132–132143. [ Google Scholar ] [ CrossRef ]
  • Zhang-Kennedy, L.; Chiasson, S. A Systematic Review of Multimedia Tools for Cybersecurity Awareness and Education. ACM Comput. Surv. 2021 , 54 , 12. [ Google Scholar ] [ CrossRef ]
  • Silic, M.; Lowry, P.B. Using design-science based gamification to improve organizational security training and compliance. J. Manag. Inf. Syst. 2020 , 37 , 129–161. [ Google Scholar ]
  • Dincelli, E.; Chengalur-Smith, I. Choose your own training adventure: Designing a gamified SETA artefact for improving information security and privacy through interactive storytelling. Eur. J. Inf. Syst. 2020 , 29 , 669–687. [ Google Scholar ] [ CrossRef ]
  • Emm, D. Gamification—Can it be applied to security awareness training? Netw. Secur. 2021 , 4 , 16–18. [ Google Scholar ] [ CrossRef ]
  • Abawajy, J. User preference of cyber security awareness delivery methods. Behav. Inf. Technol. 2014 , 33 , 237–248. [ Google Scholar ]
  • Kajzer, M.; D’Arcy, J.; Crowell, C.R.; Striegel, A.; Van Bruggen, D. An exploratory investigation of message-person congruence in information security awareness campaigns. Comput. Secur. 2014 , 43 , 64–76. [ Google Scholar ]
  • Yoo, C.W.; Sanders, G.L.; Cerveny, R.P. Exploring the Influence of Flow and Psychological Ownership on Security Education, Training and Awareness Effectiveness and Security Compliance. Decis. Support Syst. 2018 , 108 , 107–118. [ Google Scholar ] [ CrossRef ]
  • Puhakainen, P.; Siponen, M. Improving employees’ compliance through information systems security training: An action research study. MIS Q. 2010 , 34 , 757–778. [ Google Scholar ]
  • Chu, A.M.; So, M.K. Organizational information security management for sustainable information systems: An unethical employee information security behaviour perspective. Sustainability 2020 , 12 , 3163. [ Google Scholar ]
  • Goo, J.; Yim, M.-S.; Kim, D.J. A path to successful management of employee security compliance: An empirical study of information security climate. IEEE Trans. Prof. Commun. 2014 , 57 , 286–308. [ Google Scholar ]
  • Davis, J.; Agrawal, D.; Guo, X. Enhancing users’ security engagement through cultivating commitment: The role of psychological needs fulfilment. Eur. J. Inf. Syst. 2023 , 32 , 195–206. [ Google Scholar ] [ CrossRef ]
  • Cavallari, M. Organizational Determinants and Compliance Behaviour to Shape Information Security Plan. Acad. J. Interdiscip. Stud. 2023 , 12 , 1. [ Google Scholar ] [ CrossRef ]
  • Vedadi, A.; Warkentin, M.; Straub, D.W.; Shropshire, J. Fostering Information Security Compliance as Organizational Citizenship Behavior. Inf. Manage. 2024 , 61 , 103968. [ Google Scholar ] [ CrossRef ]
  • Price, W.; Price, T.; Tenan, M.; Head, J.; Maslin, W.; LaFiandra, M. Acute Stress Causes Overconfidence in Situation Awareness. In Proceedings of the 2016 IEEE International Multi-Disciplinary Conference on Cognitive Methods in Situation Awareness and Decision Support (CogSIMA), San Diego, CA, USA, 15–18 March 2016; IEEE: New York, NY, USA, 2016; pp. 1–6. [ Google Scholar ] [ CrossRef ]
  • McCormac, A.; Calic, D.; Parsons, K.; Butavicius, M.; Pattinson, M.; Lillie, M. The effect of resilience and job stress on information security awareness. Inf. Comput. Secur. 2018 , 26 , 463–483. [ Google Scholar ] [ CrossRef ]
  • Lee, C.; Lee, C.C.; Kim, S. Understanding information security stress: Focusing on the type of information security compliance activity. Comput. Secur. 2016 , 59 , 60–70. [ Google Scholar ] [ CrossRef ]
  • D’Arcy, J.; Teh, P.-L. Predicting employee information security policy compliance on a daily basis: The interplay of security-related stress, emotions, and neutralization. Inf. Manag. 2019 , 56 , 103151. [ Google Scholar ] [ CrossRef ]
  • Cram, W.A.; D’Arcy, J.; Proudfoot, J.G. When enough is enough: Investigating the antecedents and consequences of information security fatigue. Inf. Syst. J. 2021 , 31 , 521–549. [ Google Scholar ] [ CrossRef ]
  • D’Arcy, J.; Herath, T.; Shoss, M.K. Understanding employee responses to stressful information security requirements: A coping perspective. J. Manag. Inf. Syst. 2014 , 31 , 285–318. [ Google Scholar ]
  • Harper, A.; Mustafee, N.; Pitt, M. Increasing situation awareness in healthcare through real-time simulation. J. Oper. Res. Society 2023 , 74 , 2339–2349. [ Google Scholar ]
  • Bolger, C.; Brummel, B.; Aurigemma, S.; Moore, T.; Baskin, M. Information security awareness: Identifying gaps in current measurement tools. In Proceedings of the 22nd Annual Security Conference (ASC), Las Vegas, NV, USA, 29–30 April 2023. [ Google Scholar ]
  • Nwachukwu, U.; Vidgren, J.; Niemimaa, M.; Järveläinen, J. Do SETA Interventions Change Security Behavior? A Literature Review. In Proceedings of the 56th Annual Hawaii International Conference on System Sciences (HICSS 2023) ; Bui, T.X., Ed.; University of Hawaii, Mānoa: Honolulu, HI, USA, 2023; pp. 6300–6309. [ Google Scholar ]
  • Hart, C. Doing a Literature Review: Releasing the Social Science Research Imagination ; Sage: London, UK, 1998. [ Google Scholar ]
  • Kraus, S.; Breier, M.; Lim, W.M.; Dabić, M.; Kumar, S.; Kanbach, D.; Mukherjee, D.; Corvello, V.; Piñeiro-Chousa, J.; Liguori, E. Literature reviews as independent studies: Guidelines for academic practice. Rev. Manag. Sci. 2022 , 16 , 2577–2595. [ Google Scholar ]
  • Letts, L.; Wilkins, S.; Law, M.C.; Stewart, D.A.; Bosch, J.; Westmorland, M.G. Guidelines for Critical Review Form—Qualitative Studies (Version 2.0) ; McMaster University Occupational Therapy Evidence-Based Practice Research Group: Hamilton, ON, Canada, 2007; pp. 1–12. [ Google Scholar ]
  • Roscoe, J.T. Fundamental Research Statistics for the Behavioural Sciences , 2nd ed.; Holt, Rinehart & Winston: New York, NY, USA, 1975. [ Google Scholar ]
  • Chandarman, R.; Van Niekerk, B. Students’ cybersecurity awareness at a private tertiary educational institution. Afr. J. Inf. Commun. 2017 , 20 , 133–155. [ Google Scholar ]
  • Sarkar, S.; Vance, A.; Ramesh, B.; Demestihas, M.; Wu, D.T. The Influence of Professional Subculture on Information Security Policy Violations: A Field Study in a Healthcare Context. Inf. Syst. Res. 2020 , 31 , 1240–1259. [ Google Scholar ] [ CrossRef ]
  • Forthofer, R.N.; Lee, E.S.; Hernandez, M. Biostatistics: A Guide to Design, Analysis and Discovery ; Elsevier: Amsterdam, The Netherlands, 2006. [ Google Scholar ]
  • Salmerón, R.; García, C.; García, J. Overcoming the inconsistences of the variance inflation factor: A redefined VIF and a test to detect statistical troubling multicollinearity. arXiv 2020 , arXiv:2005.02245. [ Google Scholar ]
  • Sijtsma, K.; Emons, W. Nonparametric Statistical Methods. Int. Encycl. Educ. 2010 , 3 , 347–353. [ Google Scholar ]
  • Hoyle, R. Confirmatory Factor Analysis. In Handbook of Applied Multivariate Statistics and Mathematical Modeling ; Tinsley, H.E.A., Brown, S.D., Eds.; Academic Press: San Diego, CA, USA, 2000; pp. 465–497. [ Google Scholar ]
  • Suhr, D. Exploratory or confirmatory factor analysis? In The Reviewer’s Guide to Quantitative Methods in the Social Sciences ; Hancock, G.R., Mueller, R.O., Eds.; Routledge: London, UK, 2006; pp. 111–142. [ Google Scholar ]
  • Fornell, C.; Larcker, D.F. Evaluating structural equation models with unobservable variables and measurement error. J. Mark. Res. 1981 , 18 , 39–50. [ Google Scholar ] [ CrossRef ]
  • Hair, J.F.; Anderson, R.E.; Tatham, R.L.; Black, W.C. Multivariate Data Analysis , 5th ed.; Prentice Hall: Upper Saddle River, NJ, USA, 2003. [ Google Scholar ]
  • Field, A. Discovering Statistics Using SPSS ; Sage Publications: Thousand Oaks, CA, USA, 2005. [ Google Scholar ]
  • Kutner, M.H.; Nachtsheim, C.J.; Neter, J.; Li, W. Applied Linear Regression Models , 4th ed.; McGraw-Hill Irwin: Boston, MA, USA, 2004. [ Google Scholar ]
  • O’Brien, R.M. A caution regarding rules of thumb for variance inflation factors. Qual. Quant. 2007 , 41 , 673–690. [ Google Scholar ] [ CrossRef ]
  • Borenstein, M.; Hedges, L.V.; Higgins, J.P.; Rothstein, H.R. Introduction to Meta-Analysis ; John Wiley & Sons: Hoboken, NJ, USA, 2021. [ Google Scholar ] [ CrossRef ]
  • Cisco. The Top Cybersecurity Threats in 2022. Available online: https://umbrella.cisco.com/blog/top-cybersecurity-threats-2022 (accessed on 14 April 2022).
  • Chen, H.; Hai, Y.; Tu, L.; Fan, J. Not All Information Security-Related Stresses Are Equal: The Effects of Challenge and Hindrance Stresses on Employees’ Compliance with Information Security Policies. Behav. Inf. Technol. 2023 , 1–16. [ Google Scholar ] [ CrossRef ]
  • Ament, C.; Jaeger, L. Unconscious on their own ignorance: Overconfidence in information security. J. Inf. Sci. 2017 , 50 , 254–272. [ Google Scholar ]
  • Mady, A.; Gupta, S.; Warkentin, M. The effects of knowledge mechanisms on employees’ information security threat construal. Inf. Syst. J. 2023 , 33 , 790–841. [ Google Scholar ] [ CrossRef ]
  • Azizollah, A.; Abolghasem, F.; Amin, D.M. The relationship between organizational culture and organizational commitment in Zahedan University of Medical Sciences. Glob. J. Health Sci. 2016 , 8 , 195. [ Google Scholar ]
  • Kävrestad, J.; Nohlberg, M.; Furnell, S. A taxonomy of SETA methods and linkage to delivery preferences. ACM SIGMIS Database DATABASE Adv. Inf. Syst. 2023 , 54 , 107–133. [ Google Scholar ]
  • Hu, Q.; Dinev, T.; Hart, P.; Cooke, D. Managing employee compliance with information security policies: The critical role of top management and organizational culture. Decis. Sci. 2012 , 43 , 615–660. [ Google Scholar ]
  • Jaeger, L.; Ament, C.; Eckhardt, A. The closer you get the more aware you become–a case study about psychological distance to information security incidents. In Proceedings of the ICIS 2017: Transforming Society with Digital Innovation, Seoul, Republic of Korea, 10-13 December 2017; Association for Information Systems: Atlanta, GA, USA, 2018; pp. 1–18. [ Google Scholar ]
  • Kritzinger, E.; Da Veiga, A.; van Staden, W. Measuring organizational information security awareness in South Africa. Inf. Secur. J. A Glob. Perspect. 2023 , 32 , 120–133. [ Google Scholar ]
  • Kaiser, H.F. An index of factorial simplicity. Psychometrika 1974 , 39 , 31–36. [ Google Scholar ]
  • Fuller, C.M.; Simmering, M.J.; Atinc, G.; Atinc, Y.; Babin, B.J. Common methods variance detection in business research. J. Bus. Res. 2016 , 69 , 3192–3198. [ Google Scholar ]
  • NIST. Computer Security Resource Center. Available online: https://csrc.nist.gov/glossary/term/cybersecurity (accessed on 2 August 2024).
  • Björck, F.; Henkel, M.; Stirna, J.; Zdravkovic, J. Cyber resilience—Fundamentals for a definition. Adv. Intell. Syst. Comput. 2015 , 353 , 311–316. [ Google Scholar ] [ CrossRef ]
  • Von Solms, R.; Van Niekerk, J. From information security to cyber security. Comput. Secur. 2013 , 38 , 97–102. [ Google Scholar ]
  • Laudon, K.C.; Laudon, J.P. Management Information Systems , 12th ed.; Prentice-Hall: Upper Saddle River, NJ, USA, 2012; p. 44. [ Google Scholar ]

Click here to enlarge figure

ReferenceResearch ObjectiveSelf-Efficacy and/or AttitudeInformation Security Awareness
[ ]Examining the social contextual effects on ISP compliance. Utilizing safety climate literature.Self-efficacy positively affects compliant behavior.Not a research construct, but it is concluded that policy guidelines and awareness program lessons should be applied when employees carry out work.
[ ]Investigating rational factors that drive ISP compliance. Utilizing the theory of planned behavior.Self-efficacy and attitude positively affect intention to comply with ISP.Predecessor, positive effect on attitude and outcome beliefs.
[ ]Explaining compliance intention, utilizing social learning theory.Self-efficacy positively affects compliance intention.Mediating role and directly positively affects compliance intention.
[ ]Investigating the antecedents of privacy policy compliance, utilizing social learning theory.Self-efficacy positively affects behavioral intent.Not a research construct
[ ]Significance of self-learning and awareness on attitudes toward ISP compliance. Utilizing theory of planned behavior.Self-efficacy and attitude positively affect intention to comply.General ISA and technology awareness: predecessors. Positively affects attitude and self-efficacy.
[ ]Constructing a measurement tool for the prediction and explanation of ISP compliance. Based on the security acceptance model.Self-efficacy posited to affect perceived usefulness of protection and perceived ease of use (mediating) towards compliance intention.ISA distributed in awareness of information security, ISP, and SETA. Posited to influence mediating constructs.
[ ]Factors influencing internet information security practices. Social cognitive theory utilization.Self-efficacy explains a small amount in information security practices variance.Predecessor, higher ISA in users report higher means in safe internet practices.
[ ]Influence of subordinate guanxi and organizational commitment on information security behavior.Self-efficacy positively affects compliant behavior.Control variable on compliance behavior.
[ ]Investigating various factors influencing information security compliance behavior.Self-efficacy being one of the most significant factors on compliance behavior.Technology awareness: mediator. Positively influences compliant behavior.
[ ]Investigating how individual decision-making styles impact cybersecurity compliance behavior to enhance security measures.Self-efficacy positively affects compliant behavior.Security awareness has a direct positive effect on compliant behavior.
ConstructCodeItemsScaleReference
ISAISA1I understand the importance of information security. AAdapted from [ ]
ISA2I am aware of the negative consequences of a threat.
ISA3I am able to recognize a threat when I encounter one.
ISA4I know what measures I can take to avoid negative consequences.
ISA5I exhibit safe behavior during my daily routine.
ISA6I exhibit safe behavior when faced with a threat.
Negative Experience (NEG)NEG1Have you had any issues with malware at any point in the last two years? (e.g., viruses, spyware, ransomware)BAdapted from [ ]
NEG2Have you been phished at any point in the last two years (in every possible form)?
SETASETA1Security awareness activities increase my knowledge about information security.A[ ]
SETA2I understand the security awareness activities.
SETA3I try to apply the knowledge of security awareness activities.
InfoSec Goals (GOAL)GOAL1I want to contribute to information security. AAdapted from [ ]
GOAL2I would like to handle information securely for information security.
GOAL3The information security of the firm means a lot to me.
Complexity (COMP)COMP1I experience pressure in my work because I find security awareness topics complex.AAdapted from [ ]
COMP2I find it difficult to understand security awareness topics.
COMP3I know too little about information security to keep the firm safe.
SETA Design
(SETAD)
SETAD1Communication tools help me to handle information securely.ASurvey-specific
SETAD2Gamification helps me to handle information securely.
SETAD3Phishing simulations help me to handle information securely.
SETAD4The amount of information that has been offered helps me to handle information securely.
SETAD5The information that is offered is of good quality which helps me to deal with information in a secure way.
Items for demography (AGE) and data segmentation (IT/MAN)
AGEWhat is your age group?C
ITAre you IT staff?BSurvey specific
MANAre you management or non-management?
ConstructMeanStandard Deviation
SETA Program6.180.85
Security Complexity1.990.96
Negative Experience0.150.27
InfoSec Goals6.530.82
SETA Design5.461.14
Information Security Awareness6.350.64
Item MeanSD
SETA1Security awareness activities increase my knowledge about information security.5.811.362
SETA2I understand the security awareness activities.6.380.960
SETA3I try to apply the knowledge of security awareness activities.6.350.975
COMP1I experience pressure in my work because I find security awareness topics complex.2.121.411
COMP2I find it difficult to understand security awareness topics.1.851.148
COMP3I know too little about information security to keep the firm safe.2.011.231
NEG1Have you had any issues with malware at any point in the last two years? (e.g., viruses, spyware, ransomware)0.100.304
NEG2Have you been phished at any point in the last two years (in every possible form)?0.190.395
GOAL1I want to contribute to the information security. 6.650.816
GOAL2I would like to handle information securely for information security.6.660.775
GOAL3The information security of the firm means a lot to me. 6.281.082
SETAD1Communication tools help me to handle information securely.5.641.334
SETAD2Gamification helps me to handle information securely.4.561.891
SETAD3Phishing simulations help me to handle information securely.6.041.456
SETAD4The amount of information that has been offered helps me to handle information securely.5.501.346
SETAD5The information that is offered is of good quality, which helps me deal with information in a secure way.5.571.296
ISA1I understand the importance of information security. 6.830.599
ISA2I am aware of the negative consequences of a threat.6.740.710
ISA3I am able to recognize a threat when I encounter one.5.890.862
ISA4I know what measures I can take to avoid negative consequences. 6.080.865
ISA5I exhibit safe behavior during my daily routine.6.280.816
ISA6I exhibit safe behavior when faced with a threat.6.250.840
PropositionΒSEt-Valuep-ValueResult
NEG → ISA0.0580.1210.477 Not supported
SETA → ISA0.1360.0572.402*Supported
InfoSec Goals → ISA0.2220.0723.089**Supported
Complexity → ISA−0.2490.032−7.807***Supported
SETA Design → ISA−0.0380.026−1.431 Not supported
NEG → ISA0.057 0.119
SETA → ISA0.147 0.104
InfoSec Goals → ISA0.251 0.297
Complexity → ISA−0.252**−0.245**
SETA Design → ISA0.006 −0.097
NEG → ISA0.353 −0.40
SETA → ISA0.099 0.128
InfoSec Goals → ISA0.497 0.195
Complexity → ISA−0.203*−0.263**
SETA Design → ISA−0.47 −0.032
The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

Djotaroeno, M.; Beulen, E. Information Security Awareness in the Insurance Sector: Cognitive and Internal Factors and Combined Recommendations. Information 2024 , 15 , 505. https://doi.org/10.3390/info15080505

Djotaroeno M, Beulen E. Information Security Awareness in the Insurance Sector: Cognitive and Internal Factors and Combined Recommendations. Information . 2024; 15(8):505. https://doi.org/10.3390/info15080505

Djotaroeno, Morgan, and Erik Beulen. 2024. "Information Security Awareness in the Insurance Sector: Cognitive and Internal Factors and Combined Recommendations" Information 15, no. 8: 505. https://doi.org/10.3390/info15080505

Article Metrics

Article access statistics, further information, mdpi initiatives, follow mdpi.

MDPI

Subscribe to receive issue release notifications and newsletters from MDPI journals

  • Open access
  • Published: 20 August 2024

Level of patient contact and Impact of Event scores among Canadian healthcare providers during the COVID-19 pandemic

  • Iris Gutmanis 1   na1 ,
  • Ayodele Sanni 1   na1 ,
  • Allison McGeer 1 , 2 ,
  • Robert Maunder 1 , 2 ,
  • Nicole Robertson 1 ,
  • CCS Working Group &
  • Brenda L Coleman 1 , 2  

BMC Health Services Research volume  24 , Article number:  947 ( 2024 ) Cite this article

39 Accesses

Metrics details

Healthcare providers (HCP) continue to provide patient care during the COVID-19 pandemic despite the known risks for transmission. Studies conducted early in the pandemic showed that factors associated with higher levels of distress among HCP included being of younger age, female, in close contact with people with COVID-19, and lower levels of education. The goal of this study was to determine if level of patient contact was associated with concern for post-traumatic stress disorder (PTSD) as measured by the Impact of Event Scale-Revised (IES-R).

This cross-sectional study, embedded within a prospective cohort study, recruited HCP working in hospitals in four Canadian provinces from June 2020 to June 2023. Data were collected at enrolment and annually from baseline surveys with the IES-R scale completed at withdrawal/study completion. Modified Poisson regression was used to determine the association between level of patient contact and concern for PTSD (i.e., IES-R scores ≥24).

The adjusted rate ratio (RR) associated with concern for PTSD among HCP with physical contact/direct patient care was 1.19 (95% confidence interval (CI) 1.03, 1.38) times higher than for HCP with no direct contact. In fully adjusted linear regression models, physical care/contact was associated with higher avoidance and hyperarousal scores, but not intrusion scores.

Conclusions

Administrators and planners need to consider the impact of heightened and ongoing stress among HCP by providing early screening for adverse emotional outcomes and delivery of tailored preventive strategies to ensure immediate and long-term HCP health.

Peer Review reports

Transmission of the SARS-CoV-2 coronavirus has continued since the World Health Organization (WHO) declared coronavirus disease 2019 (COVID-19) a pandemic on March 11, 2020 [ 1 ]. Due to the significant physical health impacts of COVID-19, attempts were made to slow viral transmission including quarantine restrictions and preventive methods such as wearing masks, social distancing, closing venues, and vaccination. However, such mitigation strategies, added to the threats of the disease itself, can increase disruption and trauma-related stress [ 2 , 3 ].

Post-traumatic stress disorder (PTSD) is a common outcome after witnessing or experiencing a traumatic event [ 4 ]. In a 2002 Canadian study based on self-reported symptoms, Van Ameringen et al. found that prevalence of PTSD was 2.4% [ 5 ]. In a subsequent self-reported Canadian survey conducted between August and December 2021, the estimated prevalence of PTSD had increased to 5.4% [ 6 ]. Despite ongoing transmission, healthcare providers (HCP) need to provide optimal patient care. During the early pandemic period higher stress levels were reported by HCP secondary to increased workload, constantly changing work environments, provision of care to people with COVID-19, deaths caused by the disease, and fear of infecting themselves and their close contacts [ 7 , 8 ].

Several studies [ 9 , 10 , 11 , 12 , 13 , 14 , 15 ] have used the Impact of Event Scale-Revised (IES-R) [ 16 ] to assess concern for PTSD during the COVID-19 pandemic. Among HCP, younger age, female gender, personal exposure to COVID-19, and lower levels of education have been identified as factors associated with higher levels of concern for PTSD [ 11 , 14 , 17 ]. However, these studies were conducted over short periods and/or early in the pandemic when some transmission mitigation strategies, such as quarantine measures and vaccines, had either not been employed or were not yet available.

This study aims to investigate the level of concern for PTSD, as measured by the IES-R, among Canadian HCP in relation to their level of contact with patients, adjusted for potential confounders, between June 10, 2021 and December 1, 2023. Levels of avoidance, intrusion, and hyperarousal are also explored.

Study design

The COVID-19 Cohort Study was a 3.5 year prospective cohort study following HCP from acute care, rehabilitation, and complex care hospitals in the greater Toronto area (Sinai Health, Sunnybrook Health Sciences Centre, Oak Valley Health (Markham Stouffville Hospital), North York General, Michael Garron Hospital, Unity Health (St. Michael’s Hospital), William Osler Health System, and University Health Network), Hamilton (St. Joseph’s Healthcare Hamilton, Hamilton Health Sciences Centre), Ottawa (The Ottawa Hospital), Alberta (Calgary Health Zone, Grey Nuns Community Hospital, University of Alberta Hospital), Quebec (Centre hospitalier universitaire de Sherbrooke), and Halifax (IWK Health Centre, QE II) as well as private physician or midwifery practices in the Toronto area. Rolling enrollment, from June 2020 to June 2023, occurred following ethical approval at each site.

Consented participants completed annual baseline surveys and illness and vaccination surveys as needed. Participants completed the IES-R once within two weeks of study withdrawal or at study closure (December 1, 2023) (see Fig.  1 ).

figure 1

Study design and timeline

Participants

Consented HCP were eligible for these analyses if they completed ≥ 50% of their most recent baseline questionnaire; were 18 to 75 years old, inclusive; were employed full- or part-time (> 20 h per week) by a participating hospital; or were a physician, midwife, or nurse practitioner with hospital privileges and who cared for ill patients ≥ 8 h per week. Participants with incomplete IES-R data were excluded from analyses.

The Impact of Event Scale (IES) is a 15-item measure of the frequency with which respondents experience thoughts and behaviours associated with two definitional symptoms of PTSD: intrusion and avoidance [ 18 ]. The scale was revised (IES-R) with the addition of another set of items designed to identify the frequency of hyperarousal symptoms [ 16 ]. The IES-R asks participants to indicate, on a scale from 0 (not at all) to 4 (extremely), how distressing each of 22 listed difficulties have been for them during the previous seven days. To orient participants, the survey was introduced with “You have been working throughout the COVID-19 pandemic”. Overall IES-R scores are the sum of all 22 items (range 0 to 88) and were interpreted using criteria developed by Weiss and Marmar [ 16 ] (0–23: no concern for PTSD; ≥ 24: indicative of concern for PTSD). Subscale scores (avoidance, intrusion, hyperarousal) are the mean of the subscale item scores (range 0 to 4).

In the baseline survey, participants were asked to respond to three questions that asked them to indicate which of five levels of contact they had with inpatients, outpatients, and emergency department patients: 1) not applicable, no close contact with patients; 2) never or rarely in room or confined physical space with patients; 3) in room/confined space with patients, but not within 2 m of their face; 4) in room/confined space and within 2 m of their face, but no physical contact/care; 5) physical contact and/or care of patients. Two metres was selected as a key distance for this study as recommended by the Government of Canada to reduce transmission of COVID-19 [ 19 ]. The highest level of contact in any of the three settings was selected. The four levels of patient contact used in these analyses are: 1) no direct contact; 2) never/rarely in patient rooms; 3) in patient rooms but no contact, and 4) physical care/contact.

Baseline surveys collected demographic and work-related information including age; gender; self-reported health; medications for anxiety, depression, or insomnia; occupation; and current work unit (high-risk: emergency department, adult intensive care unit, or adult inpatient medical unit vs low-risk: all others). COVID-19 vaccine receipt was obtained from the most recent vaccination questionnaire. The study did not use information from the illness/testing surveys.

A mitigation strategy measure that ranked the intensity of non-pharmacological mitigation strategies associated with three sectors (work, education, and other locations) on a four-point scale (0: no restrictions to 3: most stringent restrictions) was included as a study covariate [ 20 ]. The mutually exclusive categories developed by Akanteva et al. are specific to each sector (e.g., category 3: work: all non-essential workplaces closed or operating remotely, only essential services or businesses remain open; education: all schools closed for in-person instruction; other locations: stringent gathering restriction, border closures between provinces for non-essential travel, closure of all indoor activities, and closure of most outdoor activities) [ 20 ]. Periods when restrictions summed to  ≥7  were identified as periods of high mitigation. Periods were determined using Ontario data. While other provinces imposed different restrictions at different times, Ontario was selected as the referent as most study sites were within this province.

Data analysis

Chi-squared or Fisher’s exact tests were used to compare categorical variables while t-tests or median tests were used to compared continuous variables, as appropriate. Modified Poisson regression was used to quantify the relationships between study variables and dichotomized IES-R scores [ 21 ]. All models were adjusted by age and gender. Other study covariates that were not associated with the outcome were sequentially eliminated as per Vittinghoff et al. [ 22 ]. Variance estimates were adjusted in multivariable models for clustering within province. The final model was assessed for goodness-of-fit and multi-collinearity. Linear regression, adjusted for clustering within provinces, was used to assess the association between subscale scores and variables found to be significant predictors of the dichotomized IES-R score.

Participant characteristics

Of the 2648 HCP who participated in the parent study, 1498 (56.6%) submitted an IES-R between June 10, 2021 and December 1, 2023. Those who submitted an IES-R were significantly older, and less likely to be a nurse, work on a high-risk unit, or to have been working for less than five years compared with the full cohort (see Table  1 ).

Almost one third of participants who completed the IES-R were nurses, nurse practitioners, or midwives, 773 (51.6%) provided physical care to patients, and 875 (58.4%) worked in the province of Ontario. The majority of participants were female (1309 or 87.3%) and had a mean age of 42.4 (95% confidence interval (CI) 41.9, 43.0) years. As gender was considered an important study covariate, those who selected “other” were dropped from analyses due to the small sample size.

The top three individual IES-R items most frequently assigned a score of 4, indicating that participants were extremely affected, were trouble staying asleep ( n  = 48/1498 or 3.2%), trouble falling asleep ( n  = 42), and trying not to think about it ( n  = 39). Meanwhile, few ( n  = 6) indicated they were extremely affected by reminders causing physical reactions, such as sweating, trouble breathing, nausea, or a pounding heart.

As shown in Table  2 , median IES-R scores, mean subscale scores, and the percent of respondents with an IES-R score indicative of concern for PTSD were similar in 2021 and 2022 but decreased significantly in 2023 ( p  < 0.001).

Patient contact and concern for PTSD

As seen in Table  3 , the unadjusted rate ratio (RR) associated with concern for PTSD among HCP with physical contact/care was 1.24 (95% CI 1.05 1.47) times higher than for HCP with no direct contact. When confounding variables were added, the adjusted RR associated with physical contact/care decreased by less than 5% to 1.19 (95% CI 1.03, 1.38).

Subscale scores

As shown in Table  2 , the mean subscale scores were 0.87, 0.87, and 0.67 for avoidance, intrusion, and hyperarousal, respectively. As expected, given that subscale items are summed to create the overall IES-R score, the correlation between the IES-R score and each subscale was 0.92 for both avoidance and hyperarousal and 0.96 for intrusion, with no differences in correlations by year of survey completion. There was also high correlation between the subscale scores at 0.88 for intrusion:hyperarousal, 0.79 for intrusion:avoidance, and 0.74 for hyperarousal:avoidance.

In fully adjusted linear regression models, physical care/contact was associated with increased avoidance and hyperarousal scores, but not intrusion scores. Being in the same room as a patient was also associated with higher avoidance scores.

Provision of physical care during the COVID-19 pandemic was associated with increased concern for PTSD among Canadian HCP. Between June 10, 2021 and December 1, 2023, in adjusted regression models, HCP providing physical care to patients had IES-R scores that were higher than for those with no direct patient contact. Patient contact was also associated with increased avoidance and hyperarousal scores but not with not with intrusion scores.

The association between level of patient contact and emotional distress has been found in previous studies. During the 2003 severe acute respiratory syndrome (SARS) outbreak in Toronto, nurses who had longer contact with patients with SARS had higher distress scores [ 24 ]. Similar findings were reported very early in the COVID-19 pandemic (February 2020) in China where working in a frontline position (i.e., directly engaged in clinical activities with patients with elevated temperatures or confirmed to have COVID-19) was associated with significantly higher median IES-R scores (22.5) than those who were not (17.0) [ 13 ].

In this study, in 2023, 22.5% of HCP had scores indicative of concern for PTSD. This rate is significantly lower than the 47.8% with scores of concern in 2021 but is, itself, substantially lower than estimates from other studies conducted with HCP that also used the IES-R with a cut-off score of ≥ 24. In a Canadian study, 74% of critical care nurses had scores of concern [ 25 ] while in Italy, 65% of physicians and 71% of nurses had scores of concern [ 26 ]. However, the estimate from this study is in line with an earlier 2020 Ontario study that also used the IES-R with a cut-off score ≥ 24 that found 50% of HCP had scores suggestive of concern for PTSD [ 27 ].

Fattori et al. [ 28 ] reported that Italian HCP mean IES-R scores decreased from 22 in 2020/2021 to 13 in 2021/2022. Although the scores are similar to the current study, the decrease in scores occurred about a year earlier in the Italian study. In contrast, Th’ng and colleagues reported substantially lower percentages of emergency department HCP who had scores of concern than in our study, at 13.6–16.2% for 2020 through 2022 in their longitudinal single-centre study in Singapore, with no significant change over time [ 29 ].

Studies indicate that HCP have dealt with COVID-19 associated stress in many ways. One in four Canadian HCP reported drinking more in 2021 than before the COVID-19 pandemic [ 30 ] and Canadian adults who screened positive for PTSD were 3.5 times more likely than those with a negative screen to report increased cannabis use since the beginning of the pandemic [ 31 ]. Conversely, 70% of HCP indicated that they are exercising to improve or maintain their health during the pandemic [ 30 ]. Carmassi et al. reported that HCP with IES-R scores of ≥ 24 had significantly higher Work and Social Adjustment Scale [ 32 ] scores than HCP with lower scores [ 33 ], indicating interference in working, recreational, and social activities, household chores, and family relationships. A rapid review of successful strategies to reduce HCP stress indicated that actions need to be taken at the organizational level [ 34 ]. These authors suggest that communication needs to be timely and accurate, and that HCP safety and well-being needs to be kept in the forefront. Healthcare leaders should tailor stress reduction strategies to their population and prioritize HCP who are providing direct patient care.

As with all studies, this study has limitations. Non-random sampling methods were used to generate both the study and the sub-study populations; study participants were self-selected, and some did not complete the IES-R. Biases stemming from differential patterns of study enrollment or attrition could have led to under- or over-estimates of the relationship between level of patient contact and symptoms associated with concern for PTSD. It is unknown if we over- or under-sampled HCP with PTSD symptoms (% of participants with symptoms indicative of concern for PTSD; current study 2021: 47.8%; 2020 Honarmand et al. [ 27 ]: 50%; 2021 Crowe et al. [ 25 ]: 74%; 2021 Gorini et al.: 65% (physicians) [ 26 ]). In addition, the overall variance explained by all regression models was low which is likely due to unmeasured known (e.g., pre-existing mental illness [ 35 ], fear of COVID-19 [ 36 ], personality [ 37 ]), and unknown covariates/confounders/mediators. As well, all results are self-reported and may suffer from social desirability bias. Although we have no data from before (nor early) in the pandemic, one strength of the study is its longitudinal nature, with data from 2021 through 2023. Another strength is that participants were from four provinces across Canada, increasing generalizability.

HCP who provided direct patient care were significantly more likely to have IES-R scores indicative of concern for PTSD than those reporting no direct patient contact. Healthcare system administrators and planners must consider the high prevalence of concern for PTSD among HCP who worked during the COVID-19 pandemic when reflecting on current human health resources. Early screening for adverse emotional outcomes during stressful times followed by the delivery of timely, tailored preventive strategies is vital for both immediate and long-term HCP health.

Availability of data and materials

Study data cannot be shared openly. The datasets generated and/or analyzed during the current study are not publicly available due to information that could compromise the privacy of research participants. Data are available from the corresponding author on reasonable request.

Abbreviations

Post-traumatic stress disorder

  • Healthcare provider

Impact of Events Scale

Impact of Events Scale-Revised

Severe acute respiratory syndrome

WHO Director-General's opening remarks at the media briefing on COVID-19 - 11 March 2020 [press release]. 2020. Accessed 06 May 2024.

Welfare-Wilson A, Adley L, Bell Z, Luby R. COVID-19 and how the wearing of face coverings can affect those with an experience of trauma. J Psychiatr Ment Health Nurs. 2021;28(5):777–82.

Article   PubMed   PubMed Central   Google Scholar  

Bodner E, Bergman YS, Ben-David B, Palgi Y. Vaccination anxiety when vaccinations are available: the role of existential concerns. Stress Health. 2022;38(1):111–8.

Article   PubMed   Google Scholar  

Bryant RA. Post-traumatic stress disorder: a state-of-the-art review of evidence and challenges. World Psychiatry. 2019;18(3):259–69.

Van Ameringen M, Mancini C, Patterson B, Boyle MH. Post-Traumatic Stress Disorder in Canada. CNS Neurosci Ther. 2008;14(3):171–81.

Government of Canada. Posttraumatic stress disorder among adults in Canada. Government of Canada; 2024. Available from: https://health-infobase.canada.ca/ptsd-survey/ . Accessed 23 Jul 2024.

Ornell F, Halpern SC, Kessler FHP, Narvaez JCM. The impact of the COVID-19 pandemic on the mental health of healthcare professionals. Cad Saude Publica. 2020;36(4):e00063520.

Penninx BWJH, Benros ME, Klein RS, Vinkers CH. How COVID-19 shaped mental health: from infection to pandemic effects. Nat Med. 2022;28(10):2027–37.

Article   CAS   PubMed   PubMed Central   Google Scholar  

Cai Z, Cui Q, Liu Z, Li J, Gong X, Liu J, et al. Nurses endured high risks of psychological problems under the epidemic of COVID-19 in a longitudinal study in Wuhan China. J Psychiatr Res. 2020;131:132–7.

Crowe S, Howard AF, Vanderspank-Wright B, Gillis P, McLeod F, Penner C, et al. The effect of COVID-19 pandemic on the mental health of Canadian critical care nurses providing patient care during the early phase pandemic: a mixed method study. Intensive Crit Care Nurs. 2021;63:102999.

Davico C, Ghiggia A, Marcotulli D, Ricci F, Amianto F, Vitiello B. Psychological impact of the COVID-19 pandemic on adults and their children in Italy. Front Psychiatry. 2021;12:572997.

Kang L, Ma S, Chen M, Yang J, Wang Y, Li R, et al. Impact on mental health and perceptions of psychological care among medical and nursing staff in Wuhan during the 2019 novel coronavirus disease outbreak: a cross-sectional study. Brain Behav Immun. 2020;87:11–7.

Lai J, Ma S, Wang Y, Cai Z, Hu J, Wei N, et al. Factors associated with mental health outcomes among health care workers exposed to Coronavirus Disease 2019. JAMA Netw Open. 2020;3(3):e203976.

Magalhaes E, Stoner A, Palmer J, Schranze R, Grandy S, Amin S, et al. An assessment of mental health outcomes during the COVID-19 pandemic. Community Ment Health J. 2021;57(7):1267–77.

Marcomini I, Agus C, Milani L, Sfogliarini R, Bona A, Castagna M. COVID-19 and post-traumatic stress disorder among nurses: a descriptive cross-sectional study in a COVID hospital. Med Lav. 2021;112(3):241–9.

PubMed   PubMed Central   Google Scholar  

Weiss D, Marmar C. The Impact of Events Scale-Revised. In: Wilson J, Keane T, editors. Assessing psychological trauma and PTSD. New York, New York: Guiliford Press; 1996. p. 399–411.

Google Scholar  

Hong X, Cao J, Wei J, Duan Y, Zhao X, Jiang J, et al. Stress and psychological impact of the COVID-19 outbreak on the healthcare staff at the fever clinic of a tertiary general hospital in Beijing: a cross-sectional study. BJPsych Open. 2021;7(3):e76.

Horowitz M, Wilner N, Alvarez W. Impact of Events Scale: a measure of subjective stress. Psychosom Med. 1979;41(3):209–18.

Article   CAS   PubMed   Google Scholar  

Government of Canada. Summary of evidence supporting COVID-19 public health measures. Government of Canada; 2023. [updated 27 Jan 2023]. Available from: https://www.canada.ca/en/public-health/services/diseases/2019-novel-coronavirus-infection/guidance-documents/summary-evidence-supporting-covid-19-public-health-measures.html . Accessed 23 Jul 2023.

Akanteva A, Dick DW, Amiraslani S, Heffernan JM. Canadian Covid-19 pandemic public health mitigation measures at the province level. Sci Data. 2023;10(1):882-.

Zou G. A modified Poisson regression approach to prospective studies with binary data. Am J Epidemiol. 2004;159(7):702–6.

Vittinghoff E, Glidden DV, Shiboski SC, McCulloch CE. Regression methods in biostatistics: linear, logistic, survival, and repeated measures models. 1st ed. New York, NY: Springer; 2007.

Government of Canada. FAQ: COVID-19 vaccine. 2022. [updated 09 Dec 2022]. Available from: https://www.canada.ca/en/department-national-defence/campaigns/covid-19/resuming-work/frequently-asked-questions/vaccines-immunization.html . Accessed 08 Aug 2024.

Maunder R. The experience of the 2003 SARS outbreak as a traumatic stress among frontline healthcare workers in Toronto: lessons learned. Philos Trans R Soc Lond B Biol Sci. 2004;359(1447):1117–25.

Crowe S, Fuchsia Howard A, Vanderspank B. The mental health impact of the COVID-19 pandemic on Canadian critical care nurses. Intensive Crit Care Nurs. 2022;71:103241-.

Gorini A, Giuliani M, Fiabane E, Bonomi A, Gabanelli P, Pierobon A, et al. Prevalence of psychopathological symptoms and their determinants in four healthcare workers’ categories during the second year of COVID-19 pandemic. Int J Environ Res Public Health. 2022;19(20):13712.

Honarmand K, Yarnell CJ, Young-Ritchie C, Maunder R, Priestap F, Abdalla M, et al. Personal, professional, and psychological impact of the COVID-19 pandemic on hospital workers: a cross-sectional survey. PLoS One. 2022;17(2):e0263438.

Fattori A, Comotti A, Mazzaracca S, Consonni D, Bordini L, Colombo E, et al. Long-term trajectory and risk factors of healthcare workers’ mental health during COVID-19 pandemic: a 24 month longitudinal cohort study. Int J Environ Res Public Health. 2023;20(5):4586.

Th’ng F, Rao KA, Ge L, Neo HN, Molina JAD, Lim WY, et al. Longitudinal study comparing mental health outcomes in frontline emergency department healthcare workers through the different waves of the COVID-19 pandemic. Int J Environ Res Public Health. 2022;19(24):16878.

Statistics Canada. Health care workers’ stress, alcohol consumption and positive health behaviours during the COVID-19 pandemic. 2024. [updated 15 Apr 2024]. Available from: https://www150.statcan.gc.ca/n1/pub/11-627-m/11-627-m2024017-eng.htm . Accessed 24 Apr 2024.

Government of Canada. Cycle 2: Symptoms of posttraumatic stress disorder (PTSD) during the COVID-19 pandemic. Government of Canada; 2022. [updated 19 Oct 2022]. Available from: https://www.canada.ca/en/public-health/services/publications/diseases-conditions/cycle-2-symptoms-posttraumatic-stress-disorder-covid-19-pandemic.html . Accessed 07 May 2024.

Mundt JC, Marks IM, Shear MK, Greist JH. The Work and Social Adjustment Scale: a simple measure of impairment in functioning. Br J Psychiatry. 2002;180:461–4.

Carmassi C, Pedrinelli V, Dell’Oste V, Bertelloni CA, Grossi C, Gesi C, et al. PTSD and depression in healthcare workers in the Italian epicenter of the COVID-19 outbreak. Clin Pract Epidemiol Ment Health. 2021;17(1):242–52.

Callus E, Bassola B, Fiolo V, Bertoldo EG, Pagliuca S, Lusignani M. Stress reduction techniques for health care providers dealing with severe Coronavirus infections (SARS, MERS, and COVID-19): a rapid review. Front Psychol. 2020;11:589698-.

Qi G, Yuan P, Qi M, Hu X, Shi S, Shi X. Influencing factors of high PTSD among medical staff during COVID-19: evidences from both meta-analysis and subgroup analysis. Saf Health Work. 2022;13(3):269–78.

Lee S, Kim HR, Kim B. The impact of fear of COVID-19 on the impact of event and indirect trauma. Arch Psychiatr Nurs. 2022;41:306–11.

Plomecka M, Gobbi S, Neckels R, Radzinski P, Skorko B, Lazzeri S, et al. Factors associated with psychological disturbances during the COVID-19 pandemic: multicountry online study. JMIR Ment Health. 2021;8(8):e28736-e.

Article   Google Scholar  

Download references

Acknowledgements

The investigators thank their staff, who worked tirelessly throughout the studies and the participants, who gave freely of their time throughout this stressful pandemic.

CCS Working Group

Curtis Cooper, University of Ottawa, 75 Laurier Ave E, Ottawa, ON Canada K1N 6N5.

Kevin Katz, North York General Hospital, 4001 Leslie St, Toronto, ON Canada M2K 1E1

Mark Loeb, Hamilton Health Sciences Centre, 237 Barton St East, Hamilton, ON Canada L8L 2X2

Shelly McNeil, Dalhousie University, 5820 University Ave, Halifax, NS Canada B3H 2Y9

Matthew Muller, Unity Health Toronto, 30 Bond Street, Toronto, ON Canada M5B 1W8

Jeff Powis, Michael Garron Hospital, 825 Coxwell Avenue Toronto, ON Canada M4C 3E7

Robyn Harrison, Division of Infectious Diseases, University of Alberta, 8440 112 St, Edmonton, AB Canada T5J 3E4

Joanne Langley, Canadian Center for Vaccinology, 5850 University Ave, Halifax NS Canada B3K 6R8

Samira Mubareka, Sunnybrook Health Sciences Centre, 2075 Bayview Ave, Toronto, ON Canada M4N 3M5

Jeya Nadarajah, Oak Valley Health, 381 Church St, Markham, ON Canada L3P 13P

Louis Valiquette, hospitalier universitaire de Sherbrooke, 2500 Bd de l’université, Sherbrooke, QC Canada J1K 2R1

Marek Smieja, St. Joseph’s Healthcare, 50 Charlton Ave East, Hamilton, ON Canada L8N 4A6

This work was funded by the Canadian Institutes of Health Research [173212 & 181116]; Physician Services Incorporated Foundation [6014200738]; and the Weston Family Foundation [no number]. Funders had no role in the collection, analysis, or interpretation of the data, writing of the manuscript, nor the decision to submit it for publication.

Author information

Iris Gutmanis and Ayodele Sanni contributed equally to this work as co-first authors.

Authors and Affiliations

Sinai Health System, 600 University Ave, Toronto, ON, M5G 1X5, Canada

Iris Gutmanis, Ayodele Sanni, Allison McGeer, Robert Maunder, Nicole Robertson & Brenda L Coleman

University of Toronto, 27 King’s College Circle, Toronto, ON, M5S 1A1, Canada

Allison McGeer, Robert Maunder & Brenda L Coleman

You can also search for this author in PubMed   Google Scholar

  • Curtis Cooper
  • , Kevin Katz
  • , Mark Loeb
  • , Shelly McNeil
  • , Matthew Muller
  • , Jeff Powis
  • , Robyn Harrison
  • , Joanne Langley
  • , Samira Mubareka
  • , Jeya Nadarajah
  • , Louis Valiquette
  •  & Marek Smieja

Contributions

The authors confirm contribution to the paper as follows: conceptualization: BLC, RM, AMdata curation: BLC, IG, NRformal analysis: BLC, NRfunding acquisition: BLC, AM, CCS Working Groupmethods: BLCproject administration: BLCresources: BLC, AM supervision: BLCvalidation: BLC, ASoriginal draft: AS, IGreview & editing: BLC, IG, AS, RM, AM, NRApproval of submitted version: IG, BLC, AS, NR, RM, AM, CCS Working GroupAgree to be personally accountable for own contributions and to ensure that questions related to the accuracy or integrity of any part of the work are appropriately investigated, resolved, and the resolution documented in the literature: IG, BLC, AS, NR, RM, AM, CCS Working Group

Corresponding author

Correspondence to Brenda L Coleman .

Ethics declarations

Ethics approval and consent to participate.

The study was conducted according to the guidelines of the Declaration of Helsinki, and approved by the Research Ethics Boards of Sinai Health System (20–0080-E, 2020–04-17), Sunnybrook Health Sciences Centre (1644, 2020–04-13), Michael Garron Hospital (807–2004-Inf-055, 2020–04-29), North York General Hospital (20–0017, 2020–05-06), University Health Network (20–5368, 2020–05-21), Unity Health Toronto (20–109, 2020–06-01), Oak Valley Health (121–2010, 2020–11-04), William Osler Health System (2020–12-18), Hamilton Health Sciences Centre (12809, 2020–12-31), St. Joseph’s Healthcare Hamilton (13044, 2020–12-31), University of Alberta (Pro00106776, 2021–01-13), Nova Scotia Health (1026317, 2021–02-02), The Ottawa Hospital (20210024-01H, 2021–02-05), and Centre hospitalier universitaire de Sherbrooke (MP-31–2021-4104, 2021–06-09).

Informed consent was obtained from all participants involved in the study.

Consent for publication

Not applicable.

Competing interests

The authors declare no competing interests.

Additional information

Publisher’ note.

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Supplementary Information

Supplementary material 1, rights and permissions.

Open Access This article is licensed under a Creative Commons Attribution 4.0 International License, which permits use, sharing, adaptation, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons licence, and indicate if changes were made. The images or other third party material in this article are included in the article's Creative Commons licence, unless indicated otherwise in a credit line to the material. If material is not included in the article's Creative Commons licence and your intended use is not permitted by statutory regulation or exceeds the permitted use, you will need to obtain permission directly from the copyright holder. To view a copy of this licence, visit http://creativecommons.org/licenses/by/4.0/ . The Creative Commons Public Domain Dedication waiver ( http://creativecommons.org/publicdomain/zero/1.0/ ) applies to the data made available in this article, unless otherwise stated in a credit line to the data.

Reprints and permissions

About this article

Cite this article.

Gutmanis, I., Sanni, A., McGeer, A. et al. Level of patient contact and Impact of Event scores among Canadian healthcare providers during the COVID-19 pandemic. BMC Health Serv Res 24 , 947 (2024). https://doi.org/10.1186/s12913-024-11426-w

Download citation

Received : 30 May 2024

Accepted : 12 August 2024

Published : 20 August 2024

DOI : https://doi.org/10.1186/s12913-024-11426-w

Share this article

Anyone you share the following link with will be able to read this content:

Sorry, a shareable link is not currently available for this article.

Provided by the Springer Nature SharedIt content-sharing initiative

  • Post-traumatic stress

BMC Health Services Research

ISSN: 1472-6963

a research firm conducted a survey to determine

  • Subscribe Now

The Fight To Redefine the 2024 Race for President

AW

A new Cook Political Report Swing State Project Survey conducted by BSG and GS Strategy Group shows Vice President Kamala Harris leading or tied with former President Donald Trump in all but one of the seven battleground states. Overall, she holds a narrow lead of 48% to 47% in those states in the head-to-head.

Harris has closed the gap with Trump since the last Swing State Project survey in May, when Trump led President Joe Biden by three points overall, and was ahead or tied in every one of the seven swing states.

The one state where Trump still holds a slim lead is Nevada, though Harris has narrowed Trump’s margin by six points since May.

View full size

Harris’ success in closing the gap is driven by her consolidation of the Democratic base, and increased support among independent voters.

In May, in the five-way horserace including third party candidates, just 82% of the voters who supported Biden in 2020 were committed to voting for him this fall. Harris is getting 91% of those voters. Among independent voters, Harris

Subscribe now to continue reading,

More from the cook political report.

Trump Harris Main page

Relaunched: CPR Harris vs. Trump 2024 National Polling Average

Cook Politcal Logo

Mary Peltola’s Strong Primary Showing Puts Her in Solid Position for Fall Campaign

Erin image

CPR Harris vs. Trump 2024 National Polling Average: Crosstabs

Trump

The Secret to Harris’ Recipe: Narrowing Trump’s Lead with Low-Engagement Voters

dw

Florida House Primary Preview: Scandal-Ridden Gaetz Faces Primary Challenge

a research firm conducted a survey to determine

Amy Walter: An Election That’s Become a Referendum on Trump

Subscribe today.

Our subscribers have first access to individual race pages for each House, Senate and Governors race, which will include race ratings (each race is rated on a seven-point scale) and a narrative analysis pertaining to that race. 

a research firm conducted a survey to determine

Snapsolve any problem by taking a picture. Try it in the Numerade app?

The creator economy could approach half-a-trillion dollars by 2027

a research firm conducted a survey to determine

The so-called “creator economy” has mushroomed and is expected to grow even more in the coming years, according to Goldman Sachs Research. 

Individual people with their own brands and online audiences have emerged as one of the biggest developments of the digital age. The ecosystem is expanding for a number of reasons, including the increase in digital media consumption and the advent of technology that has lowered barriers to content creation, Eric Sheridan, senior equity research analyst covering the U.S. Internet sector, writes in the team’s report. New platforms such as TikTok have emerged, while legacy platforms like Facebook and YouTube have also introduced new formats for sharing short-form video, live streaming channels and other forms of user-generated content.

As the ecosystem grows, the total addressable market of the creator economy could roughly double in size over the next five years to $480 billion by 2027 from $250 billion today, Sheridan writes. That growth is roughly in line with the team’s estimates for growth in global digital advertising spend over that period. The analysts expect spending on influencer marketing and platform payouts fueled by the monetization of short-form video platforms via advertising to be the primary growth drivers of the creator economy.

Goldman Sachs Research expects the 50 million global creators to grow at a 10-20% compound annual growth rate during the next five years. Creators earn income primarily through direct branding deals to pitch products as an influencer; via a share of advertising revenues with the host platform; and through subscriptions, donations and other forms of direct payment from followers. Brand deals are the main source of revenue at about 70%, according to survey data.

Only about 4% of global creators are deemed professionals, meaning they pull in more than $100,000 a year. Goldman Sachs Research expects their share of the creator universe to stay steady even as the overall ecosystem expands.

Which companies will benefit the most from the ongoing growth of the creator economy? The platforms that are best positioned to attract both influential creators and a larger share of the total spending are those that will offer multiple forms of monetization, according to Goldman Sachs Research. But the analysts also cite six key enablers for creating a “flywheel effect” in which small gains build on each other over time and create further growth momentum:

1. Scale:  a large, global user base with diversified interests   

2. Capital:  access to large pools of capital to fund monetization, either through a diversified revenue base and/or as part of a larger parent company

3. Strong AI-powered recommendation engines:  for surfacing relevant content and matching creators with interested users

4. Effective monetization tools:  a variety of product offerings/payout structures for creators to diversify their income streams

5. Robust data and analytics:  for providing transparency on engagement, retention, conversion and other metrics

6. E-commerce options:  the ability to shop is integrated into the core user experience

At least at this point, the report points to the large incumbent platforms as being in the driver’s seat. Goldman Sachs Research sees more creators moving to these platforms as competition heats up for their content and audiences, particularly as macroeconomic uncertainty impacts brand spending and as rising interest rates pressure funding for emerging platforms. “As a result, we expect some element of a ‘flight to quality’ whereby creators will prioritize platforms with stability, scale and monetization potential,” Sheridan writes.

This article is being provided for educational purposes only. The information contained in this article does not constitute a recommendation from any Goldman Sachs entity to the recipient, and Goldman Sachs is not providing any financial, economic, legal, investment, accounting, or tax advice through this article or to its recipient. Neither Goldman Sachs nor any of its affiliates makes any representation or warranty, express or implied, as to the accuracy or completeness of the statements or any information contained in this article and any liability therefore (including in respect of direct, indirect, or consequential loss or damage) is expressly disclaimed.

Our weekly newsletter with insights and intelligence from across the firm

By submitting this information, you agree to receive marketing emails from Goldman Sachs and accept our  privacy policy . You can opt-out at any time.

COMMENTS

  1. Stats ch 8, final Flashcards

    Suppose a research firm conducted a survey to determine the mean amount steady smokers spend on cigarettes during a week. A sample of 100 steady smokers revealed that the sample mean is $20 and the sample standard deviation is $5. What is the probability that a sample of 100 steady smokers spend between $19 and $21?

  2. SOLUTION: A research firm conducted a survey to determine the mean

    Question 1153359: A research firm conducted a survey to determine the mean amount Americans spend on coffee during a week. They found the distribution of weekly spending followed the normal distribution with a population standard deviation of $5. A sample of 49 Americans revealed that Xbar=$20. What is the point estimate of the population mean?

  3. CH8 T Flashcards

    43. Suppose a research firm conducted a survey to determine the average amount of money steady smokers spend on cigarettes during a week. A sample of 100 steady smokers revealed that the sample mean is $20 and the sample standard deviation is $5. What is the probability that a sample of 100 steady smokers spend between $19 and $21?

  4. Chapter 8 Flashcards

    Suppose a research firm conducted a survey to determine the mean amount steady smokers spend on cigarettes during a week. A sample of 100 steady smokers revealed that the sample mean is $20. The population standard deviation is $5. What is the probability that a sample of 100 steady smokers spend between $19 and $21?

  5. Solved Suppose a research firm conducted a survey to

    Our expert help has broken down your problem into an easy-to-learn solution you can count on. Question: Suppose a research firm conducted a survey to determine the mean amount steady smokers spend on cigarettes during a week. A sample of 100 steady smokers revealed that the sample mean is $20. The population standard deviation is $7.

  6. Solved 8. A research firm conducted a survey to determine

    Economics questions and answers. 8. A research firm conducted a survey to determine the mean amount steady workers spend on cigarettes during the week. They found the distribution of amounts spent per week followed the normal distribution with a population standard deviation σ of $5. A sample of 49 smokers revealed that the sample mean (XBAR)=$20.

  7. Solved 5. A research firm conducted a survey to determine

    See Answer. Question: 5. A research firm conducted a survey to determine the mean amount steady smokers spend on cigarettes during a week. They found the distribution of amounts spent per week followed the normal distribution with a standard deviation of $5. A sample of 49 steady smokers revealed that .

  8. A research firm conducted a survey to determine the mean ...

    A research firm conducted a survey to determine the mean amount steady smokers spend on cigarettes during a week. They found the distribution of amounts spent per week followed the normal distribution with a standard deviation of $\$ 5 .$ A sample of 49 steady smokers revealed that $\bar{x}=\$ 20 .$ a.

  9. A research firm conducted a survey of 49 randomly selected ...

    What is the point estimate of the population mean? Explain what it indicates. b. Using the 95% level of confidence, determine the confidence interval for mu . Explain what it indicates. A research firm conducted a survey of 49 randomly selected Americans to determine the mean amount spent on coffee during a week. The sample mean was 20 per week.

  10. A research firm conducted a survey to determine the mean ...

    A research firm conducted a survey to determine the mean amount steady smokers spend on cigarettes during a week. A sample of 49 steady smokers revealed that X̅=$ 20 and s=$ 5 a. What is the point estimate of the population mean? Explain what it indicates. b. Using the 95 percent level of confidence, determine the confidence interval for μ .

  11. Solution: A research firm conducted a survey to determine the mean

    Question: A research firm conducted a survey to determine the mean amount steady smokers spend on cigarettes during a week.A sample of 49 steady smokers revealed that \(\bar{X}\) = $20 and s = $5.. a. What is the point estimate of the population mean? Explain what it indicates.

  12. PDF Discussion 3

    4. Suppose a research firm conducted a survey to determine the average amount of money steady smokers spend on cigarettes during a week. A sample of 100 steady smokers revealed that the sample mean is $20 and the sample standard deviation is $5. What is the probability that a sample of 100 steady smokers spend between $19 and $21? A) 0.4772

  13. Solved A research firm conducted a survey to determine the

    A research firm conducted a survey to determine the mean amount Americans spend on coffee during a week. They found the distribution of weekly spending followed the normal distribution with a population standard deviation of $5. A sample of 64 Americans revealed that X¯¯¯=$20X¯=$20 .

  14. Chapter 9, Estimation and Confidence Intervals Video ...

    A research firm conducted a survey of 49 randomly selected Americans to determine the mean amount spent on coffee during a week. The sample mean was 20 per week. ... A large on-demand video streaming company is designing a large-scale survey to determine the mean amount of time corporate executives watch on-demand television. A small pilot ...

  15. Survey Research

    Survey research means collecting information about a group of people by asking them questions and analyzing the results. To conduct an effective survey, follow these six steps: Determine who will participate in the survey. Decide the type of survey (mail, online, or in-person) Design the survey questions and layout.

  16. Stats ch 8 Flashcards

    Suppose a research firm conducted a survey to determine the mean amount steady smokers spend on cigarettes during a week. A sample of 100 steady smokers revealed that the sample mean is $20 and the sample standard deviation is $5. What is the probability that a sample of 100 steady smokers spend between $19 and $21?

  17. Information

    This research is an empirical study. The main research methodology is quantitative—cross-sectional survey research (N = 156) at one of the largest Dutch insurance firms. The pilot survey, shared with a diverse group of employees, resulted in an improved survey, especially in terms of brevity and accessibility, with a reduced number of questions.

  18. Solved 1. A research firm conducted a survey to determine

    Statistics and Probability questions and answers. 1. A research firm conducted a survey to determine the mean amount Americans spend on coffee during a week. They found the distribution of weekly spending followed a normal distribution with a population standard deviation () of $5. A sample of 49 Americans revealed that x = $20.

  19. Level of patient contact and Impact of Event scores among Canadian

    Background Healthcare providers (HCP) continue to provide patient care during the COVID-19 pandemic despite the known risks for transmission. Studies conducted early in the pandemic showed that factors associated with higher levels of distress among HCP included being of younger age, female, in close contact with people with COVID-19, and lower levels of education. The goal of this study was ...

  20. A research firm conducted survey to determine the mean ...

    VIDEO ANSWER: For this question, there's given a normal distribution, and there are some given information here. The population standard deviation, so this is the population standard deviation, which is denoted by sigma. That was given as 5. And the

  21. A research firm conducted a survey to determine the mean amo

    Economics. Question. A research firm conducted a survey to determine the mean amount steady smokers spend on cigarettes during a week. They found the distribution of amounts spent per week followed the normal distribution with a population standard deviation of $5. A sample of 49 steady smokers revealed that X̅ =$20.

  22. The Fight To Redefine the 2024 Race for President

    A new Cook Political Report Swing State Project Survey conducted by BSG and GS Strategy Group shows Vice President Kamala Harris leading or tied with former President Donald Trump in all but one of the seven battleground states. Overall, she holds a narrow lead of 48% to 47% in those states in the head-to-head.

  23. SOLVED: Suppose a research firm conducted a survey to determine the

    Suppose a research firm conducted a survey to determine the mean amount steady smokers spend on cigarettes during a week: A sample of 100 steady smokers revealed that the sample mean is $20. The population standard deviation is $5. What is the probability that a sample of 100 steady smokers spend between $19 and $21? Multiple Choice 0.4772 0. ...

  24. The creator economy could approach half-a-trillion dollars by 2027

    Brand deals are the main source of revenue at about 70%, according to survey data. Only about 4% of global creators are deemed professionals, meaning they pull in more than $100,000 a year. Goldman Sachs Research expects their share of the creator universe to stay steady even as the overall ecosystem expands.

  25. Solved Suppose a research firm conducted a survey to

    Step 1. Suppose a research firm conducted a survey to determine the average amount of money steady smokers spend on cigarettes during a week. The population mean is $20 and population standard deviation is $5 A sample of 100 steady smokers was recently surveyed. What is the probability that a sample of 100 steady smokers spend between $19 and ...