MedISA Logo

MedISA

Medical Centre Employee Centered Information Security Awareness

eHAIS-Q


Extended Human Aspects of Information Security Questionnaire (eHAIS-Q, based on Parsons et al., 2017)

Basis The extended questionnaire is based on the HAIS-Q, developed by Parsons et al. (2017). The original questionnaire measures behaviour, knowledge and attitudes related to information security across seven focus areas.

Source of the original:

Titel: The Human Aspects of Information Security Questionnaire (HAIS-Q): Two further validation studies
Autoren: Parsons, K., Calic, D., Pattinson, M., Butavicius, M., McCormac, A., & Zwaans, T.
DOI: 10.1016/j.cose.2017.01.004
Jahr: 2017

Note on adaptation Two items from the focus area "Mobile Devices" were slightly modified to reflect the current state of technology. In addition, two new focus areas were added: Preventive Security Orientation and Responsible Information Sharing. The extended HAIS-Q is available in both German and English.

Year 2025

Language of items German and English

Number of items 81

Reliability (McDonald's ω) Knowledge = 0.95, Attitude = 0.96, Behaviour = 0.94

Validity Factorial, convergent and discriminant validity demonstrated for the English version

Measurement invariance Scalar measurement invariance demonstrated for German and English

Sample for psychometric testing 1,182 individuals from access panels (DACH n = 601; UK n = 581)

Knowledge
Instructions
The following statements are about your knowledge of how you should behave to comply with the information security guidelines at work.
Response Specifications
"Strongly agree" means that the statement fully complies with the information security guidelines. "Strongly disagree" means that the statement does not comply with the information security guidelines at all. You can use the options in between to grade your answers. (5-Point-Likert Scale)
Focus AreaSubcategoriesStatements
Password ManagementUsing the same passwordIt´s acceptable to use my social media password on my work accounts.
Sharing passwordsI am allowed to share my work password with my colleagues.
Using a strong passwordA mixture of letters, numbers and symbols is necessary for short work passwords.
Email useClicking on links in emails from known sendersI am allowed to click on any links in emails from people I know.
Clicking on links in emails from unknown sendersI am not permitted to click on a link in an email from an unknown sender.
Opening attachments in emails from unknown sendersI am allowed to open email attachments from unknown senders.
Internet useDownloading filesI am allowed to download any files onto my work computer if they help me to do my job.
Accessing dubious websitesWhile I am at work, I shouldn´t access certain websites.
Entering information onlineI am allowed to enter any information on any website if it helps me do my job.
Social media useSM privacy settingsI must periodically review the privacy setting on my social media accounts.
Considering consequencesI can´t be fired for something I post on social media.
Posting about workI can post what I want about work on social media.
Mobile devicesPhysically securing mobile devicesWhen working in a public place, I have to keep portable devices such as laptop or tablet with me at all times.
Sending sensitive information via Wi-FiI am allowed to send sensitive work files via a public Wi-Fi network.
Shoulder surfingWhen working on a sensitive document, I must ensure that strangers can´t see the screen of my laptop or tablet.
Information handlingDisposing of sensitive print-outsSensitive print-outs can be disposed of in the same way as non-sensitive ones.
Inserting removable mediaIf I find a USB stick in a public place, I shouldn´t plug it into my work computer.
Leaving sensitive materialI am allowed to leave print-outs containing sensitive information on my desk when I step away from it.
Incident reportingReporting suspicious behaviourIf I see someone acting suspiciously in my workplace, I should report it.
Ignoring poor security behaviour behaviour by colleaguesI must not ignore poor security behavior by my colleagues.
Reporting all incidentsIt´s optional to report security incidents.
Preventive security orientationEducation & sensitivityStaff must partake in training and educational courses on information security on a regular basis.
Policy knowledgeStaff must regularly keep themselves up to date on the organisation´s information security regulations and policies.
Technical security measuresI am required to help ensuring that work equipment regularly undergoes security updates.
Responsible information sharingAuthorized information sharingI may only discuss confidential information with others if permission has been granted.
Conversation confidentialityWhen discussing confidential information, it is necessary to ensure that unauthorised persons cannot overhear.
Accountability in case of misconductThe accidental disclosure of sensitive information to unauthorised persons must be reported.
Attitude
Instructions
The following statements are about your attitude towards the information security guidelines at work. Now please tell us what you think about these guidelines.
Response Specifications
"Strongly agree" means that the statement completely aligns with your attitude. "Strongly disagree" means that the statement has nothing at all to do with your attitude. You can use the options in between to grade your responses. (5-Point-Likert Scale)
Focus AreaSubcategoriesStatements
Password ManagementUsing the same passwordIt´s safe to use the same password for social media and work accounts.
Sharing passwordsIt´s a bad idea to share my work passwords, even if a colleague asks for it.
Using a strong passwordIt´s safe to have a short work password with just letters.
Email useClicking on links in emails from known sendersIt´s always safe to click on links in emails from people I know.
Clicking on links in emails from unknown sendersNothing bad can happen if I click on a link in an email from an unknown sender.
Opening attachments in emails from unknown sendersIt´s risky to open an email attachment from an unknown sender.
Internet useDownloading filesI can be risky to download files on my work computer.
Accessing dubious websitesJust because I can access a website at work, doesn´t mean that it´s safe.
Entering information onlineIf it helps me to do my job, it doesn´t matter what information I put on a website.
Social media useSM privacy settingsIt´s a good idea to regularly review my social media privacy settings.
Considering consequencesIt doesn´t matter if I post things on social media that I wouldn´t normally say in public.
Posting about workIt´s risky to post certain information about my work on social media.
Mobile devicesPhysically securing mobile devicesWhen working in a public place, it´s safe to leave portable devices such as laptop or tablet unattended for a minute.
Sending sensitive information via Wi-FiIt´s risky to send sensitive work files using a public Wi-Fi network.
Shoulder surfingIt´s risky to access sensitive work files on portable devices such as laptop or tablet if strangers can see my screen.
Information handlingDisposing of sensitive print-outsDisposing of sensitive print-outs by putting them in the rubbish bin is safe.
Inserting removable mediaIf I find a USB stick in a public place, nothing bad can happen if I plug it into my work computer.
Leaving sensitive materialIt´s risky to leave print-outs that contain sensitive information on my desk unattended.
Incident reportingReporting suspicious behaviourIf I ignore someone acting suspiciously in my workplace, nothing bad can happen.
Ignoring poor security behaviour behaviour by colleaguesNothing bad can happen if I ignore poor security behavior by a colleague.
Reporting all incidentsIt´s risky to ignore security incidents, even if I think they´re not significant.
Preventive security orientationEducation & sensitivityIt is useful for staff to take part in training and educational courses on information security on a regular basis.
Policy knowledgeIt is appropriate to keep myself up to date with the organisation’s regulations and guidelines on information security on a regular basis.
Technical security measuresIt is important for work equipment to undergo security updates on a regular basis.
Responsible information sharingAuthorized information sharingIt is important not to discuss confidential information with unauthorised persons.
Conversation confidentialityIt is risky to discuss confidential information if unauthorised persons are able to overhear.
Accountability in case of misconductIt is important to report when sensitive information is accidentally disclosed to unauthorised persons.
Behavior
Instructions
The following statements are about your behavior regarding information security at work. Now please tell us how you act at work.
Response Specifications
"Strongly agree" means that the statement completely aligns with your behavior. "Strongly disagree" means that the statement has nothing at all to do with your behavior. You can use the options in between to grade your responses. (5-Point-Likert Scale)
Focus AreaSubcategoriesStatements
Password ManagementUsing the same passwordI use a different password for my social media and work accounts.
Sharing passwordsI share my work passwords with my colleagues.
Using a strong passwordI use a combination of letters, numbers and symbols in my short work password.
Email useClicking on links in emails from known sendersI don´t always click in links in emails just because they come from someone I know.
Clicking on links in emails from unknown sendersIf an email from an unknown sender looks interesting, I click on a link within it.
Opening attachments in emails from unknown sendersI don´t open email attachments if the sender is unknown to me.
Internet useDownloading filesI download any files onto my work computer that will help me get the job done.
Accessing dubious websitesWhen accessing the Internet at work, I visit any website that I want to.
Entering information onlineI assess the safety of websites before entering information.
Social media useSM privacy settingsI don´t regularly review my social media privacy settings.
Considering consequencesI don´t post anything on social media before considering any negative consequences.
Posting about workI post whatever I want about my work on social media.
Mobile devicesPhysically securing mobile devicesWhen working in a public place, I leave portable devices such as laptop or tablet unattended.
Sending sensitive information via Wi-FiI send sensitive work files using a public Wi-Fi network.
Shoulder surfingI check that strangers can´t see the screen of my portable device, such as laptop or tablet, if I´m working on a sensitive document.
Information handlingDisposing of sensitive print-outsWhen sensitive print-outs need to be disposed of, I ensure that they are shredded or destroyed.
Inserting removable mediaI wouldn´t plug a USB stick found in a public place into my work computer.
Leaving sensitive materialI leave print-outs that contain sensitive information on my desk when I´m not there.
Incident reportingReporting suspicious behaviourIf I saw someone acting suspiciously in my workplace, I would do something about it.
Ignoring poor security behaviour behaviour by colleaguesIf I notice my colleague ignoring security rules, I wouldn´t take any action.
Reporting all incidentsIf I notice a security incident, I would report it.
Preventive security orientationEducation & sensitivityI regularly attend courses or training on information security.
Policy knowledgeI regularly keep myself informed about the regulations and guidelines on information security within my organisation.
Technical security measuresI make sure that available security updates are installed on my work equipment.
Responsible information sharingAuthorized information sharingI sometimes discuss confidential information with others without permission.
Conversation confidentialityI sometimes discuss confidential information even though others may be listening.
Accountability in case of misconductI will report if I accidentally disclose sensitive information to an unauthorised person.