Cyber Security Behaviour In Organisations
- URL: http://arxiv.org/abs/2004.11768v1
- Date: Fri, 24 Apr 2020 14:17:46 GMT
- Title: Cyber Security Behaviour In Organisations
- Authors: Amy Ertan, Georgia Crossland, Claude Heath, David Denny, Rikke Jensen
- Abstract summary: This review explores the academic and policy literature in the context of everyday cyber security in organisations.
It identifies four behavioural sets that influences how people practice cyber security.
These are compliance with security policy, intergroup coordination and communication, phishing/email behaviour, and password behaviour.
- Score: 0.0
- License: http://arxiv.org/licenses/nonexclusive-distrib/1.0/
- Abstract: This review explores the academic and policy literature in the context of
everyday cyber security in organisations. In so doing, it identifies four
behavioural sets that influences how people practice cyber security. These are
compliance with security policy, intergroup coordination and communication,
phishing/email behaviour, and password behaviour. However, it is important to
note that these are not exhaustive and they do not exist in isolation. In
addition, the review explores the notion of security culture as an overarching
theme that overlaps and frames the four behavioural sets. The aim of this
review is therefore to provide a summary of the existing literature in the area
of everyday cyber security within the social sciences, with a particular focus
on organisational contexts. In doing so, it develops a series of suggestions
for future research directions based on existing gaps in the literature. The
review also includes a theoretical lens that will aid the understanding of
existing studies and wider literatures. Where possible, the review makes
recommendations for organisations in relation to everyday cyber security.
Related papers
- Exploring the Cybersecurity-Resilience Gap: An Analysis of Student Attitudes and Behaviors in Higher Education [0.0]
This study addresses the gap using the Theory of Behavior as a theoretical framework.
A modified Human Aspects of Information Security Questionnaire was employed to gather 266 valid responses from undergraduate and postgraduate students.
Key dimensions of cybersecurity awareness and behavior, including password management, email usage, social media practices, and mobile device security, were assessed.
arXiv Detail & Related papers (2024-11-05T16:09:37Z) - Linkage on Security, Privacy and Fairness in Federated Learning: New Balances and New Perspectives [48.48294460952039]
This survey offers comprehensive descriptions of the privacy, security, and fairness issues in federated learning.
We contend that there exists a trade-off between privacy and fairness and between security and sharing.
arXiv Detail & Related papers (2024-06-16T10:31:45Z) - The current state of security -- Insights from the German software industry [0.0]
This paper outlines the main ideas of secure software development that have been discussed in the literature.
A dataset on implementation in practice is gathered through a qualitative interview research involving 20 companies.
arXiv Detail & Related papers (2024-02-13T13:05:10Z) - Service Level Agreements and Security SLA: A Comprehensive Survey [51.000851088730684]
This survey paper identifies state of the art covering concepts, approaches, and open problems of SLA management.
It contributes by carrying out a comprehensive review and covering the gap between the analyses proposed in existing surveys and the most recent literature on this topic.
It proposes a novel classification criterium to organize the analysis based on SLA life cycle phases.
arXiv Detail & Related papers (2024-01-31T12:33:41Z) - Towards a Contemporary Definition of Cybersecurity [0.0]
The article seeks to offer a comprehensive definition of the term "cybersecurity" to accentuate its multidisciplinary perspectives.
The report will offer a unified framework for examining activities that constitute the concept resulting in a new definition.
arXiv Detail & Related papers (2023-02-05T01:25:50Z) - Physical Adversarial Attack meets Computer Vision: A Decade Survey [57.46379460600939]
This paper presents a comprehensive overview of physical adversarial attacks.
We take the first step to systematically evaluate the performance of physical adversarial attacks.
Our proposed evaluation metric, hiPAA, comprises six perspectives.
arXiv Detail & Related papers (2022-09-30T01:59:53Z) - Multidimensional Cybersecurity Framework for Strategic Foresight [0.0]
The rise in National cybersecurity laws and regulations is a good indicator of its perceived importance to nations.
The conceptual cybersecurity framework comprises six domains such as Physical, Cultural, Economic, Social, Political and Cyber.
The guiding principles underpinning the framework are outlined, followed by in-depth reflection on the Business, Operational, Technological and Human (BOTH) factors.
arXiv Detail & Related papers (2022-02-05T12:30:31Z) - Developing a cyber security culture: Current practices and future needs [2.7719338074999538]
We identify and analyse 58 research articles from the last 10 years (2010-2020)
Top management support, policy and procedures, and awareness are critical in engendering cyber security culture.
Questionnaires and surveys are the most used tool to measure cyber security culture.
For practitioners, this article highlights factors and models essential to the creation and management of a robust security culture.
arXiv Detail & Related papers (2021-06-28T13:31:33Z) - Improving Cyberbully Detection with User Interaction [34.956581421295]
We propose a principled graph-based approach for modeling the temporal dynamics and topic coherence throughout user interactions.
We empirically evaluate the effectiveness of our approach with the tasks of session-level bullying detection and comment-level case study.
arXiv Detail & Related papers (2020-11-01T08:47:33Z) - Dos and Don'ts of Machine Learning in Computer Security [74.1816306998445]
Despite great potential, machine learning in security is prone to subtle pitfalls that undermine its performance.
We identify common pitfalls in the design, implementation, and evaluation of learning-based security systems.
We propose actionable recommendations to support researchers in avoiding or mitigating the pitfalls where possible.
arXiv Detail & Related papers (2020-10-19T13:09:31Z) - Adversarial Machine Learning Attacks and Defense Methods in the Cyber
Security Domain [58.30296637276011]
This paper summarizes the latest research on adversarial attacks against security solutions based on machine learning techniques.
It is the first to discuss the unique challenges of implementing end-to-end adversarial attacks in the cyber security domain.
arXiv Detail & Related papers (2020-07-05T18:22:40Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.