Cyber Security Behaviour In Organisations
- URL: http://arxiv.org/abs/2004.11768v1
- Date: Fri, 24 Apr 2020 14:17:46 GMT
- Title: Cyber Security Behaviour In Organisations
- Authors: Amy Ertan, Georgia Crossland, Claude Heath, David Denny, Rikke Jensen
- Abstract summary: This review explores the academic and policy literature in the context of everyday cyber security in organisations.
It identifies four behavioural sets that influences how people practice cyber security.
These are compliance with security policy, intergroup coordination and communication, phishing/email behaviour, and password behaviour.
- Score: 0.0
- License: http://arxiv.org/licenses/nonexclusive-distrib/1.0/
- Abstract: This review explores the academic and policy literature in the context of
everyday cyber security in organisations. In so doing, it identifies four
behavioural sets that influences how people practice cyber security. These are
compliance with security policy, intergroup coordination and communication,
phishing/email behaviour, and password behaviour. However, it is important to
note that these are not exhaustive and they do not exist in isolation. In
addition, the review explores the notion of security culture as an overarching
theme that overlaps and frames the four behavioural sets. The aim of this
review is therefore to provide a summary of the existing literature in the area
of everyday cyber security within the social sciences, with a particular focus
on organisational contexts. In doing so, it develops a series of suggestions
for future research directions based on existing gaps in the literature. The
review also includes a theoretical lens that will aid the understanding of
existing studies and wider literatures. Where possible, the review makes
recommendations for organisations in relation to everyday cyber security.
Related papers
- Linkage on Security, Privacy and Fairness in Federated Learning: New Balances and New Perspectives [48.48294460952039]
This survey offers comprehensive descriptions of the privacy, security, and fairness issues in federated learning.
We contend that there exists a trade-off between privacy and fairness and between security and sharing.
arXiv Detail & Related papers (2024-06-16T10:31:45Z) - The current state of security -- Insights from the German software industry [0.0]
This paper outlines the main ideas of secure software development that have been discussed in the literature.
A dataset on implementation in practice is gathered through a qualitative interview research involving 20 companies.
arXiv Detail & Related papers (2024-02-13T13:05:10Z) - Service Level Agreements and Security SLA: A Comprehensive Survey [51.000851088730684]
This survey paper identifies state of the art covering concepts, approaches, and open problems of SLA management.
It contributes by carrying out a comprehensive review and covering the gap between the analyses proposed in existing surveys and the most recent literature on this topic.
It proposes a novel classification criterium to organize the analysis based on SLA life cycle phases.
arXiv Detail & Related papers (2024-01-31T12:33:41Z) - SemProtector: A Unified Framework for Semantic Protection in Deep Learning-based Semantic Communication Systems [51.97204522852634]
We present a unified framework that aims to secure an online semantic communications system with three semantic protection modules.
Specifically, these protection modules are able to encrypt semantics to be transmitted by an encryption method, mitigate privacy risks from wireless channels by a perturbation mechanism, and calibrate distorted semantics at the destination.
Our framework enables an existing online SC system to dynamically assemble the above three pluggable modules to meet customized semantic protection requirements.
arXiv Detail & Related papers (2023-09-04T06:34:43Z) - Towards a Contemporary Definition of Cybersecurity [0.0]
The article seeks to offer a comprehensive definition of the term "cybersecurity" to accentuate its multidisciplinary perspectives.
The report will offer a unified framework for examining activities that constitute the concept resulting in a new definition.
arXiv Detail & Related papers (2023-02-05T01:25:50Z) - Physical Adversarial Attack meets Computer Vision: A Decade Survey [57.46379460600939]
This paper presents a comprehensive overview of physical adversarial attacks.
We take the first step to systematically evaluate the performance of physical adversarial attacks.
Our proposed evaluation metric, hiPAA, comprises six perspectives.
arXiv Detail & Related papers (2022-09-30T01:59:53Z) - 'Cyber security is a dark art': The CISO as soothsayer [12.246860992135783]
Commercial organisations continue to face a growing and evolving threat of data breaches and system compromises.
Many organisations employ a Chief Information Security Officer (CISO) to lead such a function.
We conducted in-depth, semi-structured interviews with 15 CISOs and six senior organisational leaders.
arXiv Detail & Related papers (2022-02-25T15:21:29Z) - Multidimensional Cybersecurity Framework for Strategic Foresight [0.0]
The rise in National cybersecurity laws and regulations is a good indicator of its perceived importance to nations.
The conceptual cybersecurity framework comprises six domains such as Physical, Cultural, Economic, Social, Political and Cyber.
The guiding principles underpinning the framework are outlined, followed by in-depth reflection on the Business, Operational, Technological and Human (BOTH) factors.
arXiv Detail & Related papers (2022-02-05T12:30:31Z) - Developing a cyber security culture: Current practices and future needs [2.7719338074999538]
We identify and analyse 58 research articles from the last 10 years (2010-2020)
Top management support, policy and procedures, and awareness are critical in engendering cyber security culture.
Questionnaires and surveys are the most used tool to measure cyber security culture.
For practitioners, this article highlights factors and models essential to the creation and management of a robust security culture.
arXiv Detail & Related papers (2021-06-28T13:31:33Z) - Dos and Don'ts of Machine Learning in Computer Security [74.1816306998445]
Despite great potential, machine learning in security is prone to subtle pitfalls that undermine its performance.
We identify common pitfalls in the design, implementation, and evaluation of learning-based security systems.
We propose actionable recommendations to support researchers in avoiding or mitigating the pitfalls where possible.
arXiv Detail & Related papers (2020-10-19T13:09:31Z) - Adversarial Machine Learning Attacks and Defense Methods in the Cyber
Security Domain [58.30296637276011]
This paper summarizes the latest research on adversarial attacks against security solutions based on machine learning techniques.
It is the first to discuss the unique challenges of implementing end-to-end adversarial attacks in the cyber security domain.
arXiv Detail & Related papers (2020-07-05T18:22:40Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.