Evaluating the impact of government Cyber Security initiatives in the UK
- URL: http://arxiv.org/abs/2303.13943v1
- Date: Fri, 24 Mar 2023 12:02:36 GMT
- Title: Evaluating the impact of government Cyber Security initiatives in the UK
- Authors: Adejoke T. Odebade, Elhadj Benkhelifa
- Abstract summary: The study evaluates sixteen of the UK government's cyber security initiatives.
It discovers four notable reasons why these initiatives are failing.
The recommendation is to promote these initiatives both nationally and at community levels.
- Score: 0.0
- License: http://creativecommons.org/licenses/by-nc-sa/4.0/
- Abstract: Cyber security initiatives provide immense opportunities for governments to
educate, train, create awareness, and promote cyber hygiene among businesses
and the general public. Creating and promoting these initiatives are necessary
steps governments take to ensure the cyber health of a nation. To ensure users
are safe and confident, especially online, the UK government has created
initiatives designed to meet the needs of various users such as small charity
guide for charity organisations, small business guide for small businesses, get
safe online for the general public, and cyber essentials for organisations,
among many others. However, ensuring that these initiatives deliver on their
objectives can be daunting, especially when reaching out to the whole
population. It is, therefore, vital for the government to intensify practical
ways of reaching out to users to make sure that they are aware of their
obligation to cyber security. This study evaluates sixteen of the UK
government's cyber security initiatives and discovers four notable reasons why
these initiatives are failing. These reasons are insufficient awareness and
training, non-evaluation of initiatives to measure impact, insufficient
behavioural change, and limited coverage to reach intended targets. The
recommendation based on these findings is to promote these initiatives both
nationally and at community levels.
Related papers
- Artificial Intelligence in Government: Why People Feel They Lose Control [44.99833362998488]
The use of Artificial Intelligence in public administration is expanding rapidly.<n>While AI promises greater efficiency and responsiveness, its integration into government functions raises concerns about fairness, transparency, and accountability.<n>This article applies principal-agent theory to AI adoption as a special case of delegation.
arXiv Detail & Related papers (2025-05-02T07:46:41Z) - A comprehensive survey of cybercrimes in India over the last decade [0.0]
Digital transformation has spurred the rise of cybercrime, criminal activities perpetrated through networks or computer systems.<n>Cybercrimes range from financial fraud and phishing scams to identity theft and online harassment.<n>In recent years, India has experienced a significant surge in cybercrime incidents.
arXiv Detail & Related papers (2025-04-21T04:42:46Z) - AI threats to national security can be countered through an incident regime [55.2480439325792]
We propose a legally mandated post-deployment AI incident regime that aims to counter potential national security threats from AI systems.
Our proposed AI incident regime is split into three phases. The first phase revolves around a novel operationalization of what counts as an 'AI incident'
The second and third phases spell out that AI providers should notify a government agency about incidents, and that the government agency should be involved in amending AI providers' security and safety procedures.
arXiv Detail & Related papers (2025-03-25T17:51:50Z) - Countering Autonomous Cyber Threats [40.00865970939829]
Foundation Models present dual-use concerns broadly and within the cyber domain specifically.
Recent research has shown the potential for these advanced models to inform or independently execute offensive cyberspace operations.
This work evaluates several state-of-the-art FMs on their ability to compromise machines in an isolated network and investigates defensive mechanisms to defeat such AI-powered attacks.
arXiv Detail & Related papers (2024-10-23T22:46:44Z) - AI Delegates with a Dual Focus: Ensuring Privacy and Strategic Self-Disclosure [40.47039082007319]
Large language model (LLM)-based AI delegates are increasingly utilized to act on behalf of users.<n>We propose a novel AI delegate system that enables privacy-conscious self-disclosure.<n>Our user study demonstrates that the proposed AI delegate strategically protects privacy, pioneering its use in diverse and dynamic social interactions.
arXiv Detail & Related papers (2024-09-26T08:45:15Z) - Navigating the road to automotive cybersecurity compliance [39.79758414095764]
The automotive industry is compelled to adopt robust cybersecurity measures to safeguard both vehicles and data against potential threats.
The future of automotive cybersecurity lies in the continuous development of advanced protective measures and collaborative efforts among all stakeholders.
arXiv Detail & Related papers (2024-06-29T16:07:48Z) - "What Keeps People Secure is That They Met The Security Team": Deconstructing Drivers And Goals of Organizational Security Awareness [4.711430413139394]
Security awareness campaigns in organizations now collectively cost billions of dollars annually.
Despite this, the basis of what security awareness managers do and what decides this are unclear.
We identify that success in awareness management is fragile while having the potential to improve.
arXiv Detail & Related papers (2024-04-29T02:10:35Z) - A Safe Harbor for AI Evaluation and Red Teaming [124.89885800509505]
Some researchers fear that conducting such research or releasing their findings will result in account suspensions or legal reprisal.
We propose that major AI developers commit to providing a legal and technical safe harbor.
We believe these commitments are a necessary step towards more inclusive and unimpeded community efforts to tackle the risks of generative AI.
arXiv Detail & Related papers (2024-03-07T20:55:08Z) - Municipal cyber risk modeling using cryptographic computing to inform cyber policymaking [0.5872014229110214]
Using data from 83 municipalities, we build data-driven cyber risk models and cyber security benchmarks for municipalities.
We produce benchmarks of the security posture in a sector, the frequency of cyber incidents, forecasted annual losses for organizations based on their defensive posture.
These newly derived risk measures highlight the need for continuous measured improvement of cybersecurity readiness.
arXiv Detail & Related papers (2024-02-01T20:45:20Z) - Security and Privacy Considerations for Machine Learning Models Deployed
in the Government and Public Sector (white paper) [1.438446731705183]
We describe how the inevitable interactions between a user of unknown trustworthiness and the machine learning models, deployed in governments and public sectors, can jeopardize the system.
We propose recommendations and guidelines that can enhance the security and privacy of the provided services.
arXiv Detail & Related papers (2020-10-12T16:05:29Z) - Persuasion Meets AI: Ethical Considerations for the Design of Social
Engineering Countermeasures [0.0]
Privacy in Social Network Sites (SNSs) like Facebook or Instagram is closely related to people's self-disclosure decisions.
Online privacy decisions are often based on spurious risk judgements that make people liable to reveal sensitive data to untrusted recipients.
This paper elaborates on the ethical challenges that nudging mechanisms can introduce to the development of AI-based countermeasures.
arXiv Detail & Related papers (2020-09-27T14:24:29Z) - COVI White Paper [67.04578448931741]
Contact tracing is an essential tool to change the course of the Covid-19 pandemic.
We present an overview of the rationale, design, ethical considerations and privacy strategy of COVI,' a Covid-19 public peer-to-peer contact tracing and risk awareness mobile application developed in Canada.
arXiv Detail & Related papers (2020-05-18T07:40:49Z) - A Deep Q-learning/genetic Algorithms Based Novel Methodology For
Optimizing Covid-19 Pandemic Government Actions [63.669642197519934]
We use the SEIR epidemiological model to represent the evolution of the virus COVID-19 over time in the population.
The sequences of actions (confinement, self-isolation, two-meter distance or not taking restrictions) are evaluated according to a reward system.
We prove that our methodology is a valid tool to discover actions governments can take to reduce the negative effects of a pandemic in both senses.
arXiv Detail & Related papers (2020-05-15T17:17:45Z) - SARS-CoV-2, a Threat to Privacy? [0.46180371154032884]
The global SARS-CoV-2 pandemic is currently putting a massive strain on the world's critical infrastructures.
We are discussing and evaluating the steps corporations and governments are taking to condemn the virus by applying established privacy research.
arXiv Detail & Related papers (2020-04-21T21:12:44Z) - Digital Ariadne: Citizen Empowerment for Epidemic Control [55.41644538483948]
The COVID-19 crisis represents the most dangerous threat to public health since the H1N1 pandemic of 1918.
Technology-assisted location and contact tracing, if broadly adopted, may help limit the spread of infectious diseases.
We present a tool, called 'diAry' or 'digital Ariadne', based on voluntary location and Bluetooth tracking on personal devices.
arXiv Detail & Related papers (2020-04-16T15:53:42Z) - Quantifying the Vulnerabilities of the Online Public Square to Adversarial Manipulation Tactics [43.98568073610101]
We use a social media model to quantify the impacts of several adversarial manipulation tactics on the quality of content.
We find that the presence of influential accounts, a hallmark of social media, exacerbates the vulnerabilities of online communities to manipulation.
These insights suggest countermeasures that platforms could employ to increase the resilience of social media users to manipulation.
arXiv Detail & Related papers (2019-07-13T21:12:08Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.