1 / 2

Individual Behavior Towards Cyber Security - Phdassistance

At present, the need for cyber security is essential as todayu2019s culture has evolved into a true cyber society, with people relying on information and communication technology in their daily lives. [1]. In todayu2019s fast-paced society, mobile technologies in the information era have the capability and advanced features of computers and communication. Technology has become central and commonplace in everyoneu2019s lives without their knowledge, and users are vulnerable to cyber-attacks. <br><br>Learn More:https://bit.ly/3sN6x4g

phd
Download Presentation

Individual Behavior Towards Cyber Security - Phdassistance

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Individual Behaviour Towards Cyber Security Dr. Nancy Agnes, Head, Technical Operations Phdassistance, info@phdassistance.co Keyword Phdassistance, Cyber Security Is Essential, Information Technology Industry, Literatures On Information Security, Technical Technologies Help, Cyber Security Help, PhD Thesis Help, computer science Help, machine learning (ML) I. INTRODUCTION At present, the need of cyber security is essential as today's culture has evolved into a true cyber society, with people relying on information and communication technology in their daily lives. [1]. In today's fast-paced society, mobile technologies in the information era have the capability and advanced features of computers and communication. Technology has become central and commonplace in everyone’s lives without their knowledge, and users are vulnerable to cyber-attacks. Since the massive progress and growth of the information technology industry has increased the technical needs in organisations and among their people, information security is seen as a concern in organisations and industries. However, the reason for handling information security has proven to be a key concern for many organizations as issues related to security are prevalent due to easy access of information [2]. When information securing technologies have struggled to secure organisations from cyber-attacks, the human factor of information security has been demonstrated in particular and its impact in cyber security is a existing concern as indicated [3] and also human behaviour is presented as a risk factor [4]. II. SURVEY ON CYBERSECURITY Although there are extensive literatures on information security, most of the security researches have focused on the technical aspects of information management systems, neglecting the human behaviour factor. The human element is also under constant attack, despite the accelerated growth and deployment of new technical technologies to address the increasing challenge to information security. Copyright © 2021 PhdAssistance. All rights reserved 1

  2. As a result, in order to create a comprehensive and statistical model that can determine cyber security risks, human behaviour factors must be highlighted in order to perceive the effect of customer, sponsor, and perpetrator activities on cyber security [5]. According to many international reports [6], [7], most of the advanced cyber-attacks are frequently built on human vulnerabilities mainly human behaviourand hence role of humans cannot be ignored in a successful cyber security strategy. However, human behaviour is inconsistent, according to research, and may be heavily motivated by relationships; there is also a widespread conviction that negative things only happen to other people. Risky behaviour is also linked to the human actions of cyber security, where individuals would engage in an operation despite the fact that there was a known risk involved. Therefore, Organizations must use behavioural experts to analyse data security activities from cognitive and bias perspectives and also should consider other behavioural aspects, in order to create an integrated approach technologies, systems, and procedures to optimise security [8], [9]. Theoretical models of the factors that influence an individual's behaviour towards security are shown below Perceived vulnerability: It symbolizes a person's perception that he or she has been harmed in a way that may lead to an online assault. Perceived gravity: It reflects a person's reaction to the effects of a computer crash. Perceived benefits: It refers to the advantages that people see in embracing safety attitudes. III. CONCLUSION The battle against cybercrime and the avoidance of digital threats inside companies shifts the focus from technology to the human factors; The Research on Individual behavior towards cyber security will become increasingly relevant. Thus, analyzing individual behavior towards cyber organizations in their information security processes. If a more comprehensive paradigm of how people want to participate in successful cyber security practices is built, tactics to spread these practices further have the potential to emerge. REFERENCES [1] H. de Bruijn and M. Janssen, “Building Cybersecurity Awareness: The need for evidence-based framing strategies,” Gov. Inf. Q., vol. 34, no. 1, pp. 1– 7, Jan. 2017, doi: 10.1016/j.giq.2017.02.007. [2] “Towards analysing the rationale of information security non-compliance: Devising a Value-Based Compliance analysis method,” J. Strateg. Inf. Syst., vol. 26, no. 1, pp. 39–57, 10.1016/j.jsis.2016.08.005. [3] M. Evans, L. A. Maglaras, Y. He, and H. Janicke, “Human behaviour as an aspect of cybersecurity assurance,” Secur. Commun. Networks, vol. 9, no. 17, pp. 4667–4679, 2016, [Online]. Available: https://onlinelibrary.wiley.com/doi/abs/10.1002/sec.165 7. [4] M. Anwar, W. He, I. Ash, X. Yuan, L. Li, and L. Xu, “Gender difference cybersecurity behaviors,” Comput. Human Behav., vol. 69, pp. 437–443, 10.1016/j.chb.2016.12.040. [5] D. Henshel, M. G. Cains, B. Hoffman, and T. Kelley, “Trust as a human factor in holistic cyber security risk assessment,” Procedia Manuf., vol. 3, pp. 1117–1124, 2015, https://www.sciencedirect.com/science/article/pii/S235 1978915001870. [6] Verizon, “Data Breach Investigations Report,” 2017. https://www.verizon.com/business/resources/reports/dbi r/. [7] Pwc, “The Global State of Information Security® Survey,” 2018, https://www.pwc.com/us/en/services/consulting/cyberse curity-privacy-forensics.html. [8] S. L. Pfleeger and D. D. Caputo, “Leveraging behavioral science to mitigate cyber security risk,” Comput. Secur., vol. 31, no. 4, pp. 597–611, Jun. 2012, doi: 10.1016/j.cose.2011.12.010. [9] N. S. Safa, M. Sookhak, R. Von Solms, S. Furnell, N. A. Ghani, and T. Herawan, “Information security conscious care behaviour formation in organizations,” Comput. Secur., vol. 53, pp. 65–78, Sep. 2015, doi: 10.1016/j.cose.2015.05.01 E. Kolkowska, F. Karlsson, and K. Hedström, Mar. 2017, doi: and employees’ Apr. 2017, doi: to capitalised [Online]. Available: [Online]. Available: security can support Copyright © 2021 PhdAssistance. All rights reserved 2

More Related