2016 SAI Computing Conference (SAI) 2016
DOI: 10.1109/sai.2016.7556102
|View full text |Cite
|
Sign up to set email alerts
|

A cybersecurity culture research philosophy and approach to develop a valid and reliable measuring instrument

Abstract: Abstract-A cybersecurity culture must be promoted at an international, national, organizational, and individual level to aid in minimizing risks from a human perspective in cyberspace. To promote such a culture it has to be understood and quantified in order to direct change. This research makes use of the disciplines of information technology and industrial psychology to define a cybersecurity culture. A quantitative research methodology, cybersecurity culture research methodology (CSeCRM), is proposed that c… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
5

Citation Types

0
24
0

Year Published

2017
2017
2023
2023

Publication Types

Select...
5
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 31 publications
(24 citation statements)
references
References 14 publications
0
24
0
Order By: Relevance
“…However, though cybersecurity culture has a profound impact on risk, it can be difficult to identify, build, and quantify [6], [7]. Examining other kinds of organizational culture provides a foundation for a model of cybersecurity culture.…”
Section: Introductionmentioning
confidence: 99%
“…However, though cybersecurity culture has a profound impact on risk, it can be difficult to identify, build, and quantify [6], [7]. Examining other kinds of organizational culture provides a foundation for a model of cybersecurity culture.…”
Section: Introductionmentioning
confidence: 99%
“…Cyber threats include identity theft [2] and unauthorised access to an organisational network [3]. Denial of Service (DoS) attacks, malicious insiders, web-based attacks [4], human error [3], phishing emails and inadequate security monitoring [5] are also documented threats.…”
Section: Introductionmentioning
confidence: 99%
“…Cyber threats include identity theft [2] and unauthorised access to an organisational network [3]. Denial of Service (DoS) attacks, malicious insiders, web-based attacks [4], human error [3], phishing emails and inadequate security monitoring [5] are also documented threats. There are some reasons which contribute to the success of these attacks, for example, preventative equipment failures [6], lack of technical awareness [7], unauthorised access [3] and malicious employees [4].…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…While the role of cultivating a culture in pursuing cybersecurity is wellappreciated, research focusing intensely on defining and measuring cybersecurity culture is still in its infancy [7]. Furthermore, studies conducted by Reid and van Niekerk [8], [9] revealed that there are no widely accepted key concepts that delimit a cybersecurity culture.…”
Section: Introductionmentioning
confidence: 99%