2017
DOI: 10.1016/j.cose.2017.03.010
|View full text |Cite
|
Sign up to set email alerts
|

Applications of social network analysis in behavioural information security research: Concepts and empirical analysis

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
12
0
2

Year Published

2018
2018
2023
2023

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 37 publications
(14 citation statements)
references
References 31 publications
0
12
0
2
Order By: Relevance
“…DT thereby causes a blurring of the boundaries between physical and online industry structures , including the convergence of physical products and digital services, merging the physical world with online content, and creating an omnichannel environment for the customer (e.g., Brynjolfsson et al, 2013). These effects also lead to a higher exposure to cyber threats , including both cyber war threats and data security vulnerability (e.g., Dang‐Pham et al, 2017), as well as the resulting need to ensure network and data security (Haggerty, 2017). Finally, we found that firms need to account for the digitalization of the individual .…”
Section: Resultsmentioning
confidence: 99%
“…DT thereby causes a blurring of the boundaries between physical and online industry structures , including the convergence of physical products and digital services, merging the physical world with online content, and creating an omnichannel environment for the customer (e.g., Brynjolfsson et al, 2013). These effects also lead to a higher exposure to cyber threats , including both cyber war threats and data security vulnerability (e.g., Dang‐Pham et al, 2017), as well as the resulting need to ensure network and data security (Haggerty, 2017). Finally, we found that firms need to account for the digitalization of the individual .…”
Section: Resultsmentioning
confidence: 99%
“…Security Champions in development teams have an interest in security but they are not necessarily security experts or have a formal Security Champion title [33,57,68,70,72,79]. They can positively infuence the security practices of others [19][20][21] often with a bottom-up approach instead of a top-down approach [8,19,55]. Such behaviours and attitudes are valuable in organisations that prioritise security [35].…”
Section: Related Workmentioning
confidence: 99%
“…They can be an experienced hacker who helps testers in fnding vulnerabilities [74], an intermediary between the security and development teams [25,70], or the leader in threat modelling activities [10,63]. They are involved in several security-related activities such as educating other developers [31,33,34,38,73], increasing awareness [19,33,34], and promoting the adoption of technologies [31,32,34].…”
Section: Related Workmentioning
confidence: 99%
“…Thus, there is a need to study social networks, to study strategies that either contribute to the promotion of information, or, conversely, prevent the spread of unwanted information blocking it [12][13][14].…”
Section: Introductionmentioning
confidence: 99%