2022
DOI: 10.1108/tg-05-2022-0073
|View full text |Cite
|
Sign up to set email alerts
|

Human-driven and human-centred cybersecurity: policy-making implications

Abstract: Purpose The purpose of this paper is to challenge the prevailing, stereotypical approach of the human aspect of cybersecurity, i.e. treating people as weakness or threat. Instead, several reflections are presented, pertaining to the ways of making cybersecurity human-centred. Design/methodology/approach This paper bases on the authors’ own experiences, gathered whilst working in cybersecurity projects; the resulting comments and reflections have been enriched and backed up by the results of a targeted litera… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
2
2

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(2 citation statements)
references
References 31 publications
0
2
0
Order By: Relevance
“…For example the people in the company and their attitude and behavior plays important role in achieving the appropriate level of cybersecurity within the company. According to Pawlicka (2022) the human aspects are one of most important when we analyze cybersecurity problems. Authors thinks that cybersecurity can be achieved using appropriate human management.…”
Section: Discussionmentioning
confidence: 99%
“…For example the people in the company and their attitude and behavior plays important role in achieving the appropriate level of cybersecurity within the company. According to Pawlicka (2022) the human aspects are one of most important when we analyze cybersecurity problems. Authors thinks that cybersecurity can be achieved using appropriate human management.…”
Section: Discussionmentioning
confidence: 99%
“…The study estimates this skill gap at three million unfilled positions worldwide. Investing in organizational cybersecurity training is one approach to overcoming this problem (Pawlicka et al , 2022; Hwang and Helser, 2022). As conventional training methods like lectures or static e-learning have shown not to be sufficient in transferring practical cybersecurity skills (Crumpler and Lewis, 2019), training in cyber ranges has gained popularity in recent years (Yamin et al , 2020).…”
Section: Introductionmentioning
confidence: 99%