Proceedings of the 29th European Safety and Reliability Conference (ESREL) 2019
DOI: 10.3850/978-981-11-2724-3_0761-cd
|View full text |Cite
|
Sign up to set email alerts
|

The Concept of Cybersecurity Culture

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

1
15
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 23 publications
(16 citation statements)
references
References 0 publications
1
15
0
Order By: Relevance
“…That all these improvement measures required management buy-in in terms of resource approval, budget allocation, and prioritizing cybersecurity measures does not seem to have been transparent or perceived. Thus, this finding supports earlier research that a cybersecurity culture not only needs to be built and maintained but, very importantly, changes and activities communicated openly and clearly (Uchendu et al , 2021; Alshaikh, 2020; Reegård et al , 2019).…”
Section: Analysis Of Resultssupporting
confidence: 90%
“…That all these improvement measures required management buy-in in terms of resource approval, budget allocation, and prioritizing cybersecurity measures does not seem to have been transparent or perceived. Thus, this finding supports earlier research that a cybersecurity culture not only needs to be built and maintained but, very importantly, changes and activities communicated openly and clearly (Uchendu et al , 2021; Alshaikh, 2020; Reegård et al , 2019).…”
Section: Analysis Of Resultssupporting
confidence: 90%
“…As a result, knowledge and attitudes are two critical pillars in establishing cybersecurity culture, which will then support cybersecurity best practices (Reegå rd et al, 2019) which were the focus of this present study.…”
Section: Background Of the Studymentioning
confidence: 93%
“…Cybersecurity threats take many forms [2,3], from accidental data leaking to different forms of social engineering, ransomware, exploiting software vulnerabilities, and dis-tributed denial of service attacks (Figure 1). The best company's strategy against attacks is a multi-layered approach that includes several activities and practices that encompass the entire organization and can help reduce the risk of successful attacks and minimize the impact of any attacks that do occur [4]. While some of these activities can be easily done by laypeople and multi-tasking managers of small companies (patching and updating software and setting authentication with strong passwords), others require knowledge and experience (for example, vulnerability testing or network segmentation).…”
Section: Theoretical Backgroundmentioning
confidence: 99%
“…In this paper, we primarily focus on the actions of black-hat hackers who seek to exploit cybersecurity vulnerabilities for malicious purposes. This approach will allow for the examination of the most pressing cybersecurity challenges faced by SMEs and the development of awareness of defensive strategies that are both effective and feasible for managers with varying levels of cybersecurity expertise [3,4]. However, it is also assumed that the hacker has a type, which, in this case, presumes a form of specialization.…”
Section: Game Settingmentioning
confidence: 99%
See 1 more Smart Citation