Study of internet security threats among home users

Author(s):  
Umesh Hodeghatta Rao Xavier ◽  
Bishwa Prakash Pati
Author(s):  
Ogochukwu Thaddaeus Emiri ◽  
Chukwunweike Gracious Omede

This chapter examines the problems of e-governance data/information security. In order to adequately achieve this objective, the chapter after the introduction, deals with the information and communication technology (ICT) security network, followed by effects of the changing nature of security threats in e-governance. The use of ICT internet security balancing requirements for achieving effective e-governance security network is considered. The chapter observes that strong security for internet transactions (information communication) is one of the last technical hurdles to be overcome in achieving true e-governance, enabling the broadest range of online government services while streamlining bureaucracy and providing efficient alternatives to in-person contact between government agencies and their constituents. The chapter argues that the problems of information security threats, if not tackled effectively, can hinder e-governance implementation success. The use of ICT internet security balancing requirements for achieving effective e-governance security network is recommended.


2021 ◽  
Vol 11 (1) ◽  
pp. 101-104
Author(s):  
Bandr Fakiha

It is argued that the advancement of Information, Communication and Technology went hand in hand with the emergence of certain threats and vulnerabilities to cybersecurity. In several cases, cyber attacks have targeted the information, communication and infrastructure networks of numerous organizations. Today, hackers and intruders have advanced technology within their scope that lets them access the organizational information system. The present study highlights numerous internet security related problems, it offers a broad-based overview of internet threats from the perspective of business enterprises, along with prevention measures and enhanced safety strategies. A systematic analysis of secondary literature was introduced by researchers, the study found that it is critical for organizations to choose an IT security management tool that can be categorized as best practices and standards. The Security Incident Event Management (SIEM) framework is one key instrument proposed here. SIEM instruments help security analysts gain insight into the security threats targeting the IT structures of a given organization.


Author(s):  
Zainab Hamdan ◽  
Iman Obaid ◽  
Asma Ali ◽  
Hanan Hussain ◽  
Amala V. Rajan ◽  
...  

2021 ◽  
Author(s):  
◽  
Nicole Kristine Henika Braun

<p>Cybersecurity has been a concern for businesses and governments since their initial uptake of the Internet in the 1970s. As more and more people started using the internet for personal use, cybersecurity has become an important concern for home users as well. However, most research on cybersecurity has been undertaken at an organisational rather than at the individual level. Individual behaviours online have became increasingly important as the line between home and business use has blurred and users’ actions on their home computers has begun to have more wide ranging implications. There appears to be a lack of agreement on how to approach the topic of internet security outside of an organisational perspective.  This research focuses on the individual home user perspective and seeks to (1) identify factors relate to users’ cybersecurity behaviours, and (2) examine how the identified factors relate to users' cybersecurity behaviours. A conceptual framework was developed based on the literature to guide the data collection.  To identify the relevant factors relating to home users’ security behaviours, a qualitative study comprised of three focus groups and 20 individual interviews was carried out. From the data, a revised model was developed. In the revised model, awareness threats was identified as a necessary first cybersecurity step before users can form opinions about the danger of threats. Awareness of threats was influenced by users' characteristics, opinions, and experiences as well as by factors in their external environments.  The combination of internal factors, external factors, and awareness led to users’ perceptions about the danger of threats online. This perception of danger led to users’ intentions to engage in protective behaviours. However, these intentions were strengthened or weakened based on users’ perceptions about the barriers to and enablers of security.  By applying the revised model, it was possible to identify different types of security users. Through the identification of these user types, eight factors emerged as being particularly important in influencing users' perceptions of threats and dangers: knowledge, perceived self-efficacy, trust, threat awareness, safeguard awareness, prior experience, reliance, and security orientation. These factors from the model are used as a starting point to understanding how users make decisions about what they will do to protect themselves online. Further, through the identification of these user types suggestions are made about how to promote security for different types of individuals.</p>


2021 ◽  
Author(s):  
◽  
Nicole Kristine Henika Braun

<p>Cybersecurity has been a concern for businesses and governments since their initial uptake of the Internet in the 1970s. As more and more people started using the internet for personal use, cybersecurity has become an important concern for home users as well. However, most research on cybersecurity has been undertaken at an organisational rather than at the individual level. Individual behaviours online have became increasingly important as the line between home and business use has blurred and users’ actions on their home computers has begun to have more wide ranging implications. There appears to be a lack of agreement on how to approach the topic of internet security outside of an organisational perspective.  This research focuses on the individual home user perspective and seeks to (1) identify factors relate to users’ cybersecurity behaviours, and (2) examine how the identified factors relate to users' cybersecurity behaviours. A conceptual framework was developed based on the literature to guide the data collection.  To identify the relevant factors relating to home users’ security behaviours, a qualitative study comprised of three focus groups and 20 individual interviews was carried out. From the data, a revised model was developed. In the revised model, awareness threats was identified as a necessary first cybersecurity step before users can form opinions about the danger of threats. Awareness of threats was influenced by users' characteristics, opinions, and experiences as well as by factors in their external environments.  The combination of internal factors, external factors, and awareness led to users’ perceptions about the danger of threats online. This perception of danger led to users’ intentions to engage in protective behaviours. However, these intentions were strengthened or weakened based on users’ perceptions about the barriers to and enablers of security.  By applying the revised model, it was possible to identify different types of security users. Through the identification of these user types, eight factors emerged as being particularly important in influencing users' perceptions of threats and dangers: knowledge, perceived self-efficacy, trust, threat awareness, safeguard awareness, prior experience, reliance, and security orientation. These factors from the model are used as a starting point to understanding how users make decisions about what they will do to protect themselves online. Further, through the identification of these user types suggestions are made about how to promote security for different types of individuals.</p>


2019 ◽  
Vol 22 (4) ◽  
pp. 336-341
Author(s):  
D. V. Ivanov ◽  
D. A. Moskvin

In the article the approach and methods of ensuring the security of VANET-networks based on automated counteraction to information security threats through self-regulation of the network structure using the theory of fractal graphs is provided.


Sign in / Sign up

Export Citation Format

Share Document