scholarly journals Individual awareness of cyber-security vulnerability - Citizen and public servant

2018 ◽  
Vol 325 ◽  
pp. 411-422
Author(s):  
Krisztina Győrffy ◽  
Ferenc Leitold ◽  
Anthony Arrott

Cyber-security is not concerned so much with average or median vulnerability in an organization. Rather more important is identifying the weakest links. Individual user susceptibility and user behaviour risk assessment are key to measuring the effectiveness of cyber-security awareness programs and policies. Increasingly, it has been demonstrated that managing individual user susceptibility is as critical to organization well-being as maintaining patched IT infrastructure or responding to specific immediate cyber-threat alerts. Despite IT systems audits, human factor studies, training courses, user policies, and user documentation, managing user cyber-security awareness remains one of the weakest links in protecting organizations from cyber-threats. Most employees are not aware of the cyber-threats they are most likely to encounter while performing their work. They are susceptible to malicious manipulation (social engineering threats) and they tend not to follow standard procedures (either through ignorance or in attempting to circumvent security procedures to achieve more productivity). Typically, employees only recognize the importance of cyber-security policies and practices after an incident has happened to themselves. With the increasing availability and utility of IT network traffic analysis tools and active user behaviour probes (e.g., fake-phishing), employees can be given direct and individual feedback to increase their cyber-security awareness and improve their cyber-security practices. Beyond an organization’s employees, the same holds for a country’s citizens, or a government’s public servants. At their best, these user behaviour monitoring tools can be used in an open and transparent way to increase awareness of individual vulnerability before actual incidents occur. In addition to presenting results from the application of user behaviour monitoring tools to cybersecurity, this paper examines the efficacy of the privacy protection safeguards that they incorporate. These results are applied to public sector approaches to: (a) public awareness of citizen cyber-health; (b) securing online pubic services; and (c) public servant awareness of their own vulnerability to cyber-threats.

Author(s):  
Heru Susanto

In recent years, the number of mobile device users has increased at a significant rate due to the rapid technological advancement in mobile technology. While mobile devices are providing more useful features to its users, it has also made it possible for cyber threats to migrate from desktops to mobile devices. Thus, it is important for mobile device users to be aware that their mobile device could be exposed to cyber threats and that users could protect their devices by employing cyber security measures. This study discusses how users in responded to the smart mobile devices (SMD) breaches. A number of behavioural model theories are used to understand the user behaviour towards security features of smart mobile devices. To assess the impact of smart mobile devices (SMD) security and privacy, surveys had been conducted with users, stressing on product preferences, user behaviour of SMD, as well as perceptions on the security aspect of SMD. The results was very interesting, where the findings revealed that there were a lack of positive relationships between SMD users and their level of SMD security awareness. A new framework approach to securing SMD is proposed to ensure that users have strong protection over their data within SMD.


2021 ◽  
Author(s):  
◽  
Kyle Gibson

<p>This research explores the level of security awareness, of domestic Internet users in New Zealand. Awareness and online security are the top priorities of the New Zealand Cyber Security Strategy, but little research has been conducted to gauge the current level of security awareness in context with common mitigation strategies. The majority of the literature on the subject is primarily focused on organisational technology security and awareness so this had to be put in context with domestic users. A sample set of Facebook friends of the researcher were asked to respond to an online survey. The survey explored the respondents' attitude and selfevaluated level of security awareness, and their awareness of a subset of mitigation strategies from the Australian Defence Signals Directorates' 'Strategies to Mitigate Targeted Cyber Intrusions'. The respondents demonstrated a good level of security awareness regarding patching and anti-virus, but there is a need for more education regarding access control and social engineering.</p>


2021 ◽  
Author(s):  
S M Nazmuz Sakib

Several professional routines were moved to Digital media because of the prevalent circumstances of the COVID 19 disease outbreak. This resulted in a spike in the number of individuals on all these sites and also saw current members leap into the period consumed digitally. This rise in folk's internet connectivity often never precedes cyber security awareness and the different forms of threats that can happen to a daily Web user. This makes this particular circumstance ready for use by malicious hackers and social engineering attacks (SEA) are indeed the main kind. The assaults on social engineering are a category of advanced cyber threats that manipulate the inherent human behavior and thus violate most security mechanisms. This article addresses how the COVID-19 disease outbreak has laid the groundwork for an increased social technology assault, the implications of these threats as well as some strategies for countering these challenges. This report would assist entities and enterprises through an examination of the several known threats on coronaviruses and suggestions. The study also investigated social engineering philosophy and proposes safety knowledge as a solution for reducing the risk of threats of being the victim of social engineering.


2021 ◽  
Vol 12 ◽  
Author(s):  
Ahmed A. Moustafa ◽  
Abubakar Bello ◽  
Alana Maurushat

Information security has for long time been a field of study in computer science, software engineering, and information communications technology. The term ‘information security’ has recently been replaced with the more generic term cybersecurity. The goal of this paper is to show that, in addition to computer science studies, behavioural sciences focused on user behaviour can provide key techniques to help increase cyber security and mitigate the impact of attackers’ social engineering and cognitive hacking methods (i.e., spreading false information). Accordingly, in this paper, we identify current research on psychological traits and individual differences among computer system users that explain vulnerabilities to cyber security attacks and crimes. Our review shows that computer system users possess different cognitive capabilities which determine their ability to counter information security threats. We identify gaps in the existing research and provide possible psychological methods to help computer system users comply with security policies and thus increase network and information security.


2019 ◽  
Vol 70 (2) ◽  
pp. 313
Author(s):  
Valeriy Yu. Bykov ◽  
Oleksandr Yu. Burov ◽  
Nina P. Dementievska

The article discusses the problems of cyber-security of participants of the educational process, emphasizes the fact that these problems are not limited to the technical aspects of the protection of information resources, they must include in their entirety the following types of protection: legal, technical, informational, organizational and psychological. Among the psychological tools for securing cyber-security, it is proposed to distinguish cognitive ones, as the general population, and especially children and youth, increasingly become targets of cyber-attacks, first of all, their cognitive sphere, becoming the most vulnerable (weak) link in the network. In anthropocentric networks, which make up an ever-increasing share among common networks, the network itself acquires new properties, acting as an independent component (in addition to factors such as the network node, interface and links). Threats to participants in the educational process from the cyberspace should be regarded as passive and active, developing adequate means of protection and viability of the system "subject of educational process-learning-environment". The most significant among cyber-threats for the participants of the educational process are the social engineering methods, which knowledge and resistance can be the most effective for providing cyber-security. As part of the training of participants in the educational process on cyber-security, it is proposed to use "cyber vaccination", that is the formation of a conscious cognitive experience of staying under the influence of a cyber threat and counteracting it as a system of training activities that include, in addition to traditional methods, training of "cyber attacks", as well as the formation of knowledge and skills of resilience (recovery) in relation to cyber-threats. Further research is suggested to focus on the detailed development of types of threats to participants in the education process, as well as methods of counteraction. A special place should be a problem of resistance to cyber-threats, which can use the experience of training operators in emergent industries, including assessing the current state of the person and necessary adjustments in order to optimize its performance.


2021 ◽  
Author(s):  
◽  
Kyle Gibson

<p>This research explores the level of security awareness, of domestic Internet users in New Zealand. Awareness and online security are the top priorities of the New Zealand Cyber Security Strategy, but little research has been conducted to gauge the current level of security awareness in context with common mitigation strategies. The majority of the literature on the subject is primarily focused on organisational technology security and awareness so this had to be put in context with domestic users. A sample set of Facebook friends of the researcher were asked to respond to an online survey. The survey explored the respondents' attitude and selfevaluated level of security awareness, and their awareness of a subset of mitigation strategies from the Australian Defence Signals Directorates' 'Strategies to Mitigate Targeted Cyber Intrusions'. The respondents demonstrated a good level of security awareness regarding patching and anti-virus, but there is a need for more education regarding access control and social engineering.</p>


Author(s):  
Todd A. Eisenstadt ◽  
Karleen Jones West

Parting from conventional social science arguments that people speak for the ethnic groups they represent or for social or class-based groups, this study argues that attitudes of Ecuador’s Amazon citizens are shaped by environmental vulnerability, and specifically exposure to environmental degradation. Using results of a nationwide survey to demonstrate that vulnerability matters in determining environmental attitudes of respondents, the authors argue that groups might have more success mobilizing on behalf of the environment through geographically based “polycentric rights,” rather than through more traditional and ethnically bound multicultural rights. This book offers among the first methodological bridges between scholarship considering social movements, and predominantly ethnic groups, as primary agents of environmental change in Latin America and those emphasizing the agency of individuals. The authors conduct a nationwide survey to glean respondent positions on a range of environmental issues, then contextualize these findings through scores of in-depth interviews with indigenous, environmental, government, academic, and civil society leaders throughout Ecuador between 2014 and 2017. They find that some abstract issues—like indigenous worldviews—affect peoples’ attitudes, but that concrete experiences—such as that of living in areas of environmental degradation due to oil drilling—is a more important conditioner of environmental attitudes. The authors qualify post-materialism, an early theory of environmentalism, which argues that material well-being makes citizens more protective of the environment. The book concludes that post-materialism must be tempered by individual vulnerability, and that group activism is more successful where people have not yet been adversely impacted by environmental degradation such as oil spills and forest destruction.


2021 ◽  
pp. bmjspcare-2020-002820
Author(s):  
Kathleen Kane ◽  
Fiona Kennedy ◽  
Kate L Absolom ◽  
Clare Harley ◽  
Galina Velikova

BackgroundAs treatments continue to progress, patients with advanced cancer are living longer. However, ongoing physical side-effects and psychosocial concerns can compromise quality of life (QoL). Patients and physicians increasingly look to the internet and other technologies to address diverse supportive needs encountered across this evolving cancer trajectory.Objectives1. To examine the features and delivery of web and technological interventions supporting patients with advanced cancer. 2. To explore their efficacy relating to QoL and psychosocial well-being.MethodsRelevant studies were identified through electronic database searches (MEDLINE, PsychINFO, Embase, CINAHL, CENTRAL, Web of Science and ProQuest) and handsearching. Findings were collated and explored through narrative synthesis.ResultsOf 5274 identified records, 37 articles were included. Interventions were evaluated within studies targeting advanced cancer (13) or encompassing all stages (24). Five subtypes emerged: Interactive Health Communication Applications (n=12), virtual programmes of support (n=11), symptom monitoring tools (n=8), communication conduits (n=3) and information websites (n=3). Modes of delivery ranged from self-management to clinically integrated. Support largely targeted psychosocial well-being, alongside symptom management and healthy living. Most studies (78%) evidenced varying degrees of efficacy through QoL and psychosocial measures. Intervention complexity made it challenging to distinguish the most effective components. Incomplete reporting limited risk of bias assessment.ConclusionWhile complex and varied in their content, features and delivery, most interventions led to improvements in QoL or psychosocial well-being across the cancer trajectory. Ongoing development and evaluation of such innovations should specifically target patients requiring longer-term support for later-stage cancer.PROSPERO registration numberCRD42018089153.


Sign in / Sign up

Export Citation Format

Share Document