scholarly journals The Great New Zealand Botnet: Broadband to the Door an Asset  or Security Issue?

2021 ◽  
Author(s):  
◽  
Kyle Gibson

<p>This research explores the level of security awareness, of domestic Internet users in New Zealand. Awareness and online security are the top priorities of the New Zealand Cyber Security Strategy, but little research has been conducted to gauge the current level of security awareness in context with common mitigation strategies. The majority of the literature on the subject is primarily focused on organisational technology security and awareness so this had to be put in context with domestic users. A sample set of Facebook friends of the researcher were asked to respond to an online survey. The survey explored the respondents' attitude and selfevaluated level of security awareness, and their awareness of a subset of mitigation strategies from the Australian Defence Signals Directorates' 'Strategies to Mitigate Targeted Cyber Intrusions'. The respondents demonstrated a good level of security awareness regarding patching and anti-virus, but there is a need for more education regarding access control and social engineering.</p>

2021 ◽  
Author(s):  
◽  
Kyle Gibson

<p>This research explores the level of security awareness, of domestic Internet users in New Zealand. Awareness and online security are the top priorities of the New Zealand Cyber Security Strategy, but little research has been conducted to gauge the current level of security awareness in context with common mitigation strategies. The majority of the literature on the subject is primarily focused on organisational technology security and awareness so this had to be put in context with domestic users. A sample set of Facebook friends of the researcher were asked to respond to an online survey. The survey explored the respondents' attitude and selfevaluated level of security awareness, and their awareness of a subset of mitigation strategies from the Australian Defence Signals Directorates' 'Strategies to Mitigate Targeted Cyber Intrusions'. The respondents demonstrated a good level of security awareness regarding patching and anti-virus, but there is a need for more education regarding access control and social engineering.</p>


2014 ◽  
Vol 52 ◽  
Author(s):  
Noluxolo Kortjan ◽  
Rossouw Von Solms

The Internet is becoming increasingly interwoven in the daily lives of many individuals, organisations and nations. It has, to a large extent, had a positive effect on the way people communicate. It has also introduced new avenues for business; and it has offered nations an opportunity to govern online. Nevertheless, although cyberspace offers an endless list of services and opportunities, it is also accompanied by many risks, of which many Internet users are not aware. As such, various countries have developed and implemented cyber-security awareness and education measures to counter the perceived ignorance of the Internet users. However, there is currently a definite lack in South Africa (SA) in this regard; as there are currently, little government-led and sponsored cyber-security awareness and education initiatives. The primary research objective of this paper, therefore, is to propose a cyber-security awareness and education framework for SA that would assist in creating a cyber-secure culture in SA among all of the users of the Internet. This framework will be developed on the basis of key factors extrapolated from a comparative analysis of relevant developed countries.


2018 ◽  
Vol 13 ◽  
pp. 3288-3300
Author(s):  
Rudy Agus Gemilang Gultom ◽  
Asep Adang Supriyadi ◽  
Tatan Kustana

Nowadays, the extremism, radicalism and terrorism groups have taken advantages the use of Internet access to support their activities, i.e, member recruitment, propaganda, fundraising, cyberattack actions against their targets, etc. This is one of the issues of cyber security as a negative impact of internet utilization especially by the extremism, radicalism and terrorism groups. They know the benefits of the internet services and social media can be used to facilitate the control of information in their organizational command and control system.  In order to tackle this cyber security issue, the internet users in Association of Southeast Asian Nations (ASEAN) member countries should get more understanding as well as protection from their government against the danger of cyber extremism, cyber radicalism or cyber terrorism activities over the Internet. Therefore, this paper tries to explain the need of an ASEAN Cyber Security Framework standard in order to countering cyber terrorism activities via Internet as well as introducing the initial concept of Six-Ware Cyber Security Framework (SWCSF). 


2019 ◽  
Vol 5 ◽  
pp. 205520761987180 ◽  
Author(s):  
Tom Nadarzynski ◽  
Oliver Miles ◽  
Aimee Cowie ◽  
Damien Ridge

Background Artificial intelligence (AI) is increasingly being used in healthcare. Here, AI-based chatbot systems can act as automated conversational agents, capable of promoting health, providing education, and potentially prompting behaviour change. Exploring the motivation to use health chatbots is required to predict uptake; however, few studies to date have explored their acceptability. This research aimed to explore participants’ willingness to engage with AI-led health chatbots. Methods The study incorporated semi-structured interviews (N-29) which informed the development of an online survey (N-216) advertised via social media. Interviews were recorded, transcribed verbatim and analysed thematically. A survey of 24 items explored demographic and attitudinal variables, including acceptability and perceived utility. The quantitative data were analysed using binary regressions with a single categorical predictor. Results Three broad themes: ‘Understanding of chatbots’, ‘AI hesitancy’ and ‘Motivations for health chatbots’ were identified, outlining concerns about accuracy, cyber-security, and the inability of AI-led services to empathise. The survey showed moderate acceptability (67%), correlated negatively with perceived poorer IT skills OR = 0.32 [CI95%:0.13–0.78] and dislike for talking to computers OR = 0.77 [CI95%:0.60–0.99] as well as positively correlated with perceived utility OR = 5.10 [CI95%:3.08–8.43], positive attitude OR = 2.71 [CI95%:1.77–4.16] and perceived trustworthiness OR = 1.92 [CI95%:1.13–3.25]. Conclusion Most internet users would be receptive to using health chatbots, although hesitancy regarding this technology is likely to compromise engagement. Intervention designers focusing on AI-led health chatbots need to employ user-centred and theory-based approaches addressing patients’ concerns and optimising user experience in order to achieve the best uptake and utilisation. Patients’ perspectives, motivation and capabilities need to be taken into account when developing and assessing the effectiveness of health chatbots.


2018 ◽  
Vol 23 (2) ◽  
pp. 113-120
Author(s):  
László Kovács

Abstract The more advanced digital economy and society a country has the more exposed it is to cyber threats. Consequently, countries with advanced digital economy and digital infrastructure naturally need to pay more attention to protecting cyber space. Today it is a national security issue and it can no longer be argued that cyber security is its indispensable part. Accordingly, a national cyber security strategy has to be built on national security strategy. That is the main reason for using the word “cornerstone” in the title of this study. The relation between national security and national cyber security means a specific context, which is one of the subjects of our examination in this study. Today, most countries have a cyber security strategy. However, these strategies are mostly static documents that do not or only partially can handle the dynamism that characterizes cyberspace. This paper focuses on the key issues that are needed for developing a usable cyber security strategy.


2018 ◽  
Vol 325 ◽  
pp. 411-422
Author(s):  
Krisztina Győrffy ◽  
Ferenc Leitold ◽  
Anthony Arrott

Cyber-security is not concerned so much with average or median vulnerability in an organization. Rather more important is identifying the weakest links. Individual user susceptibility and user behaviour risk assessment are key to measuring the effectiveness of cyber-security awareness programs and policies. Increasingly, it has been demonstrated that managing individual user susceptibility is as critical to organization well-being as maintaining patched IT infrastructure or responding to specific immediate cyber-threat alerts. Despite IT systems audits, human factor studies, training courses, user policies, and user documentation, managing user cyber-security awareness remains one of the weakest links in protecting organizations from cyber-threats. Most employees are not aware of the cyber-threats they are most likely to encounter while performing their work. They are susceptible to malicious manipulation (social engineering threats) and they tend not to follow standard procedures (either through ignorance or in attempting to circumvent security procedures to achieve more productivity). Typically, employees only recognize the importance of cyber-security policies and practices after an incident has happened to themselves. With the increasing availability and utility of IT network traffic analysis tools and active user behaviour probes (e.g., fake-phishing), employees can be given direct and individual feedback to increase their cyber-security awareness and improve their cyber-security practices. Beyond an organization’s employees, the same holds for a country’s citizens, or a government’s public servants. At their best, these user behaviour monitoring tools can be used in an open and transparent way to increase awareness of individual vulnerability before actual incidents occur. In addition to presenting results from the application of user behaviour monitoring tools to cybersecurity, this paper examines the efficacy of the privacy protection safeguards that they incorporate. These results are applied to public sector approaches to: (a) public awareness of citizen cyber-health; (b) securing online pubic services; and (c) public servant awareness of their own vulnerability to cyber-threats.


Sign in / Sign up

Export Citation Format

Share Document