Measuring Behavioural Cybersecurity: An Overview of Options

被引:2
|
作者
van Steen, Tommy [1 ]
机构
[1] Leiden Univ, Inst Secur & Global Affairs, Turfmarkt 99, NL-2511 DP The Hague, Netherlands
来源
AUGMENTED COGNITION, AC 2023 | 2023年 / 14019卷
关键词
Behavioural cybersecurity; Organisational cybersecurity; Measures; Behavioural models; Behavioural factors; INFORMATION; AWARENESS;
D O I
10.1007/978-3-031-35017-7_29
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
As the field of cybersecurity is maturing, there is more attention to the behaviour of end-users in securing data and systems. Awareness campaigns are gaining popularity and behavioural change initiatives are deployed. However, many organisations do not know where to start when attempting to effectively measure the maturity of the behavioural component in their cybersecurity strategy. While some measures, such as knowledge, attitudes and skills are assessed, (objective) measurements of behaviour, and the interplay between these factors are less commonly measured. This paper discusses the importance of measuring behavioural cybersecurity and presents an overview of possible measurements and relevant factors. First, the paper outlines why measuring behavioural cybersecurity is vital in understanding behaviour related problems and coming up with evidence-based solutions. Then, the various measurement levels and current practices are discussed before turning to options regarding these levels. These include both self-reported as well as objective behavioural measurements in addition to attitudes, knowledge and skills. Lastly, some issues surrounding these measurements are discussed including spill-over effects and ethical considerations.
引用
收藏
页码:460 / 471
页数:12
相关论文
共 50 条
  • [1] Measuring maternal mortality: An overview of opportunities and options for developing countries
    WJ Graham
    S Ahmed
    C Stanton
    CL Abou-Zahr
    OMR Campbell
    BMC Medicine, 6
  • [2] Measuring maternal mortality: An overview of opportunities and options for developing countries
    Graham, W. J.
    Ahmed, S.
    Stanton, C.
    Abou-Zahr, C. L.
    Campbell, O. M. R.
    BMC MEDICINE, 2008, 6 (1)
  • [3] An Options Approach to Cybersecurity Investment
    Chronopoulos, Michail
    Panaousis, Emmanouil
    Grossklags, Jens
    IEEE ACCESS, 2018, 6 : 12175 - 12186
  • [4] An Augmented Cybersecurity Behavioural Research Model
    Addae, Joyce
    Radenkovic, Milena
    Sun, Xu
    Towey, Dave
    PROCEEDINGS 2016 IEEE 40TH ANNUAL COMPUTER SOFTWARE AND APPLICATIONS CONFERENCE WORKSHOPS (COMPSAC), VOL 2, 2016, : 602 - 603
  • [5] The economics of cybersecurity: Principles and policy options
    Moore, Tyler
    INTERNATIONAL JOURNAL OF CRITICAL INFRASTRUCTURE PROTECTION, 2010, 3 (3-4) : 103 - 117
  • [6] Cyber governance studies in ensuring cybersecurity: an overview of cybersecurity governance
    Serkan Savaş
    Süleyman Karataş
    International Cybersecurity Law Review, 2022, 3 (1): : 7 - 34
  • [7] Cybersecurity: Stakeholder incentives, externalities, and policy options
    Bauer, Johannes M.
    van Eeten, Michel J. G.
    TELECOMMUNICATIONS POLICY, 2009, 33 (10-11) : 706 - 719
  • [8] Automotive Cybersecurity Standards - Relation and Overview
    Schmittner, Christoph
    Macher, Georg
    COMPUTER SAFETY, RELIABILITY, AND SECURITY, SAFECOMP 2019, 2019, 11699 : 153 - 165
  • [9] Cybersecurity in PACS and Medical Imaging: an Overview
    Eichelberg, Marco
    Kleber, Klaus
    Kaemmerer, Marc
    JOURNAL OF DIGITAL IMAGING, 2020, 33 (06) : 1527 - 1542
  • [10] Cybersecurity in PACS and Medical Imaging: an Overview
    Marco Eichelberg
    Klaus Kleber
    Marc Kämmerer
    Journal of Digital Imaging, 2020, 33 : 1527 - 1542