Measuring Behavioural Cybersecurity: An Overview of Options

被引:2
|
作者
van Steen, Tommy [1 ]
机构
[1] Leiden Univ, Inst Secur & Global Affairs, Turfmarkt 99, NL-2511 DP The Hague, Netherlands
来源
AUGMENTED COGNITION, AC 2023 | 2023年 / 14019卷
关键词
Behavioural cybersecurity; Organisational cybersecurity; Measures; Behavioural models; Behavioural factors; INFORMATION; AWARENESS;
D O I
10.1007/978-3-031-35017-7_29
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
As the field of cybersecurity is maturing, there is more attention to the behaviour of end-users in securing data and systems. Awareness campaigns are gaining popularity and behavioural change initiatives are deployed. However, many organisations do not know where to start when attempting to effectively measure the maturity of the behavioural component in their cybersecurity strategy. While some measures, such as knowledge, attitudes and skills are assessed, (objective) measurements of behaviour, and the interplay between these factors are less commonly measured. This paper discusses the importance of measuring behavioural cybersecurity and presents an overview of possible measurements and relevant factors. First, the paper outlines why measuring behavioural cybersecurity is vital in understanding behaviour related problems and coming up with evidence-based solutions. Then, the various measurement levels and current practices are discussed before turning to options regarding these levels. These include both self-reported as well as objective behavioural measurements in addition to attitudes, knowledge and skills. Lastly, some issues surrounding these measurements are discussed including spill-over effects and ethical considerations.
引用
收藏
页码:460 / 471
页数:12
相关论文
共 50 条
  • [31] An Overview of Cybersecurity Regulations and Standards for Medical Device Software
    Lechner, Nadica Hrgarek
    CENTRAL EUROPEAN CONFERENCE ON INFORMATION AND INTELLIGENT SYSTEMS: PROCEEDINGS ARCHIVE 2017, 2017, : 237 - 249
  • [32] Other options in pharmacological management of behavioural disorders
    Davidson, M
    INTERNATIONAL JOURNAL OF NEUROPSYCHOPHARMACOLOGY, 2004, 7 : S110 - S110
  • [33] Animals as prey: perceptual limitations and behavioural options
    Hemmi, JM
    Zeil, J
    MARINE ECOLOGY PROGRESS SERIES, 2005, 287 : 274 - 278
  • [34] Developing a behavioural cybersecurity strategy: A five-step approach for organisations
    van Steen, Tommy
    COMPUTER STANDARDS & INTERFACES, 2025, 92
  • [35] Behavioural studies on eriophyoid mites: an overview
    Katarzyna Michalska
    Anna Skoracka
    Denise Navia
    James W. Amrine
    Experimental and Applied Acarology, 2010, 51 : 31 - 59
  • [36] Behavioural studies on eriophyoid mites: an overview
    Michalska, Katarzyna
    Skoracka, Anna
    Navia, Denise
    Amrine, James W.
    EXPERIMENTAL AND APPLIED ACAROLOGY, 2010, 51 (1-3) : 31 - 59
  • [37] MEASURING PORTFOLIO RISK IN OPTIONS
    SEARS, RS
    TRENNEPOHL, GL
    JOURNAL OF FINANCIAL AND QUANTITATIVE ANALYSIS, 1982, 17 (03) : 391 - 409
  • [38] Cybersecurity risks A behavioural approach through the influence of media and information literacy
    Rodrigues, Andre Filipe
    Monteiro, Bruno Miguel
    Pedrosa, Isabel
    PROCEEDINGS OF 2021 16TH IBERIAN CONFERENCE ON INFORMATION SYSTEMS AND TECHNOLOGIES (CISTI'2021), 2021,
  • [39] MEASURING IMPACT OF CYBERSECURITY ON THE PERFORMANCE OF INDUSTRIAL CONTROL SYSTEMS
    Stouffer, Keith
    Candell, Rick
    MECHANICAL ENGINEERING, 2014, 136 (12) : 59 - 62
  • [40] Measuring Stakeholders' Perceptions of Cybersecurity for Renewable Energy Systems
    Madnick, Stuart
    Jalali, Mohammad S.
    Siegel, Michael
    Lee, Yang
    Strong, Diane
    Wang, Richard
    Ang, Wee Horng
    Deng, Vicki
    Mistree, Dinsha
    DATA ANALYTICS FOR RENEWABLE ENERGY INTEGRATION (DARE 2016), 2017, 10097 : 67 - 77