User perception of Context-Based Micro-Training - a method for cybersecurity training

被引:3
|
作者
Kaevrestad, Joakim [1 ,3 ]
Furnell, Steven [2 ]
Nohlberg, Marcus [1 ]
机构
[1] Univ Skovde, Sch Informat, Skovde, Sweden
[2] Univ Nottingham, Sch Comp Sci, Nottingham, England
[3] Univ Skovde, Sch Informat, Box 408, S-54128 Skovde, Sweden
来源
INFORMATION SECURITY JOURNAL | 2024年 / 33卷 / 02期
关键词
behavior; cybersecurity; end-user; perception; training; FEAR APPEALS; MODEL;
D O I
10.1080/19393555.2023.2222713
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
User behavior is one of the biggest challenges to cybersecurity in modern organizations. Users are continuously targeted by attackers and required to have sufficient knowledge to spot and avoid such attacks. Different training methods are suggested and used in the industry to support users to behave securely. The challenge remains, and improved methods for end-user cybersecurity training are needed. This paper introduces and evaluates user perception of a method called Context-Based Micro-Training (CBMT). This approach suggests that training should be delivered in short sequences when the information is of direct relevance. The intention is to provide training directly related to the user's current situation while also providing an awareness-increasing effect. This notion is tested in a survey-based evaluation involving 1,452 respondents from Sweden, Italy, and the UK, comparing the perception of CBMT against the experience of traditional approaches. The results emphasize that current methods are not effective enough and show that CBMT is perceived positively by respondents in all sample groups. The study further evaluated how demographic aspects impact the perception of CBMT and found that a diverse group of users can appreciate it.
引用
收藏
页码:121 / 137
页数:17
相关论文
共 50 条
  • [1] A context-based approach to training situation awareness
    Bass, EJ
    Zenyuh, JP
    Small, RL
    Fortin, ST
    THIRD ANNUAL SYMPOSIUM ON HUMAN INTERACTION WITH COMPLEX SYSTEMS - HICS '96, PROCEEDINGS, 1996, : 89 - 95
  • [2] Basing Cybersecurity Training on User Perceptions
    Furman, Susanne M.
    Theofanos, Mary Frances
    Choong, Yee-Yin
    Stanton, Brian
    IEEE SECURITY & PRIVACY, 2012, 10 (02) : 40 - 49
  • [3] Context-based representation of intelligent behavior in training simulations
    Gonzalez, AJ
    Ahlers, R
    TRANSACTIONS OF THE SOCIETY FOR COMPUTER SIMULATION INTERNATIONAL, 1998, 15 (04): : 153 - 166
  • [4] Context-based Hybrid Method for User Query Expansion
    Asfari, Ounas
    Doan, Bich-Lien
    Bourda, Yolaine
    Sansonnet, Jean-Paul
    SEMAPRO 2010: THE FOURTH INTERNATIONAL CONFERENCE ON ADVANCES IN SEMANTIC PROCESSING, 2010, : 69 - 74
  • [5] EFFECTS OF A COGNITIVE ADJUNCT PROCEDURE WITHIN A MICRO-TRAINING SITUATION
    RICHARDSON, B
    STONE, GL
    JOURNAL OF COUNSELING PSYCHOLOGY, 1981, 28 (02) : 168 - 175
  • [6] Establishing a Model for the User Acceptance of Cybersecurity Training
    Fallatah, Wesam
    Kavrestad, Joakim
    Furnell, Steven
    FUTURE INTERNET, 2024, 16 (08)
  • [7] Micro-Training: A Path to Collaborative Success with Paraeducators: Editor: Ferman Konukman
    Konukman, Ferman
    JOURNAL OF PHYSICAL EDUCATION RECREATION AND DANCE, 2020, 91 (08): : 46 - 48
  • [8] Context-Based and Adaptive Cybersecurity Risk Management Framework
    Melaku, Henock Mulugeta
    RISKS, 2023, 11 (06)
  • [9] Context-based learning in the process of training modern teachers (Preschool education)
    Naida, Ruslana
    Korolova, Nataliia
    Danylchenko, Iryna
    Chorna, Hanna
    Sadova, Hanna
    AMAZONIA INVESTIGA, 2022, 11 (52): : 240 - 249
  • [10] Context-based Virtual Adversarial Training for Text Classification with Noisy Labels
    Lee, Do-Myoung
    Kim, Yeachan
    Seo, Chang-gyun
    LREC 2022: THIRTEEN INTERNATIONAL CONFERENCE ON LANGUAGE RESOURCES AND EVALUATION, 2022, : 6139 - 6146