Adapting Cyber-Security Training to Your Employees

被引:0
|
作者
Pattinson, M. [1 ]
Butavicius, M. [2 ]
Ciccarello, B. [1 ]
Lillie, M. [1 ]
Parsons, K. [2 ]
Calic, D. [2 ]
McCormac, A. [2 ]
机构
[1] Univ Adelaide, Adelaide Business Sch, Adelaide, SA, Australia
[2] Def Sci & Technol Grp, Edinburgh, SA, Australia
关键词
Information Security (InfoSec); Human Aspects of Cyber Security (HACS); Human Aspects of Information Security Questionnaire (HAIS-Q); Adaptive Control Framework (ACF); Information Security Awareness (ISA); Learning Styles; Training; CONTROL FRAMEWORK;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The aim of this paper is twofold. First, it introduces the concept of a framework of controls that relates to the human aspects of cyber security, which is adaptable to different types of organisations and different types of employees. A review of the literature confirmed that Adaptive Control Frameworks (ACFs) for cyber security exist, but only in terms of hardware and software controls. The second aim of this paper is to empirically test the effectiveness of one of these adaptive controls, namely, the type of training provided. A total of 1048 working Australian adults completed the Human Aspects of Information Security Questionnaire (HAIS-Q). This included questions relating to the types of cyber-security training they had received and how often it was provided, and a set of questions called the Cyber-security Learning Styles Inventory to identify their preferred learning styles for training. The frequency of training did not directly predict Information Security Awareness (ISA) levels. However, the extent to which the training received was matched with an individual's learning preferences was positively associated with ISA levels. This finding supports the hypothesis that if training interventions are adapted to the learning styles of individuals, their level of ISA will improve and therefore their non-malicious behaviour, whilst using a digital device to do their work, will be safer. The practical implications of this finding, as well as suggestions for further research on the ACF, are also discussed.
引用
收藏
页码:67 / 79
页数:13
相关论文
共 50 条
  • [1] Cyber-Security Training Evaluation Metrics
    Koutsouris, Nikolaos
    Vassilakis, Costas
    Kolokotronis, Nicholas
    [J]. PROCEEDINGS OF THE 2021 IEEE INTERNATIONAL CONFERENCE ON CYBER SECURITY AND RESILIENCE (IEEE CSR), 2021, : 192 - 197
  • [2] Enabling Practical Experimentation in Cyber-Security Training
    Mao, Jian
    Chua, Zheng Leong
    Liang, Zhenkai
    [J]. 2017 IEEE CONFERENCE ON DEPENDABLE AND SECURE COMPUTING, 2017, : 516 - 517
  • [3] The THREAT-ARREST Cyber-Security Training Platform
    Soultatos, Othonas
    Fysarakis, Konstantinos
    Spanoudakis, George
    Koshutanski, Hristo
    Damiani, Ernesto
    Beckers, Kristian
    Wortmann, Dirk
    Bravos, George
    Ioannidis, Menelaos
    [J]. COMPUTER SECURITY: ESORICS 2019 INTERNATIONAL WORKSHOPS, IOSEC, MSTEC, AND FINSEC, 2020, 11981 : 199 - 214
  • [4] EXPLORING THE EFFECT OF TRAINING ON REALIZING EFFECTIVE CYBER-SECURITY
    Saravanos, A.
    Curinga, M.
    Auchter, K.
    [J]. INTED2017: 11TH INTERNATIONAL TECHNOLOGY, EDUCATION AND DEVELOPMENT CONFERENCE, 2017, : 9762 - 9762
  • [5] Social Cyber-Security
    Carley, Kathleen M.
    Cervone, Guido
    Agarwal, Nitin
    Liu, Huan
    [J]. SOCIAL, CULTURAL, AND BEHAVIORAL MODELING, SBP-BRIMS 2018, 2018, 10899 : 389 - 394
  • [6] REGULATING CYBER-SECURITY
    Sales, Nathan Alexander
    [J]. NORTHWESTERN UNIVERSITY LAW REVIEW, 2013, 107 (04) : 1503 - 1568
  • [7] Cyber-security threat
    Klebba, Jesse
    [J]. CHEMISTRY & INDUSTRY, 2017, 81 (10) : 9 - 9
  • [8] Cyber-Security and Privacy
    Lopez, Javier
    Martinelli, Fabio
    Samarati, Pierangela
    [J]. ERCIM NEWS, 2015, (100): : 10 - 11
  • [9] Balancing Cyber-Security and Privacy
    Patakyova, Maria T.
    [J]. BRATISLAVA LAW REVIEW, 2020, 4 (01): : 181 - 183
  • [10] CYBER-SECURITY RISKS OF FEDWIRE
    Bilger, Mark J.
    [J]. JOURNAL OF DIGITAL FORENSICS SECURITY AND LAW, 2019, 14 (04)