2017
DOI: 10.1108/ics-12-2015-0046
|View full text |Cite
|
Sign up to set email alerts
|

A general morphological analysis: delineating a cyber-security culture

Abstract: Purpose The purpose of this paper is to define and delineate cyber security culture. Cyber security has been a concern for many years. In an effort to mitigate the cyber security risks, technology-centred measures were deemed to be the ultimate solution. Nowadays, however, it is accepted that the process of cyber security requires much more than mere technical controls. On the contrary, it now demands a human-centred approach, including a cyber security culture. Although the role of cultivating a culture in pu… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
10
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 22 publications
(12 citation statements)
references
References 27 publications
0
10
0
Order By: Relevance
“…The GoI is developing the SCI concept with a core of information communication technology (ICT activity). However, there are concerns that the SCI concept might be adversely affected by security problems (Thomson, Von Solms, & Lauw, 2006;Chaturvedi, Sing, Gupta, & Bhattacharya, 2014;Gcaza, Solms, Grobler, & Vuuren, 2017). It is expected that citizens of SCI would use high-speed internet for ensuring easy access to digital services Chhonker, Verma, & Kar, 2017).…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…The GoI is developing the SCI concept with a core of information communication technology (ICT activity). However, there are concerns that the SCI concept might be adversely affected by security problems (Thomson, Von Solms, & Lauw, 2006;Chaturvedi, Sing, Gupta, & Bhattacharya, 2014;Gcaza, Solms, Grobler, & Vuuren, 2017). It is expected that citizens of SCI would use high-speed internet for ensuring easy access to digital services Chhonker, Verma, & Kar, 2017).…”
Section: Introductionmentioning
confidence: 99%
“…The GoI is developing the SCI concept with a core of information communication technology (ICT activity). However, there are concerns that the SCI concept might be adversely affected by security problems (Thomson et al ., 2006; Chaturvedi et al ., 2014; Dwivedi, Rana, Janssen, Lal, Williams and Clement, 2017; Dwivedi, Rana, Jeyaraj, Clement and Williams, 2017; Gcaza et al ., 2017). It is expected that citizens of SCI would use high-speed internet for ensuring easy access to digital services (Chatterjee and Kar, 2017; Chhonker et al ., 2017).…”
Section: Introductionmentioning
confidence: 99%
“…Awareness campaigns and programs that are designed to improve compliance towards cyber security policies or ensure that the risks surrounding cyber crimes and attacks are fully apprehended can influence a country's maturity [18] because users have certain perceptions that can either positively or negatively impact the security process. It is especially cyber security misbehaviour that has a negative impact on cyber security culture, causing resistance to cyber security measures that can compromise its effectiveness and have an impact on a national level [19]. Finally, different groups of people and organisations would require specific cyber security training and interventions based on their own individual processes and needs [20,21].…”
Section: Cyber Security Capacity Buildingmentioning
confidence: 99%
“…The incorporation of an understanding of human behavior into cyber security products and processes can lead to more effective technology ( Pfleeger and Caputo, 2011 ). In contrast, resistance to cyber security measures can compromise the effectiveness of the security level ( Gcaza et al, 2017 ) and as such the psychological aspects should be considered in a true human centric cyber security design. Kraus et al (2017) show that there is a relationship between personality traits and information security.…”
Section: Usermentioning
confidence: 99%
“…Users present overconfidence with an “I won’t be affected by this” attitude. Users have certain perceptions that can either positively or negatively impact their security process ( Gcaza et al, 2017 ). Moreover, Van Schaik et al (2017) show that poor security behaviors are adopted by users and maintained throughout their life progression (from students to workforce).…”
Section: Usermentioning
confidence: 99%