2019
DOI: 10.1007/978-3-030-20074-9_11
|View full text |Cite
|
Sign up to set email alerts
|

Cybersecurity Behaviour: A Conceptual Taxonomy

Abstract: User cybersecurity behaviour is a concern for organisations as well as home users. This is because cyber-criminals have made a shift from targeting security systems to targeting the users of the systems. As a result, an increasing number of studies have been conducted in efforts to understand user cybersecurity behaviour. The advantage in understanding user behaviour is that researchers and security practitioners can apply this knowledge and begin to change behaviour to benefit cybersecurity. Different studies… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
2
2
2

Relationship

0
6

Authors

Journals

citations
Cited by 7 publications
(2 citation statements)
references
References 21 publications
(25 reference statements)
0
2
0
Order By: Relevance
“…Based on our classification scheme, it is possible to derive measures for specific types of behavior, such as targeted awareness programs, based on behaviors where employees were not aware of their offenses or specific measures against the different types of expected added values. Further possibilities would be, e.g., the use of behavior with organizational moral or beneficial intention to achieve a positive effect on information security, e.g., promoting an information security culture [32].…”
Section: Discussionmentioning
confidence: 99%
“…Based on our classification scheme, it is possible to derive measures for specific types of behavior, such as targeted awareness programs, based on behaviors where employees were not aware of their offenses or specific measures against the different types of expected added values. Further possibilities would be, e.g., the use of behavior with organizational moral or beneficial intention to achieve a positive effect on information security, e.g., promoting an information security culture [32].…”
Section: Discussionmentioning
confidence: 99%
“…One such example would be that behavior is likely to be different between a user's work-related and private use. That since the user is likely to be constrained by policies and technical security controls at work, but not equally so at home (Mashiane & Kritzinger, 2018). Individual factors such as gender, stress level, the user's security awareness and knowledge, and predisposition to being suspicious are also important factors influencing the users' response to different situations (Chowdhury, Adam, & Skinner, 2019;Donalds & Osei-Bryson, 2020;Harrison, Vishwanath, & Rao, 2016).…”
Section: Theoretical Backgroundmentioning
confidence: 99%