2019
DOI: 10.1007/s11257-019-09236-5
|View full text |Cite
|
Sign up to set email alerts
|

Exploring user behavioral data for adaptive cybersecurity

Abstract: This paper describes an exploratory investigation into the feasibility of predictive analytics of user behavioural data as a possible aid in developing effective user models for adaptive cybersecurity. Partial Least Squares Structural Equation Modelling (PLS-SEM) is applied to the domain of cybersecurity by collecting data on users' attitude towards digital security, and analysing how that influences their adoption and usage of technological security controls. Bayesian-network modeling is then applied to integ… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

1
10
0
1

Year Published

2021
2021
2024
2024

Publication Types

Select...
7
2

Relationship

0
9

Authors

Journals

citations
Cited by 30 publications
(41 citation statements)
references
References 98 publications
(117 reference statements)
1
10
0
1
Order By: Relevance
“…Critically, research has highlighted the challenges of incorporating individual differences and other socio-cultural variables when applying usable security design heuristics (Jaferian et al 2011 ; Quiñones and Rusu 2017 ). Adaptive and/or personalized user interfaces have been suggested as potential ways of overcoming usability and acceptability issues related to different user domains and contexts (e.g., Addae et al 2019 ).…”
Section: Challenges To Cybersecuritymentioning
confidence: 99%
“…Critically, research has highlighted the challenges of incorporating individual differences and other socio-cultural variables when applying usable security design heuristics (Jaferian et al 2011 ; Quiñones and Rusu 2017 ). Adaptive and/or personalized user interfaces have been suggested as potential ways of overcoming usability and acceptability issues related to different user domains and contexts (e.g., Addae et al 2019 ).…”
Section: Challenges To Cybersecuritymentioning
confidence: 99%
“…This is worth considering in future studies and indeed such experimental effects may help to account for the ENISA report [19] observation that threat information tends to be relatively ineffective in driving behaviour. That said, this study still helps to address the relative lack of experimental approaches to cybersecurity behaviour; of which there are even fewer that combine subjective and objective measures (despite some evidence that hybrid approaches may provide a useful new source of evidence around cybersecurity and cyberinsurance behaviours [14,41]).…”
Section: Discussionmentioning
confidence: 99%
“…All work presented here used different approaches to predict the privacy settings in a binary deny-or-allow fashion, using either existing privacy settings from the same domain, context factors that influence the privacy decision, or additional user input for their prediction. Other recommender systems instead use user behavioral data, for example, for developing user models for adaptive cybersecurity (Addae et al 2019) or to infer a degree of diversity for recommender systems suitable to the user's personality (Wu et al 2018). In the past, we already did some research on how the personality and privacy desires (according to the IUIPC 1 scale) can be used together with context factors as an input to predict privacy levels for specifying the correct audience for a social network post (Raber et al 2017), the detail level of a shared location , which data out of an intelligent retail store should be shared with whom and to assist the user in adapting the permission settings for her smartphone apps (Raber and Krüger 2017).…”
Section: Related Workmentioning
confidence: 99%