Dec 10, 2020 | Research library
Cyber risk assessment standards and methodologies do not consider psychological, social and behavioural parameters in their classifications of the attackers’ types, profiles, and competencies. In this paper, we present a holistic, multidimensional approach to...
Dec 4, 2020 | Research library
While training individuals on best practices in cybersecurity continues to be implemented, prior research has found that training people in the use of secure passwords has not proven to be effective. Developing profiles of individual who are likely to become victims...
Nov 23, 2020 | Research library
This paper presents a cyber-security culture framework for assessing and evaluating the current security readiness of an organization’s workforce. Having conducted a thorough review of the most commonly used security frameworks, it identifies core security...
Oct 1, 2020 | Research library
Previous studies have observed an intention-behavior gap that has been labeled the “privacy paradox”: people disclose personal information (behavior) despite expressing negative sharing intentions (in surveys). However, this phenomenon has not been studied in the...
Sep 17, 2020 | Research library
Cybersecurity controls are deployed to manage risks posed by malicious behaviours or systems. What is not often considered or articulated is how cybersecurity controls may impact legitimate users (often those whose use of a managed system needs to be protected, and...
Sep 14, 2020 | Research library
As organizations continue to invest in phishing awareness training programs, many chief information security officers (CISOs) are concerned when their training exercise click rates are high or variable, as they must justify training budgets to organization officials...