Matches in SemOpenAlex for { <https://semopenalex.org/work/W3048947157> ?p ?o ?g. }
Showing items 1 to 71 of
71
with 100 items per page.
- W3048947157 abstract "Cyber-security is not concerned so much with average or median vulnerability in an organization. Rather more important is identifying the weakest links. Individual user susceptibility and user behaviour risk assessment are key to measuring the effectiveness of cyber-security awareness programs and policies. Increasingly, it has been demonstrated that managing individual user susceptibility is as critical to organization well-being as maintaining patched IT infrastructure or responding to specific immediate cyber-threat alerts.
 Despite IT systems audits, human factor studies, training courses, user policies, and user documentation, managing user cyber-security awareness remains one of the weakest links in protecting organizations from cyber-threats. Most employees are not aware of the cyber-threats they are most likely to encounter while performing their work. They are susceptible to malicious manipulation (social engineering threats) and they tend not to follow standard procedures (either through ignorance or in attempting to circumvent security procedures to achieve more productivity). Typically, employees only recognize the importance of cyber-security policies and practices after an incident has happened to themselves.
 With the increasing availability and utility of IT network traffic analysis tools and active user behaviour probes (e.g., fake-phishing), employees can be given direct and individual feedback to increase their cyber-security awareness and improve their cyber-security practices. Beyond an organization’s employees, the same holds for a country’s citizens, or a government’s public servants. At their best, these user behaviour monitoring tools can be used in an open and transparent way to increase awareness of individual vulnerability before actual incidents occur.
 In addition to presenting results from the application of user behaviour monitoring tools to cybersecurity, this paper examines the efficacy of the privacy protection safeguards that they incorporate. These results are applied to public sector approaches to: (a) public awareness of citizen cyber-health; (b) securing online pubic services; and (c) public servant awareness of their own vulnerability to cyber-threats." @default.
- W3048947157 created "2020-08-18" @default.
- W3048947157 creator A5010616205 @default.
- W3048947157 creator A5035524983 @default.
- W3048947157 creator A5049555575 @default.
- W3048947157 date "2018-02-14" @default.
- W3048947157 modified "2023-09-24" @default.
- W3048947157 title "Individual awareness of cyber-security vulnerability - Citizen and public servant" @default.
- W3048947157 doi "https://doi.org/10.24989/ocg.v325.34" @default.
- W3048947157 hasPublicationYear "2018" @default.
- W3048947157 type Work @default.
- W3048947157 sameAs 3048947157 @default.
- W3048947157 citedByCount "0" @default.
- W3048947157 crossrefType "journal-article" @default.
- W3048947157 hasAuthorship W3048947157A5010616205 @default.
- W3048947157 hasAuthorship W3048947157A5035524983 @default.
- W3048947157 hasAuthorship W3048947157A5049555575 @default.
- W3048947157 hasBestOaLocation W30489471571 @default.
- W3048947157 hasConcept C108827166 @default.
- W3048947157 hasConcept C137176749 @default.
- W3048947157 hasConcept C144133560 @default.
- W3048947157 hasConcept C15744967 @default.
- W3048947157 hasConcept C167063184 @default.
- W3048947157 hasConcept C17744445 @default.
- W3048947157 hasConcept C2993022102 @default.
- W3048947157 hasConcept C3116431 @default.
- W3048947157 hasConcept C38652104 @default.
- W3048947157 hasConcept C39549134 @default.
- W3048947157 hasConcept C41008148 @default.
- W3048947157 hasConcept C77805123 @default.
- W3048947157 hasConcept C95713431 @default.
- W3048947157 hasConceptScore W3048947157C108827166 @default.
- W3048947157 hasConceptScore W3048947157C137176749 @default.
- W3048947157 hasConceptScore W3048947157C144133560 @default.
- W3048947157 hasConceptScore W3048947157C15744967 @default.
- W3048947157 hasConceptScore W3048947157C167063184 @default.
- W3048947157 hasConceptScore W3048947157C17744445 @default.
- W3048947157 hasConceptScore W3048947157C2993022102 @default.
- W3048947157 hasConceptScore W3048947157C3116431 @default.
- W3048947157 hasConceptScore W3048947157C38652104 @default.
- W3048947157 hasConceptScore W3048947157C39549134 @default.
- W3048947157 hasConceptScore W3048947157C41008148 @default.
- W3048947157 hasConceptScore W3048947157C77805123 @default.
- W3048947157 hasConceptScore W3048947157C95713431 @default.
- W3048947157 hasLocation W30489471571 @default.
- W3048947157 hasOpenAccess W3048947157 @default.
- W3048947157 hasPrimaryLocation W30489471571 @default.
- W3048947157 hasRelatedWork W106165666 @default.
- W3048947157 hasRelatedWork W2064669928 @default.
- W3048947157 hasRelatedWork W2244779664 @default.
- W3048947157 hasRelatedWork W2256205366 @default.
- W3048947157 hasRelatedWork W2270465613 @default.
- W3048947157 hasRelatedWork W2355224813 @default.
- W3048947157 hasRelatedWork W2416034718 @default.
- W3048947157 hasRelatedWork W2462843623 @default.
- W3048947157 hasRelatedWork W2473446435 @default.
- W3048947157 hasRelatedWork W2475649008 @default.
- W3048947157 hasRelatedWork W2489908742 @default.
- W3048947157 hasRelatedWork W2514655099 @default.
- W3048947157 hasRelatedWork W2576134180 @default.
- W3048947157 hasRelatedWork W2800902502 @default.
- W3048947157 hasRelatedWork W2891683746 @default.
- W3048947157 hasRelatedWork W2894702694 @default.
- W3048947157 hasRelatedWork W3025359831 @default.
- W3048947157 hasRelatedWork W3155101031 @default.
- W3048947157 hasRelatedWork W3109959535 @default.
- W3048947157 hasRelatedWork W3122437233 @default.
- W3048947157 isParatext "false" @default.
- W3048947157 isRetracted "false" @default.
- W3048947157 magId "3048947157" @default.
- W3048947157 workType "article" @default.