An extended perspective on cybersecurity education

The current trend of ubiquitous device use whereby computing is becoming increasingly context-aware and personal, has created a growing concern for the protection of personal privacy. Privacy is an essential component of security, and there is a need to be able to secure personal computers and networks to minimize privacy depreciation within cyberspace. Human error has been recognized as playing a major role in security breaches: Hence technological solutions alone cannot adequately address the emerging security and privacy threats. Home users are particularly vulnerable to cybersecurity threats for a number of reasons, including a particularly important one that our research seeks to address: The lack of cybersecurity education. We argue that research seeking to address the human element of cybersecurity should not be limited only to the design of more usable technical security mechanisms, but should be extended and applied to offering appropriate training to all stakeholders within cyberspace.

[1]  Xu Sun,et al.  An Augmented Cybersecurity Behavioral Research Model , 2016, 2016 IEEE 40th Annual Computer Software and Applications Conference (COMPSAC).

[2]  Cormac Herley,et al.  More Is Not the Answer , 2014, IEEE Security & Privacy.

[3]  J. Manyika Big data: The next frontier for innovation, competition, and productivity , 2011 .

[4]  John Anderson,et al.  Minimalist User Modelling in a Complex Commercial Software System , 2000, User Modeling and User-Adapted Interaction.

[5]  J. Doug Tygar,et al.  Why Johnny Can't Encrypt: A Usability Evaluation of PGP 5.0 , 1999, USENIX Security Symposium.

[6]  Princely Ifinedo,et al.  Understanding information systems security policy compliance: An integration of the theory of planned behavior and the protection motivation theory , 2012, Comput. Secur..

[7]  Hanudin Amin Journal of Internet Banking and Commerce Internet Banking Adoption among Young Intellectuals , 2022 .

[8]  Zinta S. Byrne,et al.  The Psychology of Security for the Home Computer User , 2012, 2012 IEEE Symposium on Security and Privacy.

[9]  Nuray Aykin,et al.  Individual differences in human-computer interaction: a survey , 1991 .

[10]  T. Ramayah,et al.  Doing e-Research with e-Library: Determinants of Perceived Ease of Use of e-Library , 2006 .

[11]  Clare-Marie Karat,et al.  Usable security and privacy: a case study of developing privacy management tools , 2005, SOUPS '05.

[12]  Shari Lawrence Pfleeger,et al.  Guest Editors' Introduction: Shouldn't All Security Be Usable? , 2011, IEEE Secur. Priv..

[13]  Chaomei Chen,et al.  Individual differences in virtual environments-introduction and overview , 2000 .

[14]  Patrick Y. K. Chau,et al.  Influence of Computer Attitude and Self-Efficacy on IT Usage Behavior , 2001, J. Organ. End User Comput..

[15]  André P. Calitz,et al.  The evaluation of an adaptive user interface model , 2010, SAICSIT '10.

[16]  Sadie Creese,et al.  Guidelines for usable cybersecurity: Past and present , 2011, 2011 Third International Workshop on Cyberspace Safety and Security (CSS).

[17]  Hassan Jameel Asghar,et al.  Design and analysis of human identification protocols , 2012 .

[18]  Mohd Salehuddin Mohd Zahari,et al.  Individual Differences, Perceived Ease of Use, and Perceived Usefulness in the E-Library Usage , 2009, Comput. Inf. Sci..

[19]  Adel Mahfoudhi,et al.  Bayesian networks for user modeling: Predicting the user's preferences , 2013, 13th International Conference on Hybrid Intelligent Systems (HIS 2013).

[20]  Kar Yan Tam,et al.  What leads to user acceptance of digital libraries? , 2004, CACM.

[21]  Bassam Hasan,et al.  Delineating the effects of general and system-specific computer self-efficacy beliefs on IS acceptance , 2006, Inf. Manag..

[22]  Jeffrey M. Stanton,et al.  Analysis of end user security behaviors , 2005, Comput. Secur..

[23]  Giuseppe Di Modica,et al.  Dynamically Adaptable User Interface Generation for Heterogeneous Computing Devices , 2005, HPCC.

[24]  Kar Yan Tam,et al.  Determinants of User Acceptance of Digital Libraries: An Empirical Examination of Individual Differences and System Characteristics , 2002, J. Manag. Inf. Syst..

[25]  Mikko T. Siponen,et al.  Motivating IS security compliance: Insights from Habit and Protection Motivation Theory , 2012, Inf. Manag..

[26]  Cristina Conati,et al.  What role can adaptive support play in an adaptable system? , 2004, IUI '04.

[27]  Shari Lawrence Pfleeger,et al.  Leveraging behavioral science to mitigate cyber security risk , 2012, Comput. Secur..

[28]  Gabriele Lenzini,et al.  Maybe Poor Johnny Really Cannot Encrypt: The Case for a Complexity Theory for Usable Security , 2015, NSPW.