Research on information security awareness of groups based on cellular automata

Information security awareness(ISA) of end-user in organizations is crucially important to defense Information security threats. The paper starts with issue and focuses on the internal and external factors of influencing individual ISA. By the interactions among individuals, leaders and different groups, multiple individual ISAs can be regarded as a complex system. Hereby, an ISA evolutionary model based on cellular automata is proposed to study the ISA transition and spatial distribution. The simulation experiments show the average level of ISA in group is fluctuating with individual movement, interactions and security training etc., and the ISA distribution has features of plasticity, sociality, diffusibility and relative independent ability. Besides, the roles of leaders have an great impact on the ISA stability in groups.

[1]  Valerie Spicer,et al.  A cellular automata model on residential migration in response to neighborhood social dynamics , 2010, Math. Comput. Model..

[2]  Sancheng Peng,et al.  Modeling the dynamics of worm propagation using two-dimensional cellular automata in smartphones , 2013, J. Comput. Syst. Sci..

[3]  Jeffrey M. Stanton,et al.  Analysis of end user security behaviors , 2005, Comput. Secur..

[4]  Hennie A. Kruger,et al.  A prototype for assessing information security awareness , 2006, Comput. Secur..

[5]  Martin P. Loeb,et al.  CSI/FBI Computer Crime and Security Survey , 2004 .

[6]  James Cox,et al.  Information systems user security: A structured model of the knowing-doing gap , 2012, Comput. Hum. Behav..

[7]  Stephen Wolfram,et al.  A New Kind of Science , 2003, Artificial Life.

[8]  Sun Shao-rong Simulation of Organized Groups' Behavior Based on Cellular Automata , 2012 .

[9]  R. Power CSI/FBI computer crime and security survey , 2001 .

[10]  Peter B. Borwein,et al.  uzzy cognitive maps and cellular automata : An evolutionary approach or social systems modelling , 2012 .

[11]  Richard Taylor,et al.  Knowledge diffusion dynamics and network properties of face-to-face interactions , 2004 .

[12]  Yuan Hongyong Fire evacuation model based on motor schema and cellular automaton , 2007 .

[13]  Rossouw von Solms,et al.  From policies to culture , 2004, Comput. Secur..

[14]  Tejaswini Herath,et al.  Encouraging information security behaviors in organizations: Role of penalties, pressures and perceived effectiveness , 2009, Decis. Support Syst..