Cybersecurity when working from home during COVID-19: considering the human factors

被引:4
作者
Whitty, Monica T. [1 ]
Moustafa, Nour [2 ]
Grobler, Marthie [3 ]
机构
[1] Monash Univ, Software Syst & Cybersecur, Wellington Rd, Melbourne, Vic 3800, Australia
[2] UNSW Canberra, Northcott Dr, Campbell, ACT 2612, Australia
[3] CSIROs Data61, Village St & Fishplate Ln, Docklands, Vic 3008, Australia
来源
JOURNAL OF CYBERSECURITY | 2024年 / 10卷 / 01期
关键词
working from home; human factors cybersecurity; policy; cybersecurity training; cybersecurity education; cyber awareness; Vygotskian approach; CYBER HYGIENE; BEHAVIORS;
D O I
10.1093/cybsec/tyae001
中图分类号
C [社会科学总论];
学科分类号
03 ; 0303 ;
摘要
This research examined the lives of Australian employees who moved to work from home during COVID-19. Taking a unique approach to cybersecurity, we sought to gain insights into the intermingling of individuals' personal lives and technology to inform policies and educational programmes. The study employed interpretative phenomenological analysis to understand 27 participants' lived experiences under lockdown. We found that psychological (e.g. stress, anxiety, confidence, motivation) and sociological (e.g. sharing physical spaces, digital divide) factors impacted employees' likelihood and ability to engage in effective cybersecurity practices. So did new ways of using technology (e.g. teaching via Zoom), which elucidated unexpected but significant security concerns (e.g. naked children in virtual classrooms). We suggest that cyber educators and policymakers take a Vygotskian approach, which considers that social interaction is central to learning. This assumption means that personal factors must be considered instead of a 'one-size-fits-all approach'. We argue that organizations should think about approaches that consider the employees' psychological state before training (and perhaps find ways to reduce anxiety), helping employees redesign their home workspaces to ensure privacy and concentration, and updating employees' digital devices. Practitioners and scholars can also apply these results post-COVID-19, especially if the 'new working normal' provides options for employees to work from home.
引用
收藏
页数:11
相关论文
共 38 条
[1]   Users are not the enemy [J].
Adams, A ;
Sasse, MA .
COMMUNICATIONS OF THE ACM, 1999, 42 (12) :41-46
[2]   A taxonomy of cyber-harms: Defining the impacts of cyber-attacks and understanding how they propagate [J].
Agrafiotis, Ioannis ;
Nurse, Jason R. C. ;
Goldsmith, Michael ;
Creese, Sadie ;
Upton, David .
JOURNAL OF CYBERSECURITY, 2018, 4 (01)
[3]   Understanding Awareness of Cyber Security Threat Among IT Employees [J].
AL-Mohannadi, Hamad ;
Awan, Irfan ;
Al Hamar, Jassim ;
Al Hamar, Yousef ;
Shah, Mohammad ;
Musa, Ahmad .
2018 IEEE 6TH INTERNATIONAL CONFERENCE ON FUTURE INTERNET OF THINGS AND CLOUD WORKSHOPS (W-FICLOUD 2018), 2018, :188-192
[4]   Reviewing Cyber Security Social Engineering Training and Awareness Programs-Pitfalls and Ongoing Issues [J].
Aldawood, Hussain ;
Skinner, Geoffrey .
FUTURE INTERNET, 2019, 11 (03)
[5]  
Blythe J.M., 2013, P CHI 2013 DOCT CONS, P92
[6]  
Borrett Martin, 2013, J Bus Contin Emer Plan, V7, P163
[7]  
Braun V., 2006, Qualitative Research in Psychology, V3, P77, DOI [10.1191/1478088706qp063oa, DOI 10.1191/1478088706QP063OA]
[8]   When believing in technology leads to poor cyber security: Development of a trust in technical controls scale [J].
Butavicius, Marcus ;
Parsons, Kathryn ;
Lillie, Meredith ;
McCormac, Agata ;
Pattinson, Malcolm ;
Calic, Dragana .
COMPUTERS & SECURITY, 2020, 98
[9]   An exploratory study of cyber hygiene behaviors and knowledge [J].
Cain, Ashley A. ;
Edwards, Morgan E. ;
Still, Jeremiah D. .
JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2018, 42 :36-45
[10]  
Callary B, 2015, QUAL REP, V20, P63