Developing cybersecurity culture to influence employee behavior: A practice perspective

被引:72
作者
Alshaikh, Moneer [1 ,2 ]
机构
[1] Univ Jeddah, Coll Comp Sci & Engn, Dept Cybersecur, Jeddah, Saudi Arabia
[2] Univ Melbourne, Sch Comp & Informat Syst, Melbourne Sch Engn, Melbourne, Vic 3010, Australia
关键词
Cybersecurity culture; Behavior change; Cyber security awareness; Information security management; Cybersecurity initiatives; Cybersecurity champion network; Cybersecurity hub; INFORMATION SECURITY CULTURE; DESIGN;
D O I
10.1016/j.cose.2020.102003
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper identifies and explains five key initiatives that three Australian organizations have implemented to improve their respective cyber security cultures. The five key initiatives are: identifying key cyber security behaviors, establishing a 'cyber security champion' network, developing a brand for the cyber team, building a cyber security hub, and aligning security awareness activities with internal and external campaigns. These key initiatives have helped organizations exceed minimal standards-compliance to create functional cyber security cultures. This paper discusses why these initiatives have been effective and provides practical guidance on their integration into organizational security program (c) 2020 Elsevier Ltd. All rights reserved.
引用
收藏
页数:10
相关论文
共 48 条
  • [11] SEEING THE FOREST AND THE TREES: A META-ANALYSIS OF THE ANTECEDENTS TO INFORMATION SECURITY POLICY COMPLIANCE
    Cram, W. Alec
    D'Arcy, John
    Proudfoot, Jeffrey G.
    [J]. MIS QUARTERLY, 2019, 43 (02) : 525 - +
  • [12] A framework and assessment instrument for information security culture
    Da Veiga, A.
    Eloff, J. H. P.
    [J]. COMPUTERS & SECURITY, 2010, 29 (02) : 196 - 207
  • [13] Defining organisational information security culture-Perspectives from academia and industry
    da Veiga, Adele
    Astakhova, Liudmila, V
    Botha, Adele
    Herselman, Marlien
    [J]. COMPUTERS & SECURITY, 2020, 92 (92)
  • [14] Dojkovski S., 2010, P 21 AUSTR C INF SYS
  • [15] ENISA, 2018, CYB SEC CULT ORG
  • [16] European Union Agency for Network and Information Security (ENISA), 2017, CYB SEC CULT ORG
  • [17] Fennelly L.J., 2020, PROFESSIONAL PROTECT, P397
  • [18] Fertig T., 2020, P 28 EUR C INF SYST
  • [19] From culture to disobedience: Recognising the varying user acceptance of IT security
    Furnell, Steven
    Thomson, Kerry-Lynn
    [J]. Computer Fraud and Security, 2009, 2009 (02) : 5 - 10
  • [20] Gabriel T, 2011, COMPUT FRAUD SECUR, P8, DOI 10.1016/S1361-3723(11)70082-3