TY - GEN
T1 - An Instrument to Measure Human Behavior Toward Cyber Security Policies
AU - Alissa, Khalid Adnan
AU - Alshehri, Hanan Abdullah
AU - Dahdouh, Shahad Abdulaziz
AU - Alsubaie, Basstaa Mohammad
AU - Alghamdi, Afnan Mohammed
AU - Alharby, Abdulrahman
AU - Almubairik, Norah Ahmed
N1 - Publisher Copyright:
© 2018 IEEE.
PY - 2018/12/27
Y1 - 2018/12/27
N2 - Human is the weakest link in information security. Even with strong cyber security policies an organization can still be hacked because of a human error. Even if people are aware of the policies and their importance they might not behave accordingly. This shows to the importance of studying and measuring human behavior toward cyber security policies. This paper introduces a new instrument that can be used to measure human behavior toward cybersecurity policies through creative measures. The goal is to gather data about human behaviors toward cybersecurity policies in natural environment. This method of gathering information allows people to behave normally and don't feel the need to answer perfectly. The paper illustrates all the previous work related to the subject, summarizing previous work in order to improve what have been previously done. The methodology seeks on measuring behavior based on specific measures. These measures are the password, email, identity, sensitive data, and physical/resource security. Each measure has a number of policies used to measure behavior. These policies were selected among several policies based on literature from the same field and the opinion of experts in the field. These question that went through several rounds of check were used to build the proposedinstrument. This instrument then shall be used by researchers to collect data and perform the required analysis. This paper discusses the behavior pattern in a detail and concise manner. The paper demonstrates that it is posable to measure behavior if the right we questions were asked in the right way.
AB - Human is the weakest link in information security. Even with strong cyber security policies an organization can still be hacked because of a human error. Even if people are aware of the policies and their importance they might not behave accordingly. This shows to the importance of studying and measuring human behavior toward cyber security policies. This paper introduces a new instrument that can be used to measure human behavior toward cybersecurity policies through creative measures. The goal is to gather data about human behaviors toward cybersecurity policies in natural environment. This method of gathering information allows people to behave normally and don't feel the need to answer perfectly. The paper illustrates all the previous work related to the subject, summarizing previous work in order to improve what have been previously done. The methodology seeks on measuring behavior based on specific measures. These measures are the password, email, identity, sensitive data, and physical/resource security. Each measure has a number of policies used to measure behavior. These policies were selected among several policies based on literature from the same field and the opinion of experts in the field. These question that went through several rounds of check were used to build the proposedinstrument. This instrument then shall be used by researchers to collect data and perform the required analysis. This paper discusses the behavior pattern in a detail and concise manner. The paper demonstrates that it is posable to measure behavior if the right we questions were asked in the right way.
KW - component
KW - Cyber security policies
KW - Gamification
KW - Human behavior
KW - Information system policie
KW - Masuerment instrument
UR - https://www.scopus.com/pages/publications/85061484730
U2 - 10.1109/NCG.2018.8592978
DO - 10.1109/NCG.2018.8592978
M3 - Conference contribution
AN - SCOPUS:85061484730
T3 - 21st Saudi Computer Society National Computer Conference, NCC 2018
BT - 21st Saudi Computer Society National Computer Conference, NCC 2018
PB - Institute of Electrical and Electronics Engineers Inc.
T2 - 21st Saudi Computer Society National Computer Conference, NCC 2018
Y2 - 25 April 2018 through 26 April 2018
ER -