Security and Behaviour Change

Key Principles for Effective Cybersecurity Behavior Change Programs

When designing and implementing cybersecurity behavior change programs, it’s crucial to understand that the process is both iterative and complex. Drawing insights from our expert panel, several key principles have emerged, which can serve as guiding frameworks for creating effective and sustainable behavior change initiatives. 1. Behavior Change Takes Time Behavior change in cybersecurity is […]

Key Principles for Effective Cybersecurity Behavior Change Programs Read More »

Comprehensive Overview of Key Learning Outcomes in Cybersecurity Behaviour Change Module

As we near the completion of this module, it’s essential to reflect on the key learning outcomes that have shaped our understanding of cybersecurity behaviors and how they can be influenced and changed. This module has explored several critical dimensions, all of which contribute to the overarching goal of understanding and improving information security through

Comprehensive Overview of Key Learning Outcomes in Cybersecurity Behaviour Change Module Read More »

Designing a Multi-Scale Behaviour Change Programme for Enhanced Cybersecurity Practices

In today’s rapidly evolving digital landscape, cybersecurity threats are becoming increasingly sophisticated, making it essential to instill proactive cybersecurity behaviors across various levels of society. This article will guide you through constructing a multi-scale behaviour change programme aimed at improving cybersecurity practices. The programme will target individuals, organizations, and society as a whole, operating at

Designing a Multi-Scale Behaviour Change Programme for Enhanced Cybersecurity Practices Read More »

Emerging Technologies Shaping Security Behavior Change

The rapid evolution of technology has significantly impacted how security behavior is approached within organizations. Advances in encryption, artificial intelligence (AI), machine learning (ML), and user behavior analytics are leading the way in transforming security practices, ensuring that both individuals and organizations can better protect themselves in an increasingly digital world. This article explores how

Emerging Technologies Shaping Security Behavior Change Read More »

Security behaviour change at different scales

The concept of security behavior change at different scales is crucial in understanding how cybersecurity is managed across various levels of an organization and society. This approach divides the examination into three primary scales: macro, meso, and micro. Macro Level (Organizational or National Scale) At the macro level, the focus is on the overarching policies

Security behaviour change at different scales Read More »

Activity: Creating Security Personas from Popular Media

Creating security personas is a valuable exercise in understanding the different perspectives and roles people assume concerning cyber security. This activity involves selecting a story from a play, TV drama, film, or book that deals with cyber security, and analyzing the characters based on their security positions. Step-by-Step Guide to Creating Security Personas Example: Analyzing

Activity: Creating Security Personas from Popular Media Read More »

Security Positionality in Popular Culture

Security positionality in popular culture is a fascinating area of study because it reveals how society perceives, understands, and interacts with the concept of security, particularly in the digital age. Popular culture—including movies, television shows, books, and even video games—often mirrors societal anxieties and attitudes towards security. These narratives contribute to the shaping of public

Security Positionality in Popular Culture Read More »

Exploring Security Positionality: Understanding Vantage Points in Security Behavior

Security is not a one-size-fits-all concept; it is deeply influenced by the vantage point—or positionality—from which it is approached. The concept of positionality helps us understand how different perspectives shape our understanding of security issues and the strategies we employ to address them. In cybersecurity, this is particularly important as it influences the effectiveness of

Exploring Security Positionality: Understanding Vantage Points in Security Behavior Read More »

Understanding Security Logics: Positive and Negative Security Approaches

Security is a multifaceted concept that has evolved over time, with various scholars contributing to its understanding. One of the critical discussions in this domain involves the concepts of positive and negative security. These concepts are intricately connected to the broader security logics that guide how security is perceived and implemented in different contexts. Security

Understanding Security Logics: Positive and Negative Security Approaches Read More »

Understanding Security Logic

“Security logic” refers to the underlying principles and reasoning that drive security decisions and actions. It involves the frameworks through which security issues are perceived, interpreted, and acted upon by states, organizations, and individuals. This logic dictates how threats are identified, prioritized, and addressed, shaping the overall approach to security. In her paper, Doty examines

Understanding Security Logic Read More »