Security and Behaviour Change

Security behaviour change challenges

Scenario 1: The Challenge of Contextual Nature of Security Practices Target Audience: Employees of an OrganizationInsecure Behavior: Sharing Potentially Sensitive Information Scenario: In a large financial institution, employees frequently discuss work-related matters during lunch breaks in public spaces such as cafes near the office. While these conversations seem harmless, they often include discussions about sensitive […]

Security behaviour change challenges Read More »

Introduction to common security problems

Understanding Security Behaviors Identifying which cybersecurity behaviors need to be influenced is crucial but challenging. It involves recognizing patterns and connections between different behaviors and understanding their impact on overall security. This process is essential for developing effective strategies to promote safer practices among users. Key Points from the Podcast In the podcast “Human-Centered Cybersecurity

Introduction to common security problems Read More »

Types of security behaviours revisited

When revisiting the types of security behaviors in the context of personal exposure, physical damage, privacy violation, and fraud and identity theft, it’s crucial to understand how these categories represent different aspects of security risks. Below is a detailed explanation of each category, an analysis of the behavioral similarities and dissimilarities found in the case

Types of security behaviours revisited Read More »

Activity – Group and sort security behaviours

To group and sort security behaviors effectively, it’s essential to understand the different typology techniques that can be applied. Here’s a detailed explanation of how to approach this task: 1. Reviewing Security Behaviors Security Behaviors Collection: 2. Typology Techniques for Grouping and Sorting Security Behaviors Typology techniques are methods used to classify behaviors into categories

Activity – Group and sort security behaviours Read More »

Security awareness campaigns

Security awareness campaigns aim to educate individuals on best practices for protecting themselves and their organizations from cybersecurity threats. Here’s a detailed explanation of the concepts and strategies discussed in the transcript: 1. Security Awareness Campaigns Purpose and Effectiveness: Book Reference: 2. Weak Passwords Risks: Encouraging Stronger Passwords: Book Reference: 3. Public WiFi Networks Risks:

Security awareness campaigns Read More »

Overview of types of security behaviours

Overview of Types of Security Behaviors In cybersecurity, categorizing behaviors helps in understanding and addressing security issues effectively. The four main categories you mentioned—account compromise, data theft, malware infection, and data leak—represent different types of security incidents. Here’s a detailed breakdown of each category and the behavioral themes across these categories: 1. Account Compromise 2.

Overview of types of security behaviours Read More »

Introduction to creating a typology of security behaviours

Creating a typology of security behaviors involves classifying and organizing different behaviors into categories or families. This approach helps in understanding and influencing these behaviors more effectively. Key Concepts from Typology Building: Key Paper for Reference: AdminWe love to share our knowledge on current technologies. Our motto is ‘Do our best so that we can’t

Introduction to creating a typology of security behaviours Read More »

Activity – Behaviour change case studies

Scenario: Passwords In this scenario, employees often use weak or reused passwords, which poses significant security risks. Here are the solutions proposed: Best Method(s): Scenario: Phishing Awareness for Small Business In small businesses, employees may not prioritize security due to limited resources and time constraints. Here are the solutions proposed: Best Method(s): Book References for

Activity – Behaviour change case studies Read More »

Applying Protection Motivation Theory to a Practical Security Problem

Protection Motivation Theory (PMT) is widely used in cybersecurity to understand and influence security behaviors within organizations. The theory posits that individuals’ protective behaviors are driven by their motivation to protect themselves from perceived threats, and it can be applied to address issues like weak or non-compliant security behaviors. Practical Example: Enhancing IS Security Compliance

Applying Protection Motivation Theory to a Practical Security Problem Read More »

Matching a behaviour change model to a scenario

In the provided scenario, the goal is to design a behavioral intervention to encourage employees to report potential phishing emails. The scenario outlines that employees have been trained on identifying phishing emails and a reporting mechanism is in place, but they are not utilizing it. To address this, the Extended Parallel Process Model (EPPM), a

Matching a behaviour change model to a scenario Read More »