Security and Behaviour Change

dummy-img

Key Principles for Effective Cybersecurity Behavior Change Programs

AdminSep 1, 20243 min read

When designing and implementing cybersecurity behavior change programs, it’s crucial to understand that the process is both iterative and complex. Drawing insights from our expert panel, several key principles have emerged, which can serve as guiding frameworks for creating effective…

dummy-img

Comprehensive Overview of Key Learning Outcomes in Cybersecurity Behaviour Change Module

AdminSep 1, 20245 min read

As we near the completion of this module, it’s essential to reflect on the key learning outcomes that have shaped our understanding of cybersecurity behaviors and how they can be influenced and changed. This module has explored several critical dimensions,…

dummy-img

Designing a Multi-Scale Behaviour Change Programme for Enhanced Cybersecurity Practices

AdminSep 1, 20245 min read

In today’s rapidly evolving digital landscape, cybersecurity threats are becoming increasingly sophisticated, making it essential to instill proactive cybersecurity behaviors across various levels of society. This article will guide you through constructing a multi-scale behaviour change programme aimed at improving…

dummy-img

Emerging Technologies Shaping Security Behavior Change

AdminSep 1, 20243 min read

The rapid evolution of technology has significantly impacted how security behavior is approached within organizations. Advances in encryption, artificial intelligence (AI), machine learning (ML), and user behavior analytics are leading the way in transforming security practices, ensuring that both individuals…

dummy-img

Security behaviour change at different scales

AdminSep 1, 20243 min read

The concept of security behavior change at different scales is crucial in understanding how cybersecurity is managed across various levels of an organization and society. This approach divides the examination into three primary scales: macro, meso, and micro. Macro Level…

dummy-img

Activity: Creating Security Personas from Popular Media

AdminSep 1, 20244 min read

Creating security personas is a valuable exercise in understanding the different perspectives and roles people assume concerning cyber security. This activity involves selecting a story from a play, TV drama, film, or book that deals with cyber security, and analyzing…

dummy-img

Security Positionality in Popular Culture

AdminSep 1, 20243 min read

Security positionality in popular culture is a fascinating area of study because it reveals how society perceives, understands, and interacts with the concept of security, particularly in the digital age. Popular culture—including movies, television shows, books, and even video games—often…

dummy-img

Exploring Security Positionality: Understanding Vantage Points in Security Behavior

AdminSep 1, 20244 min read

Security is not a one-size-fits-all concept; it is deeply influenced by the vantage point—or positionality—from which it is approached. The concept of positionality helps us understand how different perspectives shape our understanding of security issues and the strategies we employ…

dummy-img

Understanding Security Logics: Positive and Negative Security Approaches

AdminSep 1, 20244 min read

Security is a multifaceted concept that has evolved over time, with various scholars contributing to its understanding. One of the critical discussions in this domain involves the concepts of positive and negative security. These concepts are intricately connected to the…

dummy-img

Understanding Security Logic

AdminSep 1, 20243 min read

“Security logic” refers to the underlying principles and reasoning that drive security decisions and actions. It involves the frameworks through which security issues are perceived, interpreted, and acted upon by states, organizations, and individuals. This logic dictates how threats are…