EconPapers    
Economics at your fingertips  
 

An effective approach to addressing human security vulnerability in an organisation

Masha Sedova

Cyber Security: A Peer-Reviewed Journal, 2018, vol. 2, issue 1, 51-65

Abstract: The current security awareness framework is far from effective, with little measured impact or enjoyment from its participants. Instead, the science of behaviour change provides a solid framework for security practitioners to consider when looking to create security awareness programmes that have a measurable impact on the underlying security posture of an organisation and its employees. The model of behaviour change suggests that for someone to change a behaviour, three essential ingredients need to coexist: motivation, ability and triggers. First, practitioners must select and prioritise the most critical security behaviours to focus on. To create desired change in those behaviours, practitioners can make a behaviour easier to do (increase ability) or drive up motivation around the targeted behaviour (increase motivation). Ability can be improved through technology or educational means. Motivation can be harnessed on an individual and organisational level and should be leveraged when the task at hand is difficult to do. With these tools in hand, it is possible to create effective campaigns with measurable impact to address the top issues in human security, such as reducing phishing and increasing reporting rates.

Keywords: security behaviour change; security awareness; security training; phishing prevention (search for similar items in EconPapers)
JEL-codes: M15 (search for similar items in EconPapers)
Date: 2018
References: Add references at CitEc
Citations:

Downloads: (external link)
https://hstalks.com/article/3988/download/ (application/pdf)
https://hstalks.com/article/3988/ (text/html)
Requires a paid subscription for full access.

Related works:
This item may be available elsewhere in EconPapers: Search for items with the same title.

Export reference: BibTeX RIS (EndNote, ProCite, RefMan) HTML/Text

Persistent link: https://EconPapers.repec.org/RePEc:aza:csj000:y:2018:v:2:i:1:p:51-65

Access Statistics for this article

More articles in Cyber Security: A Peer-Reviewed Journal from Henry Stewart Publications
Bibliographic data for series maintained by Henry Stewart Talks ().

 
Page updated 2025-03-19
Handle: RePEc:aza:csj000:y:2018:v:2:i:1:p:51-65