EconPapers    
Economics at your fingertips  
 

Usable Security in Work from Home Environments: Understanding User Behaviour Patterns and Risk Assessment: A Systematic Literature Review

Aarone Atuhe Mike, Dr.Richard Ntwari and Akampurira Paul
Additional contact information
Aarone Atuhe Mike: Faculty of computing and informatics, Department of computer science Mbarara University of Science and technology
Dr.Richard Ntwari: Faculty of computing and informatics, Department of computer science Mbarara University of Science and technology
Akampurira Paul: Faculty of Science and technology, Department of computing, Kampala International university

International Journal of Research and Innovation in Applied Science, 2024, vol. 9, issue 12, 80-90

Abstract: The transition to remote work (WFH) during the COVID-19 pandemic has transformed traditional workspaces, offering enhanced flexibility and productivity. However, this shift has also introduced significant cyber security challenges, as employees’ home networks often lack the robust security measures found in corporate environments. The increasing reliance on personal devices and unsecured networks has raised the risk of cyber threats, including phishing attacks and unauthorized access to sensitive information. To address these issues, a systematic literature review was conducted to identify methodologies and practices for governing cyber security in remote settings. This review utilized academic databases such as Google Scholar, IEEE Xplore, and JSTOR, focusing on research related to usable security in remote work contexts. Inclusion criteria emphasized the relevance of studies, their scope, and a balanced mix of qualitative and quantitative research. The analysis revealed key risk behaviors among remote workers, such as password reuse and reliance on unsecured Wi-Fi networks, contributing to a reported 300% increase in cyberattacks. Although existing security measures, like multi-factor authentication (MFA) and virtual private networks (VPNs), provide basic protection, their complexity often leads to non-compliance. Future research should aim to develop user-friendly security solutions that enhance compliance without sacrificing effectiveness.

Date: 2024
References: Add references at CitEc
Citations:

Downloads: (external link)
https://www.rsisinternational.org/journals/ijrias/ ... 9-issue-12/80-90.pdf (application/pdf)
https://rsisinternational.org/journals/ijrias/arti ... c-literature-review/ (text/html)

Related works:
This item may be available elsewhere in EconPapers: Search for items with the same title.

Export reference: BibTeX RIS (EndNote, ProCite, RefMan) HTML/Text

Persistent link: https://EconPapers.repec.org/RePEc:bjf:journl:v:9:y:2024:i:12:p:80-90

Access Statistics for this article

International Journal of Research and Innovation in Applied Science is currently edited by Dr. Renu Malsaria

More articles in International Journal of Research and Innovation in Applied Science from International Journal of Research and Innovation in Applied Science (IJRIAS)
Bibliographic data for series maintained by Dr. Renu Malsaria ().

 
Page updated 2025-03-19
Handle: RePEc:bjf:journl:v:9:y:2024:i:12:p:80-90