Skip to main content
Top

2019 | OriginalPaper | Chapter

Cyber Security Capacity Building Planning Within Organisations

Authors : Ramo Šendelj, Ivana Ognjanović

Published in: New Technologies, Development and Application

Publisher: Springer International Publishing

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Organisations are facing challenges of protecting their data in cyberspace since damages of cyberattacks might potentially run into billions, besides killing investor confidence and denting brand image. Recent data shows that one of key threats for organisations are insider attacks caused by person who has/had authorized access to an organization’s information system, and thus having the knowledge about the system and being a potential point of intrusion, and jeopardizing the availability, integrity and confidentiality of the organization’s information systems. That is a reason why we analyse key factors influencing planning of capacity building activities for employees, and thus making optimal planning of raising awareness, training and education activities.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference NIST: Guide for Conducting Risk Assessments: Information Security. NIST Special Publication 800-30 (2012) NIST: Guide for Conducting Risk Assessments: Information Security. NIST Special Publication 800-30 (2012)
2.
go back to reference Metalidou, E., Marinagi, C., Trivellas, P., Eberhagen, N., Giannakopoulos, G., Skourlas, C.: Human factor and information security in higher education. J. Syst. Inf. Technol. 16(3), 210–221 (2014)CrossRef Metalidou, E., Marinagi, C., Trivellas, P., Eberhagen, N., Giannakopoulos, G., Skourlas, C.: Human factor and information security in higher education. J. Syst. Inf. Technol. 16(3), 210–221 (2014)CrossRef
3.
go back to reference Stanton, J.M., Stam, K.R., Mastrangelo, P., Jolton, J.: Analysis of end user security behaviors. Comput. Secur. 24, 124–133 (2005)CrossRef Stanton, J.M., Stam, K.R., Mastrangelo, P., Jolton, J.: Analysis of end user security behaviors. Comput. Secur. 24, 124–133 (2005)CrossRef
5.
go back to reference Da Veiga, A., Eloff, J.H.: A framework and assessment instrument for information security culture. Comput. Secur. 29, 196–207 (2010)CrossRef Da Veiga, A., Eloff, J.H.: A framework and assessment instrument for information security culture. Comput. Secur. 29, 196–207 (2010)CrossRef
6.
go back to reference U. Edition: Clearswift Insider Threat Index (CITI). Clearswift (2015) U. Edition: Clearswift Insider Threat Index (CITI). Clearswift (2015)
7.
go back to reference 2016 Cost of Data Breach Study: Global Analysis. Benchmark Research Sponsored by IBM. Ponemon Institute LLC (2016) 2016 Cost of Data Breach Study: Global Analysis. Benchmark Research Sponsored by IBM. Ponemon Institute LLC (2016)
8.
go back to reference The Verizon’s 2016 Data Breach Investigate Report. Verizon (2016) The Verizon’s 2016 Data Breach Investigate Report. Verizon (2016)
9.
go back to reference Egelman, S., Peer, E.: Scaling the security wall: developing a Security Behavior Intentions Scale (SeBIS). In: CHI 2015 (2015) Egelman, S., Peer, E.: Scaling the security wall: developing a Security Behavior Intentions Scale (SeBIS). In: CHI 2015 (2015)
10.
go back to reference Joireman, J., Shaffer, M., Balliet, D., Strathman, A.: Promotion orientation explains why future-oriented people exercise and eat healthy evidence from the two-factor consideration of future consequences-14 scale. Pers. Soc. Psychol. Bull. 38(10), 1272–1287 (2012)CrossRef Joireman, J., Shaffer, M., Balliet, D., Strathman, A.: Promotion orientation explains why future-oriented people exercise and eat healthy evidence from the two-factor consideration of future consequences-14 scale. Pers. Soc. Psychol. Bull. 38(10), 1272–1287 (2012)CrossRef
11.
go back to reference Arden, L., Bement, J.: Building an Information Technology Security Awareness and Training Program. National Institute of Standards and Technology (2003) Arden, L., Bement, J.: Building an Information Technology Security Awareness and Training Program. National Institute of Standards and Technology (2003)
14.
go back to reference Anwar, M., He, W., Ash, I., Yuan, X., Li, L., Xu, L.: Gender difference and employees’ cybersecurity behaviors. Comput. Hum. Behav. 69, 437–443 (2017)CrossRef Anwar, M., He, W., Ash, I., Yuan, X., Li, L., Xu, L.: Gender difference and employees’ cybersecurity behaviors. Comput. Hum. Behav. 69, 437–443 (2017)CrossRef
15.
go back to reference Rees, L.P., Deane, J.K., Rakes, T.R., Baker, W.H.: Decision support for Cybersecurity risk planning. Decis. Support Syst. 51, 493–505 (2011)CrossRef Rees, L.P., Deane, J.K., Rakes, T.R., Baker, W.H.: Decision support for Cybersecurity risk planning. Decis. Support Syst. 51, 493–505 (2011)CrossRef
16.
go back to reference Shropshire, J., Warkentin, M., Sharma, S.: Presonality, attitudes, and intensions: predicitng initial adoption of information security behavior. Comput. Secur. 49, 177–191 (2015)CrossRef Shropshire, J., Warkentin, M., Sharma, S.: Presonality, attitudes, and intensions: predicitng initial adoption of information security behavior. Comput. Secur. 49, 177–191 (2015)CrossRef
Metadata
Title
Cyber Security Capacity Building Planning Within Organisations
Authors
Ramo Šendelj
Ivana Ognjanović
Copyright Year
2019
DOI
https://doi.org/10.1007/978-3-319-90893-9_27