Skip to main content
Erschienen in:

2025 | OriginalPaper | Buchkapitel

The Influence of Human Factors on Adaptive Social Media Cybersecurity Training and Education

verfasst von : Fai Ben Salamah, Marco A. Palomino, Maria Papadaki, Matthew J. Craven, Steven Furnell

Erschienen in: Human Aspects of Information Security and Assurance

Verlag: Springer Nature Switzerland

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Despite the efforts to mitigate the risks posed by social media, no organisation can be completely protected from hackers. Therefore, specialists are increasingly relying on the training and education of the organisations’ workforce to prevent cyberattacks. To investigate the best training strategies available, we have conducted a survey among a large and diverse sample of employees working in various sectors, and we have interviewed people who possess expertise in policymaking and cybersecurity training—either as trainers or trainees. Our analysis reveals that the efficiency of cybersecurity training varies among individuals due to aspects such as motivation, simplicity, the expertise of the trainer, the experience of the trainee, the training environment, customisation, and the delivery methods employed. Moreover, we have concluded that cybersecurity training is contingent upon the trainees’ specific job roles within the organisation. Our findings have the potential to improve cybersecurity training, as well as the productivity of the trainers involved in its development.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
3.
Zurück zum Zitat Sasse, M.A., Brostoff, S., Weirich, D.: Transforming the ‘weakest link’—a human/computer interaction approach to usable and effective security. BT Technol. J. 19(3), 122–131 (2001)CrossRef Sasse, M.A., Brostoff, S., Weirich, D.: Transforming the ‘weakest link’—a human/computer interaction approach to usable and effective security. BT Technol. J. 19(3), 122–131 (2001)CrossRef
4.
Zurück zum Zitat Anwar, M., He, W., Ash, I., Yuan, X., Li, L., Xu, L.: Gender difference and employees’ cybersecurity behaviors. Comput. Hum. Behav. 69, 437–443 (2017)CrossRef Anwar, M., He, W., Ash, I., Yuan, X., Li, L., Xu, L.: Gender difference and employees’ cybersecurity behaviors. Comput. Hum. Behav. 69, 437–443 (2017)CrossRef
5.
Zurück zum Zitat Chapple, M., Stewart, J.M., Gibson, D.: Certified Information System Security Professional (CISSP). SYBEX, ninth edition ed (2021) Chapple, M., Stewart, J.M., Gibson, D.: Certified Information System Security Professional (CISSP). SYBEX, ninth edition ed (2021)
6.
Zurück zum Zitat Triplett, W.J.: Addressing human factors in cybersecurity leadership. J. Cybersecurity and Privacy 2(3), 573–586 (2022)CrossRef Triplett, W.J.: Addressing human factors in cybersecurity leadership. J. Cybersecurity and Privacy 2(3), 573–586 (2022)CrossRef
7.
Zurück zum Zitat Dash, B.: An effective cybersecurity awareness training model: first defense of an organizational security strategy. International Research J. Eng. Technology (IRJET) 9(4) (2022) Dash, B.: An effective cybersecurity awareness training model: first defense of an organizational security strategy. International Research J. Eng. Technology (IRJET) 9(4) (2022)
8.
Zurück zum Zitat Alshaikh, M., Maynard, S.B., Ahmad, A., Chang, S.: An exploratory study of current information security training and awareness practices in organizations. In: Proceedings of the 51st Hawaii International Conference on System Sciences, Honolulu HI, pp. 5085–5094 (2018) Alshaikh, M., Maynard, S.B., Ahmad, A., Chang, S.: An exploratory study of current information security training and awareness practices in organizations. In: Proceedings of the 51st Hawaii International Conference on System Sciences, Honolulu HI, pp. 5085–5094 (2018)
11.
Zurück zum Zitat Kaplan, A.M., Haenlein, M.: Users of the world, unite! the challenges and opportunities of social media. Bus. Horiz. 53(1), 59–68 (2010)CrossRef Kaplan, A.M., Haenlein, M.: Users of the world, unite! the challenges and opportunities of social media. Bus. Horiz. 53(1), 59–68 (2010)CrossRef
13.
Zurück zum Zitat van Steen, T., Deeleman, J.R.: Successful gamification of cybersecurity training. Cyberpsychol. Behav. Soc. Netw. 24(9), 593–598 (2021)CrossRef van Steen, T., Deeleman, J.R.: Successful gamification of cybersecurity training. Cyberpsychol. Behav. Soc. Netw. 24(9), 593–598 (2021)CrossRef
14.
Zurück zum Zitat Sungkur, R.K., Maharaj, M.S.: Design and implementation of a smart learning environment for the upskilling of cybersecurity professionals in mauritius. Educ. Inf. Technol. 26, 3175–3201 (2021)CrossRef Sungkur, R.K., Maharaj, M.S.: Design and implementation of a smart learning environment for the upskilling of cybersecurity professionals in mauritius. Educ. Inf. Technol. 26, 3175–3201 (2021)CrossRef
15.
Zurück zum Zitat Haeussinger, F., Kranz, J.: Antecedents of employees’ information security awareness - review, synthesis, and directions for future research. In: European Conference on Information Systems. Guimaraes, Portugal (2017) Haeussinger, F., Kranz, J.: Antecedents of employees’ information security awareness - review, synthesis, and directions for future research. In: European Conference on Information Systems. Guimaraes, Portugal (2017)
16.
Zurück zum Zitat Furnell, S., Vasileiou, I.: Security education and awareness: just let them burn? Netw. Secur. 2017(12), 5–9 (2017)CrossRef Furnell, S., Vasileiou, I.: Security education and awareness: just let them burn? Netw. Secur. 2017(12), 5–9 (2017)CrossRef
17.
Zurück zum Zitat Hadlington, L.: Employees attitudes towards cyber security and risky online behaviours: an empirical assessment in the United Kingdom. Int. J. Cyber Criminol. 12, 262–274 (2018) Hadlington, L.: Employees attitudes towards cyber security and risky online behaviours: an empirical assessment in the United Kingdom. Int. J. Cyber Criminol. 12, 262–274 (2018)
18.
Zurück zum Zitat Hatzivasilis, G., et al.: Modern aspects of cyber-security training and continuous adaptation of programmes to trainees. Appl. Sci. 10(16), 5702 (2020)CrossRef Hatzivasilis, G., et al.: Modern aspects of cyber-security training and continuous adaptation of programmes to trainees. Appl. Sci. 10(16), 5702 (2020)CrossRef
20.
Zurück zum Zitat Parker, H.J., Flowerday, S.V.: Contributing factors to increased susceptibility to social media phishing attacks. South African J. Information Manage. 22, 1–10 (2020)CrossRef Parker, H.J., Flowerday, S.V.: Contributing factors to increased susceptibility to social media phishing attacks. South African J. Information Manage. 22, 1–10 (2020)CrossRef
21.
Zurück zum Zitat Nifakos, S., et al.: Influence of human factors on cyber security within healthcare organisations: a systematic review. Sensors 21(15), 5119 (2021)CrossRef Nifakos, S., et al.: Influence of human factors on cyber security within healthcare organisations: a systematic review. Sensors 21(15), 5119 (2021)CrossRef
22.
Zurück zum Zitat Pattinson, M.R., et al.: Adapting cyber-security training to your employees. In: Proceedings of the International Symposium on Human Aspects of Information Security and Assurance (HAISA), pp. 67–79 (2018) Pattinson, M.R., et al.: Adapting cyber-security training to your employees. In: Proceedings of the International Symposium on Human Aspects of Information Security and Assurance (HAISA), pp. 67–79 (2018)
23.
Zurück zum Zitat Schürmann, C., Jensen, L.H., Sigbjörnsdóttir, R.M.: Effective cybersecurity awareness training for election officials. In: Krimmer, R., et al. Electronic Voting. Lecture Notes in Computer Science, 12455, pp. 196–212 (2020). Springer, Cham Schürmann, C., Jensen, L.H., Sigbjörnsdóttir, R.M.: Effective cybersecurity awareness training for election officials. In: Krimmer, R., et al. Electronic Voting. Lecture Notes in Computer Science, 12455, pp. 196–212 (2020). Springer, Cham
24.
Zurück zum Zitat Zhang, Z., He, W., Li, W., Abdous, M.H.: Cybersecurity awareness training programs: a cost-benefit analysis framework. Ind. Manag. Data Syst. 121(3), 613–636 (2021)CrossRef Zhang, Z., He, W., Li, W., Abdous, M.H.: Cybersecurity awareness training programs: a cost-benefit analysis framework. Ind. Manag. Data Syst. 121(3), 613–636 (2021)CrossRef
26.
Zurück zum Zitat McBride, M., Carter, L., Warkentin, M.: Exploring the role of individual employee characteristics and personality on employee compliance with cybersecurity policies. RTI International-Institute for Homeland Security Solutions 5(1) (2012) McBride, M., Carter, L., Warkentin, M.: Exploring the role of individual employee characteristics and personality on employee compliance with cybersecurity policies. RTI International-Institute for Homeland Security Solutions 5(1) (2012)
27.
Zurück zum Zitat Glaspie, H.W., Karwowski, W.: Human factors in information security culture: a literature review. In: Proceedings of the International Conference on Advances in Human Factors in Cybersecurity, Los Angeles, California, pp. 269–280 (2018). Springer International Glaspie, H.W., Karwowski, W.: Human factors in information security culture: a literature review. In: Proceedings of the International Conference on Advances in Human Factors in Cybersecurity, Los Angeles, California, pp. 269–280 (2018). Springer International
28.
Zurück zum Zitat Bada, M., Nurse, J.R.: Developing cybersecurity education and awareness programmes for small and medium-sized enterprises (SMEs). Information & Computer Security 27(3), 393–410 (2019)CrossRef Bada, M., Nurse, J.R.: Developing cybersecurity education and awareness programmes for small and medium-sized enterprises (SMEs). Information & Computer Security 27(3), 393–410 (2019)CrossRef
29.
Zurück zum Zitat McKim, C.A.: The value of mixed methods research: a mixed methods study. J. Mixed Methods Res. 11(2), 202–222 (2017)CrossRef McKim, C.A.: The value of mixed methods research: a mixed methods study. J. Mixed Methods Res. 11(2), 202–222 (2017)CrossRef
30.
Zurück zum Zitat Dulock, H.L.: Research design: descriptive research. J. Pediatr. Oncol. Nurs. 10(4), 154–157 (1993)CrossRef Dulock, H.L.: Research design: descriptive research. J. Pediatr. Oncol. Nurs. 10(4), 154–157 (1993)CrossRef
31.
Zurück zum Zitat Castro, S.: Google forms quizzes and substitution, augmentation, modification, and redefinition (samr) model integration. Issues and Trends in Educational Technol. 6(1), 4–14 (2018) Castro, S.: Google forms quizzes and substitution, augmentation, modification, and redefinition (samr) model integration. Issues and Trends in Educational Technol. 6(1), 4–14 (2018)
32.
Zurück zum Zitat Sarfraz, M.: Developments in Information Security and Cybernetic Wars. IGI Global. ISBN: 9781522583042 (2019) Sarfraz, M.: Developments in Information Security and Cybernetic Wars. IGI Global. ISBN: 9781522583042 (2019)
33.
Zurück zum Zitat Symantec. 2018 Internet Security Threat Report. Symantec Corporation (2018) Symantec. 2018 Internet Security Threat Report. Symantec Corporation (2018)
37.
Zurück zum Zitat De Swert, K.: Calculating inter-coder reliability in media content analysis using krippendorff’s alpha. Center for Politics and Communication 15, 1–15 (2012) De Swert, K.: Calculating inter-coder reliability in media content analysis using krippendorff’s alpha. Center for Politics and Communication 15, 1–15 (2012)
38.
Zurück zum Zitat Archibald, M.M., Ambagtsheer, R.C., Casey, M.G., Lawless, M.: Using zoom videoconferencing for qualitative data collection: perceptions and experiences of researchers and participants. Int J Qual Methods 18, 1–8 (2019)CrossRef Archibald, M.M., Ambagtsheer, R.C., Casey, M.G., Lawless, M.: Using zoom videoconferencing for qualitative data collection: perceptions and experiences of researchers and participants. Int J Qual Methods 18, 1–8 (2019)CrossRef
39.
Zurück zum Zitat DeCuir-Gunby, J.T., et al.: Developing and using a codebook for the analysis of interview data: an example from a professional development research project. Field Methods 23(2), 136–155 (2011)CrossRef DeCuir-Gunby, J.T., et al.: Developing and using a codebook for the analysis of interview data: an example from a professional development research project. Field Methods 23(2), 136–155 (2011)CrossRef
40.
Zurück zum Zitat Taylor, J.J.: Confusing Stats Terms Explained: Internal Consistency (2021) Taylor, J.J.: Confusing Stats Terms Explained: Internal Consistency (2021)
41.
Zurück zum Zitat McHugh, M.L.: The chi-square test of independence. Biochemia medica 23(2), 143–149 (2013)CrossRef McHugh, M.L.: The chi-square test of independence. Biochemia medica 23(2), 143–149 (2013)CrossRef
42.
Zurück zum Zitat Ben Salamah, F., Palomino, M.A., Craven, M.J., Papadaki, M., Furnell, S.: An adaptive cybersecurity training framework for the education of social media users at work. Appl. Sci. 13(17), 9595 (2023)CrossRef Ben Salamah, F., Palomino, M.A., Craven, M.J., Papadaki, M., Furnell, S.: An adaptive cybersecurity training framework for the education of social media users at work. Appl. Sci. 13(17), 9595 (2023)CrossRef
43.
Zurück zum Zitat Hofstede, G.: Culture’s consequences: comparing values, behaviors, institutions, and organizations across nations. Collegiate Aviation Review 34(2), 108 (2016) Hofstede, G.: Culture’s consequences: comparing values, behaviors, institutions, and organizations across nations. Collegiate Aviation Review 34(2), 108 (2016)
Metadaten
Titel
The Influence of Human Factors on Adaptive Social Media Cybersecurity Training and Education
verfasst von
Fai Ben Salamah
Marco A. Palomino
Maria Papadaki
Matthew J. Craven
Steven Furnell
Copyright-Jahr
2025
DOI
https://doi.org/10.1007/978-3-031-72563-0_1