Boletsis et al., 2021 - Google Patents
Cybersecurity for SMEs: Introducing the human element into socio-technical cybersecurity risk assessmentBoletsis et al., 2021
View PDF- Document ID
- 6925494827911586940
- Author
- Boletsis C
- Halvorsrud R
- Pickering J
- Phillips S
- Surridge M
- Publication year
External Links
Snippet
Small and medium-sized enterprises (SMEs) rarely conduct a thorough cyber-risk assessment and they may face various internal issues when attempting to set up cyber-risk strategies. In this work, we apply a user journey approach to model human behaviour and …
- 241000282414 Homo sapiens 0 title abstract description 23
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/06—Resources, workflows, human or project management, e.g. organising, planning, scheduling or allocating time, human or machine resources; Enterprise planning; Organisational models
- G06Q10/063—Operations research or analysis
- G06Q10/0639—Performance analysis
- G06Q10/06398—Performance of employee with respect to a job function
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q50/00—Systems or methods specially adapted for a specific business sector, e.g. utilities or tourism
- G06Q50/10—Services
- G06Q50/18—Legal services; Handling legal documents
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/10—Office automation, e.g. computer aided management of electronic mail or groupware; Time management, e.g. calendars, reminders, meetings or time accounting
- G06Q10/101—Collaborative creation of products or services
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q50/00—Systems or methods specially adapted for a specific business sector, e.g. utilities or tourism
- G06Q50/10—Services
- G06Q50/26—Government or public service
- G06Q50/265—Personal security, identity or safety
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q50/00—Systems or methods specially adapted for a specific business sector, e.g. utilities or tourism
- G06Q50/10—Services
- G06Q50/20—Education
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Boletsis et al. | Cybersecurity for SMEs: Introducing the human element into socio-technical cybersecurity risk assessment | |
| USRE50335E1 (en) | Contextual security behavior management and change execution | |
| Nasirpouri Shadbad et al. | Technostress and its influence on employee information security policy compliance | |
| Den Braber et al. | Model-based security analysis in seven steps—a guided tour to the CORAS method | |
| Cho et al. | A study of BYOD adoption from the lens of threat and coping appraisal of its security policy | |
| Medoh et al. | The future of cybersecurity: a system dynamics approach | |
| Parkin et al. | A stealth approach to usable security: helping IT security managers to identify workable security solutions | |
| Pham et al. | Enhancing cyber security behavior: an internal social marketing approach | |
| Canedo et al. | Proposal of an implementation process for the brazilian general data protection law (LGPD) | |
| Palanisamy et al. | Employees’ BYOD security policy compliance in the public sector | |
| Lund et al. | A guided tour of the CORAS method | |
| Adriko et al. | Does cyber insurance promote cyber security best practice? an analysis based on insurance application forms | |
| Bruggen | Studying the impact of security awareness efforts on user behavior | |
| Islam et al. | Human factors in software security risk management | |
| Tracy | IT security management and business process automation: Challenges, approaches, and rewards | |
| Kita | HOW INFORMATION SECURITY MANAGEMENT SYSTEMS INFLUENCE THE HEALTHCARE PROFESSIONALS’SECURITY BEHAVIOR IN A PUBLIC HOSPITAL IN INDONESIA | |
| Musarurwa et al. | The bring‐your‐own‐device unintended administrator: A perspective from Zimbabwe | |
| Filkins | New Threats Drive Improved Practices: State of Cybersecurity in Health Care Organizations | |
| Wynn | Examining the relationship of business operations and the information security culture in the United States | |
| Barnes | Putting a lock on cloud-based information: Collaboration between records and it professionals before contracting with cloud-based information services will help organizations ask the right questions to ensure their information is secure | |
| Haney | Users are not stupid: six cyber security pitfalls overturned | |
| Bartsch et al. | Guiding Decisions on Authorization Policies: A Participatory Approach to Decision Support | |
| Bin Ishaq Alseiari | The management of risk awareness in relation to information technology (MERIT) | |
| Wani et al. | A sociotechnical approach to bring-your-own-device security in hospitals: development and pilot testing of a maturity model using mixed methods action research | |
| Shaqiri | A System for Cost-Efficient Cybersecurity Planning, Compliance, and Investment Prioritization |