[go: up one dir, main page]

Boletsis et al., 2021 - Google Patents

Cybersecurity for SMEs: Introducing the human element into socio-technical cybersecurity risk assessment

Boletsis et al., 2021

View PDF
Document ID
6925494827911586940
Author
Boletsis C
Halvorsrud R
Pickering J
Phillips S
Surridge M
Publication year

External Links

Snippet

Small and medium-sized enterprises (SMEs) rarely conduct a thorough cyber-risk assessment and they may face various internal issues when attempting to set up cyber-risk strategies. In this work, we apply a user journey approach to model human behaviour and …
Continue reading at eprints.soton.ac.uk (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/06Resources, workflows, human or project management, e.g. organising, planning, scheduling or allocating time, human or machine resources; Enterprise planning; Organisational models
    • G06Q10/063Operations research or analysis
    • G06Q10/0639Performance analysis
    • G06Q10/06398Performance of employee with respect to a job function
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q50/00Systems or methods specially adapted for a specific business sector, e.g. utilities or tourism
    • G06Q50/10Services
    • G06Q50/18Legal services; Handling legal documents
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/10Office automation, e.g. computer aided management of electronic mail or groupware; Time management, e.g. calendars, reminders, meetings or time accounting
    • G06Q10/101Collaborative creation of products or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q50/00Systems or methods specially adapted for a specific business sector, e.g. utilities or tourism
    • G06Q50/10Services
    • G06Q50/26Government or public service
    • G06Q50/265Personal security, identity or safety
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q50/00Systems or methods specially adapted for a specific business sector, e.g. utilities or tourism
    • G06Q50/10Services
    • G06Q50/20Education

Similar Documents

Publication Publication Date Title
Boletsis et al. Cybersecurity for SMEs: Introducing the human element into socio-technical cybersecurity risk assessment
USRE50335E1 (en) Contextual security behavior management and change execution
Nasirpouri Shadbad et al. Technostress and its influence on employee information security policy compliance
Den Braber et al. Model-based security analysis in seven steps—a guided tour to the CORAS method
Cho et al. A study of BYOD adoption from the lens of threat and coping appraisal of its security policy
Medoh et al. The future of cybersecurity: a system dynamics approach
Parkin et al. A stealth approach to usable security: helping IT security managers to identify workable security solutions
Pham et al. Enhancing cyber security behavior: an internal social marketing approach
Canedo et al. Proposal of an implementation process for the brazilian general data protection law (LGPD)
Palanisamy et al. Employees’ BYOD security policy compliance in the public sector
Lund et al. A guided tour of the CORAS method
Adriko et al. Does cyber insurance promote cyber security best practice? an analysis based on insurance application forms
Bruggen Studying the impact of security awareness efforts on user behavior
Islam et al. Human factors in software security risk management
Tracy IT security management and business process automation: Challenges, approaches, and rewards
Kita HOW INFORMATION SECURITY MANAGEMENT SYSTEMS INFLUENCE THE HEALTHCARE PROFESSIONALS’SECURITY BEHAVIOR IN A PUBLIC HOSPITAL IN INDONESIA
Musarurwa et al. The bring‐your‐own‐device unintended administrator: A perspective from Zimbabwe
Filkins New Threats Drive Improved Practices: State of Cybersecurity in Health Care Organizations
Wynn Examining the relationship of business operations and the information security culture in the United States
Barnes Putting a lock on cloud-based information: Collaboration between records and it professionals before contracting with cloud-based information services will help organizations ask the right questions to ensure their information is secure
Haney Users are not stupid: six cyber security pitfalls overturned
Bartsch et al. Guiding Decisions on Authorization Policies: A Participatory Approach to Decision Support
Bin Ishaq Alseiari The management of risk awareness in relation to information technology (MERIT)
Wani et al. A sociotechnical approach to bring-your-own-device security in hospitals: development and pilot testing of a maturity model using mixed methods action research
Shaqiri A System for Cost-Efficient Cybersecurity Planning, Compliance, and Investment Prioritization