Cyber security in the workplace: Understanding and promoting behaviour change
|
|
|
- August Davidson
- 10 years ago
- Views:
Transcription
1 Cyber security in the workplace: Understanding and promoting behaviour change John M Blythe PaCT Lab, Department of Psychology, Northumbria University, Newcastle-upon-Tyne, UK NE1 8ST [email protected] Abstract. Cyber security and the role employees play in securing information are major concerns for businesses. The aim of this research is to explore employee security behaviours and design interventions that can motivate behaviour change. Previous research has focused on exploring factors that influence information security policy compliance; however there are several limitations with this approach. Our work-to-date has explored the behaviours that constitute information security and potential influencers of these behaviours. These findings will aid the design of behaviour change interventions. Keywords: Cyber security; Information security; Behaviour change 1 Introduction The advancement of technology in the workplace has allowed employees ubiquitous access to information, permitting employees to work in a number of different locations and on numerous devices enhancing individual productivity and the efficiency of business operation. Businesses utilize a number of services to achieve this operation including remote access and cloud-based storage to name a few and a number of technological devices including laptops, tablets, PDAs and mobile phones. However, this adoption of newer technology has also increased their risk to cyber threats as organisations and individuals are increasingly affected by misuses of information that result from security lapses. Current cyber security practices and approaches cannot cope with this increased dependency and as a result, the UK cyber security strategy was developed with the intention to protect citizens, businesses and critical infrastructures from cyber-attacks [1]. Organisations adopt a range of technical and procedural approaches to secure information (e.g. encryption and security awareness campaigns, respectively). However, these efforts are not enough as security breaches continue to plague companies. Statistics show that 93% of large organisations and 76% of small businesses experienced a security breach in the last year [2]. Employees appear to be a large source of the prob- adfa, p. 1, Springer-Verlag Berlin Heidelberg 2011
2 lem as estimates show approximately half of all data breaches are due to compliance failure (indirectly or directly) to their company s security policy [3]. Although employees have been identified as one of the most significant vulnerabilities in information security of organisations, research to date is fragmented and little attention has been given to designing theoretically based and empirically validated behavioural interventions. 1.1 What influences security behaviour? Research has been dedicated to exploring the causes and determinants of secure behaviour. The main body of research has focused on positive behaviours, which help serve the organisational goal of information security. These are compliant behaviours such as encrypting removable media. The other type of research has explored negative, potentially damaging, behaviours such as employee computer misuse/abuse. Studies focusing on positive behaviours have primarily been through a policycompliance lens, exploring the extent to which employees conform to organisational rules and guidelines as laid out in their organisation s information security policy (ISP). There is a plethora of research in this domain investigating the factors that relate to compliance to these policies. Numerous theories have been employed to identify these factors such as the theory of planned behaviour (TPB) [4] and protection motivation theory (PMT) [5] to name a few. Consistently researched factors have been identified using a number of different theories and conceptualizations. These include internal influences such as selfefficacy [e.g. 4, 5, 6], and attitude towards security [e.g. 7]; external influences such as social pressures i.e. the extent to which an individual is influenced by what relevant others (e.g. management) expect him/her to do [e.g. 4, 5, 6, 7] and an individuals threat and response evaluation. Threat perception has been studied in terms of perceived vulnerability (an individual s assessment of the probability of threatening events) [e.g. 5] and perceived severity (severity of consequences to the organisation arising from non-compliance) [e.g. 6]. Finally, an individuals assessment of response (i.e. security) has been investigated in terms of response efficacy (belief that the security action will reduce threats) [e.g. 5] and response cost (costs associated with the security behaviour such as time and effort) [e.g. 6]. Whilst the policy-compliance approach has identified a number of factors that can help provide an understanding of why individuals comply with their ISP, there are a number of limitations with this paradigm. Firstly, there is an over-reliance on exploratory research that has largely adopted non-experimental methodologies, which have limitations in terms of understanding cause-and-effect relationships between the factors. Previous research [e.g. 5, 6, 7] has implemented hypothesized regression models to understand security behaviour and factors that account for the most variance in compliance intention. Whilst these help us understand the relationships between several factors, they cannot tell us which factors are most efficacious in promoting secure behaviours. Secondly, research investigating policy-compliance operationalise their outcome variable as intention to comply with the information security policy [e.g. 5, 6, 7].
3 This narrows information security to a single behaviour - compliance. However, this is an over simplification. ISPs actually dictate a variety of security behaviours that cannot be simplified to a single behaviour. Thirdly, there are organisational differences with regards to approaches to ISPs. There is a lack of consensus for the content of these policies so there is diversity in their described and expected employee security behaviours. Furthermore, companies differ in deployment of their policies and newer forms of security documents that complement the ISP (e.g. home working policies) makes this area more complex. Different levels of organisational security maturity and legislative obligations (e.g. Freedom of Information Act (2000)) also mean that there are inconsistencies in policies across organisations. The theoretical implications of this policy-compliance approach are that the researched behavioural determinants may not be applicable to the large amount of security behaviours. For example, factors such as social pressures may have more of an influence on password behaviour than preventative anti-virus behaviour. It is therefore important to understand how factors might differ in their influence on behaviours. Research in other domains such as [8] has emphasized the importance of assessing the degree to which behavioural determinants influence specific behaviours and how they may vary depending upon the behaviour and the population being studied. However, previous research studies have not explored these differences in employee information security behaviour. It is important to consider other influences of security behaviour including the usability of the security systems and employees working environment. A security system that considers usable design will help generate fewer insecure behaviours compared to a poorly designed system which will lead employees to workaround their security guidelines simply in order to get their main job done, thus resulting in insecure practice. It is important to consider these different influences when promoting behaviour change. Future research also needs to understand security behaviour with regards to Bring Your Own Device (BYOD) and home working, both of which have limited research but provide challenging issues for workplaces to manage security [2]. Additionally, research needs to provide more focus on the context of behaviour in organisations. Two potentially important factors could be psychological ownership (perception that a physical/non-physical target is theirs ) and organisational citizenship behaviour (discretionary behaviours that go beyond the job role). These factors have only been studied within security in relation to non-work users [9], however could play an important role in employee security behaviour. 1.2 Security behaviour change Despite efforts to understand the security behaviour of employees, there has been little attention dedicated to improving this behaviour. Behaviour change is a large research area, particularly within the health and sustainability domain. However, there is a distinct lack of research within the arena of cyber security particularly in the context of the workplace.
4 In organisations, previous behaviour change methods have been implemented such as training. A recent review [10] suggests that current approaches are based upon practical experience and lack empirical evidence and a theoretical grounding. There are, however, examples of empirically and theoretically based cyber security behaviour change in non-work domains such as [11] who used the game anti-phishing Phil and the health belief model to deliver tailored risk messages to improve financial security behaviour. However, despite previous research investigating the influences of ISP compliance using behaviour change models, the findings have not been utlised in intervention design within in the workplace. Models from health psychology are particularly relevant to this area as health behaviours are similarly sensitive to that of security. Within health, individuals have to undertake a number of preventative behaviours (e.g. sanitising hands in hospitals to prevent contamination). Similar to security, individuals have to take preventative action to prevent a security breach (e.g. running anti-virus scans). Best practice and guidance for successful behaviour change from other domains may therefore have applicability to cyber security. 2 Proposed Research There are two parts to this PhD research. The first part (stages 1-2) aims to define information security behaviours, the potential determinants of these, and identify behaviours for intervention. The second part (stages 3+) will consist of designing interventions driven by the findings of the earlier exploratory studies. The research questions proposed so far are: 1. What security behaviours are employees expected to perform? (Stage 1) 2. Are vignettes a suitable tool for cyber security research? (Stage 2a) 3. What are the behavioural determinants of security behaviours and how might they differ across the diverse security behaviours? (Stage 2b) 4. What behaviour change approaches are most suitable for cyber security? (Stage 3) This research will entail a pragmatic research approach through use of both qualitative and quantitative methodologies. Stage 1 and 2a are complete however stage 2b is currently on-going. 2.1 Stage 1. The first stage involved the development of a behavioural inventory by identifying employees expected security behaviours. To achieve this, an internet search was carried out to collate information security policies available and accessible online. 25 policies were collated from healthcare (n=7), universities (n=10) and councils (n=8). Policies were excluded if they only consisted of an executive summary or they referenced supplementary documents that were unavailable online or if they were not a UK institution (due to legislative differences between countries).
5 Inductive content analysis was adopted using guidelines outlined by [12]. The purpose of this analysis was to establish the categorical structure of the data within ISPs. The findings revealed eleven categories with designated behaviours for employees as shown in Table 1. Table 1. Categories with designated security behaviours Category Remote working Removable media User access management Prevention of malicious software Breaches of security Physical security Information control Software & Systems Acceptable usage Continuity planning Compliance to legislation Description Actions for working on mobile devices and in external locations Portable storage devices that can be connected to and removed from a computer (e.g. USB sticks) How access controls are allocated and managed Actions to prevent malicious software Steps for recovering and reporting security incidences Strategies to physically protect infrastructures, information and information resources Responsibility in protection, storage and processing of information Software and system acquisition, installation and maintenance Appropriate usage of information systems, and the internet Outlines prevention and recovery from internal and external threats Compliance to legislation acts such as the data protection act (1998) 2.2 Stage 2a Security can be considered a sensitive issue for employees to discuss as behaving insecure could be perceived as poor job performance. It is important to address why employees behave insecurely and therefore methodologies or tools to engage employees in this discussion are required. Vignettes are considered one such useful tool and have been shown to be useful when dealing with sensitive issues [13] as they allow participants to control whether they disclose personal information. These are fictional scenarios describing a character and a story that allow exploration of participants views on the issues arising from the scenario. In this research, a vignette described a security scenario (e.g. recycling passwords) but did not discuss the consequences or whether the behaviour was secure/insecure. See figure 1 for example vignette.
6 Fig. 1. Example cyber security vignette A pilot study was run with 8 employees from multiple organisations to assess the suitability of vignettes. This was undertaken by allocating participants to a vignette or non-vignette condition. Those in the vignette condition were given short stories for each of the categories in Table 1. Those in the non-vignette condition were given a short description of the category. A semi-structured interview guide was used covering the elicitation of the factors (see stage 2b). The results from stage 2a indicated that participants in the vignette conditions were more open in their discussion of insecure behaviours and reasons for this, compared to the non-vignette condition and required less questioning from the researcher. Vignettes were therefore deemed a useful tool to use to help aid and engage participants in security discussion and allow rich and detailed data to be collected. 2.3 Stage 2b This stage is exploring the influences of security behaviours, aiming to analyse the degree to which factors may differ depending upon specific security behaviours. This approach will help examine user perceptions and usage of security solutions, within the workplace, allowing the identification of poor security practices which require further exploration and targeted behaviour change. A deductive approach was adopted for this stage using factors that have previously been investigated for compliance to ISP. The factors of interest are influences including internal (self-efficacy & attitude) and external (social pressures). Furthermore, individuals threat evaluation (perceived vulnerability & severity), and their response evaluation (response efficacy & cost). Semi-structured interviews will be used with employees from recruited organisations, using the vignettes based on stage 1 and questions focusing on the elicitation of the factors outlined above. Participants will also be required to complete a questionnaire, assessing psychological ownership and organisational citizenship behaviour. This is to categorise participants into high/low groups to allow comparisons to be made dependent upon these measures.
7 3 Future Work On completion of stage 2b, the data will be analysed using framework analysis [14] as this deductive approach allows the assessment of the influences to be identified a priori and refined through further analysis. The findings will also help identify behaviours that will be targeted in interventions. These interventions could take many forms such as manipulating influences of the targeted security behaviour (e.g. increasing individual s perceived severity) and investigating whether this leads to behaviour change. This could, for example, involve re-designing security software so interventions target a specific behavioural determinant, or, use individuals data from security software to provide a tailored intervention to the individual. Whilst the current behaviour change studies are yet to be designed. The following sections outline the proposed methodology of the behavioural interventions, measurement of security behaviour and an example intervention to illustrate behaviour change within the cyber security domain. 3.1 Stage 3 Behaviour change interventions Currently, there is an abundance of guidance for the development, running and evaluation of behaviour change interventions. Within the behaviour change domain, interventions aiming to change behaviour are often poorly reported and difficult to replicate [15]. It is therefore important that when designing the interventions for this PhD that they follow previous research and guidance to enhance replicability and help inform future cyber security research and practice. For example, appropriate guidance includes the Medical Research Council (MRC) framework for complex intervention development, implementation and evaluation [16]. Other useful guidance is the nine principles for developing interventions based on models [17] which is developed by the Government Social Research and provides practical guidance on intervention development using theoretical underpinnings. These guidelines highlight the importance of interventions being theory-driven, piloted and evaluated effectively. They emphasise understanding the target behaviour, its key influencing behavioural determinants, and where possible, identifying effective intervention techniques that have previously worked for the targeted factors. As discussed, in terms of this PhD research, stages 1 and 2 are aiming to explore the determinants of security behaviour and will inform potential areas for intervention. Once target behaviours have been identified, the subsequent studies of stage 3 will aim to improve the chosen security behaviour of interest using interventions. Evaluating successful behaviour change It is important that any changes resulting from an intervention are due to the intervening factors at play and not due to extraneous variables. It is therefore necessary that the most appropriate evaluation methods are in place to assess the effectiveness of the intervention and provide empirical evidence of its efficiency. Random control trials (RCTs) are considered the gold standard for evaluation and have been widely
8 used within the health domain for clinical trials and also within the psychology discipline. They provide valid and reliable evidence of the effectiveness of an intervention and are considered the best way to evaluate a behaviour change attempt. To design RCTs, participants are allocated to either an experimental condition (behaviour change attempt) or a comparison (control) condition. This design endeavours to overcome confounding variables by exposing participants in the experimental and control condition to the same experimental factors except the behaviour change intervention. It is assumed that differences in behaviour resulting from the research are due to the intervention and not extraneous variables. To achieve this it is important that participants in the intervention condition and those in the control condition are as closely matched as possible by recruiting participants from the same recruitment sample and randomly allocating them to conditions. Randomisation to conditions reduces selection bias by ensuring that the only differences between the intervention and control condition will be due to chance and any observed differences will be due to the intervention condition. The use of RCTs for behaviour change is advocated extensively throughout behaviour change literature including the MRC framework and Cabinet Office guidance for developing public policy related to changing behaviour [18]. The behaviour change studies of stage 3 will therefore adopt RCTs as they are deemed the most appropriate methodology for assessing intervention efforts. Measuring security behaviour Behaviour is complex making it equally complex to quantify and measure it. Previous research exploring security behaviour in employees has primarily adopted selfreport measures to assess an individual s security performance. Typically this has explored the extent to which they comply to information security policies and specific security behaviours such as -related security behaviour [19]. Despite many advantages to using self-report data, they are a type of subjective measure as they rely on individual awareness. Therefore, they are open to many biases and are potentially unreliable. Objective measures, on the other hand, are considered to be more robust and accurate indicators of behaviour because they are less vulnerable to biases. In the context of security, an objective measure could be a password log to give an indication of frequency of password changes. Where possible, the behaviour change studies in this PhD research will measure both subjective and objective measures of behaviour in order to increase reliability, validity and measurement of behaviour change effectiveness. Cyber Security behaviour change: An example Current security systems within in the workplace (such as anti-virus software, for example) can be considered quite passive as they are often mandated by IT support and require little input from employees. Furthermore employees are often unaware of the function and utility of this software on their work computer. An active intervention could be designed to utilise the information from anti-virus software and other security systems to tailor risk messages to employees regarding their behaviour when online and ultimately improve their virus prevention behaviour. The intention of the intervention would be to increase perceived susceptibility to receiving a virus. This
9 would be achieved by providing information about the consequences of visiting insecure websites and downloading attachments. Furthermore, indicating the level of risk associated with the employees behaviour would provide a visualisation of their actions (e.g. an insecure website would be more noticeable if the colour red was used in a message). Individuals are influenced by sub-conscious cues and this priming through visualisation is important for behaviour change [20]. It would be anticipated that by enhancing perceived susceptibility to viruses and priming secure behaviour would lead to behaviour change in employees. 4 Contributions It is hoped that this research will help understand how to promote security behaviour change within the workplace and in doing so, aid evaluation of current approaches to information security. The main contribution is to develop interventions that are theory based and provide empirical evidence of their efficiency. Furthermore, the findings from this research will aid in the re-development of security solutions and provide resolutions for how they can be designed to encourage secure behaviour. 5 Acknowledgements I would like to thank my PhD supervisors, Lynne Coventry and Linda Little, for their support and guidance with this research. 6 References 1. Cabinet Office. The UK Cyber Security Strategy: Protecting and promoting the UK in a digital world. (2011) 2. Price Waterhouse Coopers Global State of Information Security Survey 3. Stanton, J.M., Stam, K.R., Mastrangelo, P., Jolton, J.: Analysis of end user security behaviours. Computers & Security. 24, (2005) 4. Bulgurcu, B., Cavusoglu, H., Benbasat, I.: Information security policy compliance: An empirical study of rationality-based beliefs and information security awareness. MIS Quarterly. 34, (2010) 5. Ifinedo, P.: Understanding information systems security policy compliance: An integration of the theory of planned behaviour and the protection motivation theory. Computers & Security. 31, (2012) 6. Herath, T., Rao, H. R.: Protection motivation and deterrence: a framework for security policy compliance in organisations. European Journal of Information Systems. 18, 2, (2009) 7. Herath, T., Rao, H. R.: Encouraging information security behaviours in organisations: Role of penalties, pressures and perceived effectiveness. Decision Support Systems. 47, 2, (2009) 8. Fishbein, M., Cappella, J. N.: The role of theory in developing effective health communications. Journal of Communication. 56, S1-S17 (2006)
10 9. Anderson, C. L., Agarwal, R.: Practicing safe computing: a multimedia empirical examination of home computer user security behavioural intentions. MIS Quarterly. 34, 3, (2010) 10. Puhakainen, P., Siponen, M.: Improving employees compliance through information systems security training: An action research study. MIS Quarterly. 34, (2010) 11. Davinson, N., Sillence, E.: It won t happen to me: Promoting secure behaviour among internet users. Computers in Human Behaviour. 26, (2010) 12. Elo, S., Kyngäs, H.: The qualitative content analysis process. Journal of advanced nursing. 62, 1, (2008) 13. Barter, C., Renold, E.: 'I wanna tell you a story': exploring the application of vignettes in qualitative research with children and young people. International Journal of Social Research Methodology. 3,4, (2000) 14. Ritchie, J., Spencer, L.: Qualitative data analysis for applied policy research. In: Bryman, A. & Burgess, R.G. [eds.] Analyzing qualitative data. Sage, London. (1994) 15. Abraham, C., Michie, S.: A taxonomy of behavior change techniques used in interventions. Health psychology. 27, 3, 379 (2008) 16. Campbell, M., Fitzpatrick, R., Haines, A., Kinmonth, A. L., Sandercock, P., Spiegelhalter, D., Tyrer, P.: Framework for design and evaluation of complex interventions to improve health. BMJ: British Medical Journal. 321,7262, 694 (2000) 17. Darnton, A.: GSR Behaviour Change Knowledge Review. Practical Guide: An overview of behaviour change models and their uses. HMT Publishing Unit, London (2008) 18. Haynes, L., Goldacre, B., Torgerson, D.: Test, learn, adapt: developing public policy with randomised controlled trials. Cabinet Office-Behavioural Insights Team (2012) 19. Ng, B.- Y., Kankanhalli, A., Xu, Y.: Studying users computer security behaviour: A health belief perspective. Decision Support Systems. 46, 4, (2009) 20. Cabinet Office. MINDSPACE: Influencing behaviour through public policy. (2010)
EFFECTIVENESS OF DETECTIVE AND PREVENTATIVE INFORMATION SECURITY CONTROLS IN INFORMATION SYSTEMS ORGANIZATIONS
SENRA Academic Publishers, British Columbia Vol. 8, No. 3, pp. 3125-3129, October 2014 Online ISSN: 1920-3853; Print ISSN: 1715-9997 EFFECTIVENESS OF DETECTIVE AND PREVENTATIVE INFORMATION SECURITY CONTROLS
Information Security Policy September 2009 Newman University IT Services. Information Security Policy
Contents 1. Statement 1.1 Introduction 1.2 Objectives 1.3 Scope and Policy Structure 1.4 Risk Assessment and Management 1.5 Responsibilities for Information Security 2. Compliance 3. HR Security 3.1 Terms
Newcastle University Information Security Procedures Version 3
Newcastle University Information Security Procedures Version 3 A Information Security Procedures 2 B Business Continuity 3 C Compliance 4 D Outsourcing and Third Party Access 5 E Personnel 6 F Operations
Employee Compliance with Information Systems Security Policy in Retail Industry. Case: Store Level Employees
University of Massachusetts Boston ScholarWorks at UMass Boston Honors Thesis Program in the College of Management College of Management 5-1-2012 Employee Compliance with Information Systems Security Policy
THE IMPACT OF SECURITY PRACTICES ON REGULATORY COMPLIANCE AND SECURITY PERFORMANCE 1
THE IMPACT OF SECURITY PRACTICES ON REGULATORY COMPLIANCE AND SECURITY PERFORMANCE 1 Juhee Kwon Center for Digital Strategies Tuck School of Business Dartmouth College Hanover, NH 03755 [email protected]
COURSE APPROVAL GUIDELINES APS COLLEGE OF ORGANISATIONAL PSYCHOLOGISTS
COURSE APPROVAL GUIDELINES APS COLLEGE OF ORGANISATIONAL PSYCHOLOGISTS Updated January 2007 1. General Introduction and Principles These Guidelines have been developed for use by tertiary institutions
Small businesses: What you need to know about cyber security
Small businesses: What you need to know about cyber security March 2015 Contents page What you need to know about cyber security... 3 Why you need to know about cyber security... 4 Getting the basics right...
UNDERSTANDING EXPLORATORY USE
UNDERSTANDING EXPLORATORY USE OF ERP SYSTEMS 1 Rui D. Sousa Terry College of Business University of Georgia [email protected] Dale L. Goodhue Terry College of Business University of Georgia [email protected]
INFORMATION TECHNOLOGY SECURITY STANDARDS
INFORMATION TECHNOLOGY SECURITY STANDARDS Version 2.0 December 2013 Table of Contents 1 OVERVIEW 3 2 SCOPE 4 3 STRUCTURE 5 4 ASSET MANAGEMENT 6 5 HUMAN RESOURCES SECURITY 7 6 PHYSICAL AND ENVIRONMENTAL
Measurement and measures. Professor Brian Oldenburg
Measurement and measures Professor Brian Oldenburg Learning objectives 1. To identify similarities/differences between qualitative & quantitative measures 2. To identify steps involved in choosing and/or
Leadership Styles and Information Security Compliance Behavior: The Mediator Effect of Information Security Awareness
Leadership Styles and Information Security Compliance Behavior: The Mediator Effect of Information Security Awareness Norshima Humaidi and Vimala Balakrishnan Abstract Leadership styles play an important
University of Sunderland Business Assurance Information Security Policy
University of Sunderland Business Assurance Information Security Policy Document Classification: Public Policy Reference Central Register Policy Reference Faculty / Service IG 003 Policy Owner Assistant
REMOTE WORKING POLICY
Reference number Approved by Information Management and Technology Board Date approved 30 April 2013 Version 1.0 Last revised Review date March 2014 Category Owner Target audience Information Assurance
Maximising the Effectiveness of Information Security Awareness
Maximising the Effectiveness of Information Security Awareness This thesis offers a fresh look at information security awareness using research from marketing and psychology. By Geordie Stewart and John
The Cost of Insecure Mobile Devices in the Workplace Sponsored by AT&T
The Cost of Insecure Mobile Devices in the Workplace! Sponsored by AT&T Independently conducted by Ponemon Institute LLC Publication Date: March 2014 Part 1. Introduction The Cost of Insecure Mobile Devices
Issues in Information Systems Volume 14, Issue 2, pp.139-148, 2013
COLLEGE STUDENT HOME COMPUTER SECURITY ADOPTION Chet L. Claar, Central Washington University, [email protected] Robert C. Shields, Central Washington University, [email protected] David Rawlinson, Central Washington
WEST LOTHIAN COUNCIL INFORMATION SECURITY POLICY
WEST LOTHIAN COUNCIL INFORMATION SECURITY POLICY DATA LABEL: PUBLIC INFORMATION SECURITY POLICY CONTENTS 1. INTRODUCTION... 3 2. MAIN OBJECTIVES... 3 3. LEGISLATION... 4 4. SCOPE... 4 5. STANDARDS... 4
LEEDS BECKETT UNIVERSITY. Information Security Policy. 1.0 Introduction
LEEDS BECKETT UNIVERSITY Information Security Policy 1.0 Introduction 1.1 Information in all of its forms is crucial to the effective functioning and good governance of our University. We are committed
Aftermath of a Data Breach Study
Aftermath of a Data Breach Study Sponsored by Experian Data Breach Resolution Independently conducted by Ponemon Institute LLC Publication Date: January 2012 Ponemon Institute Research Report Aftermath
Policy Document Control Page
Policy Document Control Page Title Title: Information Governance Policy Version: 5 Reference Number: CO44 Keywords: Information Governance Supersedes Supersedes: Version 4 Description of Amendment(s):
The Diffusion of E-Learning Innovations in an Australian Secondary College: Strategies and Tactics for Educational Leaders
The Diffusion of E-Learning Innovations in an Australian Secondary College: Strategies and Tactics for Educational Leaders Sam Jebeile Division of Economic and Financial Studies Macquarie University Australia
SECURITY INCIDENT REPORTING AND MANAGEMENT. Standard Operating Procedures
SECURITY INCIDENT REPORTING AND MANAGEMENT Standard Operating Procedures Notice: This document has been made available through the Police Service of Scotland Freedom of Information Publication Scheme.
CyberEdge. Desired Coverages. Application Form. Covers Required. Financial Information. Company or Trading Name: Address: Post Code: Telephone:
Company or Trading Name: Address: Post Code: Telephone: E-mail: Website: Date Business Established Number of Employees Do you have a Chief Privacy Officer (or Chief Information Officer) who is assigned
National Cyber Security Policy -2013
National Cyber Security Policy -2013 Preamble 1. Cyberspace 1 is a complex environment consisting of interactions between people, software and services, supported by worldwide distribution of information
Cyber Essentials Scheme
Cyber Essentials Scheme Requirements for basic technical protection from cyber attacks June 2014 December 2013 Contents Contents... 2 Introduction... 3 Who should use this document?... 3 What can these
KEELE UNIVERSITY IT INFORMATION SECURITY POLICY
Contents 1. Introduction 2. Objectives 3. Scope 4. Policy Statement 5. Legal and Contractual Requirements 6. Responsibilities 7. Policy Awareness and Disciplinary Procedures 8. Maintenance 9. Physical
Briefing note: GCHQ Internships
Briefing note: GCHQ Internships GCHQ 1 is developing new capabilities in partnership with Industry and Academic Researchers to pursue their cyber security. GCHQ is partnering with the Smith Institute 2
WHAT YOU NEED TO KNOW ABOUT CYBER SECURITY
SMALL BUSINESSES WHAT YOU NEED TO KNOW ABOUT CYBER SECURITY ONE CLICK CAN CHANGE EVERYTHING SMALL BUSINESSES My reputation was ruined by malicious emails ONE CLICK CAN CHANGE EVERYTHING Cybercrime comes
Influencing employees compliance behavior towards Information Security Policy
Influencing employees compliance behavior towards Information Security Policy The Telesur case By Billey B. Best (Suriname) Supervised by: Prof. Vincent Feltkamp, PhD. This paper was submitted in partial
Cloud Software Services for Schools
Cloud Software Services for Schools Supplier self-certification statements with service and support commitments Please insert supplier details below Supplier name Address Isuz Ltd. trading as Schoolcomms
Development / Monitoring / Review of this Policy. Schedule for Development / Monitoring / Review
Blakeley Heath Primary School E-Safety Policy Development / Monitoring / Review of this Policy This e-safety policy has been developed by a working group made up of: Headteacher Coordinator Staff including
Cloud Software Services for Schools
Cloud Software Services for Schools Supplier self-certification statements with service and support commitments Supplier name Address Contact name Contact email Contact telephone Parent Teacher Online
The Role of Situational Factors and Personality on Cybersecurity Policy Violation
September 2012 The Role of Situational Factors and Personality on Cybersecurity Policy Violation Project Leads Maranda McBride, PhD, North Carolina A&T State University Lemuria Carter, PhD, North Carolina
IT Security Risk Management Model for Cloud Computing: A Need for a New Escalation Approach.
IT Security Risk Management Model for Cloud Computing: A Need for a New Escalation Approach. Gunnar Wahlgren 1, Stewart Kowalski 2 Stockholm University 1: ([email protected]), 2: ([email protected]) ABSTRACT
How To Protect School Data From Harm
43: DATA SECURITY POLICY DATE OF POLICY: FEBRUARY 2013 STAFF RESPONSIBLE: HEAD/DEPUTY HEAD STATUS: STATUTORY LEGISLATION: THE DATA PROTECTION ACT 1998 REVIEWED BY GOVERNING BODY: FEBRUARY 2013 EDITED:
How To Protect Decd Information From Harm
Policy ICT Security Please note this policy is mandatory and staff are required to adhere to the content Summary DECD is committed to ensuring its information is appropriately managed according to the
Research design and methods Part II. Dr Brian van Wyk POST-GRADUATE ENROLMENT AND THROUGHPUT
Research design and methods Part II Dr Brian van Wyk POST-GRADUATE ENROLMENT AND THROUGHPUT From last week Research methodology Quantitative vs. Qualitative vs. Participatory/action research Research methods
University of Aberdeen Information Security Policy
University of Aberdeen Information Security Policy Contents Introduction to Information Security... 1 How can information be protected?... 1 1. Information Security Policy... 3 Subsidiary Policy details:...
The Ministry of Information & Communication Technology MICT
The Ministry of Information & Communication Technology MICT Document Reference: ISGSN2012-10-01-Ver 1.0 Published Date: March 2014 1 P a g e Table of Contents Table of Contents... 2 Definitions... 3 1.
Information Security Policies. Version 6.1
Information Security Policies Version 6.1 Information Security Policies Contents: 1. Information Security page 3 2. Business Continuity page 5 3. Compliance page 6 4. Outsourcing and Third Party Access
How To Audit Health And Care Professions Council Security Arrangements
Audit Committee 28 Internal audit report ICT Security Executive summary and recommendations Introduction Mazars has undertaken a review of ICT Security controls, in accordance with the internal audit plan
This series of articles is designed to
Research and diabetes nursing. Part 3: Quantitative designs Vivien Coates This article is the third in a series that aims to assist nurses working in diabetes to understand research from a broad perspective,
Cybersecurity Practices of Ohio Investment Advisers; A Summary of Survey Responses
Cybersecurity Practices of Ohio Investment Advisers; A Summary of Survey Responses October 2014 A Pilot Survey to Compile Cybersecurity Information In July 2014, the Ohio Division of Securities participated
Bring Your Own Device (BYOD) and Mobile Device Management. tekniqueit.com
Bring Your Own Device (BYOD) and Mobile Device Management tekniqueit.com Bring Your Own Device (BYOD) and Mobile Device Management People are starting to expect the ability to connect to public networks
Computer Engineering and Intelligent Systems ISSN 2222-1719 (Paper) ISSN 2222-2863 (Online) Vol.6, No.4, 2015
A Review of Impacts of Bring Your Own Device (BYOD) and Nomadic Computing on Enterprise Security Policies Compliance: The Case of Higher Learning Institutions in Kenya Peter Namisiko 1* Dr. William Sakataka
TERMS AND CONDITIONS OF USE OF WARWICK UNIVERSITY S SONA SYSTEM AND WARWICK EXPERIMENTAL LABORATORIES
TERMS AND CONDITIONS OF USE OF WARWICK UNIVERSITY S SONA SYSTEM AND WARWICK EXPERIMENTAL LABORATORIES In order to be granted access to Warwick s SONA System (https://warwick.sona-systems.com/) for managing
Appendix 6c. Final Internal Audit Report Disaster Recovery Planning. June 2007. Report 6c Page 1 of 15
Appendix 6c Final Internal Audit Report Disaster Recovery Planning June 2007 Report 6c Page 1 of 15 Contents Page Executive Summary 3 Observations and Recommendations 8 Appendix 1 - Audit Framework 13
GLOSSARY OF EVALUATION TERMS
Planning and Performance Management Unit Office of the Director of U.S. Foreign Assistance Final Version: March 25, 2009 INTRODUCTION This Glossary of Evaluation and Related Terms was jointly prepared
Bring Your Own Device (BYOD) and Mobile Device Management. www.cognoscape.com
Bring Your Own Device (BYOD) and Mobile Device Management www.cognoscape.com Bring Your Own Device (BYOD) and Mobile Device Management People are starting to expect the ability to connect to public networks
HIPAA Compliance Review Analysis and Summary of Results
HIPAA Compliance Review Analysis and Summary of Results Centers for Medicare & Medicaid Services (CMS) Office of E-Health Standards and Services (OESS) Reviews 2008 Table of Contents Introduction 1 Risk
INFORMATION GOVERNANCE POLICY
INFORMATION GOVERNANCE POLICY Primary Intranet Location Information Management & Governance Version Number Next Review Year Next Review Month 7.0 2018 January Current Author Phil Cottis Author s Job Title
Better secure IT equipment and systems
Chapter 5 Central Services Data Centre Security 1.0 MAIN POINTS The Ministry of Central Services, through its Information Technology Division (ITD), provides information technology (IT) services to government
Competency Frameworks as a foundation for successful Talent Management. part of our We think series
Competency Frameworks as a foundation for successful part of our We think series Contents Contents 2 Introduction 3 If only they solved all of our problems 3 What tools and techniques can we use to help
Acceptable Use of ICT Policy. Staff Policy
Acceptable Use of ICT Policy Staff Policy Contents INTRODUCTION 3 1. ACCESS 3 2. E-SAFETY 4 3. COMPUTER SECURITY 4 4. INAPPROPRIATE BEHAVIOUR 5 5. MONITORING 6 6. BEST PRACTICE 6 7. DATA PROTECTION 7 8.
Attitudes to Use of Social Networks in the Workplace and Protection of Personal Data
Attitudes to Use of Social Networks in the Workplace and Protection of Personal Data David Haynes, City University, School of Informatics, Department of Information Science August 2011 Background Two surveys
Fahad H.Alshammari, Rami Alnaqeib, M.A.Zaidan, Ali K.Hmood, B.B.Zaidan, A.A.Zaidan
WWW.JOURNALOFCOMPUTING.ORG 85 New Quantitative Study for Dissertations Repository System Fahad H.Alshammari, Rami Alnaqeib, M.A.Zaidan, Ali K.Hmood, B.B.Zaidan, A.A.Zaidan Abstract In the age of technology,
Using Qualitative Information For Impact Assessment: Introducing The Qualitative Impact Assessment Protocol (QUIP)
Using Qualitative Information For Impact Assessment: Introducing The Qualitative Impact Assessment Protocol (QUIP) By Katie Wright-Revolledo, INTRAC Introduction Qualitative methods can provide insight
Token Security or Just Token Security? A Vanson Bourne report for Entrust
Token Security or Just Token Security? A Vanson Bourne report for Entrust Foreword In 2011, Entrust Inc., an identity-based security company, partnered with respected technology research firm Vanson Bourne
Aberdeen City Council IT Security (Network and perimeter)
Aberdeen City Council IT Security (Network and perimeter) Internal Audit Report 2014/2015 for Aberdeen City Council August 2014 Internal Audit KPIs Target Dates Actual Dates Red/Amber/Green Commentary
AUSTRALIAN GOVERNMENT INFORMATION MANAGEMENT OFFICE CYBER SECURITY CAPABILITY FRAMEWORK & MAPPING OF ISM ROLES
AUSTRALIAN GOVERNMENT INFORMATION MANAGEMENT OFFICE CYBER SECURITY CAPABILITY FRAMEWORK & MAPPING OF ISM ROLES Final Report Prepared by Dr Janet Tweedie & Dr Julie West June 2010 Produced for AGIMO by
How Direct and Vicarious Experience Promotes Security Hygiene
How Direct and Vicarious Experience Promotes Security Hygiene Leigh A. Mutchler Accounting and Information Management University of Tennessee Knoxville, TN, USA [email protected] Merrill Warkentin Management
Information security controls. Briefing for clients on Experian information security controls
Information security controls Briefing for clients on Experian information security controls Introduction Security sits at the core of Experian s operations. The vast majority of modern organisations face
Cloud Computing: A Comparison Between Educational Technology Experts' and Information Professionals' Perspectives
Noa Aharony 1 Cloud Computing: A Comparison Between Educational Technology Experts' and Information Professionals' Perspectives Noa Aharony Department of Information Science, Bar-Ilan University [email protected]
Position Description
Position Description Position Title Human Resources Officer Position No 5023 Directorate Department Unit Appointment Type Chief Executive Officer Organisational Development Human Resources Permanent Full
Overview of the Breaking Free research and evaluation programme. Based on the MRC framework for developing and evaluating complex interventions
Overview of the Breaking Free research and evaluation programme Based on the MRC framework for developing and evaluating complex interventions June 2015 1 Overview of the Breaking Free research and evaluation
Risk management + Strategic planning IT TAKES AN ENTIRE ORGANIZATION
1 Risk management + Strategic planning IT TAKES AN ENTIRE ORGANIZATION Background 2 Technology has become the central component of business operations Businesses have become more vulnerable to risks associated
STRATEGIC POLICY REQUIRED HARDWARE, SOFTWARE AND CONFIGURATION STANDARDS
Policy: Title: Status: ISP-S9 Use of Computers Policy Revised Information Security Policy Documentation STRATEGIC POLICY 1. Introduction 1.1. This information security policy document contains high-level
Measures for improving information security management in organisations: the impact of training and awareness programmes
Measures for improving information security management in organisations: the impact of training and awareness programmes Nesren Waly, Rana Tassabehji and Mumtaz Kamala School of Computing, Informatics
10 Hidden IT Risks That Threaten Your Practice
(Plus 1 Fast Way to Find Them) Your practice depends on intelligence. But can you count on your technology? You may not be in the intelligence technology business, but it s probably impossible to imagine
1. For each of the 25 questions, multiply each question response risk value (1-5) by the number of times it was chosen by the survey takers.
Employee Security Awareness Survey Trenton Bond [email protected] Admin - Version 1.3 Security Awareness One of the most significant security risks that organizations and corporations face today is
All CCG staff. This policy is due for review on the latest date shown above. After this date, policy and process documents may become invalid.
Policy Type Information Governance Corporate Standing Operating Procedure Human Resources X Policy Name CCG IG03 Information Governance & Information Risk Policy Status Committee approved by Final Governance,
10 Hidden IT Risks That Might Threaten Your Business
(Plus 1 Fast Way to Find Them) Your business depends on intelligence. But can you count on your technology? You may not be in the intelligence technology business, but it s probably impossible to imagine
CSG & Cyberoam Endpoint Data Protection. Ubiquitous USBs - Leaving Millions on the Table
CSG & Cyberoam Endpoint Data Protection Ubiquitous USBs - Leaving Millions on the Table Contents USBs Making Data Movement Easy Yet Leaky 3 Exposing Endpoints to the Wild. 3 Data Breach a Very Expensive
Remote Access Service (RAS)
Remote Access Service (RAS) Contents 1 Introduction to Remote Access Service...2 2 Service Definition...3 2.1 Functionality & Features... 3 2.2 Access Methods... 3 3 Differentiators...4 4 Commercials...5
Enhancing Cybersecurity with Big Data: Challenges & Opportunities
Enhancing Cybersecurity with Big Data: Challenges & Opportunities Independently Conducted by Ponemon Institute LLC Sponsored by Microsoft Corporation November 2014 CONTENTS 2 3 6 9 10 Introduction The
ICT Policy. Executive Summary. Date of ratification Executive Team Committee 22nd October 2013. Document Author(s) Collette McQueen
ICT Policy THCCGIT20 Version: 01 Executive Summary This document defines the Network Infrastructure and File Server Security Policy for Tower Hamlets Clinical Commissioning Group (CCG). The Network Infrastructure
Cyber Liability Insurance Data Security, Privacy and Multimedia Protection
Page 1 of 5 Cyber Liability Insurance Data Security, Privacy and Multimedia Protection What is a Cyber Risk? Technology is advancing at such an alarming rate and business is more and more reliant on IT
PROGRAMME SPECIFICATION Postgraduate Diploma / Master of Science Psychology
Faculty of Education, Health and Sciences PROGRAMME SPECIFICATION Postgraduate Diploma / Master of Science Psychology Valid from September 2012 www.derby.ac.uk/ehs 1 CONTENTS SECTION ONE: GENERAL INFORMATION...
