Automating the Communication of Cybersecurity Knowledge: Multi-Case Study

07/15/2020
by   Alireza Shojaifar, et al.
0

Cybersecurity is essential for the protection of companies against cyber threats. Traditionally, cybersecurity experts assess and improve a company's capabilities. However, many small and medium-sized businesses (SMBs) consider such services not to be affordable. We explore an alternative do-it-yourself (DIY) approach to bringing cybersecurity to SMBs. Our method and tool, CYSEC, implements the Self-Determination Theory (SDT) to guide and motivate SMBs to adopt good cybersecurity practices. CYSEC uses assessment questions and recommendations to communicate cybersecurity knowledge to the end user SMBs and encourage self-motivated change. In this paper, the operationalisation of SDT in CYSEC is presented and the results of a multi-case study shown that offer insight into how SMBs adopted cybersecurity practices with CYSEC. Effective automated cybersecurity communication depended on the SMB's hands-on skills, tools adaptedness, and the users' willingness to documenting confidential information. The SMBs wanted to learn in simple, incremental steps, allowing them to understand what they do. An SMB's motivation to improve security depended on the fitness of assessment questions and recommendations with the SMB's business model and IT infrastructure. The results of this study indicate that automated counselling can help many SMBs in security adoption.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
07/13/2020

SMEs Confidentiality Concerns for Security Information Sharing

Small and medium sized enterprises are considered an essential part of t...
research
07/16/2020

Elicitation of SME Requirements for Cybersecurity Solutions by Studying Adherence to Recommendations

Small and medium-sized enterprises (SME) have become the weak spot of ou...
research
07/16/2020

SMEs Confidentiality Issues and Adoption of Good Cybersecurity Practices

Small and medium-sized enterprises (SME) are considered more vulnerable ...
research
06/08/2020

Principles to Practices for Responsible AI: Closing the Gap

Companies have considered adoption of various high-level artificial inte...
research
03/03/2021

SkillVet: Automated Traceability Analysis of Amazon Alexa Skills

Third-party software, or skills, are essential components in Smart Perso...
research
10/19/2020

(How) Do people change their passwords after a breach?

To protect against misuse of passwords compromised in a breach, consumer...

Please sign up or login with your details

Forgot password? Click here to reset