How to Cultivate Cyber Security Culture? The Evidences from Literature
Cyber Security Culture (CSC) is a culture that could produce a secure cyber space and could improve the quality of cyber world engagement. Despite many benefits that could be offered by CSC, there is a lack of models and guidelines on how to cultivate this culture. This pa...
Main Authors: | , , , , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
University College TATI
2023
|
Subjects: | |
Online Access: | http://umpir.ump.edu.my/id/eprint/39568/1/How%20to%20Cultivate%20Cyber%20Security%20Culture%20-%20The%20%20Evidences%20from%20Literature.pdf |
_version_ | 1796996084069826560 |
---|---|
author | Akhyari, Nasir Syahrul, Fahmy Wan Roslina, Othman Noor Suhana, Sulaiman Nooraida, Samsudin Azham, Ahmad M R A, Hamid |
author_facet | Akhyari, Nasir Syahrul, Fahmy Wan Roslina, Othman Noor Suhana, Sulaiman Nooraida, Samsudin Azham, Ahmad M R A, Hamid |
author_sort | Akhyari, Nasir |
collection | UMP |
description | Cyber Security Culture (CSC) is a culture that could produce a secure cyber space and could improve the quality of cyber world engagement. Despite many benefits that could be offered by CSC, there is a lack of models and guidelines on how to cultivate this culture. This paper discusses the concept of CSC model in terms of elements that form the model to suggest how CSC could be cultivated. Information Security Culture (ISC) model developed by [1] is used as a framework in discussing the concept of CSC. A literature search also is conducted to find and analyses the most suitable elements for CSC. A new model of CSC was proposed as a result of this study. The findings could provide better understanding of CSC and could be used as baseline to conduct more research on CSC. |
first_indexed | 2024-03-06T13:11:44Z |
format | Article |
id | UMPir39568 |
institution | Universiti Malaysia Pahang |
language | English |
last_indexed | 2024-03-06T13:11:44Z |
publishDate | 2023 |
publisher | University College TATI |
record_format | dspace |
spelling | UMPir395682023-12-08T08:14:25Z http://umpir.ump.edu.my/id/eprint/39568/ How to Cultivate Cyber Security Culture? The Evidences from Literature Akhyari, Nasir Syahrul, Fahmy Wan Roslina, Othman Noor Suhana, Sulaiman Nooraida, Samsudin Azham, Ahmad M R A, Hamid HD28 Management. Industrial Management Cyber Security Culture (CSC) is a culture that could produce a secure cyber space and could improve the quality of cyber world engagement. Despite many benefits that could be offered by CSC, there is a lack of models and guidelines on how to cultivate this culture. This paper discusses the concept of CSC model in terms of elements that form the model to suggest how CSC could be cultivated. Information Security Culture (ISC) model developed by [1] is used as a framework in discussing the concept of CSC. A literature search also is conducted to find and analyses the most suitable elements for CSC. A new model of CSC was proposed as a result of this study. The findings could provide better understanding of CSC and could be used as baseline to conduct more research on CSC. University College TATI 2023 Article PeerReviewed pdf en cc_by_nc_sa_4 http://umpir.ump.edu.my/id/eprint/39568/1/How%20to%20Cultivate%20Cyber%20Security%20Culture%20-%20The%20%20Evidences%20from%20Literature.pdf Akhyari, Nasir and Syahrul, Fahmy and Wan Roslina, Othman and Noor Suhana, Sulaiman and Nooraida, Samsudin and Azham, Ahmad and M R A, Hamid (2023) How to Cultivate Cyber Security Culture? The Evidences from Literature. International Journal of Synergy in Engineering and Technology (IJSET), 4 (1). pp. 13-19. ISSN 2735-0622. (Published) https://www.ijset.tatiuc.edu.my/index.php/ijset/article/view/166/128 |
spellingShingle | HD28 Management. Industrial Management Akhyari, Nasir Syahrul, Fahmy Wan Roslina, Othman Noor Suhana, Sulaiman Nooraida, Samsudin Azham, Ahmad M R A, Hamid How to Cultivate Cyber Security Culture? The Evidences from Literature |
title | How to Cultivate Cyber Security Culture? The Evidences from Literature |
title_full | How to Cultivate Cyber Security Culture? The Evidences from Literature |
title_fullStr | How to Cultivate Cyber Security Culture? The Evidences from Literature |
title_full_unstemmed | How to Cultivate Cyber Security Culture? The Evidences from Literature |
title_short | How to Cultivate Cyber Security Culture? The Evidences from Literature |
title_sort | how to cultivate cyber security culture the evidences from literature |
topic | HD28 Management. Industrial Management |
url | http://umpir.ump.edu.my/id/eprint/39568/1/How%20to%20Cultivate%20Cyber%20Security%20Culture%20-%20The%20%20Evidences%20from%20Literature.pdf |
work_keys_str_mv | AT akhyarinasir howtocultivatecybersecurityculturetheevidencesfromliterature AT syahrulfahmy howtocultivatecybersecurityculturetheevidencesfromliterature AT wanroslinaothman howtocultivatecybersecurityculturetheevidencesfromliterature AT noorsuhanasulaiman howtocultivatecybersecurityculturetheevidencesfromliterature AT nooraidasamsudin howtocultivatecybersecurityculturetheevidencesfromliterature AT azhamahmad howtocultivatecybersecurityculturetheevidencesfromliterature AT mrahamid howtocultivatecybersecurityculturetheevidencesfromliterature |