How to Cultivate Cyber Security Culture? The Evidences from Literature

Cyber Security Culture (CSC) is a culture that could produce a secure cyber space and could improve the quality of cyber world engagement. Despite many benefits that could be offered by CSC, there is a lack of models and guidelines on how to cultivate this culture. This pa...

Full description

Bibliographic Details
Main Authors: Akhyari, Nasir, Syahrul, Fahmy, Wan Roslina, Othman, Noor Suhana, Sulaiman, Nooraida, Samsudin, Azham, Ahmad, M R A, Hamid
Format: Article
Language:English
Published: University College TATI 2023
Subjects:
Online Access:http://umpir.ump.edu.my/id/eprint/39568/1/How%20to%20Cultivate%20Cyber%20Security%20Culture%20-%20The%20%20Evidences%20from%20Literature.pdf
_version_ 1796996084069826560
author Akhyari, Nasir
Syahrul, Fahmy
Wan Roslina, Othman
Noor Suhana, Sulaiman
Nooraida, Samsudin
Azham, Ahmad
M R A, Hamid
author_facet Akhyari, Nasir
Syahrul, Fahmy
Wan Roslina, Othman
Noor Suhana, Sulaiman
Nooraida, Samsudin
Azham, Ahmad
M R A, Hamid
author_sort Akhyari, Nasir
collection UMP
description Cyber Security Culture (CSC) is a culture that could produce a secure cyber space and could improve the quality of cyber world engagement. Despite many benefits that could be offered by CSC, there is a lack of models and guidelines on how to cultivate this culture. This paper discusses the concept of CSC model in terms of elements that form the model to suggest how CSC could be cultivated. Information Security Culture (ISC) model developed by [1] is used as a framework in discussing the concept of CSC. A literature search also is conducted to find and analyses the most suitable elements for CSC. A new model of CSC was proposed as a result of this study. The findings could provide better understanding of CSC and could be used as baseline to conduct more research on CSC.
first_indexed 2024-03-06T13:11:44Z
format Article
id UMPir39568
institution Universiti Malaysia Pahang
language English
last_indexed 2024-03-06T13:11:44Z
publishDate 2023
publisher University College TATI
record_format dspace
spelling UMPir395682023-12-08T08:14:25Z http://umpir.ump.edu.my/id/eprint/39568/ How to Cultivate Cyber Security Culture? The Evidences from Literature Akhyari, Nasir Syahrul, Fahmy Wan Roslina, Othman Noor Suhana, Sulaiman Nooraida, Samsudin Azham, Ahmad M R A, Hamid HD28 Management. Industrial Management Cyber Security Culture (CSC) is a culture that could produce a secure cyber space and could improve the quality of cyber world engagement. Despite many benefits that could be offered by CSC, there is a lack of models and guidelines on how to cultivate this culture. This paper discusses the concept of CSC model in terms of elements that form the model to suggest how CSC could be cultivated. Information Security Culture (ISC) model developed by [1] is used as a framework in discussing the concept of CSC. A literature search also is conducted to find and analyses the most suitable elements for CSC. A new model of CSC was proposed as a result of this study. The findings could provide better understanding of CSC and could be used as baseline to conduct more research on CSC. University College TATI 2023 Article PeerReviewed pdf en cc_by_nc_sa_4 http://umpir.ump.edu.my/id/eprint/39568/1/How%20to%20Cultivate%20Cyber%20Security%20Culture%20-%20The%20%20Evidences%20from%20Literature.pdf Akhyari, Nasir and Syahrul, Fahmy and Wan Roslina, Othman and Noor Suhana, Sulaiman and Nooraida, Samsudin and Azham, Ahmad and M R A, Hamid (2023) How to Cultivate Cyber Security Culture? The Evidences from Literature. International Journal of Synergy in Engineering and Technology (IJSET), 4 (1). pp. 13-19. ISSN 2735-0622. (Published) https://www.ijset.tatiuc.edu.my/index.php/ijset/article/view/166/128
spellingShingle HD28 Management. Industrial Management
Akhyari, Nasir
Syahrul, Fahmy
Wan Roslina, Othman
Noor Suhana, Sulaiman
Nooraida, Samsudin
Azham, Ahmad
M R A, Hamid
How to Cultivate Cyber Security Culture? The Evidences from Literature
title How to Cultivate Cyber Security Culture? The Evidences from Literature
title_full How to Cultivate Cyber Security Culture? The Evidences from Literature
title_fullStr How to Cultivate Cyber Security Culture? The Evidences from Literature
title_full_unstemmed How to Cultivate Cyber Security Culture? The Evidences from Literature
title_short How to Cultivate Cyber Security Culture? The Evidences from Literature
title_sort how to cultivate cyber security culture the evidences from literature
topic HD28 Management. Industrial Management
url http://umpir.ump.edu.my/id/eprint/39568/1/How%20to%20Cultivate%20Cyber%20Security%20Culture%20-%20The%20%20Evidences%20from%20Literature.pdf
work_keys_str_mv AT akhyarinasir howtocultivatecybersecurityculturetheevidencesfromliterature
AT syahrulfahmy howtocultivatecybersecurityculturetheevidencesfromliterature
AT wanroslinaothman howtocultivatecybersecurityculturetheevidencesfromliterature
AT noorsuhanasulaiman howtocultivatecybersecurityculturetheevidencesfromliterature
AT nooraidasamsudin howtocultivatecybersecurityculturetheevidencesfromliterature
AT azhamahmad howtocultivatecybersecurityculturetheevidencesfromliterature
AT mrahamid howtocultivatecybersecurityculturetheevidencesfromliterature