IDEAS home Printed from https://ideas.repec.org/a/bjz/ajisjr/2099.html
   My bibliography  Save this article

Is It Possible to Change the Cyber Security Behaviours of Employees? Barriers and Promoters

Author

Listed:
  • Ahu Ergen
  • Ahmet Naci Ãœnal
  • Mehmet Sıtkı Saygili

Abstract

The increase in cyber attacks cause individuals and businesses to face financial loss and reputation damage. Most cyber security studies ignore human factor and focus only on technological measures although the cyber security behaviors of employees are vital for the organisations. This paper aims to explore and discuss the role of employees in cyber security. In-depth interviews with eight cyber security experts were conducted through semi-structured, open-ended interviews. This study gives perspectives regarding the cyber security behaviors of employees, the barriers and promoters of secure behaviors in cyberspace. The findings mainly stem reasons of unsecure behaviors and solutions for them, and provide implications to companies for effective training and recommendations to adopt secure behaviors in the companies.

Suggested Citation

  • Ahu Ergen & Ahmet Naci Ãœnal & Mehmet Sıtkı Saygili, 2021. "Is It Possible to Change the Cyber Security Behaviours of Employees? Barriers and Promoters," Academic Journal of Interdisciplinary Studies, Richtmann Publishing Ltd, vol. 10, July.
  • Handle: RePEc:bjz:ajisjr:2099
    DOI: https://doi.org/10.36941/ajis-2021-0111
    as

    Download full text from publisher

    File URL: https://www.richtmann.org/journal/index.php/ajis/article/view/12588
    Download Restriction: no

    File URL: https://www.richtmann.org/journal/index.php/ajis/article/view/12588/12189
    Download Restriction: no

    File URL: https://libkey.io/https://doi.org/10.36941/ajis-2021-0111?utm_source=ideas
    LibKey link: if access is restricted and if your library uses this service, LibKey will redirect you to where you can use your library subscription to access this item
    ---><---

    References listed on IDEAS

    as
    1. Donalds, Charlette & Osei-Bryson, Kweku-Muata, 2020. "Cybersecurity compliance behavior: Exploring the influences of individual decision style and other antecedents," International Journal of Information Management, Elsevier, vol. 51(C).
    2. Fatima Salahdine & Naima Kaabouch, 2019. "Social Engineering Attacks: A Survey," Future Internet, MDPI, vol. 11(4), pages 1-17, April.
    3. Aurélien Baillon & Jeroen de Bruin & Aysil Emirmahmutoglu & Evelien van de Veer & Bram van Dijk, 2019. "Informing, simulating experience, or both: A field experiment on phishing risks," PLOS ONE, Public Library of Science, vol. 14(12), pages 1-15, December.
    4. Li, Ling & He, Wu & Xu, Li & Ash, Ivan & Anwar, Mohd & Yuan, Xiaohong, 2019. "Investigating the impact of cybersecurity policy awareness on employees’ cybersecurity behavior," International Journal of Information Management, Elsevier, vol. 45(C), pages 13-24.
    Full references (including those not matched with items on IDEAS)

    Most related items

    These are the items that most often cite the same works as this one and are cited by the same works as this one.
    1. Agbodoh-Falschau, Kouassi Raymond & Ravaonorohanta, Bako Harinivo, 2023. "Investigating the influence of governance determinants on reporting cybersecurity incidents to police: Evidence from Canadian organizations’ perspectives," Technology in Society, Elsevier, vol. 74(C).
    2. Asad Hussain & Sunila Fatima Ahmad & Mishal Tanveer & Ansa Sameen Iqbal, 2022. "Computer Malware Classification, Factors, and Detection Techniques: A Systematic Literature Review (SLR)," International Journal of Innovations in Science & Technology, 50sea, vol. 4(3), pages 899-918, August.
    3. Han, Kookyoung & Choi, Jin Hyuk, 2023. "Implications of false alarms in dynamic games on cyber-security," Chaos, Solitons & Fractals, Elsevier, vol. 169(C).
    4. Naume Sonhera & David Mhlanga, 2022. "Reducing Cyber Incidents through Good Online Behavioral Norms: Lessons from South Africa," Eurasian Journal of Social Sciences, Eurasian Publications, vol. 10(1), pages 37-48.
    5. Saif Hussein Abdallah Alghazo & Norshima Humaidi & Shereen Noranee, 2023. "Assessing Information Security Competencies of Firm Leaders towards Improving Procedural Information Security Countermeasure: Awareness and Cybersecurity Protective Behavior," Information Management and Business Review, AMH International, vol. 15(1), pages 1-13.
    6. Ou, Carol & Zhang, Xiaowei & Angelopoulos, Spyros & Davison, Robert & Janse, Noury, 2022. "Security breaches and organization response strategy : Exploring consumers’ threat and coping appraisals," Other publications TiSEM 9ac0c2eb-87e8-4c1d-a0b0-c, Tilburg University, School of Economics and Management.
    7. Canitgia Tambariki, 2024. "Drivers of banking consumers' cybersecurity behavior: Applying the extended protection motivation theory ," GATR Journals jmmr327, Global Academy of Training and Research (GATR) Enterprise.
    8. T. V. Tulupieva, 2022. "Psychological Aspects of the Organization’s Information Security in the Context of Socio-engineering Attacks," Administrative Consulting, Russian Presidential Academy of National Economy and Public Administration. North-West Institute of Management., issue 2.
    9. Ben Krishna & Satish Krishnan & M. P. Sebastian, 2023. "Examining the Relationship between National Cybersecurity Commitment, Culture, and Digital Payment Usage: An Institutional Trust Theory Perspective," Information Systems Frontiers, Springer, vol. 25(5), pages 1713-1741, October.
    10. Wing Fung Chong & Runhuan Feng & Hins Hu & Linfeng Zhang, 2022. "Cyber Risk Assessment for Capital Management," Papers 2205.08435, arXiv.org, revised Oct 2023.
    11. Percia David, Dimitri & Maréchal, Loïc & Lacube, William & Gillard, Sébastien & Tsesmelis, Michael & Maillart, Thomas & Mermoud, Alain, 2023. "Measuring security development in information technologies: A scientometric framework using arXiv e-prints," Technological Forecasting and Social Change, Elsevier, vol. 188(C).
    12. Tahereh Hasani & Norman O’Reilly & Ali Dehghantanha & Davar Rezania & Nadège Levallet, 2023. "Evaluating the adoption of cybersecurity and its influence on organizational performance," SN Business & Economics, Springer, vol. 3(5), pages 1-38, May.
    13. Keefer, Philip & Roseth, Benjamin & Santamaria, Julieth, 2024. "General Skills Training for Public Employees: Experimental Evidence on Cybersecurity Training in Argentina," IDB Publications (Working Papers) 13775, Inter-American Development Bank.
    14. Hameed, Irfan & Akram, Umair & Khan, Yamna & Khan, Naveed R. & Hameed, Imran, 2024. "Exploring consumer mobile payment innovations: An investigation into the relationship between coping theory factors, individual motivations, social influence and word of mouth," Journal of Retailing and Consumer Services, Elsevier, vol. 77(C).
    15. Berger, Allen N. & Öztekin, Özde & Roman, Raluca A., 2023. "Geographic deregulation and bank capital structure," Journal of Banking & Finance, Elsevier, vol. 149(C).
    16. Kim, Byung-Jik & Kim, Min-Jik, 2024. "The influence of work overload on cybersecurity behavior: A moderated mediation model of psychological contract breach, burnout, and self-efficacy in AI learning such as ChatGPT," Technology in Society, Elsevier, vol. 77(C).

    More about this item

    Statistics

    Access and download statistics

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:bjz:ajisjr:2099. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Richtmann Publishing Ltd (email available below). General contact details of provider: https://www.richtmann.org/journal/index.php/ajis .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.