Cybersecurity

14,000,000 Leading Edge Experts on the ideXlab platform

Scan Science and Technology

Contact Leading Edge Experts & Companies

Scan Science and Technology

Contact Leading Edge Experts & Companies

The Experts below are selected from a list of 26289 Experts worldwide ranked by ideXlab platform

W. Tad Foster - One of the best experts on this subject based on the ideXlab platform.

  • Factors affecting risky Cybersecurity behaviors by U.S. workers: An exploratory study
    Computers in Human Behavior, 2020
    Co-Authors: Andrew R. Gillam, W. Tad Foster
    Abstract:

    Abstract Behavioral determinants of Cybersecurity have gained greater attention among information technology experts in recent years. However, drivers of risky Cybersecurity behavior have not been widely studied. This exploratory study examines the extent to which risky Cybersecurity behavior is predicted by factors of Cybersecurity-related avoidance behavior. Self-reported risky Cybersecurity behavior was examined in light of technology threat avoidance factors in a sample of 184 working adults in the United States. Risky behaviors were measured using the instrument by Hadlington (2017), previously used by researchers to measure behavioral associations with non-technology threat avoidance-related items. Hierarchical regression noted significant predictive associations between several technology threat avoidance factors and self-reported risky Cybersecurity behavior: perceived susceptibility (p = .027), perceived cost (p = .003), and self-efficacy (p = .043). Combined, these variables explained 9.4% of the adjusted variance in levels of risky Cybersecurity behavior (p = .001). Effect size calculations revealed predictive impacts in the low-medium range. Age was also confirmed as a confounding covariate (p = .045). The impact findings uniquely distinguish this study from previous works. Findings also infer that training in protective behavior can mitigate a significant portion of risky Cybersecurity behavior.

Anupam Joshi - One of the best experts on this subject based on the ideXlab platform.

  • Cybersecurity Challenges to American Local Governments
    2017
    Co-Authors: Donald F. Norris, Laura Mateczun, Anupam Joshi, Tim Finin
    Abstract:

    In this paper we examine data from the first ever nationwide survey of Cybersecurity among American local governments. We are particularly interested in understanding the threats to local government Cybersecurity, their level of preparedness to address the threats, the barriers these governments encounter when deploying Cybersecurity, the policies, tools and practices that they employ to improve Cybersecurity and, finally, the extent of awareness of and support for high levels of Cybersecurity within their organizations. We found that local governments are under fairly constant cyberattack and are periodically breached. They are not especially well prepared to prevent cyberattacks or to recover when breached. The principal barriers to local Cybersecurity are financial and organizations. Although a number of polices, tools and practices to improve Cybersecurity, few local governments are making wide use of them. Last, local governments suffer from too little awareness of and support for Cybersecurity within their organizations.

  • uco a unified Cybersecurity ontology
    National Conference on Artificial Intelligence, 2016
    Co-Authors: Zareen Syed, Lisa M Mathews, Ankur Padia, Anupam Joshi
    Abstract:

    In this paper we describe the Unified Cybersecurity Ontology (UCO) that is intended to support information integration and cyber situational awareness in Cybersecurity systems. The ontology incorporates and integrates heterogeneous data and knowledge schemas from different Cybersecurity systems and most commonly used Cybersecurity standards for information sharing and exchange. The UCO ontology has also been mapped to a number of existing Cybersecurity ontologies as well as concepts in the Linked Open Data cloud. Similar to DBpedia which serves as the core for general knowledge in Linked Open Data cloud, we envision UCO to serve as the core for Cybersecurity domain, which would evolve and grow with the passage of time with additional Cybersecurity data sets as they become available. We also present a prototype system and concrete use cases supported by the UCO ontology. To the best of our knowledge, this is the first Cybersecurity ontology that has been mapped to general world ontologies to support broader and diverse security use cases. We compare the resulting ontology with previous efforts, discuss its strengths and limitations, and describe potential future work directions.

  • AAAI Workshop: Artificial Intelligence for Cyber Security - UCO: A Unified Cybersecurity Ontology
    2016
    Co-Authors: Zareen Syed, Ankur Padia, M. Lisa Mathews, Tim Finin, Anupam Joshi
    Abstract:

    In this paper we describe the Unified Cybersecurity Ontology (UCO) that is intended to support information integration and cyber situational awareness in Cybersecurity systems. The ontology incorporates and integrates heterogeneous data and knowledge schemas from different Cybersecurity systems and most commonly used Cybersecurity standards for information sharing and exchange. The UCO ontology has also been mapped to a number of existing Cybersecurity ontologies as well as concepts in the Linked Open Data cloud. Similar to DBpedia which serves as the core for general knowledge in Linked Open Data cloud, we envision UCO to serve as the core for Cybersecurity domain, which would evolve and grow with the passage of time with additional Cybersecurity data sets as they become available. We also present a prototype system and concrete use cases supported by the UCO ontology. To the best of our knowledge, this is the first Cybersecurity ontology that has been mapped to general world ontologies to support broader and diverse security use cases. We compare the resulting ontology with previous efforts, discuss its strengths and limitations, and describe potential future work directions.

Lynn Futcher - One of the best experts on this subject based on the ideXlab platform.

  • Identifying the Cybersecurity Body of Knowledge for a Postgraduate Module in Systems Engineering
    2018
    Co-Authors: Suné Von Solms, Lynn Futcher
    Abstract:

    In the light of Industry 4.0, there exists a drive in engineering to include Cybersecurity in the design, development and maintenance of smart cyber-physical systems. The high interconnectivity of these systems make these systems more susceptible to cyberattacks. In South Africa, the engineering education space does not traditionally cater for Cybersecurity training in undergraduate or post-graduate studies. The lack of Cybersecurity education in engineering and the need for Cybersecurity knowledge in the industry highlights a knowledge gap in the field of Cybersecurity engineering. This paper describes the process followed to determine the body of knowledge which should be considered for a postgraduate module in Cybersecurity in engineering in South Africa. Findings show that topics related to Software Security, Systems Security and Organizational Security are deemed most important for inclusion in the Cybersecurity body of knowledge for a postgraduate module in Systems Engineering.

  • World Conference on Information Security Education - Identifying the Cybersecurity Body of Knowledge for a Postgraduate Module in Systems Engineering
    IFIP Advances in Information and Communication Technology, 2018
    Co-Authors: Suné Von Solms, Lynn Futcher
    Abstract:

    In the light of Industry 4.0, there exists a drive in engineering to include Cybersecurity in the design, development and maintenance of smart cyber-physical systems. The high interconnectivity of these systems make these systems more susceptible to cyberattacks. In South Africa, the engineering education space does not traditionally cater for Cybersecurity training in undergraduate or post-graduate studies. The lack of Cybersecurity education in engineering and the need for Cybersecurity knowledge in the industry highlights a knowledge gap in the field of Cybersecurity engineering. This paper describes the process followed to determine the body of knowledge which should be considered for a postgraduate module in Cybersecurity in engineering in South Africa. Findings show that topics related to Software Security, Systems Security and Organizational Security are deemed most important for inclusion in the Cybersecurity body of knowledge for a postgraduate module in Systems Engineering.

Andrew R. Gillam - One of the best experts on this subject based on the ideXlab platform.

  • Factors affecting risky Cybersecurity behaviors by U.S. workers: An exploratory study
    Computers in Human Behavior, 2020
    Co-Authors: Andrew R. Gillam, W. Tad Foster
    Abstract:

    Abstract Behavioral determinants of Cybersecurity have gained greater attention among information technology experts in recent years. However, drivers of risky Cybersecurity behavior have not been widely studied. This exploratory study examines the extent to which risky Cybersecurity behavior is predicted by factors of Cybersecurity-related avoidance behavior. Self-reported risky Cybersecurity behavior was examined in light of technology threat avoidance factors in a sample of 184 working adults in the United States. Risky behaviors were measured using the instrument by Hadlington (2017), previously used by researchers to measure behavioral associations with non-technology threat avoidance-related items. Hierarchical regression noted significant predictive associations between several technology threat avoidance factors and self-reported risky Cybersecurity behavior: perceived susceptibility (p = .027), perceived cost (p = .003), and self-efficacy (p = .043). Combined, these variables explained 9.4% of the adjusted variance in levels of risky Cybersecurity behavior (p = .001). Effect size calculations revealed predictive impacts in the low-medium range. Age was also confirmed as a confounding covariate (p = .045). The impact findings uniquely distinguish this study from previous works. Findings also infer that training in protective behavior can mitigate a significant portion of risky Cybersecurity behavior.

Suné Von Solms - One of the best experts on this subject based on the ideXlab platform.

  • Identifying the Cybersecurity Body of Knowledge for a Postgraduate Module in Systems Engineering
    2018
    Co-Authors: Suné Von Solms, Lynn Futcher
    Abstract:

    In the light of Industry 4.0, there exists a drive in engineering to include Cybersecurity in the design, development and maintenance of smart cyber-physical systems. The high interconnectivity of these systems make these systems more susceptible to cyberattacks. In South Africa, the engineering education space does not traditionally cater for Cybersecurity training in undergraduate or post-graduate studies. The lack of Cybersecurity education in engineering and the need for Cybersecurity knowledge in the industry highlights a knowledge gap in the field of Cybersecurity engineering. This paper describes the process followed to determine the body of knowledge which should be considered for a postgraduate module in Cybersecurity in engineering in South Africa. Findings show that topics related to Software Security, Systems Security and Organizational Security are deemed most important for inclusion in the Cybersecurity body of knowledge for a postgraduate module in Systems Engineering.

  • World Conference on Information Security Education - Identifying the Cybersecurity Body of Knowledge for a Postgraduate Module in Systems Engineering
    IFIP Advances in Information and Communication Technology, 2018
    Co-Authors: Suné Von Solms, Lynn Futcher
    Abstract:

    In the light of Industry 4.0, there exists a drive in engineering to include Cybersecurity in the design, development and maintenance of smart cyber-physical systems. The high interconnectivity of these systems make these systems more susceptible to cyberattacks. In South Africa, the engineering education space does not traditionally cater for Cybersecurity training in undergraduate or post-graduate studies. The lack of Cybersecurity education in engineering and the need for Cybersecurity knowledge in the industry highlights a knowledge gap in the field of Cybersecurity engineering. This paper describes the process followed to determine the body of knowledge which should be considered for a postgraduate module in Cybersecurity in engineering in South Africa. Findings show that topics related to Software Security, Systems Security and Organizational Security are deemed most important for inclusion in the Cybersecurity body of knowledge for a postgraduate module in Systems Engineering.