logo

Human Behaviour in Cybersecurity: Impact on Data Security

Unit Handbook 2018/2019

68 Pages13665 Words232 Views
   

Added on  2023-06-04

About This Document

This thesis paper explores the relationship between human behaviour and cybersecurity, examining the impact of human factors on the security of data. The study is focused on identifying elements of cybersecurity which would benefit from further research based on findings of the literature review. The research method is based on primary data collection method using surveys and questionnaires. The selected sample is 70; these are taken to collect data. The purpose of this research study is to identify elements of the cybersecurity which would benefit from further research as well as development based on findings of the literature review.

Human Behaviour in Cybersecurity: Impact on Data Security

Unit Handbook 2018/2019

   Added on 2023-06-04

ShareRelated Documents
Running head: HUMAN BEHAVIOUR IN CYBERSECURITY
Human Behaviour in Cybersecurity
Name of the Student:
Name of the University:
Human Behaviour in Cybersecurity: Impact on Data Security_1
1HUMAN BEHAVIOUR IN CYBERSECURITY
Abstract
The thesis paper is based on human behaviour in cybersecurity. The purpose of this thesis is to
consider issues which are affecting the human behaviour and assessing if they could better
considered in implementation of the security practices. The study is focused on human behaviour
when the employees are facing manipulation. The current security thinking is based on how to
implement object secured despite the human beings. The human activities are threats to security
chains. The research method is based on primary data collection method using surveys and
questionnaires. The selected sample is 70; these are taken to collect data. The purpose of this
research study is to identify elements of the cybersecurity which would benefit from further
research as well as development based on findings of the literature review. The result of this
study is to present need of the cybersecurity field to review in established industries to benefit
from successful practices like evaluation of human reliability and quality control of data to get
true assurance. Recommendations which are provided by the researcher to implement
cybersecurity practices in the business organizations are mandatory follow the cybersecurity
guidelines, cyber and physical asset protection and security audits.
Keywords: Cybersecurity, human behaviour, security thinking, Human reliability, Security
audits.
Human Behaviour in Cybersecurity: Impact on Data Security_2
2HUMAN BEHAVIOUR IN CYBERSECURITY
Table of Contents
1.0 Introduction................................................................................................................................4
1.1 Background of the research study..........................................................................................4
1.2 Research aim and objectives..................................................................................................4
1.3 Research question..................................................................................................................5
1.4 Purpose of the research..........................................................................................................5
1.5 Overview of the research.......................................................................................................5
2.0 Proposed methodology..............................................................................................................6
2.1 Introduction............................................................................................................................6
2.2 Research philosophy..............................................................................................................6
2.3 Research approach.................................................................................................................7
2.4 Research design.....................................................................................................................8
2.5 Data collection procedures and techniques............................................................................8
2.6 Ethical considerations..........................................................................................................10
2.7 Research limitations.............................................................................................................10
2.8 Time horizon........................................................................................................................11
3.0 Findings from research............................................................................................................11
3.1 Introduction..........................................................................................................................11
3.2 Quantitative data analysis....................................................................................................12
4.0 Discussion of findings.............................................................................................................41
Human Behaviour in Cybersecurity: Impact on Data Security_3
3HUMAN BEHAVIOUR IN CYBERSECURITY
4.1 Relation to research problem...............................................................................................41
4.2 Relation to literature............................................................................................................42
5.0 Conclusion and recommendations...........................................................................................44
5.1 Conclusion from data presented..........................................................................................44
5.2 Link with aim and objectives...............................................................................................45
5.3 Recommendations................................................................................................................46
5.4 Future research.....................................................................................................................47
5.5 Critical review of completed work......................................................................................47
References......................................................................................................................................49
Bibliography..................................................................................................................................50
Appendix........................................................................................................................................51
1. Literature Review..................................................................................................................51
2. Ethics form.............................................................................................................................66
Human Behaviour in Cybersecurity: Impact on Data Security_4
4HUMAN BEHAVIOUR IN CYBERSECURITY
1.0 Introduction
1.1 Background of the research study
Danks and Danks (2016) stated that cybersecurity is extremely important in modern
society. With the technical attacks, criminals are benefitting from the information they have
received. The criminals get access to credit information, business secrets, passwords, account
and personal information of victims. This stolen information is used to blackmail and sell
information to the victim himself. For example, a hard disk is encrypted and then the encryption
key is sold back tothe victim. Gutzwiller et al. (2015) argued that social engineering is uncertain
is the modern world where humans are more aware and more suspicious about securing their
personal information.
1.2 Research aim and objectives
This research study is based on exploring the relationship between human behaviour and
cybersecurity and examining the impact of human factors on the security of data. The research
work is based on identifying the elements of cybersecurity which would benefit from further
study and development based on the literature findings. Following are the research objectives
such as:
To identify cybersecurity events caused due to human errors
To assess human behaviour considered in the implementation of the security practices
To identify the significance of human behaviour on the cybersecurity assurance
Human Behaviour in Cybersecurity: Impact on Data Security_5
5HUMAN BEHAVIOUR IN CYBERSECURITY
1.3 Research question
The selected research questions based on the research topic are:
1. What are possible cybersecurity breaches and thesignificance of human behaviour on the
cybersecurity assurance?
2. How is it assessed that human behaviour isconsidered inthe implementation of the
security practices?
3. What are possible security incidents because of human behaviour?
1.4 Purpose of the research
The purpose of this research is to consider thecauses of human behaviour and assess
whether it is better taken for theimplementation of security practices. The study is focused on
human behaviour plus social engineering. The activities of humans are always a threat
towardsthe security chain. The cybersecurity events are discussed in the study so that humans are
aware of the attacks caused due to human errors.
1.5 Overview of the research
The research discussed the series of events which are focused on how the social engineers
are taking advantage of human behaviour. The first section describes the background of the
research. It provides research aims, objectives and questions on whichthe entireresearch study is
based. The next chapter is focused on the term social engineering andthe impact of human
behaviour on cybersecurity. The third chapter consists of the methods and techniques which are
used to collect data for this research study. This section deals with how collected information
canbe used to allow the social engineer to identify the cybersecurity threats due to human errors.
Human Behaviour in Cybersecurity: Impact on Data Security_6
6HUMAN BEHAVIOUR IN CYBERSECURITY
The fifth section provides an analysis of collected data where social engineering is an action. It is
focused on the events against the social engineering throughout security thinking to prevent the
cybersecurity events. The sixth section summarises the events due to which research goals are
achieved. It provides a discussion about if the study is meeting with its aims and objectives.
2.0 Proposed methodology
2.1 Introduction
Gast and Ledford (2014) stated that the research methodology is utilised to introduce
statistical tools for analysing the data to the researcher. It is used to introduce concepts related to
the scientific research and methods which are conducted for scientific inquiry. The research
methods and techniques are used to adopt and conduct the study related to human behaviours in
cybersecurity. The methods as well as techniques are used to solve the research related problems.
2.2 Research philosophy
Creswell (2013) discussed that research philosophy deals with nature and development of
the knowledge. The concept related to the philosophy collects primary and secondary data to
create new knowledge related to the thesis work. There are three types of research philosophy
which are termed as positivism, realism and interpretivism. This method is used to determine
hidden facts related to selected research philosophy. The research philosophy is belief about
ways in which the data about research phenomenon should gather and analyses.
After analysing the selected topic “Human behaviour in cybersecurity”,it was determined
that positivism would be selected as the research method. All the hidden facts were being
evaluated in scientific manner with an application of the particular philosophy. This method is
Human Behaviour in Cybersecurity: Impact on Data Security_7
7HUMAN BEHAVIOUR IN CYBERSECURITY
used as it is believed that reality is stable and observes and describe from the viewpoint of
research objectives. It involved manipulation of reality with the variations into single
independent variables to form relationships between elements into the social world. In this study,
predictions are made based on previously observed as well as explained realities and
interrelationships.
2.3 Research approach
The research approach is selected to determine the research aim as well as objectives so
thatthe selected topic is analysed critically. There are two types of research approaches,
deductive as well as inductive. Mackey and Gass (2015) stated that the inductive approach is
used as a study to learn the selected topic at the time when proper data is not available.
Observation is used as a technique to get related data so that the research path is built based on
the method. In order to build theories related to the selected topic,the inductive approach is
suitable. The deductive approach is selected as a method which can describe the practical
applications related to the theories which are required to get access related tothe content of data
investigations.
In order to investigate details related to human behaviour in cybersecurity, the most
suitable approach wasdeductive. The results obtained from this approach provided a clear
understanding of the human errors which occurred due to cybersecurity threats in particular
behaviour. In this case,the inductive approach failed to meet with the research objectives as the
researchers failed to highlight innovative concepts as well as theories based on the human
behaviour. The human behaviour in cybersecurity helped to recognise the comprehensive
thoughts in precise way.
Human Behaviour in Cybersecurity: Impact on Data Security_8

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Capital Structures and Profitability of Pharmaceuticals Companies Listed under Australian Stock Exchange
|103
|27915
|253

Impact of Rational Decision Making and Bounded Rationality on Consumer Behaviour in FMCG Sector
|65
|15430
|21

The Impact of Customer Perceived Value on Customer Satisfaction: A Case Study on MBO Cinemas
|104
|29176
|436

Asia Pacific Management Review
|79
|17932
|28

Topic: An Investigation into Threat Modelling Tools and Technique Used in Securing E-Commerce Applications Online
|84
|20598
|225

A Study Of The Structure And Function Of The................................................................................................................3 1.3.1. General Objectives 5 1.3.2. Specifi
|51
|17075
|164