Annotated Bibliography Example

Developing a simulated intelligent instrument to measure user behavior toward cybersecurity policies – An Annotated Bibliography
06/23/2024


Alfalah, A. A. (2023, January 22). The role of Internet security awareness as a moderating variable on cyber security perception: Learning management system as a case study, 10(2023), 136-144. International Journal of Advanced and Applied Sciences. https://science-gate.com/IJAAS/Articles/2023/2023-10-04/1021833ijaas202304017.pdf

This article provides a study that investigates the influence of different factors on university students and how that influence affects security awareness on the internet. The article goes on to depict how online learning is conducted worldwide via the Learning Management System (LMS) and if that allows for users to learn enough for security. Privacy and security becomes one of the main contributing factors that is described, but the authors also include trust, risk, and security awareness into their study in order to observe what has the most influence on behavior when using the internet.
Much of the results showed that much of the behavior was influenced by trust and risk, rather than security awareness and demonstrated that there were highly negative impacts to internet usage and security due to this ideology. Given the data that was collected and used during the study, the authors take into consideration that other factors could influence a user’s behavior other than the fact that they trust the internet or have no idea of the risks involved when using it.

Bubaš, G., Orehovacki, T., & Konecki , M. (2008, December). Factors and Predictors of Online Security and Privacy Behavior, 32(December 2008). Journal of Information and Organizational Sciences.

With this article, the authors provide a detailed case study and details regarding how habits affect computers and Internet users. The experiment led them to survey 312 different personnel and investigated how assumptions and habits related to how they established their online security and privacy. The authors describe the different online threats that have evolved and become more complex within the networks and how security and vulnerabilities grow in importance.
As each system possesses different vulnerabilities it becomes a more complex practice for users to defend against threats and the authors dive into how behavior and habits can be a necessity in order to protect sensitive information. With their experiment, they were able to determine that certain factors of behavior affected the users when it came to security and privacy protection. Much of the research showed that experienced users were able to protect themselves from suspicious data, but at the same time, there were still subjects of the study that would participate in risky behavior and idealize that they were fearless from online threats. Many of the subjects showed that different influences are what truly influences their behavior.

Mamonov, S., & Benbunan-Fich, R. (2018). The impact of information security threat awareness on privacy-protective behaviors. Computers in Human Behavior, 83(June 2018), 32–44. https://www.sciencedirect.com/science/article/abs/pii/S0747563218300347?via%3Dihub#preview-section-cited-by

With this article, the awareness of information security and threats are explored in order to see how awareness of information and security influences privacy behaviors. It is observed that individuals may take automatic actions when trying to mitigate threats or reacting to an attack, before thinking out the process, causing different issues to arise if suspicious material is gathered and installed. For the authors’ experiment, different news reports are given in order to show that there are breaches occurring throughout the world and security measures should be made in order to keep this from happening. As results are gathered from the exposure to these news outlets, it is seen that exposure to the breaches and attacks cause many users to begin implementing stronger passwords and practicing appropriate cybersecurity awareness in order to refrain from being attacked. The research shines a light on how many individuals can take into consideration how important it is to secure their personal data and practice safeguards in order to respond to security threats when transparency is key and users are exposed to how the cyberworld is being attacked.

Simonet, J., & Teufel, S. (2019). The influence of organizational, social and personal factors on cybersecurity awareness and behavior of Home Computer Users. ICT Systems Security and Privacy Protection, 194–208. https://doi.org/10.1007/978-3-030-22312-0_14

This article builds more of a foundation with each of the other listed articles as it also performs a behavioral analysis as each of the articles perform. The details pertaining to security awareness and how network systems are connected all over the world are best described as unorganized by the article. The study investigates what determines an individual’s awareness and behavior at home.
Much of the article discusses how phishing and fear-based campaigns can allude to the users at home and whether or not they can influence a certain behavior from the users in order to gain the benefits that are wanted. When viewing the results, much is seen on a diverse scale as the study shows that work related training is not brought home for users to build upon personally. The researchers detail how there are still some limitations on the study as different cultural factors could play into a person’s security awareness. As the study remains, the authors demonstrate that computer systems should be protected at all times, but different factors can impact behavior when personal use is being displayed.

References
Elrayah, M., & Jamil, S. (2023). Impact of Digital Literacy and Online Privacy Concerns on Cybersecurity Behaviour: The Moderating Role of Cybersecurity Awareness. International Journal of Cyber Criminology, 17(2), 166–187. https://doi.org/10.5281/zenodo.4766711

Leave a Reply

Your email address will not be published. Required fields are marked *