CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
User perception of Context-Based Micro-Training – a method for cybersecurity training
Högskolan i Skövde, Institutionen för informationsteknologi.ORCID iD: 0000-0003-2084-9119
School of Computer Science, University of Nottingham, UK.ORCID iD: 0000-0003-0984-7542
Högskolan i Skövde, Institutionen för informationsteknologi.ORCID iD: 0000-0001-5962-9995
2023 (English)In: Information Security Journal, ISSN 1939-3555, E-ISSN 1939-3547Article in journal (Refereed) Epub ahead of print
Abstract [en]

User behavior is one of the biggest challenges to cybersecurity in modern organizations. Users are continuously targeted by attackers and required to have sufficient knowledge to spot and avoid such attacks. Different training methods are suggested and used in the industry to support users to behave securely. The challenge remains, and improved methods for end-user cybersecurity training are needed. This paper introduces and evaluates user perception of a method called Context-Based Micro-Training (CBMT). This approach suggests that training should be delivered in short sequences when the information is of direct relevance. The intention is to provide training directly related to the user’s current situation while also providing an awareness-increasing effect. This notion is tested in a survey-based evaluation involving 1,452 respondents from Sweden, Italy, and the UK, comparing the perception of CBMT against the experience of traditional approaches. The results emphasize that current methods are not effective enough and show that CBMT is perceived positively by respondents in all sample groups. The study further evaluated how demographic aspects impact the perception of CBMT and found that a diverse group of users can appreciate it.

Place, publisher, year, edition, pages
Taylor & Francis , 2023.
Keywords [en]
cybersecurity, end-user, perception, training
National Category
Computer and Information Sciences Human Computer Interaction Information Systems, Social aspects
Research subject
Information Systems
Identifiers
URN: urn:nbn:se:hj:diva-62711DOI: 10.1080/19393555.2023.2222713ISI: 001004357200001Scopus ID: 2-s2.0-85161683304OAI: oai:DiVA.org:hj-62711DiVA, id: diva2:1806957
Funder
Vinnova, 2019-05021
Note

CC BY 4.0

Published online: 09 Jun 2023

CONTACT Joakim Kävrestad

The work was supported by VINNOVA under the grant [2019-05021].

Available from: 2023-10-24 Created: 2023-10-24 Last updated: 2023-10-24Bibliographically approved

Open Access in DiVA

fulltext(1933 kB)17 downloads
File information
File name FULLTEXT01.pdfFile size 1933 kBChecksum SHA-512
a20e0b28659de6b265a5e909bc6c1469cad6bb55c4bc6f36ea295049bcda8be72a66943666337a12ff496dc3965e2cec905eada9103cc15e0a6494d218026336
Type fulltextMimetype application/pdf

Other links

Publisher's full textScopusFulltext

Authority records

Kävrestad, JoakimNohlberg, Marcus

Search in DiVA

By author/editor
Kävrestad, JoakimFurnell, StevenNohlberg, Marcus
In the same journal
Information Security Journal
Computer and Information SciencesHuman Computer InteractionInformation Systems, Social aspects

Search outside of DiVA

GoogleGoogle Scholar
Total: 17 downloads
The number of downloads is the sum of all downloads of full texts. It may include eg previous versions that are now no longer available

doi
urn-nbn

Altmetric score

doi
urn-nbn
Total: 86 hits
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf