Author:
Ramlo Susan,Nicholas John B.
Abstract
Purpose
The purpose of this paper is to reveal and describe the divergent viewpoints about cybersecurity within a purposefully selected group of people with a range of expertise in relation to computer security.
Design/methodology/approach
Q methodology [Q] uses empirical evidence to differentiate subjective views and, therefore, behaviors in relation to any topic. Q uses the strengths of qualitative and quantitative research methods to reveal and describe the multiple, divergent viewpoints that exist within a group where individuals sort statements into a grid to represent their views. Analyses group similar views (sorts). In this study, participants were selected from a range of types related to cybersecurity (experts, authorities and uninformed).
Findings
Four unique viewpoints emerged such that one represents cybersecurity best practices and the remaining three viewpoints represent poor cybersecurity behaviors (Naïve Cybersecurity Practitioners, Worried but not Vigilant and How is Cybersecurity a Big Problem) that indicate a need for educational interventions within both the public and private sectors.
Practical implications
Understanding the divergent views about cybersecurity is important within smaller groups including classrooms, technology-based college majors, a company, a set of IT professionals or other targeted groups where understanding cybersecurity viewpoints can reveal the need for training, changes in behavior and/or the potential for security breaches which reflect the human factors of cybersecurity.
Originality/value
A review of the literature revealed that only large, nation-wide surveys have been used to investigate views of cybersecurity. Yet, surveys are not useful in small groups, whereas Q is designed to investigate behavior through revealing subjectivity within smaller groups.
Subject
Management of Technology and Innovation,Information Systems and Management,Computer Networks and Communications,Information Systems,Software,Management Information Systems
Reference23 articles.
1. ACM (2017), Curriculum Guidelines for Post-Secondary Degree Programs in Cybersecurity (A Report in the Computing Curricula Series Joint Task Force on Cybersecurity Education). New York, NY 10121-0701: Version 1.0 Report 31 December 2017.
2. Adopting the cybersecurity curriculum guidelines to develop a secondary and primary academic discipline in cybersecurity postsecondary education;Journal of Cybersecurity Education, Research and Practice,2019
3. A new evaluation criteria for effective security awareness in computer risk management based on AHP;Journal of Basic and Applied Scientific Research,2012
4. Building cybersecurity awareness: the need for evidence-based framing strategies;Government Information Quarterly,2017
Cited by
10 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献