Abstract
PurposeThis article surveys why libraries are vulnerable to social engineering attacks and how to manage risks of human-caused cyber threats on organizational level; investigates Estonian library staff awareness of information security and shares recommendations concerning focus areas that should be given more attention in the future.Design/methodology/approachThe data used in this paper is based on an overview of relevant literature highlighting the theoretical points and giving the reasons why human factor is considered the weakest link in information security and cyber security and studying how to mitigate the related risks in the organisation. To perform the survey, a web questionnaire was designed which included 63 sentences and was developed based on the knowledge-attitude-behaviour (KAB) model supported by Kruger and Kearney and Human Aspects of Information Security Questionnaire (HAIS-Q) designed by Parsons et al.FindingsThe research results show that the information security awareness of library employees is at a good level; however, awareness in two focus areas needs special attention and should be improved. The output of this study is the mapping of seven focus areas of information security policy in libraries based on the HAIS-Q framework and the KAB model.Originality/valueThe cyber awareness of library employees has not been studied in the world using HAIS-Q and KAB model, and to the best of the authors’ knowledge, no research has been previously carried out in the Estonian library context into cyber security awareness.
Reference60 articles.
1. Users are not the enemy: why users compromise computer security mechanisms and how to take remedial measures;Communications of the ACM,1999
2. An information security risk-driven investment model for analysing human factors;Information and Computer Security,2016
3. A qualitative study of users' view on information security;Computers and Security,2007
4. Askew, K.L. (2012), “The relationship between cyberloafing and task performance and an examination of the theory of planned behavior as a model of cyberloafing”, in USF Tampa Graduate Theses and Dissertations, available at: https://digitalcommons.usf.edu/etd/3957
5. Correlates of different forms of cyberloafing: the role of norms and external locus of control;Computers in Human Behavior,2008
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献