1,757
views
0
recommends
+1 Recommend
1 collections
    4
    shares

      Celebrating 65 years of The Computer Journal - free-to-read perspectives - bcs.org/tcj65

      scite_
       
      • Record: found
      • Abstract: found
      • Conference Proceedings: found
      Is Open Access

      Persona-Driven Information Security Awareness

      proceedings-article
      1 ,   1 , 1
      Proceedings of the 30th International BCS Human Computer Interaction Conference (HCI)
      Fusion
      11 - 15 July 2016
      Information Security, Security Awareness, Personas
      Bookmark

            Abstract

            Because human factors are a root cause of security breaches in many organisations, security awareness activities are often used to address problematic behaviours and improve security culture. Previous work has found that personas are useful for identifying audience needs & goals when designing and implementing awareness campaigns. We present a six-step security awareness process both driven by and centred around the use of personas. This can be embedded into business-as-usual activities, with 90-day cycles of awareness themes. We evaluated this process by using it to devise a security awareness campaign for a digital agency. Our results suggest a persona-centred security awareness approach is adaptable to business constraints, and contributes towards addressing security risks.

            Content

            Author and article information

            Contributors
            Conference
            July 2016
            July 2016
            : 1-3
            Affiliations
            [0001]Bournemouth University

            Poole, UK
            Article
            10.14236/ewic/HCI2016.97
            0244bc48-d1bc-487a-af11-0a5c4f2b7840
            © Ki-Aries et al. Published by BCS Learning and Development Ltd. Proceedings of British HCI 2016 Conference Fusion, Bournemouth, UK

            This work is licensed under a Creative Commons Attribution 4.0 Unported License. To view a copy of this license, visit http://creativecommons.org/licenses/by/4.0/

            Proceedings of the 30th International BCS Human Computer Interaction Conference
            HCI
            30
            Bournemouth University, Poole, UK
            11 - 15 July 2016
            Electronic Workshops in Computing (eWiC)
            Fusion
            History
            Product

            1477-9358 BCS Learning & Development

            Self URI (article page): https://www.scienceopen.com/hosted-document?doi=10.14236/ewic/HCI2016.97
            Self URI (journal page): https://ewic.bcs.org/
            Categories
            Electronic Workshops in Computing

            Applied computer science,Computer science,Security & Cryptology,Graphics & Multimedia design,General computer science,Human-computer-interaction
            Security Awareness,Information Security,Personas

            REFERENCES

            1. 2015 Cyber security awareness campaigns: Why do they fail to change behaviour? International Conference on Cyber Security for Sustainable Society 118 131

            2. 2016 A serious game for eliciting social engineering security requirements. Proceedings of the 24th IEEE International Conference on Requirements Engineering, RE ’16 IEEE Computer Society. To Appear

            3. 2015 White paper: Awareness is only the first step: A framework for progressive engagement of staff in cyber security Technical report, Hewlett Packard Enterprise

            4. 2014 About Face: The Essentials of Interaction Design John Wiley & Sons

            5. 2013 Do you enjoy getting gifts?: Keeping personas alive through marketing materials. CHI ’13 Extended Abstracts on Human Factors in Computing Systems, CHI EA ’13 2355 2358 ACM

            6. 2014 Who says personas can’t dance?: The use of comic strips to design information security personas CHI ’14 Extended Abstracts on Human Factors in Computing Systems, CHI EA ’14 2485 2490 ACM

            7. 2008 Hacking the Human: Social Engineering Techniques and Security Countermeasures Gower

            8. PwC 2015 2015 Information security breaches survey Technical report, PwC

            9. 2003 NIST Special Publication 800-50: Building an Information Technology Security Awareness and Training Programme Technical report, National Institute of Standards and Technology

            Comments

            Comment on this article