Show simple item record

dc.contributor.authorAlotaibi, F
dc.contributor.authorClarke, Nathan
dc.contributor.authorFurnell, Steven
dc.date.accessioned2020-07-08T15:14:17Z
dc.date.issued2020-08-03
dc.identifier.issn2056-4961
dc.identifier.issn2056-497X
dc.identifier.urihttp://hdl.handle.net/10026.1/15855
dc.description.abstract

<jats:sec> <jats:title content-type="abstract-subheading">Purpose</jats:title> <jats:p>The human factor is a major consideration in securing systems. A wide and increasing range of different technologies, devices, platforms, applications and services are being used every day by home users. In parallel, home users are also experiencing a range of different online threats and attacks and are increasingly being targeted as they lack the knowledge and awareness about potential threats and how to protect themselves. The increase in technologies and platforms also increases the burden upon a user to understand how to apply security across differing technologies, operating systems and applications. This results in managing the security across their technology portfolio increasingly more troublesome and time consuming. This paper aims to propose an approach that attempts to propose a system for improving security management and awareness for home users.</jats:p> </jats:sec> <jats:sec> <jats:title content-type="abstract-subheading">Design/methodology/approach</jats:title> <jats:p>The proposed system is capable of creating and assigning different security policies for different digital devices in a user-friendly fashion. These assigned policies are monitored, checked and managed to review the user’s compliance with the assigned policies to provide bespoke awareness content based on the user’s current needs.</jats:p> </jats:sec> <jats:sec> <jats:title content-type="abstract-subheading">Findings</jats:title> <jats:p>A novel framework was proposed for improving information security management and awareness for home users. In addition, a mock-up design was developed to simulate the proposed approach to visualise the main concept and the functions which might be performed when it is deployed in a real environment. A number of different scenarios have been simulated to show how the system can manage and deal with different types of users, devices and threats. In addition, the proposed approach has been evaluated by experts in the research domain. The overall feedback is positive, constructive and encouraging. The experts agreed that the identified research problem is a real problem. In addition, they agreed that the proposed approach is usable, feasible and effective in improving security management and awareness for home users.</jats:p> </jats:sec> <jats:sec> <jats:title content-type="abstract-subheading">Research limitations/implications</jats:title> <jats:p>The proposed design of the system is a mock-up design without real data. Therefore, implementing the proposed approach in a real environment can provide the researcher with a better understanding of the effectiveness and the functionality of the proposed approach.</jats:p> </jats:sec> <jats:sec> <jats:title content-type="abstract-subheading">Practical implications</jats:title> <jats:p>This study offers a framework and usable mock-up design which can help in improving information security management for home users.</jats:p> </jats:sec> <jats:sec> <jats:title content-type="abstract-subheading">Originality/value</jats:title> <jats:p>Improving the security management and awareness for home users by monitoring, checking and managing different security controls and configurations effectively are the key to strengthen information security. Therefore, when home users have a good level of security management and awareness, this could protect and secure the home network and subsequently business infrastructure and services as well.</jats:p> </jats:sec>

dc.format.extent25-48
dc.languageen
dc.language.isoen
dc.publisherEmerald
dc.subjectGeneric health relevance
dc.titleA novel approach for improving information security management and awareness for home environments
dc.typejournal-article
dc.typeJournal Article
plymouth.issue1
plymouth.volume29
plymouth.publication-statusPublished
plymouth.journalInformation and Computer Security
dc.identifier.doi10.1108/ICS-05-2020-0073
plymouth.organisational-group/Plymouth
plymouth.organisational-group/Plymouth/Faculty of Science and Engineering
plymouth.organisational-group/Plymouth/Faculty of Science and Engineering/School of Engineering, Computing and Mathematics
plymouth.organisational-group/Plymouth/REF 2021 Researchers by UoA
plymouth.organisational-group/Plymouth/REF 2021 Researchers by UoA/UoA11 Computer Science and Informatics
plymouth.organisational-group/Plymouth/Users by role
plymouth.organisational-group/Plymouth/Users by role/Academics
dcterms.dateAccepted2020-06-25
dc.rights.embargodate2020-8-7
dc.identifier.eissn2056-497X
dc.rights.embargoperiodNot known
rioxxterms.versionofrecord10.1108/ICS-05-2020-0073
rioxxterms.licenseref.urihttp://www.rioxx.net/licenses/all-rights-reserved
rioxxterms.licenseref.startdate2020-08-03
rioxxterms.typeJournal Article/Review


Files in this item

Thumbnail
Thumbnail

This item appears in the following Collection(s)

Show simple item record


All items in PEARL are protected by copyright law.
Author manuscripts deposited to comply with open access mandates are made available in accordance with publisher policies. Please cite only the published version using the details provided on the item record or document. In the absence of an open licence (e.g. Creative Commons), permissions for further reuse of content should be sought from the publisher or author.
Theme by 
Atmire NV